• Title/Summary/Keyword: Multiple Infrastructure

Search Result 346, Processing Time 0.02 seconds

Semantic Segmentation for Multiple Concrete Damage Based on Hierarchical Learning (계층적 학습 기반 다중 콘크리트 손상에 대한 의미론적 분할)

  • Shim, Seungbo;Min, Jiyoung
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.6
    • /
    • pp.175-181
    • /
    • 2022
  • The condition of infrastructure deteriorates as the service life increases. Since most infrastructure in South Korea were intensively built during the period of economic growth, the proportion of outdated infrastructure is rapidly increasing now. Aging of such infrastructure can lead to safety accidents and even human casualties. To prevent these issues in advance, periodic and accurate inspection is essential. For this reason, the need for research to detect various types of damage using computer vision and deep learning is increasingly required in the field of remotely controlled or autonomous inspection. To this end, this study proposed a neural network structure that can detect concrete damage by classifying it into three types. In particular, the proposed neural network can detect them more accurately through a hierarchical learning technique. This neural network was trained with 2,026 damage images and tested with 508 damage images. As a result, we completed an algorithm with average mean intersection over union of 67.04% and F1 score of 52.65%. It is expected that the proposed damage detection algorithm could apply to accurate facility condition diagnosis in the near future.

Efficient and Secure Identity-Based Public Auditing for Dynamic Outsourced Data with Proxy

  • Yu, Haiyang;Cai, Yongquan;Kong, Shanshan;Ning, Zhenhu;Xue, Fei;Zhong, Han
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.10
    • /
    • pp.5039-5061
    • /
    • 2017
  • Cloud storage becomes a new trend that more and more users move their data to cloud storage servers (CSSs). To ensure the security of cloud storage, many cloud auditing schemes are proposed to check the integrity of users' cloud data. However, most of them are based on public key infrastructure, which leads to complex certificates management and verification. Besides, most existing auditing schemes are inefficient when user uploads a large amount of data or a third party auditor (TPA) performs auditing for multiple users' data on different CSSs. To overcome these problems, in this paper, we propose an efficient and secure auditing scheme based on identity-based cryptography. To relieve user's computation burden, we introduce a proxy, which is delegated to generate and upload homomorphic verifiable tags for user. We extend our auditing scheme to support auditing for dynamic data operations. We further extend it to support batch auditing in multiple users and multiple CSSs setting, which is practical and efficient in large scale cloud storage system. Extensive security analysis shows that our scheme is provably secure in random oracle model. Performance analysis demonstrates that our scheme is highly efficient, especially reducing the computation cost of proxy and TPA.

A Review of Clinical Studies for Treatment of Multiple System Atrophy Using the CNKI Database (다계통 위축증의 치료에 대한 임상연구 동향 - CNKI검색을 중심으로)

  • Kim, Min-ji;Won, Seo-young;Kim, Hae-yoong;Ryu, Ju-young;Jung, Eun-sun;Yoo, Ho-ryong;Seol, In-chan;Kim, Yoon-sik
    • The Journal of Internal Korean Medicine
    • /
    • v.41 no.4
    • /
    • pp.612-623
    • /
    • 2020
  • Objectives: The aim of this research was to investigate and review the trends in recent clinical studies of multiple system atrophy (MSA) in China. Methods: We searched for clinical studies discussing Oriental medicine-based treatments for MSA in the China National Knowledge Infrastructure (CNKI) database. The search focused on the authors; publication year; type of study; method and duration of treatment; evaluation criteria; and results of the selected articles. Results: Among the articles retrieved from the database, eight case series, two randomized controlled trials (RCTs), and one non-randomized controlled trial (nRCT) were analyzed. Eight articles used acupuncture; ten used herbal medicine. The most frequently used acupoints were GV20, GV24, GB20, PC6, Hyeopcheok Acupoint, CV4, EX-HN3, and GV17. Jihwangeumja was the most commonly used herbal prescription. All 13 studies confirmed the efficacy of Oriental medicine treatments. Conclusions: More varied and scientifically designed clinical studies are required to develop treatments for MSA. The results of this study may provide guidance for further studies of MSA.

A Study on Swarm Robot-Based Invader-Enclosing Technique on Multiple Distributed Object Environments

  • Ko, Kwang-Eun;Park, Seung-Min;Park, Jun-Heong;Sim, Kwee-Bo
    • Journal of Electrical Engineering and Technology
    • /
    • v.6 no.6
    • /
    • pp.806-816
    • /
    • 2011
  • Interest about social security has recently increased in favor of safety for infrastructure. In addition, advances in computer vision and pattern recognition research are leading to video-based surveillance systems with improved scene analysis capabilities. However, such video surveillance systems, which are controlled by human operators, cannot actively cope with dynamic and anomalous events, such as having an invader in the corporate, commercial, or public sectors. For this reason, intelligent surveillance systems are increasingly needed to provide active social security services. In this study, we propose a core technique for intelligent surveillance system that is based on swarm robot technology. We present techniques for invader enclosing using swarm robots based on multiple distributed object environment. The proposed methods are composed of three main stages: location estimation of the object, specified object tracking, and decision of the cooperative behavior of the swarm robots. By using particle filter, object tracking and location estimation procedures are performed and a specified enclosing point for the swarm robots is located on the interactive positions in their coordinate system. Furthermore, the cooperative behaviors of the swarm robots are determined via the result of path navigation based on the combination of potential field and wall-following methods. The results of each stage are combined into the swarm robot-based invader-enclosing technique on multiple distributed object environments. Finally, several simulation results are provided to further discuss and verify the accuracy and effectiveness of the proposed techniques.

Efficiency Enhancement Plan of the Ambiguity Leveling System for Multiple Clusters (미지정수 수준 조정을 고려한 다중클러스터 시스템 효율화 방안)

  • Yu, Sunkyoung;Song, Junesol;Kee, Changdon
    • Journal of Advanced Navigation Technology
    • /
    • v.21 no.6
    • /
    • pp.572-578
    • /
    • 2017
  • As the demand of high accuracy positioning for dynamic users increases, Network RTK is actively researched for dynamic users. Network RTK is a system which provides precise positioning in the range of about 50 to 70km radius using carrier phase measurements from several reference stations. By configuring multiple clusters, which provide Network RTK corrections independently, as a single system, it could provide precise positioning for a wider area. In this paper, we have studied how to efficiently operate multiple clusters in the Korean Peninsula. We analyzed the computational load according to the configuration of a multi-cluster system and proposed a method of selecting the main reference station and system infrastructure configuration for efficient operation. In order to analyze the effects of each proposed method, 71 clusters were constructed using the reference stations of the National Geographic Information Institute and simulations were conducted. As a result of the simulation, system computation amount was reduced by 66 % and system configuration cost was reduced by 90 %.

A New Architecture to Offload Network Traffic using OpenFlow in LTE

  • Venmani, Daniel Philip;Gourhant, Yvon;Zeghlache, Djamal
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.1
    • /
    • pp.31-38
    • /
    • 2012
  • Next generation cellular applications and smart phone usage generate very heavy wireless data traffic. It becomes ineluctable for mobile network operators to have multiple core network entities such as Serving Gateway and Packet Data Network Gateway in 4G-LTE to share this high traffic generated. A typical configuration consists of multiple serving gateways behind a load-balancer which would determine which serving gateway would service a end-users'request. Such hardware is expensive, has a rigid policy set, and is a single point of failure. Another perspective of today's increasingly high data traffic is that besides it is being widely accepted that the high bandwidth L TE provides is creating bottlenecks for service providers by the increasing user bandwidth demands without creating any corresponding revenue improvements, a hidden problem that is also passively advancing on the newly emerging 4G-LTE that may need more immediate attention is the network signaling traffic, also known as the control-plane traffic that is generated by the applications developed for smartphones and tablets. With this as starting point, in this paper, we propose a solution, by a new approach considering OpenFlow switch connected to a controller, which gains flexibility in policy, costs less, and has the potential to be more robust to failure with future generations of switches. This also solves the problem of scaling the control-plane traffic that is imperative to preserve revenue and ensure customer satisfaction. Thus, with the proposed architecture with OpenFlow, mobile network operators could manipulate the traffic generated by the control-plane signaling separated from the data-plane, besides also reducing the cost in installing multiple core-network entities.

Real-Time Full Accounting Management System in Multi-services Access Integrated Network : Design and Implementation (다중 서비스망 환경에서의 실시간 과금 관리 시스템설계 및 구현)

  • Chang, Beom-Hwan;Kim, Jong-Min;Go, Byung-Do;Chung, Tai-Myoung
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.2
    • /
    • pp.254-264
    • /
    • 2000
  • The billing techniques to support multiple services in an ATM based broadband access network have been rarely developed. In fact, the management techniques including accounting management have only focused on a single service environment such as PSTN thus far. In this paper, we present an accounting management system, called rtFAMS, designed and implemented to provide multiple Value Added Service Providers (VASPS) the charging records for the multiple services in a broadband access network. The architecture is based on OSI system management infrastructure and TMN Q3 interface to acquire accounting information from agents in the ATM cross-connecters as well as to process the billing mechanisms in the manager. This system Is designed to actively adopt the rapidly changing service environments and B-ISDN network management techniques. It also provides real-time accounting information to users using Web in addition to supplying the billing records to VASPs.

  • PDF

A Study on the Low Power Line Modulation and Power Line Channel Modeling (저압 전력선 통신 변조 기법 및 전력선 채널 특성)

  • Kand Duk-Ha;Heo Yoon-Seok;Cho Ki-Hyung;Lee Dae-Young
    • The Journal of Information Technology
    • /
    • v.5 no.4
    • /
    • pp.1-8
    • /
    • 2002
  • This thesis is about power line communication(PLC) over the low voltage grid. The main advantage with power line communication is the use of an existing infrastructure. The PLC channel can be modeled as having multi-path propagation with frequency-selective fading, typical power lines exhibit signal attenuation increasing with length and frequency. OFDM(Orthogonal Frequency Division Multiplexing) is a modulation technique where multiple low data rate carriers are combined by a transmitter to form a composite high data rate transmission. To implement the multiple carrier scheme using a bank of parallel modulators would not be very efficient in analog hardware. Each carrier in an OFDM is a sinusoid with a frequency that is an integer multiple of a base or fundamental sinusoid frequency. Therefore, each carrier is a like a Fourier series component of the composite signal. In fact, it will be shown later that an OFDM signal is created in the frequency domain, and then transformed into the time domain via the Discrete Fourier Transform(DFT).

  • PDF

저압 전력선 채널 특성을 고려한 OFDM변조 전송

  • Kang Duk-Ha;Heo Yoon-Seok;Cho Ki-Hyung;Lee Dae-Young
    • The Journal of Information Technology
    • /
    • v.6 no.2
    • /
    • pp.1-8
    • /
    • 2003
  • This paper is about power line communication(PLC) over the low power voltage grid. The main advantage with power line communication is the use of an existing infrastructure. The PLC channel can be modeled as having multi-path propagation with frequency-selective fading, typical power lines exhibit signal attenuation increasing with length and frequency. OFDM(Orthogonal Frequency Division Multiplexing) is a modulation technique where multiple low data rate carriers are combined by a transmitter to form a composite high data rate transmission. To implement the multiple carrier scheme using a bank of parallel modulators would not be very efficient in analog hardware. Each carrier in an OFDM is a sinusoid with a frequency that is an integer multiple of a base or fundamental sinusoid frequency. Therefore, each carrier is a like a Fourier series component of the composite signal. In fact, it will be shown later that an OFDM signal is created in the frequency domain, and then transformed into the time domain via the Discrete Fourier Transform(DFT).

  • PDF

Performance of Energy Detection Scheme with Multiple Antenna for Cognitive Radio Based Ad-hoc Networks (인지 무선 기반 애드혹 네트워크에서 다중 안테나 기법을 적용한 에너지 검출 기법의 성능)

  • Lee, Kyung-Sun;Kim, Yoon-Hyun;Lee, Myung-Noh;Rhee, Jong-Myung;Kim, Jin-Young
    • Journal of Satellite, Information and Communications
    • /
    • v.6 no.2
    • /
    • pp.60-65
    • /
    • 2011
  • Wireless devices can communicate between each other without existing infrastructure in mobile Ad-hod network. Ad hoc networks can be used under difficult conditions, where it is difficult to construct infrastructures, such as shadowing areas, disaster areas, war area, and so on. In order to support to considerable and various wireless services, more spectrum resources are needed. However, efficient utilization of the frequency resource is difficult because of spectrum scarcity and the conventional frequency regulation. Ad-hoc networks employing cognitive radio (CR) system that guarantee high spectrum utilization provide effective way to increase the network capacity. In this paper, to improve detection performance of the energy detection which is widely used in CR based ad-hoc network, we propose multiple antenna system for CR based ad-hoc networks.