• Title/Summary/Keyword: Processing Trade

Search Result 313, Processing Time 0.027 seconds

Devlopment of wearable and liked apps to improve chewing movement of children with developmental disabilities (발달장애 아동의 저작(씹는)운동 개선을 위한 웨어러블 및 연동 앱 개발)

  • Su-In Cha;Young-Min Go;Soo-Yong Choi;Jin-Young Kim;Jin-Young Kim
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.988-989
    • /
    • 2023
  • 본 논문에서는 발달장애 아동의 교육 및 치료에 있어서 감각, 인지훈련을 효과적으로 할 수 있는 웨어러블 기기 및 연동앱을 제시한다. 이를 위해 임베디드 하드웨어를 개발하고 이와 연동할 수 있는 앱, 앱 내 게이미피케이컨텐츠, 학습 내용 및 결과 리포트를 개발했다. 발달장애 아동의 특성을 고려한 하드웨어는 유아 친화적 디자인으로 설계해 아동이 쉽게 착용 가능하며, 주의집중을 위한 감각 훈련을 집중적으로 할 수 있도록 시각, 촉각 등의 자극 촉구 행동을 유도하며, 반복적 교육으로 인한 개선 효과를 제공한다. 개발한 기기 및 연동앱을 직접 교육현장에 적용해봄으로써 주의집중과 저작능력 향상을 위한 센터에서의 지속적인 실사용 가능성을 제고했다.

A group-wise attention based decoder for lightweight salient object detection on edge-devices (엣지 디바이스에서 객체 탐지를 위한 그룹별 어탠션 기반 경량 디코더 연구)

  • Thien-Thu Ngo;Md Delowar Hossain;Eui-Nam Huh
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2023.11a
    • /
    • pp.30-33
    • /
    • 2023
  • The recent scholarly focus has been directed towards the expeditious and accurate detection of salient objects, a task that poses considerable challenges for resource-limited edge devices due to the high computational demands of existing models. To mitigate this issue, some contemporary research has favored inference speed at the expense of accuracy. In an effort to reconcile the intrinsic trade-off between accuracy and computational efficiency, we present novel model for salient object detection. Our model incorporate group-wise attentive module within the decoder of the encoder-decoder framework, with the aim of minimizing computational overhead while preserving detection accuracy. Additionally, the proposed architectural design employs attention mechanisms to generate boundary information and semantic features pertinent to the salient objects. Through various experimentation across five distinct datasets, we have empirically substantiated that our proposed models achieve performance metrics comparable to those of computationally intensive state-of-the-art models, yet with a marked reduction in computational complexity.

Using Syntax and Shallow Semantic Analysis for Vietnamese Question Generation

  • Phuoc Tran;Duy Khanh Nguyen;Tram Tran;Bay Vo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.10
    • /
    • pp.2718-2731
    • /
    • 2023
  • This paper presents a method of using syntax and shallow semantic analysis for Vietnamese question generation (QG). Specifically, our proposed technique concentrates on investigating both the syntactic and shallow semantic structure of each sentence. The main goal of our method is to generate questions from a single sentence. These generated questions are known as factoid questions which require short, fact-based answers. In general, syntax-based analysis is one of the most popular approaches within the QG field, but it requires linguistic expert knowledge as well as a deep understanding of syntax rules in the Vietnamese language. It is thus considered a high-cost and inefficient solution due to the requirement of significant human effort to achieve qualified syntax rules. To deal with this problem, we collected the syntax rules in Vietnamese from a Vietnamese language textbook. Moreover, we also used different natural language processing (NLP) techniques to analyze Vietnamese shallow syntax and semantics for the QG task. These techniques include: sentence segmentation, word segmentation, part of speech, chunking, dependency parsing, and named entity recognition. We used human evaluation to assess the credibility of our model, which means we manually generated questions from the corpus, and then compared them with the generated questions. The empirical evidence demonstrates that our proposed technique has significant performance, in which the generated questions are very similar to those which are created by humans.

QNFT: A Post-Quantum Non-fungible Tokens for Secure Metaverse Environment

  • Abir El Azzaoui;JaeSoo Kim
    • Journal of Information Processing Systems
    • /
    • v.20 no.2
    • /
    • pp.273-283
    • /
    • 2024
  • The digital domain has witnessed unprecedented growth, reshaping the way we interact, work, and even perceive reality. The internet has evolved into a vast ecosystem of interconnected virtual worlds, giving birth to the concept of the Metaverse. The Metaverse, often envisioned as a collective virtual shared space, is created by the convergence of virtually enhanced physical reality and interactive digital spaces. Within this Metaverse space, the concept of ownership, identity, and authenticity takes on new dimensions, necessitating innovative solutions to safeguard individual rights. The digital transformation through Metaverse has also brought forth challenges, especially in copyright protection. As the lines between the virtual and physical blur, the traditional notions of ownership and rights are being tested. The Metaverse, with its multitude of user-generated content, poses unique challenges. The primary objective of this research is multifaceted. Firstly, there's a pressing need to understand the strategies employed by non-fungible token (NFT) marketplaces within the Metaverse to strengthen security and prevent copyright violations. As these platforms become centers for digital transactions, ensuring the authenticity and security of each trade becomes paramount. Secondly, the study aims to delve deep into the foundational technologies underpinning NFTs, from the workings of blockchain to the mechanics of smart contracts, to understand how they collectively ensure copyright protection. Thus, in this paper, we propose a quantum based NFT solution that can secure Metaverse and copyright contents in an advanced manner.

The Determinants and their Time-Varying Spillovers on Liquefied Natural Gas Import Prices in China Based on TVP-FAVAR Model

  • Ying Huang;Yusheng Jiao
    • Journal of Information Processing Systems
    • /
    • v.20 no.1
    • /
    • pp.93-104
    • /
    • 2024
  • China is playing more predominant role in the liquefied natural gas (LNG) market worldwide and LNG import price is subject to various factors both at home and abroad. Nevertheless, previous studies rarely heed a multiple of factors. A time-varying parameter factor augmented vector auto-regression (TVP-FAVAR) model is adopted to discover the determinants of China's LNG import price and their dynamic impacts from January 2012 to December 2021. According to the findings, market fundamentals have a greater impact on the import price of natural gas in China than overall economic demand, financial considerations, and world oil prices. The primary determinants include domestic gas consumption, consumer confidence and other demand-side information. Then, there are diverse and time-varying spillover effects of the four common determinants on the volatility of China's LNG import price at different intervals and time nodes. The price volatility is more sensitive and long-lasting to domestic natural gas pricing reform than other negative shocks such as the Sino-US trade war and the COVID-19 pandemic. The results in this study further proves the importance of domestic natural gas market liberalization. China ought to do more to support the further marketization of natural gas prices while working harder to guarantee natural gas supplies.

Energy-efficient Routing in MIMO-based Mobile Ad hoc Networks with Multiplexing and Diversity Gains

  • Shen, Hu;Lv, Shaohe;Wang, Xiaodong;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.2
    • /
    • pp.700-713
    • /
    • 2015
  • It is critical to design energy-efficient routing protocols for battery-limited mobile ad hoc networks, especially in which the energy-consuming MIMO techniques are employed. However, there are several challenges in such a design: first, it is difficult to characterize the energy consumption of a MIMO-based link; second, without a careful design, the broadcasted RREP packets, which are used in most energy-efficient routing protocols, could flood over the networks, and the destination node cannot decide when to reply the communication request; third, due to node mobility and persistent channel degradation, the selected route paths would break down frequently and hence the protocol overhead is increased further. To address these issues, in this paper, a novel Greedy Energy-Efficient Routing (GEER) protocol is proposed: (a) a generalized energy consumption model for the MIMO-based link, considering the trade-off between multiplexing and diversity gains, is derived to minimize link energy consumption and obtain the optimal transmit model; (b) a simple greedy route discovery algorithm and a novel adaptive reply strategy are adopted to speed up path setup with a reduced establishment overhead; (c) a lightweight route maintenance mechanism is introduced to adaptively rebuild the broken links. Extensive simulation results show that, in comparison with the conventional solutions, the proposed GEER protocol can significantly reduce the energy consumption by up to 68.74%.

Privacy Policy Analysis Techniques Using Deep Learning (딥러닝을 활용한 개인정보 처리방침 분석 기법 연구)

  • Jo, Yong-Hyun;Cha, Young-Kyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.2
    • /
    • pp.305-312
    • /
    • 2020
  • The Privacy Act stipulates that the privacy policy document, which is a privacy statement, should be disclosed in order to guarantee the rights of the information subjects, and the Fair Trade Commission considers the privacy policy as a condition and conducts an unfair review of the terms and conditions under the Terms and Conditions Control Act. However, the information subjects tend not to read personal information because it is complicated and difficult to understand. Simple and legible information processing policies will increase the probability of participating in online transactions, contributing to the increase in corporate sales and resolving the problem of information asymmetry between operators and information entities. In this study, complex personal information processing policies are analyzed using deep learning, and models are presented for acquiring simplified personal information processing policies that are highly readable by the information subjects. To present the model, the personal information processing policies of 258 domestic companies were established as data sets and analyzed using deep learning technology.

Improving Accuracy of Chapter-level Lecture Video Recommendation System using Keyword Cluster-based Graph Neural Networks

  • Purevsuren Chimeddorj;Doohyun Kim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.7
    • /
    • pp.89-98
    • /
    • 2024
  • In this paper, we propose a system for recommending lecture videos at the chapter level, addressing the balance between accuracy and processing speed in chapter-level video recommendations. Specifically, it has been observed that enhancing recommendation accuracy reduces processing speed, while increasing processing speed decreases accuracy. To mitigate this trade-off, a hybrid approach is proposed, utilizing techniques such as TF-IDF, k-means++ clustering, and Graph Neural Networks (GNN). The approach involves pre-constructing clusters based on chapter similarity to reduce computational load during recommendations, thereby improving processing speed, and applying GNN to the graph of clusters as nodes to enhance recommendation accuracy. Experimental results indicate that the use of GNN resulted in an approximate 19.7% increase in recommendation accuracy, as measured by the Mean Reciprocal Rank (MRR) metric, and an approximate 27.7% increase in precision defined by similarities. These findings are expected to contribute to the development of a learning system that recommends more suitable video chapters in response to learners' queries.

Lock Management in n Main-Memory DBMS

  • Kim, Sang-Wook
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.62-65
    • /
    • 2002
  • The locking is the most widely-used concurrency control mechanism for guaranteeing logical consistency of a database where a number of transactions perform concurrently. In this Paper, we propose a new method for lock management appropriate in main-memory databases. Our method chooses the partition, a fixed-sized container for records. as a unit of locking. and directly keeps lock information within the Partition itself. These make our method enjoy the following advantages: (1) it has freedom in controlling of the trade-off between the system concurrency and the lock processing overhead by considering the characteristics of given target applications. (2) it enhances the overall system performance by eliminating the hashing overhead, a serious problem occurred in the traditional method.

  • PDF

Performance Evaluation of Burst Scheduling Schemes for WDM Optical Burst Switching (WDM 광 버스트 스위칭을 위한 버스트 스케줄링 기법의 성능 평가)

  • 차윤호;소원호;노선식;김영천
    • Proceedings of the IEEK Conference
    • /
    • 2000.11a
    • /
    • pp.177-180
    • /
    • 2000
  • Optical burst switching(OBS) is a new switching paradigm to supporting bursty traffic on the Internet efficiently. OBS separates burst level and control level. To handle data burst efficiently, the scheduling schemes in optical burst switching systems must keep track of future resource availability when assigning arriving data bursts to wavelength channels. In this paper, we evaluate the performance of three scheduling schemes which are called Horizon, Single-gap and Multiple-gap, as a basic study for the future research of Optical Internet. Thus, firstly, we analyze the trade-off between the performance and the processing overhead of each scheme. In addition, the performance of OBS system which uses Multiple-gap scheduling is evaluated in detail under various network size. We use simulation for performance evaluation in terms of burst loss rate(BLR), wavelength channel utilization and the number of management data.

  • PDF