• Title/Summary/Keyword: Rapid processing

Search Result 1,383, Processing Time 0.026 seconds

Real-time Recognition and Tracking System of Multiple Moving Objects (다중 이동 객체의 실시간 인식 및 추적 시스템)

  • Park, Ho-Sik;Bae, Cheol-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7C
    • /
    • pp.421-427
    • /
    • 2011
  • The importance of the real-time object recognition and tracking field has been growing steadily due to rapid advancement in the computer vision applications industry. As is well known, the mean-shift algorithm is widely used in robust real-time object tracking systems. Since the mentioned algorithm is easy to implement and efficient in object tracking computation, many say it is suitable to be applied to real-time object tracking systems. However, one of the major drawbacks of this algorithm is that it always converges to a local mode, failing to perform well in a cluttered environment. In this paper, an Optical Flow-based algorithm which fits for real-time recognition of multiple moving objects is proposed. Also in the tests, the newly proposed method contributed to raising the similarity of multiple moving objects, the similarity was as high as 0.96, up 13.4% over that of the mean-shift algorithm. Meanwhile, the level of pixel errors from using the new method keenly decreased by more than 50% over that from applying the mean-shift algorithm. If the data processing speed in the video surveillance systems can be reduced further, owing to improved algorithms for faster moving object recognition and tracking functions, we will be able to expect much more efficient intelligent systems in this industrial arena.

Negative Transition of Smart Device Utility: Empirical Study on IT-enabled Work Flexibility, After Hours Work Connectivity, and Work-Life Conflict (스마트기기 효용의 부정적 전이: IT기반 업무 유연성, 근무시간 외 업무 연결성, 일-삶 갈등에 관한 실증 연구)

  • Kim, Hyung-Jin;Lee, Yoon-ji;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.36-61
    • /
    • 2019
  • While smart devices can have a positive impact on work efficiency and productivity by reducing time-space constraints and enabling rapid processing of tasks, side effects can arise from the imbalances between work and personal life. In recent years, as smart devices are increasingly used in work environments, it is more necessary than ever to understand the related phenomenon, find the cause of negative effects, and search for appropriate solutions. This study has developed and verified a theoretical model that shows how the technical characteristics known as the utility of smart devices are converted into negative results such as work-life conflict. As a result of analyzing the collected data from the employees, our study provides significant implications for the researchers, as well as the practitioners and policy makers, regarding various relationships among IT-enabled work flexibility, after-hours work connectivity and work-life conflict, and the new knowledge about the important role of segmentation supplies from the organization.

Analysis of IoT Open-Platform Cryptographic Technology and Security Requirements (IoT 오픈 플랫폼 암호기술 현황 및 보안 요구사항 분석)

  • Choi, Jung-In;Oh, Yoon-Seok;Kim, Do-won;Choi, Eun Young;Seo, Seung-Hyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.7
    • /
    • pp.183-194
    • /
    • 2018
  • With the rapid development of IoT(Internet of Things) technology, various convenient services such as smart home and smart city have been realized. However, IoT devices in unmanned environments are exposed to various security threats including eavesdropping and data forgery, information leakage due to unauthorized access. To build a secure IoT environment, it is necessary to use proper cryptographic technologies to IoT devices. But, it is impossible to apply the technologies applied in the existing IT environment, due to the limited resources of the IoT devices. In this paper, we survey the classification of IoT devices according to the performance and analyze the security requirements for IoT devices. Also we survey and analyze the use of cryptographic technologies in the current status of IoT open standard platform such as AllJoyn, oneM2M, IoTivity. Based on the research of cryptographic usage, we examine whether each platform satisfies security requirements. Each IoT open platform provides cryptographic technology for supporting security services such as confidentiality, integrity, authentication an authorization. However, resource constrained IoT devices such as blood pressure monitoring sensors are difficult to apply existing cryptographic techniques. Thus, it is necessary to study cryptographic technologies for power-limited and resource constrained IoT devices in unattended environments.

Experimental Study on Moisture Content According to Addition of Surfactants (계면활성제 첨가에 따른 함수율에 관한 실험적 연구)

  • Kim, Nam-Kyun;Rie, Dong-Ho
    • Fire Science and Engineering
    • /
    • v.29 no.2
    • /
    • pp.79-83
    • /
    • 2015
  • The fire accident is a representative type of disaster that can largely impact on business. Therefore, precautionary measures and rapid initial response is very important when a disaster occurs. The storage of porous combustibles is inevitable in coal yard, plywood processing industry, and others that are currently operating. Initial fire fighting of fire and identifying the ignition point in such a porous combustible storage space are so difficult that if the initial response is failed, being led to deep-seated fire, surface fire is likely to result in secondary damage. In addition, deep-seated fire can cause personal injuries and property damage due to a large amount of toxic gases and reignition. Therefore damage reduction measures is required around the storage space to handle a porous flammable. Improving the penetration performance of the concentration of the surfactant is carried out as underlying study, which is about an deep-seated fire extinguishing efficiency augmentation when using wetting agents. The porous materials used in the experiments is radiata pine wood flour, which occupies more than 75% of the domestic wood market. Fire fighting water is selected as Butyl Di Glycol (BDG), which is being used for infiltration extinguishing agent, and the experiment was carried out by producing a standard solution. The experiment was carried out on the basis of the Deep-Seated Fire Test of NFPA 18. The amount of watering, porous material to the internal amount of penetration, and runoff measurement out of the porous material was conducted. According to experimental results, as the surface tension is reduced, the surfactant concentration macroscopic penetration rate decreases, but infiltration to a porous material is shown to have growth characteristics.

Corrosion Behavior of $Y_2O_3$ Coating in an Electrolytic Reduction Process (전해환원공정에서 $Y_2O_2$ 코팅층의 부식거동)

  • Cho, Soo-Haeng;Hong, Sun-Seok;Kang, Dae-Seung;Jeong, Myeong-Soo;Park, Byung-Heong;Hur, Jin-Mok;Lee, Han-Soo
    • Journal of Nuclear Fuel Cycle and Waste Technology(JNFCWT)
    • /
    • v.8 no.1
    • /
    • pp.33-39
    • /
    • 2010
  • The electrolytic reduction of a spent oxide fuel involves a liberation of the oxygen in a molten LiCl electrolyte, which results in a chemically aggressive environment that is too corrosive for typical structural materials. Accordingly, it is essential to choose the optimum material for the processing equipment that handles the high molten salt. In this study, hot corrosion studies were performed on bare as well as coated superalloy specimens after exposure to lithium molten salt at $675^{\circ}C$ for 216 h under an oxidizing atmosphere. The IN713LC superalloy specimens were sprayed with an aluminized NiCrAlY bond coat and then with an $Y_2O_3$ top coat. The bare superalloy reveals an obvious weight loss due to spalling of the scale by the rapid scale growth and thermal stress. The chemical and thermal stability of the top coat has been found to be beneficial for increasing to the corrosion resistance of the structural materials for handling high temperature lithium molten salts.

Capacitively-coupled Resistivity Method - Applicability and Limitation (비접지식 전기비저항 탐사 - 적용성과 한계)

  • Lee Seong Kon;Cho Seong-Jun;Song Yoonho;Chung Seung-Hwan
    • Geophysics and Geophysical Exploration
    • /
    • v.5 no.1
    • /
    • pp.23-32
    • /
    • 2002
  • Capacitively-coupled resistivity (CCR) system is known to be very useful where galvanic contact to earth is impossible, such as the area covered with thick ice, snow, concrete or asphalt. This system injects current non-galvanically, i.e., capacitively to earth through line antenna and measures potential difference in a same manner. We derived geometric factor for two types of antenna configuration and presented the method of processing and converting the data obtained with CCR system suitable to conventional resistivity inversion analysis. The CCR system, however, has limitations on use at conductive area or electrically noisy area since it is very difficult to inject sufficient current to earth with this system as with conventional resistivity system. This causes low SM ratio when acquiring data with CCR system and great care must be taken in acquiring data with this system. Additionally the uniform contact between line antennas and earth is also crucial factor to obtain good S/N ratio data. The CCR method, however, enables one to perform continuous profiling over a survey line by dragging entire system and thus will be useful in rapid investigation of conductivity distribution in shallow subsurface.

Short Heterodimer Partner as a Regulator in OxLDL-induced Signaling Pathway

  • Kimpak, Young-Mi
    • Proceedings of the PSK Conference
    • /
    • 2001.10a
    • /
    • pp.109-113
    • /
    • 2001
  • Oxidized low-density lipoprotein (oxLDL) has been shown to modulate transactivations by the peroxisome proliferator activated receptor (PPAR)$\gamma$ and nuclear factor-kappa B (NF$\kappa$B). In this study, the oxLDL signaling pathways involved with the NF$\kappa$B transactivation were investigated by utilizing a reporter construct driven by three upstream NF$\kappa$B binding sites, and various pharmacological inhibitors. OxLDL and its constituent lysophophatidylcholine (lysoPC) induced a rapid and transient increase of intracellular calcium and stimulated the NF-KB transactivation in resting RAW264.7 macrophage cells in an oxidation-dependent manner. The NF$\kappa$B activation by oxLDL or lysoPC was inhibited by protein kinase C inhibitors or an intracellular calcium chelator. Tyrosine kinase or PI3 kinase inhibitors did not block the NF$\kappa$B transactivation. Furthermore, the oxLDL-induced NF$\kappa$B activity was abolished by the PPAR$\gamma$ ligands. When the endocytosis of oxLDL was blocked by cytochalasin B, the NF$\kappa$B transactivation by oxLDL was synergistically increased, while PPAR transactivation was blocked. These results suggest that oxLDL activates NF-$\kappa$B in resting macrophages via protein kinase C- and/or calcium-dependent pathways, which does not involve the endocytic processing of oxLDL. The endocytosis-dependent PPAR$\gamma$ activation by oxLDL may function as an inactivation route of the oxLDL induced NF$\kappa$B signal. Short heterodimer partner (SHP), specifically expressed in liver and a limited number of other tissues, is an unusual orphan nuclear receptor that lacks the conventional DNA-binding domain. In this work, we found that SHP expression is abundant in murine macrophage cell line RAW 264.7 but suppressed by oxLDL and its constituent I3-HODE, a ligand for peroxisome proliferator-activated receptor y. Furthermore, SHP acted as a transcription coactivator of nuclear factor-$\kappa$B (NF$\kappa$B) and was essential for the previously described NF$\kappa$B transactivation by lysoPC, one of the oxLDL constituents. Accordingly, NF$\kappa$B, transcriptionally active in the beginning, became progressively inert in oxLDL-treated RAW 264.7 cells, as oxLDL decreased the SHP expression. Thus, SHP appears to be an important modulatory component to regulate the transcriptional activities of NF$\kappa$B in oxLDL-treated, resting macrophage cells.

  • PDF

Authentication Mechanism Using Three-Dimensional Optical Memory (3차원 광메모리를 이용한 인증 기법)

  • Park, CheolYong;Ryou, JaeCheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.6
    • /
    • pp.1361-1373
    • /
    • 2016
  • Recently the need for user authentication with increasing, there are a variety of mechanisms, such as password, graphic authentication, token, biometrics and multiple authentication. in particular, the data of the 2-dimensional(2D) factors such as password, graphic authentication, biometrics is used because of the convenience. The stored information is problematic in that additional data recording needs to be performed whenever authentication data is updated. Furthermore, this storage method is problematic in that the time it takes to perform authentication increases because the time it takes to compare storage data with authentication data increases in proportion to an increase in the amount of the storage data. Accordingly, authentication through the rapid comparison of storage data with authentication data is a very important factor in data recording and authentication technology using memory. Using the three-dimensional(3D) optical memory by variously changing the recoding elements during recoding of data constitutes the way that multiple recoding different data storage. This enables high-density recoding in this way, and by applying the possible parallel processing at the time of recording and restoring method, provided that it is possible to quickly record and restore the data. In addition, each time to solve problems that require additional data recorded by a combination of the stored data record in the old data using a combination of the authentication. The proposed mechanism is proposed an authentication method using scheme after the recoding data in 3D optical memory to apply the conditions corresponding to the recoding condition when restoring the recorded data and through the experiment it was confirmed possible application as an authentication mechanism.

Study about Component Identification Method Based On RUP (RUP 기반의 컴포넌트 식별 방법에 관한 연구)

  • Choe, Mi-Suk;Yun, Yong-Ik;Park, Jae-Nyeon
    • The KIPS Transactions:PartD
    • /
    • v.9D no.1
    • /
    • pp.91-102
    • /
    • 2002
  • We need a component-based system to reflect software changes in user's requirements, to implement a system at a rapid speed as well as to efficiently manage the system in a maintenance phase and to easily change software. Moreover, the component-based system has a merit in development cost. However, existing component development methodology for implement of component-based system is inefficient in object identification for component identification. Moreover, the existing component development methodology also fails to provide any method to identify system component. It merely provides procedures and methods to identify business component focused on a whole system domain. In addition, it has another problem that it considerably relies on developer's experiences and intuitions for component identification. Therefore, according to this paper, RUP (Rational Unified Process) is applied from a requirement analysis phase to an object identification phase in order to improve the inefficiency of object identification. In addition, this paper procedures and methods for system component identification, and identifies business components based on the identified system component, rather than on the whole system domain. This paper also provides and applies cohesion metric and coupling metric so as to overcome the problem that component identification depends on developer's intuitions and experiences. Accordingly, the component identification method proposed in this paper, may identify components more effectively based on facility of object identification, functional reusability of components, traceability, and independence of components.

Log-Structured B-Tree for NAND Flash Memory (NAND 플래시 메모리를 위한 로그 기반의 B-트리)

  • Kim, Bo-Kyeong;Joo, Young-Do;Lee, Dong-Ho
    • The KIPS Transactions:PartD
    • /
    • v.15D no.6
    • /
    • pp.755-766
    • /
    • 2008
  • Recently, NAND flash memory is becoming into the spotlight as a next-generation storage device because of its small size, fast speed, low power consumption, and etc. compared to the hard disk. However, due to the distinct characteristics such as erase-before-write architecture, asymmetric operation speed and unit, disk-based systems and applications may result in severe performance degradation when directly implementing them on NAND flash memory. Especially when a B-tree is implemented on NAND flash memory, intensive overwrite operations may be caused by record inserting, deleting, and reorganizing. These may result in severe performance degradation. Although ${\mu}$-tree has been proposed in order to overcome this problem, it suffers from frequent node split and rapid increment of its height. In this paper, we propose Log-Structured B-Tree(LSB-Tree) where the corresponding log node to a leaf node is allocated for update operation and then the modified data in the log node is stored at only one write operation. LSB-tree reduces additional write operations by deferring the change of parent nodes. Also, it reduces the write operation by switching a log node to a new leaf node when inserting the data sequentially by the key order. Finally, we show that LSB-tree yields a better performance on NAND flash memory by comparing it to ${\mu}$-tree through various experiments.