• Title/Summary/Keyword: Recent update

Search Result 169, Processing Time 0.022 seconds

An Energy Efficient RF Protocol Structure for a Large-Scale In-Home Display Deployment (대규모 In-Home Display 보급을 위한 에너지 효율적 RF 통신 프로토콜 체계)

  • Lee, Seung-Min;Son, Sung-Yong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.1
    • /
    • pp.53-60
    • /
    • 2011
  • In-Home Display (IHD) is one of the most popular ways to induce voluntary customer participation in energy savings. Various communication technologies are used for recent IHD implementations, but most IHD systems are designed for each house because of their limitations such as communication coverage area and operation complexity. In this study, 400MHz RF communication is used for economical large-scale deployment of IHDs especially for apartment complexes that represent typical residentioal environment in Korea. Since it is essential to use internal batteries to increase the usability of IHD, the frequent changes of them should be avoided. By dividing communication data into 3 types such as common data, long term data, and short term data depending on their update periods, energy efficient communication protocol is designed and proposed. In result, the quantity of data and the battery consumption of IHD are reduced to 23.4% and 31.5% each without harming service quality.

A New CSR-DCF Tracking Algorithm based on Faster RCNN Detection Model and CSRT Tracker for Drone Data

  • Farhodov, Xurshid;Kwon, Oh-Heum;Moon, Kwang-Seok;Kwon, Oh-Jun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.12
    • /
    • pp.1415-1429
    • /
    • 2019
  • Nowadays object tracking process becoming one of the most challenging task in Computer Vision filed. A CSR-DCF (channel spatial reliability-discriminative correlation filter) tracking algorithm have been proposed on recent tracking benchmark that could achieve stat-of-the-art performance where channel spatial reliability concepts to DCF tracking and provide a novel learning algorithm for its efficient and seamless integration in the filter update and the tracking process with only two simple standard features, HoGs and Color names. However, there are some cases where this method cannot track properly, like overlapping, occlusions, motion blur, changing appearance, environmental variations and so on. To overcome that kind of complications a new modified version of CSR-DCF algorithm has been proposed by integrating deep learning based object detection and CSRT tracker which implemented in OpenCV library. As an object detection model, according to the comparable result of object detection methods and by reason of high efficiency and celerity of Faster RCNN (Region-based Convolutional Neural Network) has been used, and combined with CSRT tracker, which demonstrated outstanding real-time detection and tracking performance. The results indicate that the trained object detection model integration with tracking algorithm gives better outcomes rather than using tracking algorithm or filter itself.

A Dynamic Partitioning Scheme for Distributed Storage of Large-Scale RDF Data (대규모 RDF 데이터의 분산 저장을 위한 동적 분할 기법)

  • Kim, Cheon Jung;Kim, Ki Yeon;Yoo, Jong Hyeon;Lim, Jong Tae;Bok, Kyoung Soo;Yoo, Jae Soo
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1126-1135
    • /
    • 2014
  • In recent years, RDF partitioning schemes have been studied for the effective distributed storage and management of large-scale RDF data. In this paper, we propose an RDF dynamic partitioning scheme to support load balancing in dynamic environments where the RDF data is continuously inserted and updated. The proposed scheme creates clusters and sub-clusters according to the frequency of the RDF data used by queries to set graph partitioning criteria. We partition the created clusters and sub-clusters by considering the workloads and data sizes for the servers. Therefore, we resolve the data concentration of a specific server, resulting from the continuous insertion and update of the RDF data, in such a way that the load is distributed among servers in dynamic environments. It is shown through performance evaluation that the proposed scheme significantly improves the query processing time over the existing scheme.

Efficient Processing method of OLAP Range-Sum Queries in a dynamic warehouse environment (다이나믹 데이터 웨어하우스 환경에서 OLAP 영역-합 질의의 효율적인 처리 방법)

  • Chun, Seok-Ju;Lee, Ju-Hong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.427-438
    • /
    • 2003
  • In a data warehouse, users typically search for trends, patterns, or unusual data behaviors by issuing queries interactively. The OLAP range-sum query is widely used in finding trends and in discovering relationships among attributes in the data warehouse. In a recent environment of enterprises, data elements in a data cube are frequently changed. The problem is that the cost of updating a prefix sum cube is very high. In this paper, we propose a novel algorithm which reduces the update cost significantly by an index structure called the Δ-tree. Also, we propose a hybrid method to provide either approximate or precise results to reduce the overall cost of queries. It is highly beneficial for various applications that need quick approximate answers rather than time consuming accurate ones, such as decision support systems. An extensive experiment shows that our method performs very efficiently on diverse dimensionalities, compared to other methods.

A Study to Determine the Rainfall Erosivity Factor of Universal Soil Loss Equation using Recent Rainfall Data (최근 강수 자료를 이용한 범용토양유실공식의 강우침식능인자 정의에 관한 연구)

  • Kim, Jonggun;Jang, Jin Uk;Seong, Gak Gyu;Cha, Sang Sun;Park, Youn Shik
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.60 no.6
    • /
    • pp.13-20
    • /
    • 2018
  • Universal Soil Loss Equation (USLE) has been widely used to estimate potential soil loss because USLE is a simple and reliable method. The rainfall erosivity factor (R factor) explains rainfall characteristics. R factors, cited in the Bulletin on the Survey of the Erosion of Topsoil of the Ministry of Environment in the Republic of Korea, are too outdated to represent current rainfall patterns in the Republic of Korea. Rainfall datasets at one minute intervals from 2013 to 2017 were collected from fifty rainfall gauge stations to update R factors considering current rainfall condition. The updated R factors in this study were compared to the previous R factors which were calculated using the data from 1973 to 1996. The coefficient of determination between the updated and the previous R factors shows 0.374, which means the correlation is not significant. Therefore, it was concluded that the previous R factors might not explain current rainfall conditions. The other remarkable result was that regression equations using annual rainfall data might be inappropriate to estimate reasonable R factors because the correlation between annual rainfall and the R factors was generally unsatisfy.

Trends and Future Directions of Corporate e-learning Contents (기업교육 이러닝 콘텐츠의 동향과 발전 방향)

  • Jung, Hyojung
    • The Journal of Industrial Distribution & Business
    • /
    • v.9 no.2
    • /
    • pp.65-72
    • /
    • 2018
  • Purpose - One of the biggest problems in the e-learning distribution process is the lack of quality content and learners' discredit in e-learning content. In order to respond to the various demands of the corporate education field appropriately, it is necessary to search for directions of new e-learning models that are out of traditional e-learning contents. The purpose of this study is to identify recent trend issues related to corporate e-learning and to suggest directions for development. Research design, data, and methodology - Based on the literature review, trend issues that should be considered important in corporate e-learning were derived. Online survey was conducted to evaluate the importance-feasibility of each issue to 13 experts on e-learning and corporate education. The contents of the questionnaire are as follows: 1) recognition of importance and feasibility of trend issues to be considered important in the future corporate education field; 2) factors to be considered in developing future e-learning contents. Results - Six trends derived from a comprehensive literature review. The most important e-learning trends for corporate education field were 'mobile learning', 'micro learning', 'blended learning', 'social learning', 'adaptive learning', 'engaged learning'. As a result of evaluating the importance and feasibility of each issue, experts point out that 'mobile learning' and 'micro learning' should be actively considered for introduction and utilization at present. In addition, 'social learning' and 'blended learning' need to be actively considered in the near future. On the other hand, experts recognized that 'adaptive learning' and 'engaged learning' need to be prepared from a long-term perspective. Conclusions - There are two main reasons for this result. First, in corporate e-learning, it is important to 1) be able to update on time, 2) the connection with the workplace is important. Second, it requires realistic verification of the expected performance of the learning model. To be considered part of the future are as follows: First, the value and effectiveness of the new e-learning type should be studied. Seconds, e-learning contents should be developed through adopting SAM or Agile methodology. Through this process, we would be able to enhance the quality in e-learning content.

A Study on the Structured Weakness Classification for Mobile Applications (모바일 애플리케이션을 위한 보안약점 구조화 기법에 대한 연구)

  • Son, Yunsik;Oh, Se-Man
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.11
    • /
    • pp.1349-1357
    • /
    • 2012
  • In recent years, security accidents which are becoming the socially hot issue not only cause financial damages but also raise outflow of private information. Most of the accidents have been immediately caused by the software weakness. Moreover, it is difficult for software today to assure reliability because they exchange data across the internet. In order to solve the software weakness, developing the secure software is the most effective way than to strengthen the security system for external environments. Therefore, suggests that the coding guide has emerged as a major security issue to eliminate vulnerabilities in the coding stage for the prevention of security accidents. Developers or administrators effectively in order to use secure coding coding secure full set of security weaknesses organized structurally and must be managed. And the constant need to update new information, but the existing Secure Coding and Security weakness is organized structurally do not. In this paper, we will define and introduce the structured weakness for mobile applications by the surveys of existing secure coding and coding rules for code analysis tools in Java.

Design of Efficient Edge Computing based on Learning Factors Sharing with Cloud in a Smart Factory Domain (스마트 팩토리 환경에서 클라우드와 학습된 요소 공유 방법 기반의 효율적 엣지 컴퓨팅 설계)

  • Hwang, Zi-on
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2167-2175
    • /
    • 2017
  • In recent years, an IoT is dramatically developing according to the enhancement of AI, the increase of connected devices, and the high-performance cloud systems. Huge data produced by many devices and sensors is expanding the scope of services, such as an intelligent diagnostics, a recommendation service, as well as a smart monitoring service. The studies of edge computing are limited as a role of small server system with high quality HW resources. However, there are specialized requirements in a smart factory domain needed edge computing. The edges are needed to pre-process containing tiny filtering, pre-formatting, as well as merging of group contexts and manage the regional rules. So, in this paper, we extract the features and requirements in a scope of efficiency and robustness. Our edge offers to decrease a network resource consumption and update rules and learning models. Moreover, we propose architecture of edge computing based on learning factors sharing with a cloud system in a smart factory.

Small Business Innovation Research Program in the United States: A Political Review and Implications for East Asian Countries

  • Ryu, Youngbok
    • STI Policy Review
    • /
    • v.6 no.2
    • /
    • pp.54-86
    • /
    • 2015
  • The study examines the U.S. Small Business Innovation Research (SBIR) program, with a focus on the recent Reauthorization, and compares, in the political context, the U.S. and East Asian countries-Japan, Korea and Taiwan-that adopted the U.S. SBIR program. For the systematic analysis and cross-country comparison, the study employs Kingdon (2003)'s framework-his political theory and Garbage Can Model-to identify political participants and processes underlying the SBIR Reauthorization and to analyze the differences in problem, policy, and politics streams between the U.S. and East Asian countries. For the cross-country comparison, specifically, the study uses various data sources such as OECD, Global Entrepreneurship Monitor, Hofstede's Cultural Dimensions, and World Value Survey. Based on the analysis outcomes, implications of U.S. practices on East Asian countries are extracted as follows. East Asian countries tend to: Have higher entrepreneurial aspiration while lower entrepreneurial activity and attitude than the U.S.; bear higher long term orientation and uncertainty avoidance while lower individualism than the U.S.; and have greater expectations of technology development and higher confidence in political parties while participating less in political action than the U.S. Drawing on the differences, the following policy recommendations are suggested. East Asian countries should: Improve entrepreneurs' access to resources (in particular, financial resource) in order to link their high entrepreneurial aspiration to actual entrepreneurial activities; cultivate failure-tolerating culture and risk-taking entrepreneurs, for instance, by providing a second chance to SBIR-participating businesses that failed to materialize their innovative ideas; and leverage their high expectations of new technology in order to take bold actions regarding their SBIR programs, and update the programs by drawing out constructive dialogues between SBIR stakeholders.

A Study on the Analysis of Vulnerabilities in the Program Source Code (프로그램 소스코드 취약성 분석에 관한 연구)

  • 하경휘;최진우;우종우;김홍철;박상서
    • Proceedings of the Korea Information Assurance Society Conference
    • /
    • 2004.05a
    • /
    • pp.3-8
    • /
    • 2004
  • The majority of recent intrusions reveal that the attackers do not use the previous intrusion techniques or network flaw, rather they tend to use the vulnerabilities residing inside the program, which are the running programs on the system or the processes for the service. Therefore, the security managers must focus on updating the programs with lots of time and efforts. Developers also need to patch continuously to update the program, which is a lot of burden for them. In order to solve the problem, we need to understand the vulnerabilities in the program, which has been studied for some time. And also we need to analyze the functions that contains some vulnerabilities inside. In this paper, we first analyzed the vulnerabilities of the standard C library, and Win32 API functions used in various programs. And then we described the design and implementation of the automated scanning tool for writing secure source code based on the analysis.

  • PDF