• Title/Summary/Keyword: Scalable

Search Result 1,426, Processing Time 0.028 seconds

Scalable RDFS Reasoning Using the Graph Structure of In-Memory based Parallel Computing (인메모리 기반 병렬 컴퓨팅 그래프 구조를 이용한 대용량 RDFS 추론)

  • Jeon, MyungJoong;So, ChiSeoung;Jagvaral, Batselem;Kim, KangPil;Kim, Jin;Hong, JinYoung;Park, YoungTack
    • Journal of KIISE
    • /
    • v.42 no.8
    • /
    • pp.998-1009
    • /
    • 2015
  • In recent years, there has been a growing interest in RDFS Inference to build a rich knowledge base. However, it is difficult to improve the inference performance with large data by using a single machine. Therefore, researchers are investigating the development of a RDFS inference engine for a distributed computing environment. However, the existing inference engines cannot process data in real-time, are difficult to implement, and are vulnerable to repetitive tasks. In order to overcome these problems, we propose a method to construct an in-memory distributed inference engine that uses a parallel graph structure. In general, the ontology based on a triple structure possesses a graph structure. Thus, it is intuitive to design a graph structure-based inference engine. Moreover, the RDFS inference rule can be implemented by utilizing the operator of the graph structure, and we can thus design the inference engine according to the graph structure, and not the structure of the data table. In this study, we evaluate the proposed inference engine by using the LUBM1000 and LUBM3000 data to test the speed of the inference. The results of our experiment indicate that the proposed in-memory distributed inference engine achieved a performance of about 10 times faster than an in-storage inference engine.

A Cluster-based Power-Efficient Routing Protocol for Sensor Networks (센서 네트워크를 위한 클러스터 기반의 에너지 효율적인 라우팅 프로토콜)

  • Kweon, Ki-Suk;Lee, Seung-Hak;Yun, Hyun-Soo
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.1
    • /
    • pp.76-90
    • /
    • 2006
  • Sensor network consists of a large number of sensor nodes that are densely deployed either inside the phenomenon or very close to it. The life time of each node in the sensor network significantly affects the life time of whole sensor network. A node which drained out its battery may incur the partition of whole network in some network topology The life time of each node depends on the battery capacity of each node. Therefore if all sensor nodes in the network live evenly long, the life time of the network will be longer. In this paper, we propose Cluster-Based Power-Efficient Routing (CBPER) Protocol which provides scalable and efficient data delivery to multiple mobile sinks. Previous r(luting protocols, such as Directed Diffusion and TTDD, need to flood many control packets to support multiple mobile sinks and many sources, causing nodes to consume their battery. In CBPER, we use the fact that sensor nodes are stationary and location-aware to construct and maintain the permanent grid structure, which makes nodes live longer by reducing the number of the flooding control packets. We have evaluated CBPER performance with TTDD. Our results show that CBPER is more power-efficient routing protocol than TTDD.

A Study on Implementation of SVG for ENC Applications (전자해도 활용을 위한 SVG 변환 연구)

  • Oh, Se-Woong;Park, Jong-Min;Seo, Ki-Yeol;Suh, Sang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.10
    • /
    • pp.1930-1936
    • /
    • 2007
  • Electronic Navigational Charts(ENCs) are official nautical charts which are equivalent to paper charts with supplementary information. Although their main purpose is to be used for the safe navigation of ships, they also contain much information on coasts and seas which may be interesting to ordinary people. However, there is no easy way to access them because of their specialized data format, access method and visualization. This paper proposes m implementation of SVG for the access and services of ENCs. SVG(Scalable Vector Graphic) makes it possible to make use of Vector graphics for map services in basic internet browsing environment. Implementation of SVG for ENC applications by this research is free of special server side GIS mapping system and client side extra technology. The Implementation of SVG for ENC Applications can be summarized as follows: Firstly, SVG provides spatial information to possess searching engine to embody SVG map. Secondly SVG can provide high-quality vector map graphics and interactive facility without special Internet GIS system. It makes it possible to use services with very low cost. Thirdly, SVG information service targeting on maritime transportation can be used as template, so it can be used dynamically any other purpose such as traffic management and vessel monitoring. Many good characteristics of SVG in mapping at computer screen and reusability of SVG document provide new era of visualization of marine geographic information.

Microfluidic Assisted Synthesis of Ag-ZnO Nanocomposites for Enhanced Photocatalytic Activity (광촉매 성능 강화를 위한 미세유체공정 기반 Ag-ZnO 나노복합체 합성)

  • Ko, Jae-Rak;Jun, Ho Young;Choi, Chang-Ho
    • Clean Technology
    • /
    • v.27 no.4
    • /
    • pp.291-296
    • /
    • 2021
  • Recently, there has been increasing demand for advancing photocatalytic techniques that are capable of the efficient removal of organic pollutants in water. TiO2, a representative photocatalytic material, has been commonly used as an effective photocatalyst, but it is rather expensive and an alternative is required that will fulfill the requirements of both high performing photocatalytic activities and cost-effectiveness. In this work, ZnO, which is more cost effective than TiO2, was synthesized by using a microreactor-assisted nanomaterials (MAN) process. The process enabled a continuous production of ZnO nanoparticles (NPs) with a flower-like structure with high uniformity. In order to resolve the limited light absorption of ZnO arising from its large band gap, Ag NPs were uniformly decorated on the flower-like ZnO surface by using the MAN process. The plasmonic effect of Ag NPs led to a broadening of the absorption range toward visible wavelengths. Ag NPs also helped inhibit the electron-hole recombination by drawing electrons generated from the light absorption of the flower-like ZnO NPs. As a result, the Ag-ZnO nanocomposites showed improved photocatalytic activities compared with the flower-like ZnO NPs. The photocatalytic activities were evaluated through the degradation of methylene blue (MB) solution. Scanning electron microscopy (SEM), x-ray diffraction (XRD), and energy-dispersive x-ray spectroscopy (EDS) confirmed the successful synthesis of Ag-ZnO nanocomposites with high uniformity. Ag-ZnO nanocomposites synthesized via the MAN process offer the potential for cost-effective and scalable production of next-generation photocatalytic materials.

Consideration Points for application of KOMPSAT Data to Open Data Cube (다목적실용위성 자료의 오픈 데이터 큐브 적용을 위한 기본 고려사항)

  • LEE, Ki-Won;KIM, Kwang-Seob;LEE, Sun-Gu;KIM, Yong-Seung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.1
    • /
    • pp.62-77
    • /
    • 2019
  • Open Data Cube(ODC) has been emerging and developing as the open source platform in the Committee on Earth Observation Satellites(CEOS) for the Global Earth Observation System of Systems(GEOSS) deployed by the Group on Earth Observations (GEO), ODC can be applied to the deployment of scalable and large amounts of free and open satellite images in a cloud computing environment, and ODC-based country or regional application services have been provided for public users on the high performance. This study first summarizes the status of ODC, and then presents concepts and some considering points for linking this platform with Korea Multi-Purpose Satellite (KOMPSAT) images. For the reference, the main contents of ODC with the Google Earth Engine(GEE) were compared. Application procedures of KOMPSAT satellite image to implement ODC service were explained, and an intermediate process related to data ingestion using actual data was demonstrated. As well, it suggested some practical schemes to utilize KOMPSAT satellite images for the ODC application service from the perspective of open data licensing. Policy and technical products for KOMPSAT images to ODC are expected to provide important references for GEOSS in GEO to apply new satellite images of other countries and organizations in the future.

Analysis of Priority of Technical Factors for Enabling Cloud Computing Services (클라우드 컴퓨팅 서비스 활성화를 위한 기술적 측면 특성요인의 중요도 우선순위 분석)

  • Kang, Da-Yeon;Hwang, Jong-Ho
    • Journal of Digital Convergence
    • /
    • v.17 no.8
    • /
    • pp.123-130
    • /
    • 2019
  • The advent of the full-fledged Internet of Things era will bring together various types of information through Internet of Things devices, and the vast amount of information collected will be generated as new information by the analysis process. To effectively store this generated information, a flexible and scalable cloud computing system is advantageous. Therefore, the main determinants for effective client system acceptance are viewed as motivator factor (economics, efficiency, etc.) and hindrance factor (transitional costs, security issues, etc.) and the purpose of this study is to determine which detailed factors play a major role in making new system acceptance decisions around harm. The factors required to determine the major priorities are defined as the system acceptance determinants from the technical point of view obtained through the literature review, and the questionnaire is prepared based on the factors derived, and the survey is conducted on the experts concerned. In addition, the AHP analysis aims to achieve a final priority by performing a bifurcation between components for measuring a decision unit. Furthermore, the results of this study will serve as an important basis for making decisions based on acceptance (enabling) of technology.

Performance Analysis of Super-Resolution based Video Coding for HEVC (HEVC 기반 초해상화를 이용한 비디오 부호화 효율 성능 분석)

  • Ki, Sehwan;Kim, Dae-Eun;Jun, Ki Nam;Baek, Seung Ho;Choi, Jeung Won;Kim, Dong Hyun;Kim, Munchurl
    • Journal of Broadcast Engineering
    • /
    • v.24 no.2
    • /
    • pp.306-314
    • /
    • 2019
  • Since the resolutions of videos increase rapidly, there are continuing needs for effective video compression methods despite an increase in the transmission bandwidth. In order to satisfy such a demand, a reconstructive video coding (RVC) method by using a super resolution has been proposed. Since RVC reduces the resolution of the input video, when frames are compressed to the same size, the number of bits per pixel increases, thereby reducing coding artifacts caused by video coding. However, RVC method using super resolution is not effective in all target bitrates. Comparing the size of the loss generated while downsizing the resolution and the size of the loss caused by the video compression, only when the size of loss generated in the video compression is larger, RVC method can perform the improved compression performance compared to direct video coding. In particular, since HEVC has considerably higher compression performance than the previous standard video codec, it can be experimentally confirmed that the compression distortions become larger than the distortions of downsizing the resolution only in the very low-bitrate conditions. In this paper, we applied RVC based HEVC in various video types and measured the target bitrates that RVC method can be effectively applied.

Location Trigger System for the Application of Context-Awareness based Location services

  • Lee, Yon-Sik;Jang, Min-Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.149-157
    • /
    • 2019
  • Recent research has been actively carried out on systems that want to optimize resource utilization by analyzing the intended behavior and pattern of behavior of objects (users, consumers). A service system that applies information about an object's location or behavior must include a location trigger processing system for tracking an object's real-time location. In this paper, we analyze design problems for the implementation of a context-awareness based location trigger system, and present system models based on analysis details. For this purpose, this paper introduces the concept of location trigger for intelligent location tracking techniques about moving situations of objects, and suggests a mobile agent system with active rules that can perform monitoring and appropriate actions based on sensing information and location context information, and uses them to design and implement the location trigger system for context-awareness based location services. The proposed system is verified by implementing location trigger processing scenarios and trigger service and action service protocols. In addition, through experiments on mobile agents with active rules, it is suggested that the proposed system can optimize the role and function of the application system by using rules appropriate to the service characteristics and that it is scalable and effective for location-based service systems. This paper is a preliminary study for the establishment of an optimization system for utilizing resources (equipment, power, manpower, etc.) through the active characteristics of systems such as real-time remote autonomous control and exception handling over consumption patterns and behavior changes of power users. The proposed system can be used in system configurations that induce optimization of resource utilization through intelligent warning and action based on location of objects, and can be effectively applied to the development of various location service systems.

Drone Obstacle Avoidance Algorithm using Camera-based Reinforcement Learning (카메라 기반 강화학습을 이용한 드론 장애물 회피 알고리즘)

  • Jo, Si-hun;Kim, Tae-Young
    • Journal of the Korea Computer Graphics Society
    • /
    • v.27 no.5
    • /
    • pp.63-71
    • /
    • 2021
  • Among drone autonomous flight technologies, obstacle avoidance is a very important technology that can prevent damage to drones or surrounding environments and prevent danger. Although the LiDAR sensor-based obstacle avoidance method shows relatively high accuracy and is widely used in recent studies, it has disadvantages of high unit price and limited processing capacity for visual information. Therefore, this paper proposes an obstacle avoidance algorithm for drones using camera-based PPO(Proximal Policy Optimization) reinforcement learning, which is relatively inexpensive and highly scalable using visual information. Drone, obstacles, target points, etc. are randomly located in a learning environment in the three-dimensional space, stereo images are obtained using a Unity camera, and then YOLov4Tiny object detection is performed. Next, the distance between the drone and the detected object is measured through triangulation of the stereo camera. Based on this distance, the presence or absence of obstacles is determined. Penalties are set if they are obstacles and rewards are given if they are target points. The experimennt of this method shows that a camera-based obstacle avoidance algorithm can be a sufficiently similar level of accuracy and average target point arrival time compared to a LiDAR-based obstacle avoidance algorithm, so it is highly likely to be used.

Study on Threshold Scheme based Secure Secret Sharing P2P System (임계 방식 기반 안전 비밀조각 공유 P2P 시스템 연구)

  • Choi, Cheong-Hyeon
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.21-33
    • /
    • 2022
  • This paper is to suggest the secure secret sharing system in order to outstandingly reduce the damage caused by the leakage of the corporate secret. This research system is suggested as efficient P2P distributed system kept from the centrally controlled server scheme. Even the bitcoin circulation system is also based on P2P distribution scheme recenly. This research has designed the secure circulation of the secret shares produced by Threshold Shamir Secret Sharing scheme instead of the shares specified in the torrent file using the simple, highly scalable and fast transferring torrent P2P distribution structure and its protocol. In addition, this research has studied to apply both Shamir Threshold Secret Sharing scheme and the securely strong multiple user authentication based on Collaborative Threshold Autentication scheme. The secure transmission of secret data is protected as using the efficient symmetric encryption with the session secret key which is safely exchanged by the public key encryption. Also it is safer against the leakage because the secret key is effectively alive only for short lifetime like a session. Especially the characteristics of this proposed system is effectively to apply the threshold secret sharing scheme into efficient torrent P2P distributed system without modifying its architecture of the torrent system. In addition, this system guaranttes the confidentiality in distributing the secret file using the efficient symmetric encryption scheme, which the session key is securely exchanged using the public key encryption scheme. In this system, the devices to be taken out can be dynamically registered as an user. This scalability allows to apply the confidentiality and the authentication even to dynamically registerred users.