• Title/Summary/Keyword: SmartBase

Search Result 470, Processing Time 0.028 seconds

A Block-based Uniformly Distributed Random Node Arrangement Method Enabling to Wirelessly Link Neighbor Nodes within the Communication Range in Free 3-Dimensional Network Spaces (장애물이 없는 3차원 네트워크 공간에서 통신 범위 내에 무선 링크가 가능한 블록 기반의 균등 분포 무작위 노드 배치 방법)

  • Lim, DongHyun;Kim, Changhwa
    • Journal of Korea Multimedia Society
    • /
    • v.25 no.10
    • /
    • pp.1404-1415
    • /
    • 2022
  • The 2-dimensional arrangement method of nodes has been used in most of RF (Radio Frequency) based communication network simulations. However, this method is not useful for the an none-obstacle 3-dimensional space networks in which the propagation delay speed in communication is very slow and, moreover, the values of performance factors such as the communication speed and the error rate change on the depth of node. Such a typical example is an underwater communication network. The 2-dimensional arrangement method is also not useful for the RF based network like some WSNs (Wireless Sensor Networks), IBSs (Intelligent Building Systems), or smart homes, in which the distance between nodes is short or some of nodes can be arranged overlapping with their different heights in similar planar location. In such cases, the 2-dimensional network simulation results are highly inaccurate and unbelievable so that they lead to user's erroneous predictions and judgments. For these reasons, in this paper, we propose a method to place uniformly and randomly communication nodes in 3-dimensional network space, making the wireless link with neighbor node possible. In this method, based on the communication rage of the node, blocks are generated to construct the 3-dimensional network and a node per one block is generated and placed within a block area. In this paper, we also introduce an algorithm based on this method and we show the performance results and evaluations on the average time in a node generation and arrangement, and the arrangement time and scatter-plotted visualization time of all nodes according to the number of them. In addition, comparison with previous studies is conducted. As a result of evaluating the performance of the algorithm, it was found that the processing time of the algorithm was proportional to the number of nodes to be created, and the average generation time of one node was between 0.238 and 0.28 us. ultimately, There is no problem even if a simulation network with a large number of nodes is created, so it can be sufficiently introduced at the time of simulation.

Development of Software-Defined Perimeter-based Access Control System for Security of Cloud and IoT System (Cloud 및 IoT 시스템의 보안을 위한 소프트웨어 정의 경계기반의 접근제어시스템 개발)

  • Park, Seung-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.2
    • /
    • pp.15-26
    • /
    • 2021
  • Recently, as the introduction of cloud, mobile, and IoT has become active, there is a growing need for technology development that can supplement the limitations of traditional security solutions based on fixed perimeters such as firewalls and Network Access Control (NAC). In response to this, SDP (Software Defined Perimeter) has recently emerged as a new base technology. Unlike existing security technologies, SDP can sets security boundaries (install Gateway S/W) regardless of the location of the protected resources (servers, IoT gateways, etc.) and neutralize most of the network-based hacking attacks that are becoming increasingly sofiscated. In particular, SDP is regarded as a security technology suitable for the cloud and IoT fields. In this study, a new access control system was proposed by combining SDP and hash tree-based large-scale data high-speed signature technology. Through the process authentication function using large-scale data high-speed signature technology, it prevents the threat of unknown malware intruding into the endpoint in advance, and implements a kernel-level security technology that makes it impossible for user-level attacks during the backup and recovery of major data. As a result, endpoint security, which is a weak part of SDP, has been strengthened. The proposed system was developed as a prototype, and the performance test was completed through a test of an authorized testing agency (TTA V&V Test). The SDP-based access control solution is a technology with high potential that can be used in smart car security.

A Study on Reading Survey for the Establishment of Goyang City Reading Culture Promotion Plan (고양시 독서문화진흥 종합계획 수립을 위한 독서실태 조사 연구)

  • Min Sun Song;Inho Chang;Gum-Sook Hoang;Soo-Kyoung Kim
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.57 no.1
    • /
    • pp.285-308
    • /
    • 2023
  • This study was carried out to survey and analyze the actual state of reading in Goyang citizens, and to utilize it as a base data for Goyang City's 2nd 'Reading Culture Promotion Plan'. To do this, including references related to reading survey and the 2021 National Reading Survey questionnaire survey questions, the questionnaires that reflected characteristics of adult and student respondents constructed. Then, the survey of 960 adults and 540 students in Goyang City conducted and analyzed the results, and several useful suggestions deduced for 'Goyang City Reading Culture Promotion Plan'. First, the category of reading materials have to be expanded from the paper media to the various media. Second, the expandation of collections in libraries and the services that will help actually buy books are necessary. Third, various reading programs should develop, and the opportunities for citizens to participate in reading and club activities through online should also be increased. Fourth, the facilities and service environments for activating reading should ensure that the accessibility of everyday life. Finally, among the existing reading culture promotion projects, the 'smart libraries', 'Inter-library loan services', 'reading and cultural programs management', and 'Goyang Book Pay' projects need to be sustained and expanded. This study is significant in that it has investigated the actual reading situation of real citizens and has converged the opinions necessary for setting the direction of the effective 'Goyang City reading culture promotion plan'.

Dynamic Channel Management Scheme for Device-to-device Communication in Next Generation Downlink Cellular Networks (차세대 하향링크 셀룰러 네트워크에서 단말 간 직접 통신을 위한 유동적 채널관리 방법)

  • Se-Jin Kim
    • Journal of Internet Computing and Services
    • /
    • v.24 no.1
    • /
    • pp.1-7
    • /
    • 2023
  • Recently, the technology of device-to-device(D2D) communication has been receiving big attention to improve the system performance since the amount of high quality/large capacity data traffic from smart phones and various devices of Internet of Things increase rapidly in 5G/6G based next generation cellular networks. However, even though the system performance of macro cells increase by reusing the frequency, the performance of macro user equipments(MUEs) decrease because of the strong interference from D2D user equipments(DUEs). Therefore, this paper proposes a dynamic channel management(DCM) scheme for DUEs to guarantee the performance of MUEs as the number of DUEs increases in next generation downlink cellular networks. In the proposed D2D DCM scheme, macro base stations dynamically assign subchannels to DUEs based on the interference information and signal to interference and noise ratio(SINR) of MUEs. Simulation results show that the proposed D2D DCM scheme outperforms other schemes in terms of the mean MUE capacity as the threshold of the SINR of MUEs incareases.

Application of Artificial Intelligence Technology for Dam-Reservoir Operation in Long-Term Solution to Flood and Drought in Upper Mun River Basin

  • Areeya Rittima;JidapaKraisangka;WudhichartSawangphol;YutthanaPhankamolsil;Allan Sriratana Tabucanon;YutthanaTalaluxmana;VarawootVudhivanich
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.30-30
    • /
    • 2023
  • This study aims to establish the multi-reservoir operation system model in the Upper Mun River Basin which includes 5 main dams namely, Mun Bon (MB), Lamchae (LC), Lam Takhong (LTK), Lam Phraphoeng (LPP), and Lower Lam Chiengkrai (LLCK) Dams. The knowledge and AI technology were applied aiming to develop innovative prototype for SMART dam-reservoir operation in future. Two different sorts of reservoir operation system model namely, Fuzzy Logic (FL) and Constraint Programming (CP) as well as the development of rainfall and reservoir inflow prediction models using Machine Learning (ML) technique were made to help specify the right amount of daily reservoir releases for the Royal Irrigation Department (RID). The model could also provide the essential information particularly for the Office of National Water Resource of Thailand (ONWR) to determine the short-term and long-term water resource management plan and strengthen water security against flood and drought in this region. The simulated results of base case scenario for reservoir operation in the Upper Mun from 2008 to 2021 indicated that in the same circumstances, FL and CP models could specify the new release schemes to increase the reservoir water storages at the beginning of dry season of approximately 125.25 and 142.20 MCM per year. This means that supplying the agricultural water to farmers in dry season could be well managed. In other words, water scarcity problem could substantially be moderated at some extent in case of incapability to control the expansion of cultivated area size properly. Moreover, using AI technology to determine the new reservoir release schemes plays important role in reducing the actual volume of water shortfall in the basin although the drought situation at LTK and LLCK Dams were still existed in some periods of time. Meanwhile, considering the predicted inflow and hydrologic factors downstream of 5 main dams by FL model and minimizing the flood volume by CP model could ensure that flood risk was considerably minimized as a result of new release schemes.

  • PDF

A Comparative Analysis of Construction Labor Productivity in OECD Countries (OECD 국가의 건설업 노동생산성 비교 및 분석)

  • Park, Hwan-Pyo
    • Journal of the Korea Institute of Building Construction
    • /
    • v.23 no.2
    • /
    • pp.175-185
    • /
    • 2023
  • Upon analyzing labor productivity in the construction industry across OECD countries, it was found that in 2019, labor productivity per employee in the South Korean construction industry was lower than that of major developed countries when adjusted for purchasing power parity(PPP). Specifically, when benchmarked against other countries at a base of 100, South Korea scored 76.9 in the United States, 88.4 in Japan, and 85.1 in the OECD average. Notably, South Korea ranked 25th in labor productivity per employee in the construction industry among 35 OECD countries in 2019, indicating a low standing. A comparative analysis of the construction market size and labor productivity in the construction industry across OECD countries revealed that larger construction markets did not necessarily correlate with higher labor productivity. To enhance labor productivity in the construction industry, this study proposed the active implementation of smart construction technology at construction sites and the promotion of on-site assembly work using off-site construction(OSC) technology, rather than traditional on-site labor. Moreover, it was recommended that the development of modular construction methods and technologies be expanded. In the future, if off-site production methods and modules are further developed through advanced robotics and factory automation, labor productivity is anticipated to increase due to the restructuring of production methods, such as manufacturing.

A Mobile Landmarks Guide : Outdoor Augmented Reality based on LOD and Contextual Device (모바일 랜드마크 가이드 : LOD와 문맥적 장치 기반의 실외 증강현실)

  • Zhao, Bi-Cheng;Rosli, Ahmad Nurzid;Jang, Chol-Hee;Lee, Kee-Sung;Jo, Geun-Sik
    • Journal of Intelligence and Information Systems
    • /
    • v.18 no.1
    • /
    • pp.1-21
    • /
    • 2012
  • In recent years, mobile phone has experienced an extremely fast evolution. It is equipped with high-quality color displays, high resolution cameras, and real-time accelerated 3D graphics. In addition, some other features are includes GPS sensor and Digital Compass, etc. This evolution advent significantly helps the application developers to use the power of smart-phones, to create a rich environment that offers a wide range of services and exciting possibilities. To date mobile AR in outdoor research there are many popular location-based AR services, such Layar and Wikitude. These systems have big limitation the AR contents hardly overlaid on the real target. Another research is context-based AR services using image recognition and tracking. The AR contents are precisely overlaid on the real target. But the real-time performance is restricted by the retrieval time and hardly implement in large scale area. In our work, we exploit to combine advantages of location-based AR with context-based AR. The system can easily find out surrounding landmarks first and then do the recognition and tracking with them. The proposed system mainly consists of two major parts-landmark browsing module and annotation module. In landmark browsing module, user can view an augmented virtual information (information media), such as text, picture and video on their smart-phone viewfinder, when they pointing out their smart-phone to a certain building or landmark. For this, landmark recognition technique is applied in this work. SURF point-based features are used in the matching process due to their robustness. To ensure the image retrieval and matching processes is fast enough for real time tracking, we exploit the contextual device (GPS and digital compass) information. This is necessary to select the nearest and pointed orientation landmarks from the database. The queried image is only matched with this selected data. Therefore, the speed for matching will be significantly increased. Secondly is the annotation module. Instead of viewing only the augmented information media, user can create virtual annotation based on linked data. Having to know a full knowledge about the landmark, are not necessary required. They can simply look for the appropriate topic by searching it with a keyword in linked data. With this, it helps the system to find out target URI in order to generate correct AR contents. On the other hand, in order to recognize target landmarks, images of selected building or landmark are captured from different angle and distance. This procedure looks like a similar processing of building a connection between the real building and the virtual information existed in the Linked Open Data. In our experiments, search range in the database is reduced by clustering images into groups according to their coordinates. A Grid-base clustering method and user location information are used to restrict the retrieval range. Comparing the existed research using cluster and GPS information the retrieval time is around 70~80ms. Experiment results show our approach the retrieval time reduces to around 18~20ms in average. Therefore the totally processing time is reduced from 490~540ms to 438~480ms. The performance improvement will be more obvious when the database growing. It demonstrates the proposed system is efficient and robust in many cases.

Research on Korea Mythology in Korea Subculture Contents (한국 서브컬처 콘텐츠에서 한국 신화에 대한 연구)

  • Yun, Young-Seok
    • Cartoon and Animation Studies
    • /
    • s.41
    • /
    • pp.553-578
    • /
    • 2015
  • The Korean society was forcefully merged with the invasion of Japan in 20th century, and traditional culture of Korea was damaged severely by colonization from Japan. After liberation, Korean society experienced drastic social change with Korean War, and industrial economy and democratic system developed as modernization and democratization occurred. However, Korean traditional culture dissolved more severely as Korean society developed industrial economy and democracy. As criticism of existing Western center of society and the emphasis of cultural identity of non-western regions and third-world, world society preferred exchange of culture of diverse nations and people with each other in advent of postmodernism thoughts in mid-late 20th century. If the cultural identity of Korea was dissolving meanwhile, it was needed to be recovered again. Despite the research in Korean history, language, art, architecture was performed to recover cultural identity of Korea, it did not go in-depth with Korean mythology, for Korean mythology is considered as superstition or savage. Mythology shows subconscious group psychology of people who live in certain specific region. Studying Korean mythology is one of the ways to rediscover cultural identity of Korea. In order for Korean mythology to be known to many people, its stories should be told by media. There were movies, plays, drama, and novels produced based on existing Korean mythology as introduction, then these mythical stories are appear in subculture contents such as recent comics, animation, webtoon, games, and light novels. Then population of game players and webtoon readers increased as dissemination of PC and smart phones, and increasing market scale of subculture contents increased a population of consumers of comics, animation, and light novel. Consumers of sub-culture contents were interested as many of these contents were created, base on Korean mythology. Therefore, this paper is written as research on Korean mythology and its signification in sub-cultural contents which were produced base on Korean mythology.

A Study of Anomaly Detection for ICT Infrastructure using Conditional Multimodal Autoencoder (ICT 인프라 이상탐지를 위한 조건부 멀티모달 오토인코더에 관한 연구)

  • Shin, Byungjin;Lee, Jonghoon;Han, Sangjin;Park, Choong-Shik
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.57-73
    • /
    • 2021
  • Maintenance and prevention of failure through anomaly detection of ICT infrastructure is becoming important. System monitoring data is multidimensional time series data. When we deal with multidimensional time series data, we have difficulty in considering both characteristics of multidimensional data and characteristics of time series data. When dealing with multidimensional data, correlation between variables should be considered. Existing methods such as probability and linear base, distance base, etc. are degraded due to limitations called the curse of dimensions. In addition, time series data is preprocessed by applying sliding window technique and time series decomposition for self-correlation analysis. These techniques are the cause of increasing the dimension of data, so it is necessary to supplement them. The anomaly detection field is an old research field, and statistical methods and regression analysis were used in the early days. Currently, there are active studies to apply machine learning and artificial neural network technology to this field. Statistically based methods are difficult to apply when data is non-homogeneous, and do not detect local outliers well. The regression analysis method compares the predictive value and the actual value after learning the regression formula based on the parametric statistics and it detects abnormality. Anomaly detection using regression analysis has the disadvantage that the performance is lowered when the model is not solid and the noise or outliers of the data are included. There is a restriction that learning data with noise or outliers should be used. The autoencoder using artificial neural networks is learned to output as similar as possible to input data. It has many advantages compared to existing probability and linear model, cluster analysis, and map learning. It can be applied to data that does not satisfy probability distribution or linear assumption. In addition, it is possible to learn non-mapping without label data for teaching. However, there is a limitation of local outlier identification of multidimensional data in anomaly detection, and there is a problem that the dimension of data is greatly increased due to the characteristics of time series data. In this study, we propose a CMAE (Conditional Multimodal Autoencoder) that enhances the performance of anomaly detection by considering local outliers and time series characteristics. First, we applied Multimodal Autoencoder (MAE) to improve the limitations of local outlier identification of multidimensional data. Multimodals are commonly used to learn different types of inputs, such as voice and image. The different modal shares the bottleneck effect of Autoencoder and it learns correlation. In addition, CAE (Conditional Autoencoder) was used to learn the characteristics of time series data effectively without increasing the dimension of data. In general, conditional input mainly uses category variables, but in this study, time was used as a condition to learn periodicity. The CMAE model proposed in this paper was verified by comparing with the Unimodal Autoencoder (UAE) and Multi-modal Autoencoder (MAE). The restoration performance of Autoencoder for 41 variables was confirmed in the proposed model and the comparison model. The restoration performance is different by variables, and the restoration is normally well operated because the loss value is small for Memory, Disk, and Network modals in all three Autoencoder models. The process modal did not show a significant difference in all three models, and the CPU modal showed excellent performance in CMAE. ROC curve was prepared for the evaluation of anomaly detection performance in the proposed model and the comparison model, and AUC, accuracy, precision, recall, and F1-score were compared. In all indicators, the performance was shown in the order of CMAE, MAE, and AE. Especially, the reproduction rate was 0.9828 for CMAE, which can be confirmed to detect almost most of the abnormalities. The accuracy of the model was also improved and 87.12%, and the F1-score was 0.8883, which is considered to be suitable for anomaly detection. In practical aspect, the proposed model has an additional advantage in addition to performance improvement. The use of techniques such as time series decomposition and sliding windows has the disadvantage of managing unnecessary procedures; and their dimensional increase can cause a decrease in the computational speed in inference.The proposed model has characteristics that are easy to apply to practical tasks such as inference speed and model management.

TENSILE BOND STRENGTH BETWEEN ELASTOMERIC IMPRESSION MATERIALS AND TRAY RESINS DEPENDING ON THE THICKNESS OF THE TRAY ADHESIVE

  • Kim, Tae-Won;Moon, Hong-Seok;Lee, Keun-Woo;Chung, Moon-Kyu
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.44 no.6
    • /
    • pp.699-711
    • /
    • 2006
  • Statement of problem. Elastomeric impression materials have been widely used to obtain an accurate impression. However there have not been enough studies on the influence of the thickness of the tray adhesives on the bonding strength between the trays and the elastomeric impression materials. Purpose. In order to understand the relationship between the thickness of the tray adhesive and the tensile bond strength and to suggest the thickness at which the bonding strength is strongest, tensile bond strength related to the thickness of adhesives of 3 different elastomeric impression materials were tested. Materials and methods. 3 impression materials, $Permlastic^{(R)}$. Regular Set(Kerr Corp., Romulus, Michigan, U.S.A.), $Impregum^{TM}$ $Penta^{TM}$(3M ESPE, Seefeld, Germany), and Aquasil Ultra Monophase Regular Set Smart Wetting.(Dentsply Caulk, Milford, Delaware, U.S.A.), were used in this study, and tray adhesives from the same manufacturers of the impression materials were used, which were Rubber Base Adhesive, Polyether Adhesive, and Silfix, respectively. The tray specimens were prepared by autopolymerizing the tray material(Instant Tray Mix, Lang, Wheeling, Illinois, U.S.A.), and a PVC pipe was used to house the impression material. In group A, tray adhesives were applied in multiple thin layers of 1 to 5 and in group B, adhesives were applied only once, in the thickness equivalent to several applications. Lightness($L^*$) of the adhesion surface was measured with a spectrophotometer(CM-3500d, Konica Minolta, Sakai, Osaka, Japan). The tensile bond strength of the elastomeric impression material and the tray resin was measured with universal materials testing machines(Instron, Model 3366, Instron Corp, Nowood, Massachusetts, U.S.A.). A formula between the number of adhesive application layers and the lightness of the adhesion surface was deduced in group A, and the number of adhesive layers in group B was estimated by applying the lightness($L^*$) to the deduced formula. Results. 1. In group A, a statistically significant increase in tensile bond strength appeared when the number of application layers increased from 1 to 2 and from 4 to 5, and no significant difference was present between 2, 3, and 4 layers in Permlastic. In Impregum, the tensile bond strength was significantly increased when the number of adhesive layers increased from 1 to 3, but no significant difference after 3 layers. In Aquasil, the tensile bond strength significantly increased as the number of application layers increased up to 4 but showed no significant difference between 4 and 5. 2. In group B, the tensile bond strength was decreased when the thickness of the adhesive increased in Permlastic. Impregum showed an increased tensile bond strength when the thickness of the adhesive was increased. In Aquasil, the tensile bond strength increased as the number of adhesive application layers increased up to approximately 2.5 layers but it sharply decreased after approximately 4.5. Conclusion. From the study, the common idea that it is better to apply a thin and single coat of tray adhesive needs correction in more detailed ways, and instructions on some of the tray adhesives should be reconsidered since there were several cases in which the tensile bond strength increased according to the increase in the thickness of the adhesives.