• Title/Summary/Keyword: Storage Location

Search Result 408, Processing Time 0.022 seconds

Dynamic / Static Object Segmentation and Visual Encryption Mechanism for Storage Space Management of Image Information (영상정보의 저장 공간 관리를 위한 동적/정적 객체 분리 및 시각암호화 메커니즘)

  • Kim, Jinsu;Park, Namje
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.10
    • /
    • pp.1199-1207
    • /
    • 2019
  • Video surveillance data, which is used for preemptive or post-emptive action against any event or accident, is required for monitoring the location, but is reducing the capacity of the image data by removing intervals for cost reduction and system persistence. Such a video surveillance system is fixed in a certain position and monitors the area only within a limited angle, or monitors only the fixed area without changing the angle. At this time, the video surveillance system that is monitored only within a limited angle shows that the variation object such as the floating population shows different status in the image, and the background of the image maintains a generally constant appearance. The static objects in the image do not need to be stored in all the images, unlike the dynamic objects that must be continuously shot, and occupy a storage space other than the necessary ones. In this paper, we propose a mechanism to analyze the image, store only the small size image for the fixed background, and store it as image data only for variable objects.

A Study of Factors Influencing the Range of 81mm HE shells One-Shot systems based on CART Regression analysis (CART 회귀분석 기반 일회성 시스템 81mm 고폭탄 사거리에 영향을 미치는 요인 분석)

  • Myung Sung Kim;Jun Hyeok Choi;Young Min Kim
    • Journal of the Korean Society of Systems Engineering
    • /
    • v.19 no.1
    • /
    • pp.107-113
    • /
    • 2023
  • For one-shot systems such as 81mm high-explosive ammunition, research on performance prediction is insignificant due to research manpower infrastructure and lack of interest and difficulties in securing field data, which can only be done by special task workers. In order to evaluate the actual range of ammunition, the storage ammunition reliability evaluation checks the range by firing actual ammunition through a functional test. Test evaluation is a method of extracting a sample from the population, launching it, and recording the results accordingly. As a result of these tests, the range, which is an indicator of ammunition performance, can be measured differently according to meteorological factors such as temperature, atmospheric pressure, and humidity according to the location of the test site. In this study, various environmental factors generated at the test site and storage period analyze the correlation with the range, which is the performance of ammunition, and analyze the priority of importance for each factor and the numerical standards that environmental factors affect range. Through this, a new approach to one-shot system performance prediction was presented.

Study of a Process for Flood Detention Location and Storage Capacity (재해저류지 위치결정과 용량결정 과정에 관한 연구)

  • Oh, Gun-Heung;Park, Ki-Bum;Chang, In-Soo
    • Journal of Environmental Science International
    • /
    • v.17 no.6
    • /
    • pp.601-609
    • /
    • 2008
  • In this study for the development of area due to the increasing of industry, population and spreading of urbanization is rapidly increasing but about seventy percent of our nation's areas consists of the mountainous districts. In such case, when those areas have the heavy rains break, they are washed away by a fast-flowing stream of a valley and overflowed. Thus it could result on human life and property damage and also the widespread of flood damage in the downstream area. To decrease those damage, the construction of flood control reservoir is necessary. This research was aim to construct the flood runoff models of a mountainous small district and to determine the probability rainfall by analyzing precipitation. The study also examined the effects of location and size of flood control reservoir on flood reduction. The result showed that the construction of detention basin was an effective way to ensure the safety of flood control and multiple detention basin had superior result for reducing amount of runoff in the down stream area than the single detention basin.

Numerical Simulation of Flows inside the Various Rooms for Performance Assessment of Air Cleaning System (공기청정 시스템 성능예측을 위한 실내 유동현상에 관한 수치모사)

  • 손덕영;이두환;길재흥;최윤호;김동현
    • Journal of Energy Engineering
    • /
    • v.11 no.4
    • /
    • pp.306-316
    • /
    • 2002
  • ln this paper, flowfields inside the various rooms have been investigated. A storage room, a liv-ingroom with a kitchen in an apartment, and a hospital room are considered in the present calculations. In all cases, it was found that the average of air change rate is. similar to that of perfect mixing assumption and the location of air purifier has little effects on the average air change rate. Detailed local air concentrations show that there are regions where air is not quite purified because of non-uniform circulation of air flow. The location of air purifier has great effects on this behavior.

DESIGN AND IMPLEMENTATION OF MOVING OBJECTS MANAGEMENT SYSTEM APPLYING OPEN GOESPATIAL DATA ENCODING

  • Lee, Hye-Jin;Lee, Hyun-Ah;Park, Jong-Heung
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.663-666
    • /
    • 2005
  • The Geography Markup Language (GML) is an XML encoding for the transport and storage of geographic information, including both the geometry and properties of geographic features. This paper uses the GML to provide extendibility and interoperability of spatial data in moving objects management system. Since the purpose of the system is to provide locations of the moving objects in the web and mobile environments, we used the GML both for presenting map data and trajectories of the moving objects. The proposed system is composed of Location Data Interface, Moving Objects Engine, and Web/Mobile Presentation Interface. We utilized the concept of Web Map Server, that is web mapping technology of OGC (Open Geospatial Consortium), to integrate map data and the location information of the moving objects. In the process of the integration, we used the standard data model and interfaces while defining new application schema. Since our suggested system uses open spatial data encoding and interfaces, both extendibility and interoperability are guaranteed.

  • PDF

A Study on the Brand-based Warehouse Management in Online Clothing Shops (온라인 쇼핑몰의 브랜드 중심 창고관리 기법에 대한 연구)

  • Song, Yong-Uk;Ahn, Byung-Hyuk
    • Journal of Information Technology Applications and Management
    • /
    • v.18 no.1
    • /
    • pp.125-141
    • /
    • 2011
  • As the sales volume of online shops increases, the job burden in the back-offices of the online shops also increases. Order picking is the most labor-intensive operation among the jobs in a back-office and mid-size pure click online shops are experiencing the time delay and complexity in order picking nowadays while fulfilling their customers' orders. Those warehouses of the mid-size shops are based on manual systems, and as order pickings are repeated, the warehouses get a mess and lots of products in those warehouses are getting missing, which results in severe delay in order picking. To overcome this kind of problem in online clothing shops, we research a methodology to locate warehousing products. When products arrive at a warehouse, they are packed into a box and located on a rack in the warehouse. At this point, the operator should determine the box to be put in and the location on the rack for the box to be put on. This problem could be formulated as an Integer Programming model, but the branch-and bound algorithm to solve the IP model requires enormous computation, and sometimes it is even impossible to get a solution in a proper time. So, we relaxed the problem, developed a set of heuristics as a methodology to get a semi-optimum in an acceptable time, and proved by an experiment that the solutions by our methodology are satisfactory and acceptable by field managers.

Case histories on design alternatives during excavation of underground LPG storage cavern and traffic tunnel using TSP survey (TSP 탐사를 이용한 지하유류저장공동 및 도로터널의 시공 중 설계변경 사례 고찰)

  • Cha Sung-Soo;Kim Se-Hoon;Yun Sang-Pil;Bae Jung-Sik;Lee Jin-Moo
    • 한국지구물리탐사학회:학술대회논문집
    • /
    • 1999.08a
    • /
    • pp.117-136
    • /
    • 1999
  • The geophysical survey at pre-investigation stage can hardly provide the detailed information on geological structure of site which has difficulty in access and thick overburden. The TSP (VSP applied in tunnel) survey at post-investigation stage can show the detailed geology ahead of tunnel and around cavern. The TSP survey was carried out at the Pyongtaek LPG storage cavern site during the cavern excavation and provided the location and orientation of the fault inferred below Namyangho. In order to confirm the result of TSP survey four boreholes were drilled in access tunnel. The fault was also detected by borehole survey and the location was coincided with the result of TSP survey. Depend on the result of TSP survey and core logging, the design such as cavern layout and length could have been changed. As another case history the TSP survey was performed at the Mumeuje road tunnel which has poor geological information due to thick overburden. The support design was also changed on the base of TSP survey.

  • PDF

Enabling Environment for Participation in Information Storage Media Export and Digital Evidence Search Process using IPA (정보저장매체 반출 및 디지털 증거탐색 과정에서의 참여권 보장 환경에 대한 중요도-이행도 분석)

  • Yang, Sang Hee;Lee, Choong C.;Yun, Haejung
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.3
    • /
    • pp.129-143
    • /
    • 2018
  • Recently, the use of digital media such as computers and smart devices has been rapidly increasing, The vast and diverse information contained in the warrant of the investigating agency also includes the one irrelevant to the crime. Therefore, when confiscating the information, the basic rights, defense rights and privacy invasion of the person to be seized have been the center of criticism. Although the investigation agency guarantees the right to participate, it does not have specific guidelines, so they are various by the contexts and environments. In this process, the abuse of the participation right is detrimental to the speed and integrity of the investigation, and there is a side effect that the digital evidence might be destroyed by remote initialization. In this study, we conducted surveys of digital evidence analysts across the country based on four domains and thirty measurement items for enabling environment for participation in information storage media export and digital evidence search process. The difference between the level of importance and the performance was analyzed by the IPA matrix based on process, location, people, and technology dimensions. Seven items belonging to "concentrate here" area are one process-related, three location-related, and three people-related items. This study is meaningful to be a basis for establishing the proper policies and strategies for ensuring participation right, as well as for minimizing the side effects.

Design and Implementation of Driving Pattern based Map Matching on Smart Phone (스마트폰에서 운전자 이동패턴을 이용한 맵매칭 설계 및 구현)

  • Hwang, Jae-Yun;Choi, Se-Hyu
    • Spatial Information Research
    • /
    • v.23 no.4
    • /
    • pp.47-56
    • /
    • 2015
  • Recently, there has been an increase in the number of people who use the smart-phone navigation for using various latest functions such as group driving and location sharing. But smart-phone has a limited storage space for one application, since a lot of applications with different purposes are installed in the smart-phone. For this reason, road network data with a large space of memory used for map matching in the device for navigation cannot be stored in the smart-phone for this reason map matching is impossible. Besides, smart-phone which doesn't use the external GPS device, provides inaccurate GPS information, compared to the device for navigation. This is why the smart-phone navigation is hard to provide accurate location determination. Therefore, this study aims to help map matching that is more accurate than the existing device for navigation, by reducing the capacity of road network data used in the device for navigation through format design of a new road network and conversion and using a database of driver's driving patterns. In conclusion, more accurate map matching was possible in the smart-phone by using a storage space more than 80% less than existing device at the intersection where many roads cross, the building forest that a lot of GPS errors occur, the narrow roads close to the highway. It is considered that more accurate location-based service would be available not only in the navigation but also in various applications using GPS information and map in the future Navigation.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.