• Title/Summary/Keyword: Storage Space

Search Result 1,403, Processing Time 0.028 seconds

The Rule Case Simplification Algorithm to be used in a Rule-Based System (규칙기반 시스템에 사용되는 규칙 간소화 알고리즘)

  • Zheng, Baowei;Yeo, Jeong-Mo
    • The KIPS Transactions:PartD
    • /
    • v.17D no.6
    • /
    • pp.405-414
    • /
    • 2010
  • A rule is defined as a case to determine the target values according to combination of various Business factors. The information system is used to represent enterprise's business, which includes and implements the amount of these rules to Rule-Based System. A Rule-Based System can be constructed by using the rules engine method or Relational Database technology. Because the rules engine method has some disadvantages, the Rule-Based System is mostly developed with Relational Database technology. When business scales become larger and more complex, a large number of various rule cases must be operated in system, and processing these rule cases requires additional time, overhead and storage space, and the speed of execution slows down. To solve these problems, we propose a simplification algorithm that converts a large amount of rule cases to simplification rule cases with same effects. The proposed algorithm is applied to hypothetical business rule data and a large number of simplification experiments and tests are conducted. The final results proved that the number of rows can be reduced to some extent. The proposed algorithm can be used to simplify business rule data for improving performance of the Rule-Based System implemented with the Relational Database.

Phonetic Transcription based Speech Recognition using Stochastic Matching Method (확률적 매칭 방법을 사용한 음소열 기반 음성 인식)

  • Kim, Weon-Goo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.5
    • /
    • pp.696-700
    • /
    • 2007
  • A new method that improves the performance of the phonetic transcription based speech recognition system is presented with the speaker-independent phonetic recognizer. Since SI phoneme HMM based speech recognition system uses only the phoneme transcription of the input sentence, the storage space could be reduced greatly. However, the performance of the system is worse than that of the speaker dependent system due to the phoneme recognition errors generated from using SI models. A new training method that iteratively estimates the phonetic transcription and transformation vectors is presented to reduce the mismatch between the training utterances and a set of SI models using speaker adaptation techniques. For speaker adaptation the stochastic matching methods are used to estimate the transformation vectors. The experiments performed over actual telephone line shows that a reduction of about 45% in the error rates could be achieved as compared to the conventional method.

Analysis of the MSC(Multi-Spectral Camera) Operational Parameters

  • Yong, Sang-Soon;Kong, Jong-Pil;Heo, Haeng-Pal;Kim, Young-Sun
    • Korean Journal of Remote Sensing
    • /
    • v.18 no.1
    • /
    • pp.53-59
    • /
    • 2002
  • The MSC is a payload on the KOMPSAT-2 satellite to perform the earth remote sensing. The instrument images the earth using a push-broom motion with a swath width of 15 km and a GSD(Ground Sample Distance) of 1 m over the entire FOV(Field Of View) at altitude 685 km. The instrument is designed to haute an on-orbit operation duty cycle of 20% over the mission lifetime of 3 years with the functions of programmable gain/offset and on-board image data compression/storage. The MSC instrument has one channel for panchromatic imaging and four channel for multi-spectral imaging covering the spectral range from 450nm to 900nm using TDI(Time Belayed Integration) CCD(Charge Coupled Device) FPA(Focal Plane Assembly). The MSC hardware consists of three subsystem, EOS(Electro Optic camera Subsystem), PMU(Payload Management Unit) and PDTS(Payload Data Transmission Subsystem) and each subsystems are currently under development and will be integrated and verified through functional and space environment tests. Final verified MSC will be delivered to spacecraft bus for AIT(Assembly, Integration and Test) and then COMSAT-2 satellite will be launched after verification process through IST(Integrated Satellite Test). In this paper, the introduction of MSC, the configuration of MSC electronics including electrical interlace and design of CEU(Camera Electronic Unit) in EOS are described. MSC Operation parameters induced from the operation concept are discussed and analyzed to find the influence of system for on-orbit operation in future.

Hydrological Variability of Lake Chad using Satellite Gravimetry, Altimetry and Global Hydrological Models

  • Buma, Willibroad Gabila;Seo, Jae Young;Lee, Sang-IL
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2015.05a
    • /
    • pp.467-467
    • /
    • 2015
  • Sustainable water resource management requires the assessment of hydrological variability in response to climate fluctuations and anthropogenic activities. Determining quantitative estimates of water balance and total basin discharge are of utmost importance to understand the variations within a basin. Hard-to-reach areas with few infrastructures, coupled with lengthy administrative procedures makes in-situ data collection and water management processes very difficult and unreliable. In this study, the hydrological behavior of Lake Chad whose extent, extreme climatic and environmental conditions make it difficult to collect field observations was examined. During a 10 year period [January 2003 to December 2013], dataset from space-borne and global hydrological models observations were analyzed. Terrestial water storage (TWS) data retrieved from Gravity Recovery and Climate Experiment (GRACE), lake level variations from Satellite altimetry, water fluxes and soil moisture from Global Land Data Assimilation System (GLDAS) were used for this study. Furthermore, we combined altimetry lake volume with TWS over the lake drainage basin to estimate groundwater and soil moisture variations. This will be validated with groundwater estimates from WaterGAP Global Hydrology Model (WGHM) outputs. TWS showed similar variation patterns Lake water level as expected. The TWS in the basin area is governed by the lake's surface water. As expected, rainfall from GLDAS precedes GRACE TWS with a phase lag of about 1 month. Estimates of groundwater and soil moisture content volume changes derived by combining altimetric Lake Volume with TWS over the drainage basin are ongoing. Results obtained shall be compared with WaterGap Hydrology Model (WGHM) groundwater estimate outputs.

  • PDF

A Study on the Changes in the urban structure of Pyongyang-Bu and the characteristics of Pyeong-an Gamyeong in the late Joseon Dynasty (조선 후기 평양부(平壤府)의 도시구조 변화와 평안감영의 특성)

  • Hong, Soek-Joo;Kim, Bue-Dyel
    • Journal of architectural history
    • /
    • v.30 no.6
    • /
    • pp.45-58
    • /
    • 2021
  • This study aims to examine the changes in Pyongyang-bu during the late Joseon period and Pyeong-an Gamyeong through gazetteer, pictiroal maps and various literature. The results are as follows. To begin with, unlike other gamyeong, Pyongyang-bu had an exclusive government office facility from the beginning and had a different status because of the route for envoys from Ming. Therefore historical sites related to Gija were important. Second, the importance of Pyongyang city-wall increased even more through the Japanese Hideyoshi invasions in 1592 and the Manchu Invasion in 1636. However, since the post-war restoration was insufficient they focused on defense reducing the size of Pyongyang city wall. Third, as society stabilized, Pyongyangbu's finances were greatly secured. King Sukjong systematically reorganized Pyongyang city wall and facility of Pyongy-an gamyeong. The nothern wall in located high place, Gamyeong and storage in middle height and military force and guesthouse in the center of Pyongyang-bu. I-a and warehouse facilities in the far south were placed around the Daedonggwan. The urban structure that runs from Daedonggwan to Daedongmun was the same as other city. Another pertinent point is Pyeong-an gamyeong had more military facilities and rear garden and pavilion than before. In clunclusion, Pyeong-an gamyeong did not pass through three gates, but only through two gates. And it was characterized by more various space and having more pavilions than other gamyeong.

Detecting Abnormalities in Fraud Detection System through the Analysis of Insider Security Threats (내부자 보안위협 분석을 통한 전자금융 이상거래 탐지 및 대응방안 연구)

  • Lee, Jae-Yong;Kim, In-Seok
    • The Journal of Society for e-Business Studies
    • /
    • v.23 no.4
    • /
    • pp.153-169
    • /
    • 2018
  • Previous e-financial anomalies analysis and detection technology collects large amounts of electronic financial transaction logs generated from electronic financial business systems into big-data-based storage space. And it detects abnormal transactions in real time using detection rules that analyze transaction pattern profiling of existing customers and various accident transactions. However, deep analysis such as attempts to access e-finance by insiders of financial institutions with large scale of damages and social ripple effects and stealing important information from e-financial users through bypass of internal control environments is not conducted. This paper analyzes the management status of e-financial security programs of financial companies and draws the possibility that they are allies in security control of insiders who exploit vulnerability in management. In order to efficiently respond to this problem, it will present a comprehensive e-financial security management environment linked to insider threat monitoring as well as the existing e-financial transaction detection system.

Design of Security Method for Network Rendering of Augmented Reality Object (홀로그램 용 증강현실 객체의 네트워크 랜더링을 위한 보안 기법 설계)

  • Kim, Seoksoo;Kim, Donghyun
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • Due to the development of hologram display technology, various studies are being conducted to provide realistic contents for augmented reality. In the case of the HMD for hologram, since augmented reality objects must be rendered by a small processor, it is necessary to use a low-capacity content. To solve this problem, there is a need for a technique of rendering resources by providing resources through a network. In the case of the existing augmented reality system, there is no problem of contents modulation because the resources are loaded and rendered in the internal storage space. However, when providing resources through the network, security problems such as content tampering and malicious code insertion should be considered. Therefore, in this paper, we propose a network rendering technique applying security techniques to provide augmented reality contents in a holographic HMD device.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Crystal Structures and Electrochemical Properties of LiNi1-xMgxO2 (0≤x≤0.1) for Cathode Materials of Secondary Lithium Batteries (리튬 이차전지의 양극 활물질 LiNi1-xMgxO2 (0≤x≤0.1)의 결정구조 및 전기화학적 특성)

  • Kim, Deok-Hyeong;Jeong, Yeon Uk
    • Korean Journal of Metals and Materials
    • /
    • v.48 no.3
    • /
    • pp.262-267
    • /
    • 2010
  • $LiNi_{1-x}Mg_xO_2$(x=0, 0.025, 0.05, 0.075, 0.1) samples were synthesized by the solid-state reaction method. The crystal structure was analyzed by X-ray powder diffraction and Rietveld refinement. $LiNi_{1-x}Mg_xO_2$samples give single phases of hexagonal layered structures with a space group of R-3m. The calculated cation-anion distances and angles from the Rietveld refinement were changed with Mg contents in $LiNi_{1-x}Mg_xO_2$. The thicknesses of $NiO_2$ slabs were increased and the distances between the $NiO_2$ slabs were decreased with the increase in Mg contents in the samples. The electrical conductivities of sintered $LiNi_{1-x}Mg_xO_2$ samples were around $10^{-2}$ S/cm at room temperature. The electrochemical performances of $LiNi_{1-x}Mg_xO_2$were evaluated by coin cell test. Compared to $LiNiO_2$, $LiNi_{0.95}Mg_{0.05}O_2$ exhibited improved high-rate capability and cyclability due to the well-ordered layered structure by doping of Mg ion.

Reversible Watermarking in JPEG Compression Domain (JPEG 압축 영역에서의 리버서블 워터마킹)

  • Cui, Xue-Nan;Choi, Jong-Uk;Kim, Hak-Il;Kim, Jong-Weon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.6
    • /
    • pp.121-130
    • /
    • 2007
  • In this paper, we propose a reversible watermarking scheme in the JPEG compression domain. The reversible watermarking is useful to authenticate the content without the quality loss because it preserves the original content when embed the watermark information. In the internet, for the purpose to save the storage space and improve the efficiency of communication, digital image is usually compressed by JPEG or GIF. Therefore, it is necessary to develop a reversible watermarking in the JPEG compression domain. When the watermark is embedded, the lossless compression was used and the original image is recovered during the watermark extracting process. The test results show that PSNRs are distributed from 38dB to 42dB and the payload is from 2.5Kbits to 3.4Kbits where the QF is 75. Where the QF of the Lena image is varied from 10 to 99, the PSNR is directly proportional to the QF and the payload is around $1.6{\sim}2.8Kbits$.