• Title/Summary/Keyword: Technique Information

Search Result 16,046, Processing Time 0.053 seconds

A Study on Data Availability Improvement using Mobility Prediction Technique with Location Information (위치 정보와 이동 예측 기법을 이용한 데이터 가용성 향상에 관한 연구)

  • Yang, Hwan Seok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.4
    • /
    • pp.143-149
    • /
    • 2012
  • MANET is a network that is a very useful application to build network environment in difficult situation to build network infrastructure. But, nodes that configures MANET have difficulties in data retrieval owing to resources which aren't enough and mobility. Therefore, caching scheme is required to improve accessibility and availability for frequently accessed data. In this paper, we proposed a technique that utilize mobility prediction of nodes to retrieve quickly desired information and improve data availability. Mobility prediction of modes is performed through distance calculation using location information. We used technique which global cluster table and local member table is managed by cluster head to reduce data consistency and query latency time. We compared COCA and CacheData and experimented to confirm performance of proposed scheme in this paper and efficiency of the proposed technique through experience was confirmed.

Performance Improvement Technique of Long-range Target Information Acquisition for Airborne IR Camera

  • Yang, Hyun-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.7
    • /
    • pp.39-45
    • /
    • 2017
  • In this paper, we propose three compensation methods to solve problems in high-resolution airborne infrared camera and to improve long-range target information acquisition performance. First, image motion and temporal noise reduction technique which is caused by atmospheric turbulence. Second, thermal blurring image correction technique by imperfect performance of NUC(Non Uniformity Correction) or raising the internal temperature of the camera. Finally, DRC(Dynamic Range Compression) and flicker removing technique of 14bits HDR(High Dynamic Range) infrared image. Through this study, we designed techniques to improve the acquisition performance of long-range target information of high-resolution airborne infrared camera, and compared and analyzed the performance improvement result with implemented images.

Substrate-Assembling Technique using Adhesive Patterned Spacers for Flexible Liquid Crystal Displays

  • Kang, Jae-Hyun;Bae, Kwang-Soo;Yi, Seung-Woo;Kim, Jae-Hoon;Yu, Chang-Jae
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2009.10a
    • /
    • pp.218-220
    • /
    • 2009
  • We proposed an enhanced substrate-assembling technique using adhesive patterned spacers for flexible liquid crystal displays (LCDs). The negative photoresister was used for the rigid columnar spacers and the strong substrate-bonding agent. The proposed technique is expected to be a good candidate for manufacturing method of flexible LCDs.

  • PDF

A Hybrid Approach for Regression Testing in Interprocedural Program

  • Singh, Yogesh;Kaur, Arvinder;Suri, Bharti
    • Journal of Information Processing Systems
    • /
    • v.6 no.1
    • /
    • pp.21-32
    • /
    • 2010
  • Software maintenance is one of the major activities of the software development life cycle. Due to the time and cost constraint it is not possible to perform exhaustive regression testing. Thus, there is a need for a technique that selects and prioritizes the effective and important test cases so that the testing effort is reduced. In an analogous study we have proposed a new variable based algorithm that works on variables using the hybrid technique. However, in the real world the programs consist of multiple modules. Hence, in this work we propose a regression testing algorithm that works on interprocedural programs. In order to validate and analyze this technique we have used various programs. The result shows that the performance and accuracy of this technique is very high.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.1
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.

Validation Technique using variance and confidence interval of metamodel (근사모델의 분산과 신뢰구간을 이용한 모델의 정확도 평가법)

  • Han, In-Sik;Lee, Yong-Bin;Choi, Dong-Hoon
    • Proceedings of the KSME Conference
    • /
    • 2008.11a
    • /
    • pp.1169-1175
    • /
    • 2008
  • The validation technique is classified with two methods whether to demand of additional experimental points. The method which requires additional experimental points such as RSME is actually impossible in engineering field. Therefore, the method which only use experimented points such as the cross validation technique is only available. But the cross validation not only requires considerable computational costs for generating metamodel each iterations, but also cannot measure quantitatively the fidelity of metamodel. In this research we propose a new validation technique for representative metamodels using an variance of metamodel and confidence interval information. The proposed validation technique computes confidence intervals using a variance information from the metamodel. This technique will have influence on choosing the accurate metamodel, constructing ensemble of each metamodels and advancing effectively sequential sampling technique.

  • PDF

A Suggestion for Randomized Response Technique using Fuzzy Logic

  • Choi, Kyung-Ho
    • Communications for Statistical Applications and Methods
    • /
    • v.8 no.2
    • /
    • pp.465-471
    • /
    • 2001
  • Randomized response technique is a survey technique for eliminating evasive answer bias. But this technique has a problem. This procedure suffers from linguistic expression in randomizing device. Thus for solving the problem, in this paper, we suggested the randomized response technique using fuzzy logic.

  • PDF

The Design of Information Security Management System for SMEs Industry Technique Leakage Prevention (중소기업 산업기술 유출방지를 위한 정보보호 관리체계 설계)

  • Chang, Hang-Bae
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.111-121
    • /
    • 2010
  • Since SMEs have recognized needs for industrial technique leakage prevention, they tend to construct information security system causing huge consumption of budget, yet they cannot organize information security team to operate integrated information security management system with consistency and it is fact that there only occur instant introductions of certain system. In this study, we designed information security management system for SMEs' industrial technique leakage prevention which is differentiated from those of large enterprises based on current status of SMEs' industrial technique leakage. Specifically we analyzed current status and vulnerability of SMEs' industrial technique leakage and we designed industrial technique leakage prevention management system for SMEs. Then we applied Delphi method to validate appropriateness of study result. We strongly believe that SMEs may estimate a appropriate level of investment on information security and develop countermeasures for control by utilizing this study result.

A Case study for Agricultural Mobile Commerce Application Using Oauth Based Real-time Information Sharing Technique

  • Do, Jung Rock;Jang, Ik Hoon;Kim, Jin Hyeung;Choe, Young Chan
    • Agribusiness and Information Management
    • /
    • v.7 no.1
    • /
    • pp.37-44
    • /
    • 2015
  • This study explains an agricultural mobile commerce case using Oauth Based Real-Time Information Sharing Technique according to the growth of the agricultural e-commerce market. Considering the characteristics of the agricultural market, it can confirm differential values with the existing agricultural mobile commerce market according to the functions and characteristics of its technique. We compare variables for introducing agricultural mobile commerce with the existing mobile commerce. Trust through information sharing with real-timefarming diaries, suitability and perceived ease of use variables are positively influenced, but influence on completeness and authority of information variables are relatively insufficient. Through this, we explained differential values of agricultural mobile commerce and suggested an applicable business model.

A New Interior-Filling Algorithm Based on Binary Boundary Coding (이진 경계 코드를 이용한 새로운 영역채움 알고리듬)

  • 심재창;조석제;하영호
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.11
    • /
    • pp.1867-1871
    • /
    • 1989
  • One of the most common problems in pattern recognition and image processing is filling the interior of a region when its contour is given. The existing algorithms of the filling are parity check technique, seeding technique, and technique based on chain coding the boundaries. In this paper, a very simple but effective technique for filling the interior of bounded region is proposed. This algorithm is based on the information of binary-coded boundary direction and covers some of the drawbacks reported in the earlier relevant works.

  • PDF