• Title/Summary/Keyword: Technological performance

검색결과 1,120건 처리시간 0.03초

Object Classification based on Weakly Supervised E2LSH and Saliency map Weighting

  • Zhao, Yongwei;Li, Bicheng;Liu, Xin;Ke, Shengcai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권1호
    • /
    • pp.364-380
    • /
    • 2016
  • The most popular approach in object classification is based on the bag of visual-words model, which has several fundamental problems that restricting the performance of this method, such as low time efficiency, the synonym and polysemy of visual words, and the lack of spatial information between visual words. In view of this, an object classification based on weakly supervised E2LSH and saliency map weighting is proposed. Firstly, E2LSH (Exact Euclidean Locality Sensitive Hashing) is employed to generate a group of weakly randomized visual dictionary by clustering SIFT features of the training dataset, and the selecting process of hash functions is effectively supervised inspired by the random forest ideas to reduce the randomcity of E2LSH. Secondly, graph-based visual saliency (GBVS) algorithm is applied to detect the saliency map of different images and weight the visual words according to the saliency prior. Finally, saliency map weighted visual language model is carried out to accomplish object classification. Experimental results datasets of Pascal 2007 and Caltech-256 indicate that the distinguishability of objects is effectively improved and our method is superior to the state-of-the-art object classification methods.

The Formation of the Machine Tool Cluster and The Accumlation of Technological Capability of the Numerical Controller Industry in Korea (클러스터 형성을 위한 지식 집약적 IT 부품 연구개발정책의 Dilemma : 공작기계제어 컴퓨터 사례)

  • 임채성
    • Proceedings of the Technology Innovation Conference
    • /
    • 기술경영경제학회 2000년도 제17회 하계학술발표회 논문집
    • /
    • pp.47-64
    • /
    • 2000
  • This paper analyses characteristics of the numerical controller industry in market formation and the Flow of information between users and producers and the characteristic of knowledge base of the industry and discusses the difficulties derived, from the characteristics, in accumulation of technological capability In market formation betweenusers and producers, the multi-layered market is not favorable to domestic producers in that lower end market is not large enough to provide cardle market to them which produce inferior quality and lower price than importer products. The credibility of the permance of a product is difficult to prove until a critical mass of products are sold. Therefore gaining market share is deterred by unproven credibility of the performance of the product. The flow of information between users and producers is limited. The flow of information on users environment through mass market to producers is essential for improving credibility of a product. The nature of knowledge base is tacit and the means of knowledge transmission is limited. Technological licensing and reverse engineering, Which have been conventional industry. These characteristics provide conditions of vicious circle in accumulation of technological capability of the numerical controller industry. This paper argues that these characteristics of the industry challenges existing approach to R&D management and framework of science and technology policy.

  • PDF

A two-stage cascaded foreground seeds generation for parametric min-cuts

  • Li, Shao-Mei;Zhu, Jun-Guang;Gao, Chao;Li, Chun-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5563-5582
    • /
    • 2016
  • Parametric min-cuts is an object proposal algorithm, which can be used for accurate image segmentation. In parametric min-cuts, foreground seeds generation plays an important role since the number and quality of foreground seeds have great effect on its efficiency and accuracy. To improve the performance of parametric min-cuts, this paper proposes a new framework for foreground seeds generation. First, to increase the odds of finding objects, saliency detection at multiple scales is used to generate a large set of diverse candidate seeds. Second, to further select good-quality seeds, a two-stage cascaded ranking classifier is used to filter and rank the candidates based on their appearance features. Experimental results show that parametric min-cuts using our seeding strategy can obtain a relative small pool of proposals with high accuracy.

RF MEMS Switches and Integrated Switching Circuits

  • Liu, A.Q.;Yu, A.B.;Karim, M.F.;Tang, M.
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • 제7권3호
    • /
    • pp.166-176
    • /
    • 2007
  • Radio frequency (RF) microelectromechanical systems (MEMS) have been pursued for more than a decade as a solution of high-performance on-chip fixed, tunable and reconfigurable circuits. This paper reviews our research work on RF MEMS switches and switching circuits in the past five years. The research work first concentrates on the development of lateral DC-contact switches and capacitive shunt switches. Low insertion loss, high isolation and wide frequency band have been achieved for the two types of switches; then the switches have been integrated with transmission lines to achieve different switching circuits, such as single-pole-multi-throw (SPMT) switching circuits, tunable band-pass filter, tunable band-stop filter and reconfigurable filter circuits. Substrate transfer process and surface planarization process are used to fabricate the above mentioned devices and circuits. The advantages of these two fabrication processes provide great flexibility in developing different types of RF MEMS switches and circuits. The ultimate target is to produce more powerful and sophisticated wireless appliances operating in handsets, base stations, and satellites with low power consumption and cost.

An Empirical Study on Adoption of Open Technological Innovation for SMEs based on Information and Technology (국내 IT중소기업의 개방형 기술혁신 수용에 관한 실증연구)

  • Joung, Seok-In
    • Journal of Information Technology Applications and Management
    • /
    • 제20권4호
    • /
    • pp.47-66
    • /
    • 2013
  • Recently, with the diffusion of a new paradigm named as the creative economy, the government's interests and efforts regarding support of SMEs' R&D have been concentrated. In particular, due to the dominant perception that the fundamental science and original technology from government-funded research institutes can further enhance the capabilities of SMEs' R&D, the importance of performance's diffusion on national R&D is further emphasized. In fact, the domestic SMEs don't have enough budget and workforce, so that all of self-contained technologies, product's competitiveness as well as the R&D capabilities, are very vulnerable, and thereby SMEs' commercialization is very likely to fail. For this end, SMEs need to adopt the concept of open innovation as the use of external R&D resources by licensing. In this study, we conducted a survey on a total of 286 domestic IT SMEs, and analyzed empirically to compare the degree of their acceptance on technological innovation between two groups divided by open/not-open innovation. As a result, we drew some of the key factors influencing the acceptance of the SMEs' open technological innovation, and found a variety of implications through them.

CacheSCDefender: VMM-based Comprehensive Framework against Cache-based Side-channel Attacks

  • Yang, Chao;Guo, Yunfei;Hu, Hongchao;Liu, Wenyan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제12권12호
    • /
    • pp.6098-6122
    • /
    • 2018
  • Cache-based side-channel attacks have achieved more attention along with the development of cloud computing technologies. However, current host-based mitigation methods either provide bad compatibility with current cloud infrastructure, or turn out too application-specific. Besides, they are defending blindly without any knowledge of on-going attacks. In this work, we present CacheSCDefender, a framework that provides a (Virtual Machine Monitor) VMM-based comprehensive defense framework against all levels of cache attacks. In designing CacheSCDefender, we make three key contributions: (1) an attack-aware framework combining our novel dynamic remapping and traditional cache cleansing, which provides a comprehensive defense against all three cases of cache attacks that we identify in this paper; (2) a new defense method called dynamic remapping which is a developed version of random permutation and is able to deal with two cases of cache attacks; (3) formalization and quantification of security improvement and performance overhead of our defense, which can be applicable to other defense methods. We show that CacheSCDefender is practical for deployment in normal virtualized environment, while providing favorable security guarantee for virtual machines.

EDGE: An Enticing Deceptive-content GEnerator as Defensive Deception

  • Li, Huanruo;Guo, Yunfei;Huo, Shumin;Ding, Yuehang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권5호
    • /
    • pp.1891-1908
    • /
    • 2021
  • Cyber deception defense mitigates Advanced Persistent Threats (APTs) with deploying deceptive entities, such as the Honeyfile. The Honeyfile distracts attackers from valuable digital documents and attracts unauthorized access by deliberately exposing fake content. The effectiveness of distraction and trap lies in the enticement of fake content. However, existing studies on the Honeyfile focus less on this perspective. In this work, we seek to improve the enticement of fake text content through enhancing its readability, indistinguishability, and believability. Hence, an enticing deceptive-content generator, EDGE, is presented. The EDGE is constructed with three steps: extracting key concepts with a semantics-aware K-means clustering algorithm, searching for candidate deceptive concepts within the Word2Vec model, and generating deceptive text content under the Integrated Readability Index (IR). Furthermore, the readability and believability performance analyses are undertaken. The experimental results show that EDGE generates indistinguishable deceptive text content without decreasing readability. In all, EDGE proves effective to generate enticing deceptive text content as deception defense against APTs.

Status and Role of Technological Knowledge Exchange Network in Regional Cluster: Performance Differences in Structural Equivalent Groups (지역 클러스터 내 기술지식 교류 네트워크의 지위와 역할: 구조적 등위성 집단의 성과 차이)

  • Ahn, Jae-Gwang;Kim, Jin-Han
    • Journal of Technology Innovation
    • /
    • 제27권3호
    • /
    • pp.53-82
    • /
    • 2019
  • This study empirically conduct structural equivalence analysis based on social network analysis in picking up on overall structural characteristics of technological knowledge exchange in a regional cluster. Previous conceptual studies so far have argued that performance differences among structurally equivalent groups exist. However, because little research has been done to empirically investigate this conceptual hypothesis, this study is conducted as complementary to fill this void. For analysis, we utilize two-mode network data consisted of 2,550 firms by investigating 53 technological knowledge exchange-related associations within Gumi national industrial cluster. The results show that some structurally equivalent groups can be defined appropriately and its role can be conditioned by firms' salient characteristics attached to each structural equivalent groups. In addition, it is presented through the present study that performance difference in structural equivalent groups can be distinct by some selected performance indicators. Finally, this study suggests the need to advance the study of performance differences in structurally equivalent groups in the future.

Performance evaluation of an underwater body and pumpjet by model testing in cavitation tunnel

  • Suryanarayana, Ch.;Satyanarayana, B.;Ramji, K.
    • International Journal of Naval Architecture and Ocean Engineering
    • /
    • 제2권2호
    • /
    • pp.57-67
    • /
    • 2010
  • Experimental investigations were carried out on an Axi-symmetric Body Model fitted with Pump-jet Propulsor (PJP) in the Cavitation Tunnel at Naval Science and Technological Laboratory (NSTL). The tests were intended for evaluating the propulsion characteristics of the body and propulsor. The self propulsion point of the model for two configurations was determined after finding the corrections for tunnel blockage effects and differences in model length at zero trim. The results were found to match closely with the towing tank results. The rotor and stator torques also matched closely over full range of experiment. Further experiments were carried out on the body at $4.5^{\circ}$ angle of trim to investigate the propulsive performance and assess the operational difficulties in the sea. The results indicated an increase in resistance and decrease in rotor thrust; but the balance of torques between the rotor and stator was undisturbed, causing no concern to vehicle roll.

Performance Study of genus 3 Hyperelliptic Curve Cryptosystem

  • Gupta, Daya;De, Asok;Chatterjee, Kakali
    • Journal of Information Processing Systems
    • /
    • 제8권1호
    • /
    • pp.145-158
    • /
    • 2012
  • Hyperelliptic Curve Cryptosystem (HECC) is well suited for all kinds of embedded processor architectures, where resources such as storage, time, or power are constrained due to short operand sizes. We can construct genus 3 HECC on 54-bit finite fields in order to achieve the same security level as 160-bit ECC or 1024-bit RSA due to the algebraic structure of Hyperelliptic Curve. This paper explores various possible attacks to the discrete logarithm in the Jacobian of a Hyperelliptic Curve (HEC) and addition and doubling of the divisor using explicit formula to speed up the scalar multiplication. Our aim is to develop a cryptosystem that can sign and authenticate documents and encrypt / decrypt messages efficiently for constrained devices in wireless networks. The performance of our proposed cryptosystem is comparable with that of ECC and the security analysis shows that it can resist the major attacks in wireless networks.