• Title/Summary/Keyword: Technology Clustering

Search Result 1,152, Processing Time 0.027 seconds

Hopping Routing Scheme to Resolve the Hot Spot Problem of Periodic Monitoring Services in Wireless Sensor Networks (주기적 모니터링 센서 네트워크에서 핫 스팟 문제 해결을 위한 호핑 라우팅 기법)

  • Heo, Seok-Yeol;Lee, Wan-Jik;Jang, Seong-Sik;Byun, Tae-Young;Lee, Won-Yeol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2340-2349
    • /
    • 2009
  • In this paper we proposed a hopping routing scheme to resolve the hot spot problem for periodic monitoring services in wireless sensor networks. Our hopping routing scheme constructs load balanced routing path, where an amount of energy consumption of all nodes in the sensor networks is predictable. Load balanced routing paths can be obtained from horizontal hopping transmission scheme which balances the load of the sensor nodes in the same area, and also from vertical hopping transmission scheme which balances the load of the sensor nodes in the other area. The direct transmission count numbers as load balancing parameter for vertical hopping transmission are derived using the energy consumption model of the sensor nodes. The experimental results show that the proposed hopping scheme resolves the hot spot problem effectively. The efficiency of hopping routing scheme is also shown by comparison with other routing scheme such as multi-hop, direct transmission and clustering.

A Web Contents Ranking System using Related Tag & Similar User Weight (연관 태그 및 유사 사용자 가중치를 이용한 웹 콘텐츠 랭킹 시스템)

  • Park, Su-Jin;Lee, Si-Hwa;Hwang, Dae-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.4
    • /
    • pp.567-576
    • /
    • 2011
  • In current Web 2.0 environment, one of the most core technology is social bookmarking which users put tags and bookmarks to their interesting Web pages. The main purpose of social bookmarking is an effective information service by use of retrieval, grouping and share based on user's bookmark information and tagging result of their interesting Web pages. But, current social bookmarking system uses the number of bookmarks and tag information separately in information retrieval, where the number of bookmarks stand for user's degree of interest on Web contents, information retrieval, and classification serve the purpose of tag information. Because of above reason, social bookmarking system does not utilize effectively the bookmark information and tagging result. This paper proposes a Web contents ranking algorithm combining bookmarks and tag information, based on preceding research on associative tag extraction by tag clustering. Moreover, we conduct a performance evaluation comparing with existing retrieval methodology for efficiency analysis of our proposed algorithm. As the result, social bookmarking system utilizing bookmark with tag, key point of our research, deduces a effective retrieval results compare with existing systems.

Automated Training from Landsat Image for Classification of SPOT-5 and QuickBird Images

  • Kim, Yong-Min;Kim, Yong-Il;Park, Wan-Yong;Eo, Yang-Dam
    • Korean Journal of Remote Sensing
    • /
    • v.26 no.3
    • /
    • pp.317-324
    • /
    • 2010
  • In recent years, many automatic classification approaches have been employed. An automatic classification method can be effective, time-saving and can produce objective results due to the exclusion of operator intervention. This paper proposes a classification method based on automated training for high resolution multispectral images using ancillary data. Generally, it is problematic to automatically classify high resolution images using ancillary data, because of the scale difference between the high resolution image and the ancillary data. In order to overcome this problem, the proposed method utilizes the classification results of a Landsat image as a medium for automatic classification. For the classification of a Landsat image, a maximum likelihood classification is applied to the image, and the attributes of ancillary data are entered as the training data. In the case of a high resolution image, a K-means clustering algorithm, an unsupervised classification, was conducted and the result was compared to the classification results of the Landsat image. Subsequently, the training data of the high resolution image was automatically extracted using regular rules based on a RELATIONAL matrix that shows the relation between the two results. Finally, a high resolution image was classified and updated using the extracted training data. The proposed method was applied to QuickBird and SPOT-5 images of non-accessible areas. The result showed good performance in accuracy assessments. Therefore, we expect that the method can be effectively used to automatically construct thematic maps for non-accessible areas and update areas that do not have any attributes in geographic information system.

An Energy- Efficient Optimal multi-dimensional location, Key and Trust Management Based Secure Routing Protocol for Wireless Sensor Network

  • Mercy, S.Sudha;Mathana, J.M.;Jasmine, J.S.Leena
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3834-3857
    • /
    • 2021
  • The design of cluster-based routing protocols is necessary for Wireless Sensor Networks (WSN). But, due to the lack of features, the traditional methods face issues, especially on unbalanced energy consumption of routing protocol. This work focuses on enhancing the security and energy efficiency of the system by proposing Energy Efficient Based Secure Routing Protocol (EESRP) which integrates trust management, optimization algorithm and key management. Initially, the locations of the deployed nodes are calculated along with their trust values. Here, packet transfer is maintained securely by compiling a Digital Signature Algorithm (DSA) and Elliptic Curve Cryptography (ECC) approach. Finally, trust, key, location and energy parameters are incorporated in Particle Swarm Optimization (PSO) and meta-heuristic based Harmony Search (HS) method to find the secure shortest path. Our results show that the energy consumption of the proposed approach is 1.06mJ during the transmission mode, and 8.69 mJ during the receive mode which is lower than the existing approaches. The average throughput and the average PDR for the attacks are also high with 72 and 62.5 respectively. The significance of the research is its ability to improve the performance metrics of existing work by combining the advantages of different approaches. After simulating the model, the results have been validated with conventional methods with respect to the number of live nodes, energy efficiency, network lifetime, packet loss rate, scalability, and energy consumption of routing protocol.

Group-based speaker embeddings for text-independent speaker verification (문장 독립 화자 검증을 위한 그룹기반 화자 임베딩)

  • Jung, Youngmoon;Eom, Youngsik;Lee, Yeonghyeon;Kim, Hoirin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.496-502
    • /
    • 2021
  • Recently, deep speaker embedding approach has been widely used in text-independent speaker verification, which shows better performance than the traditional i-vector approach. In this work, to improve the deep speaker embedding approach, we propose a novel method called group-based speaker embedding which incorporates group information. We cluster all speakers of the training data into a predefined number of groups in an unsupervised manner, so that a fixed-length group embedding represents the corresponding group. A Group Decision Network (GDN) produces a group weight, and an aggregated group embedding is generated from the weighted sum of the group embeddings and the group weights. Finally, we generate a group-based embedding by adding the aggregated group embedding to the deep speaker embedding. In this way, a speaker embedding can reduce the search space of the speaker identity by incorporating group information, and thereby can flexibly represent a significant number of speakers. We conducted experiments using the VoxCeleb1 database to show that our proposed approach can improve the previous approaches.

Design of Classification Methodology of Malicious Code in Windows Environment (윈도우 악성코드 분류 방법론의 설계)

  • Seo, Hee-Suk;Choi, Joong-Sup;Chu, Pill-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2009
  • As the innovative internet technologies and multimedia are being rapidly developed, malicious codes are a remarkable new growth part and supplied by various channel. This project presents a classification methodology for malicious codes in Windows OS (Operating System) environment, develops a test classification system. Thousands of malicious codes are brought in every day. In a result, classification system is needed to analyzers for supporting information which newly brought malicious codes are a new species or a variety. This system provides the similarity for analyzers to judge how much a new species or a variety is different to the known malicious code. It provides to save time and effort, to less a faulty analysis. This research includes the design of classification system and test system. We classify the malicious codes to 9 groups and then 9 groups divide the clusters according to the each property.

Analysis on the Efficiency Change in Electric Vehicle Charging Stations Using Multi-Period Data Envelopment Analysis (다기간 자료포락분석을 이용한 전기차 충전소 효율성 변화 분석)

  • Son, Dong-Hoon;Gang, Yeong-Su;Kim, Hwa-Joong
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.2
    • /
    • pp.1-14
    • /
    • 2021
  • It is highly challenging to measure the efficiency of electric vehicle charging stations (EVCSs) because factors affecting operational characteristics of EVCSs are time-varying in practice. For the efficiency measurement, environmental factors around the EVCSs can be considered because such factors affect charging behaviors of electric vehicle drivers, resulting in variations of accessibility and attractiveness for the EVCSs. Considering dynamics of the factors, this paper examines the technical efficiency of 622 electric vehicle charging stations in Seoul using data envelopment analysis (DEA). The DEA is formulated as a multi-period output-oriented constant return to scale model. Five inputs including floating population, number of nearby EVCSs, average distance of nearby EVCSs, traffic volume and traffic congestion are considered and the charging frequency of EVCSs is used as the output. The result of efficiency measurement shows that not many EVCSs has most of charging demand at certain periods of time, while the others are facing with anemic charging demand. Tobit regression analyses show that the traffic congestion negatively affects the efficiency of EVCSs, while the traffic volume and the number of nearby EVCSs are positive factors improving the efficiency around EVCSs. We draw some notable characteristics of efficient EVCSs by comparing means of the inputs related to the groups classified by K-means clustering algorithm. This analysis presents that efficient EVCSs can be generally characterized with the high number of nearby EVCSs and low level of the traffic congestion.

The Improvement of NDF(No Defect Found) on Mobile Device Using Datamining (데이터 마이닝 기법을 활용한 Mobile Device NDF(No Defect Found) 개선)

  • Lee, Jewang;Han, Chang Hee
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.44 no.1
    • /
    • pp.60-70
    • /
    • 2021
  • Recently, with the development of technologies for the fourth industrial revolution, convergence and complex technology are being applied to aircraft, electronic home appliances and mobile devices, and the number of parts used is increasing. Increasing the number of parts and the application of convergence technologies such as HW (hardware) and SW (software) are increasing the No Defect Found (NDF) phenomenon in which the defect is not reproduced or the cause of the defect cannot be identified in the subsequent investigation systems after the discovery of the defect in the product. The NDF phenomenon is a major problem when dealing with complex technical systems, and its consequences may be manifested in decreased safety and dependability and increased life cycle costs. Until now, NDF-related prior studies have been mainly focused on the NDF cost estimation, the cause and impact analysis of NDF in qualitative terms. And there have been no specific methodologies or examples of a working-level perspective to reduce NDF. The purpose of this study is to present a practical methodology for reducing NDF phenomena through data mining methods using quantitative data accumulated in the enterprise. In this study, we performed a cluster analysis using market defects and design-related variables of mobile devices. And then, by analyzing the characteristics of groups with high NDF ratios, we presented improvement directions in terms of design and after service policies. This is significant in solving NDF problems from a practical perspective in the company.

Enhanced Tactical Situation Display for Tactical Stations of P-3C Maritime Patrol Aircraft (P-3C 해상초계기 전술 컴퓨터의 전술정보 화면 표시 성능 개선)

  • Kim, Byoung-Kug;Kim, Jae-Hyoung
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.6
    • /
    • pp.451-457
    • /
    • 2020
  • Diverse sensors are equipped on P-3C Maritime Patrol Aircraft for RoKN to detect and monitor tactical targets. Tactical targets are maintained/shared by tactical computer stations which consist of a clustering network in the aircraft and displayed in various ways on TSDs(Tactical Situation Displays) for mission operators to perform their specified missions. Korea peninsula is widely covered with the sea areas and neighboured with several countries; which makes huge number of ships and aircraft deployment around the place. Due to an increase in number of sensors and enhancement of their sensitivities; we were aware of the necessity of TSD improvements to provide huge number of tactical targets and to display them efficiently. In this paper, we propose a solution for the improvements by using previous backup data and re-usage of the data, then we verify the proposal through implementation and evaluation results.

A Study of Design for Additive Manufacturing Method for Part Consolidation to Redesign IoT Device (IoT 기기 재설계를 위한 적층제조를 활용한 부품병합 설계 방법에 대한 연구)

  • Kim, Samyeon
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.2
    • /
    • pp.55-59
    • /
    • 2022
  • Recently, IoT technology has great attention and plays a key role in 4th industrial revolution in order to design customized products and services. Additive Manufacturing (AM) is applied to fabricate IoT sensor directly or IoT sensor embedded structure. Also, design methods for AM are developing to consolidate various parts of IoT devices. Part consolidation leads to assembly time and cost reduction, reliability improvement, and lightweight. Therefore, a design method was proposed to guide designers to consolidate parts. The design method helps designers to define product architecture that consists of functions and function-part relations. The product architecture is converted to a network graph and then Girvan Newman algorithm is applied to cluster the graph network. Parts in clusters are candidates for part consolidation. To demonstrate the usefulness of the proposed design method, a case study was performed with e-bike fabricated by additive manufacturing.