• Title/Summary/Keyword: checkpoint

Search Result 246, Processing Time 0.025 seconds

Development of Mask-RCNN Based Axle Control Violation Detection Method for Enforcement on Overload Trucks (과적 화물차 단속을 위한 Mask-RCNN기반 축조작 검지 기술 개발)

  • Park, Hyun suk;Cho, Yong sung;Kim, Young Nam;Kim, Jin pyung
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.5
    • /
    • pp.57-66
    • /
    • 2022
  • The Road Management Administration is cracking down on overloaded vehicles by installing low-speed or high-speed WIMs at toll gates and main lines on expressways. However, in recent years, the act of intelligently evading the overloaded-vehicle control system of the Road Management Administration by illegally manipulating the variable axle of an overloaded truck is increasing. In this manipulation, when entering the overloaded-vehicle checkpoint, all axles of the vehicle are lowered to pass normally, and when driving on the main road, the variable axle of the vehicle is illegally lifted with the axle load exceeding 10 tons alarmingly. Therefore, this study developed a technology to detect the state of the variable axle of a truck driving on the road using roadside camera images. In particular, this technology formed the basis for cracking down on overloaded vehicles by lifting the variable axle after entering the checkpoint and linking the vehicle with the account information of the checkpoint. Fundamentally, in this study, the tires of the vehicle were recognized using the Mask RCNN algorithm, the recognized tires were virtually arranged before and after the checkpoint, and the height difference of the vehicle was measured from the arrangement to determine whether the variable axle was lifted after the vehicle left the checkpoint.

Development of a Hand Pose Rally System Based on Image Processing

  • Suganuma, Akira;Nishi, Koki
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.4 no.5
    • /
    • pp.340-348
    • /
    • 2015
  • The "stamp rally" is an event that participants go the round with predetermined points for the purpose of collecting stamps. They bring the stamp card to these points. They, however, sometimes leave or lose the card. In this case, they may not reach the final destination of the stamp rally. The purpose of this research is the construction of the stamp rally system which distinguishes each participant with his or her hand instead of the stamp card. We have realized our method distinguishing a hand posture by the image processing. We have also evaluated it by 30 examinees. Furthermore, we have designed the data communication between the server and the checkpoint to implement our whole system. We have also designed and implemented the process for the registering participant, the passing checkpoint and the administration.

Recovery Mechanism for Base Station Failure in Wireless ATM Networks (무선 ATM 망에서 시지국 고장시 회복 기법)

  • Im, Ji-Yeong;Jeong, Tae-Myeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.2
    • /
    • pp.182-188
    • /
    • 2001
  • 이동 호스트에서 기지국으로의 데이터 전송 시 예상치 못한 기지국 전체 고장은 필연적으로 버퍼에 있는 데이터의 손실을 초래하고 적절한 손실 보상이 필요하다. 기지국의 고장시의 회복을 위한 기존의 기법들은 오버헤드가 많고 단순히 무선 링크 장애만을 고려하므로 기지 국 전체 고장에는 적합하지 않다. 유무선망 전체의 신뢰성 있는 전송을 위한 End to End 전송 방식도 비효율적으로 이동 호스트가 보상할 데이터 량을 알기 위해 필요한 기지국 버 퍼의 정확한 손실 정도를 알기 어렵다. 본 논문에서는 기존에 제안된 기법들의 문제점을 분 석하고 무선 ATM망에서 기지국 고장 시에 효율적으로 손실 보상을 하도록 하는 기법으로 CPS(Checkpoint Scheme)을 제안한다. CPS는 기지국이 버퍼의 출력 정보를 통보하여 고장 시에 이동 호스트가 seamless한 전송을 할 수 있도록 한다. 기존의 기법들과 시뮬레이션 및 비교 분석을 통하여 CPS의 효율을 증명한다.

  • PDF

Control Method for the number of check-point nodes in detection scheme for selective forwarding attacks (선택적 전달 공격 탐지 기법에서의 감시 노드 수 제어기법)

  • Lee, Sang-Jin;Cho, Tae-Ho
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.387-390
    • /
    • 2009
  • Wireless Sensor Network (WSN) can easily compromised from attackers because it has the limited resource and deployed in exposed environments. When the sensitive packets are occurred such as enemy's movement or fire alarm, attackers can selectively drop them using a compromised node. It brings the isolation between the basestation and the sensor fields. To detect selective forwarding attack, Xiao, Yu and Gao proposed checkpoint-based multi-hop acknowledgement scheme (CHEMAS). The check-point nodes are used to detect the area which generating selective forwarding attacks. However, CHEMAS has static probability of selecting check-point nodes. It cannot achieve the flexibility to coordinate between the detection ability and the energy consumption. In this paper, we propose the control method for the number fo check-point nodes. Through the control method, we can achieve the flexibility which can provide the sufficient detection ability while conserving the energy consumption.

  • PDF

Recovery Methods in Main Memory DBMS

  • Kim, Jeong-Joon;Kang, Jeong-Jin;Lee, Ki-Young
    • International journal of advanced smart convergence
    • /
    • v.1 no.2
    • /
    • pp.26-29
    • /
    • 2012
  • Recently, to efficiently support the real-time requirements of RTLS( Real Time Location System) services, interest in the main memory DBMS is rising. In the main memory DBMS, because all data can be lost when the system failure happens, the recovery method is very important for the stability of the database. Especially, disk I/O in executing the log and the checkpoint becomes the bottleneck of letting down the total system performance. Therefore, it is urgently necessary to research about the recovery method to reduce disk I/O in the main memory DBMS. Therefore, In this paper, we analyzed existing log techniques and check point techniques and existing main memory DBMSs' recovery techniques for recovery techniques research for main memory DBMS.

Dead cell phagocytosis and innate immune checkpoint

  • Yoon, Kyoung Wan
    • BMB Reports
    • /
    • v.50 no.10
    • /
    • pp.496-503
    • /
    • 2017
  • The human body loses several billions of cells daily. When cells die in vivo, the corpse of each dead cell is immediately cleared. Specifically, dead cells are efficiently recognized and cleared by multiple types of neighboring phagocytes. Early research on cell death focused more on molecular mechanisms of cell death regulation while the cellular corpses were merely considered cellular debris. However, it has come to light that various biological stimuli following cell death are important for immune regulation. Clearance of normal dead cells occurs silently in immune tolerance. Exogenous or mutated antigens of malignant or infected cells can initiate adaptive immunity, thereby inducing immunogenicity by adjuvant signals. Several pathogens and cancer cells have strategies to limit the adjuvant signals and escape immune surveillance. In this review, we present an overview of the mechanisms of dead cell clearance and its immune regulations.

Design of Checklist for Improvement of Reliability of Uncertainty and Variability Environment (불확실성 및 가변성 환경의 신뢰성 향상을 위한 체크리스트 설계)

  • Lee, Eun-Ser
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.10
    • /
    • pp.389-396
    • /
    • 2014
  • There are many defects when we're working on a project. Especially, if we don't have experience in similar field, defects have a strong influence on the system entirely. Therefore, management of risk such like defects is important the factor for success of project. Finally, efficient management of risk can guarantee handling problems such like fault tolerancy, unexpected quality and delay of schedule. In this paper, we propose checkpoint for improvement of reliability and are willing to improve the reliability of an entire system using it.

T Cell-directed Immunotherapeutic Approaches for Head and Neck Squamous Cell Carcinoma (두경부편평세포암에서의 T세포 면역치료)

  • Choi, Yoon Seok
    • Korean Journal of Head & Neck Oncology
    • /
    • v.33 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • Despite improved treatment outcomes of locally advanced disease over the last 2 decades, the survival of patients with recurrent and/or metastatic head and neck squamous cell carcinoma (HNSCC) remains dismal. There is a clear need for development of novel therapeutic strategies for recurrent and/or metastatic HNSCC. Recent advances in understanding tumor immunology have been directly and rapidly translated into clinical success of T cell-directed immunotherapeutic approach in the treatment of several types of solid cancers. Among them, impact of immune checkpoint inhibition using neutralizing antibodies is the most striking. A variety of immunotherapeutic strategies targeting T cells have been also studied in HNSCC, especially in recurrent and/or metastatic setting even with significant survival benefit. The present article reviews the basic concept of T cell-directed immunotherapy and the current status of such approaches in the treatment of HNSCC.

Reliability Analysis and Fault Tolerance Strategy of TMR Real-time Control Systems (TMR 실시간 제어 시스템의 내고장성 기법 및 신뢰도 해석)

  • Kwak, Seong-Woo;You, Kwan-Ho
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.8
    • /
    • pp.748-754
    • /
    • 2004
  • In this paper, we propose the Triple Modular Redundancy (TMR) control system equipped with a checkpoint strategy. In this system, faults in a single processor are masked and faults in two or more processors are detected at each checkpoint time. When faults are detected, the rollback recovery is activated to recover from faults. The conventional TMR control system cannot overcome faults in two or more processors. The proposed system can effectively cope with correlated and independent faults in two or more processors. We develop a reliability model for this TMR control system under correlated and independent transient faults, and derive the reliability equation. Then we investigate the number of checkpoints that maximizes the reliability.