• Title/Summary/Keyword: model update

Search Result 649, Processing Time 0.033 seconds

Improving Rate Control Algorithm for MPEG 4 Video (MPEG4 Video 부호화를 위한 비트율 제어 알고리즘 개선에 관한 연구)

  • 김소영;박정훈
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.25-28
    • /
    • 2002
  • This paper presents variable bit rate(VBR) rate control scheme based on MPEG-4 VM8 rate control scheme. An initial Q searching method provides more accurate bit allocation for the first frame. A frame skipping and RD Model update scheme when coded frame quality is too low or high prevents image quality fluctuation.

  • PDF

Cost Reduction of Location Registration Using the LiEy UBdate Strategy in Hierarchical Mobile IPv6 (계층적 이동 Ipv6환경에서 지연갱신전략을 이용한 위치등록 비용 감소)

  • Yi Myung-Kyu;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.370-381
    • /
    • 2005
  • Mobile IP provides an efficient and scalable mechanism for host mobility within the Internet. Using Mobile If, mobile nodes may change their point of attachment to the Internet without changing their If address. However, it would result in a high signaling cost. To reduce the signaling cost, we factor in the fact that mobile users will not be actively communicating much of the time. In fact, there Is no necessity to send a binding update message to the home agent when an mobile node does not communicates with others while moving. From this point of view, we propose a lazy update strategy for minimizing signaling cost using the forwarding pointer in hierarchical Mobile IPv6. In our proposal, binding updates are sent only when a mobile node is in a busy mode. If an mobile node is in a dormant mode, binding update messages are delayed until busy mode using the forwarding pointer. As a result, our proposal can reduce the total signaling cost by eliminating unnecessary binding update messages when a mobile node Is in a dormant mode. In addition to, our proposal reduces unnecessary location update cost resulting from ping-pong effect under mobile node's dormant mode. Analysis results using the discrete analytic model presented in this paper shows that our proposal can has superior performance than hierarchical Mobile nv6 when the call-to-mobility ratio is low and the length of the forwarding pointer chain K is low.

An Active Candidate Set Management Model on Association Rule Discovery using Database Trigger and Incremental Update Technique (트리거와 점진적 갱신기법을 이용한 연관규칙 탐사의 능동적 후보항목 관리 모델)

  • Hwang, Jeong-Hui;Sin, Ye-Ho;Ryu, Geun-Ho
    • Journal of KIISE:Databases
    • /
    • v.29 no.1
    • /
    • pp.1-14
    • /
    • 2002
  • Association rule discovery is a method of mining for the associated item set on large databases based on support and confidence threshold. The discovered association rules can be applied to the marketing pattern analysis in E-commerce, large shopping mall and so on. The association rule discovery makes multiple scan over the database storing large transaction data, thus, the algorithm requiring very high overhead might not be useful in real-time association rule discovery in dynamic environment. Therefore this paper proposes an active candidate set management model based on trigger and incremental update mechanism to overcome non-realtime limitation of association rule discovery. In order to implement the proposed model, we not only describe an implementation model for incremental updating operation, but also evaluate the performance characteristics of this model through the experiment.

A Research on Mobile Malware Model propagated Update Attacks (변조 업데이트를 통해 전파되는 모바일 악성어플리케이션 모델 연구)

  • Ju, Seunghwan;Seo, Heesuk
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.2
    • /
    • pp.47-54
    • /
    • 2015
  • The popularity and adoption of smart-phones has greatly stimulated the spread of mobile malware, especially on the popular platforms such as Android. The fluidity of application markets complicate smart-phone security. There is a pressing need to develop effective solutions. Although recent efforts have shed light on particular security issues, there remains little insight into broader security characteristics of smart-phone application. Now, the analytical methods used mainly are the reverse engineering-based analysis and the sandbox-based analysis. Such methods are can be analyzed in detail. but, they take a lot of time and have a one-time payout. In this study, we develop a system to monitor that mobile application permissions at application update. We had to overcome a one-time analysis. This study is a service-based malware analysis, It will be based will be based on the mobile security study.

Registration multiple range views (복수의 거리영상 간의 변환계수의 추출)

  • 정도현;윤일동;이상욱
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.34S no.2
    • /
    • pp.52-62
    • /
    • 1997
  • To reconstruct the complete 3-D shape of an object, seveal range images form different viewpoints should be merged into a single model. The process of extraction of the transformation parameters between multiple range views is calle dregistration. In this paper, we propose a new algorithm to find the transformation parameters between multiple range views. Th eproposed algorithm consists of two step: initial estimation and iteratively update the transformation. To guess the initial transformation, we modify the principal axes by considering the projection effect, due to the difference fo viewpoints. Then, the following process is iterated: in order to extract the exact transformation parameters between the range views: For every point of the common region, find the nearest point among the neighborhood of the current corresponding point whose correspondency is defined by the reverse calibration of the range finder. Then, update the transformation to satisfy the new correspondencies. In order to evaluate the performance the proposed registration algorithm, some experiments are performed on real range data, acquired by space encoding range finder. The experimental results show that the proposed initial estimation accelerate the following iterative registration step.

  • PDF

Determinants of using internet shopping malls (인터넷쇼핑몰 이용에 영향을 미치는 요인에 관한 연구)

  • 신기영;추교완;박동진
    • The Journal of Information Systems
    • /
    • v.10 no.1
    • /
    • pp.279-301
    • /
    • 2001
  • This study was examined empirically the relationship between exogenous and endogenous variables to use internet shopping malls. Exogenous variables in our model are retrieval simpleness, quality of order treatment, web reputation, update and system quality and endogenous variables are perceived usefulness, perceived ease of use and intention of using internet shopping malls. The results of the path analysis are shown as follows. All exogenous variables have a direct effect on perceived ease of use while both retrieval simpleness and update has a direct effect on perceived usefulness. The perceived ease of use has a direct effect on the intention of using internet shopping malls and has a indirect effect on the intention through perceived usefulness. Especially, web reputation among the exogenous variables has the strongest impact on the perceived ease of use and retrieval has the strongest impact on the perceived usefulness.

  • PDF

Secure Group Communication with Dynamic Membership Change in Ad Hoc Networks

  • Kim, Hee-Youl
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.9
    • /
    • pp.1668-1683
    • /
    • 2011
  • The importance of secure communication between only legitimate group members in ad hoc networks has been growing in recent years. Due to the ad hoc nature the scalability on dynamic membership change is a major concern. However, the previous models require at least O(log n) communication cost for key update per each membership change, which imposes a heavy burden on the devices. In this paper we present a scalable model that supports communication-efficient membership change in ad hoc networks by exclusionary keys and RSA functions. The multicast cost for key update is extremely low, that is O(1) , and one-to-one communications occur mostly in neighboring devices.

Adaptive management of excavation-induced ground movements

  • Finno, Richard J.
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2009.09a
    • /
    • pp.27-50
    • /
    • 2009
  • This paper describes an adaptive management approach for predicting, monitoring, and controlling ground movements associated with excavations in urban areas. Successful use of monitoring data to update performance predictions of supported excavations depends equally on reasonable numerical simulations of performance, the type of monitoring data used as observations, and the optimization techniques used to minimize the difference between predictions and observed performance. This paper summarizes each of these factors and emphasizes their inter-dependence. Numerical considerations are described, including the initial stress and boundary conditions, the importance of reasonable representation of the construction process, and factors affecting the selection of the constitutive model. Monitoring data that can be used in conjunction with current numerical capabilities are discussed, including laser scanning and webcams for developing an accurate record of construction activities, and automated and remote instrumentations to measure movements. Self-updating numerical models that have been successfully used to compute anticipated ground movements, update predictions of field observations and to learn from field observations are summarized. Applications of these techniques from case studies are presented to illustrate the capabilities of this approach.

  • PDF