• Title/Summary/Keyword: original order

Search Result 2,467, Processing Time 0.031 seconds

Vector Approximation Bitmap Indexing Method for High Dimensional Multimedia Database (고차원 멀티미디어 데이터 검색을 위한 벡터 근사 비트맵 색인 방법)

  • Park Joo-Hyoun;Son Dea-On;Nang Jong-Ho;Joo Bok-Gyu
    • The KIPS Transactions:PartD
    • /
    • v.13D no.4 s.107
    • /
    • pp.455-462
    • /
    • 2006
  • Recently, the filtering approach using vector approximation such as VA-file[1] or LPC-file[2] have been proposed to support similarity search in high dimensional data space. This approach filters out many irrelevant vectors by calculating the approximate distance from a query vector using the compact approximations of vectors in database. Accordingly, the total elapsed time for similarity search is reduced because the disk I/O time is eliminated by reading the compact approximations instead of original vectors. However, the search time of the VA-file or LPC-file is not much lessened compared to the brute-force search because it requires a lot of computations for calculating the approximate distance. This paper proposes a new bitmap index structure in order to minimize the calculating time. To improve the calculating speed, a specific value of an object is saved in a bit pattern that shows a spatial position of the feature vector on a data space, and the calculation for a distance between objects is performed by the XOR bit calculation that is much faster than the real vector calculation. According to the experiment, the method that this paper suggests has shortened the total searching time to the extent of about one fourth of the sequential searching time, and to the utmost two times of the existing methods by shortening the great deal of calculating time, although this method has a longer data reading time compared to the existing vector approximation based approach. Consequently, it can be confirmed that we can improve even more the searching performance by shortening the calculating time for filtering of the existing vector approximation methods when the database speed is fast enough.

A Study on Sustainable Downtown Activation Plan Considering Balanced Development of City (Focused on Siheung City in Korea) (도시 균형발전을 고려한 지속가능한 도심활성화 방안 연구 (시흥시를 중심으로))

  • Park, Hun;Yang, Sung-Min
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.10
    • /
    • pp.4648-4659
    • /
    • 2011
  • Korea experienced rapid urbanization due to high growth of economy. As people left the country and gathered in the city, the size of city has been expanded, resulting in unbalanced development of the land. In addition, it appears in diverse aspects from nationwide phenomenon to the local development in each city unit. In particular, it even tends to become social problems in the metropolitan cities. As a solution for it, this study conducts theoretical consideration on sustainability in the aspect of balanced urban development and suggests measures through analysis on Siheung-city. The result is as follows. First of all, comprehensive approach is required based on sustainability. It is required to derive balanced city development by expanding it to the social, cultural and economic aspects. Second, integrated management policy is required for the original city along with new development. It should be considered together with diverse social and physical aspects. Third, approach from the aspect of city planning is required through consideration on flat city expansion and connection with city space structural. Fourth, in order to foster balanced urban development, it is needed to grope for solutions for imbalanced urban development through the participation of diverse groups such as local residents, private enterprisers, and the non-profit civic groups of the local community along with the mediation among persons interested. And continuous support of administrative authorities should be obtained to create such environment.

Performance Improvement of Word Clustering Using Ontology (온톨로지를 이용한 단어 군집화 성능 개선)

  • Park Eun-Jin;Kim Jae-Hoon;Ock Cheol-Young
    • The KIPS Transactions:PartB
    • /
    • v.13B no.3 s.106
    • /
    • pp.337-344
    • /
    • 2006
  • In this paper, we describe the design and the implementation of word clustering system using a definition of an entry word in the dictionary, called a dictionary definition. Generally word clustering needs various features like words and the performance of a system for the word clustering depends on using some kinds of features. Dictionary definition describes the meaning of an entry in detail, but words in the dictionary definition are implicative or abstractive, and then its length is not long. The word clustering using only features extracted from the dictionary definition results in a lots of small-size clusters. In order to make large-size clusters and improve the performance, we need to transform the features into more general words with keeping the original meaning of the dictionary definition as intact as possible. In this paper, we propose two methods for extending the dictionary definition using ontology. One is to extend the dictionary definition to parent words on the ontology and the other is to extend the dictionary definition to some words in fixed depth from the root of the ontology. Through our experiments, we have observed that the proposed systems outperform that without extending features, and the latter's extending method overtakes the former's extending method in performance. We have also observed that verbs are very useful in extending features in the case of word clustering.

Implementation and Validation of the Web DDoS Shelter System(WDSS) (웹 DDoS 대피소 시스템(WDSS) 구현 및 성능검증)

  • Park, Jae-Hyung;Kim, Kang-Hyoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.4
    • /
    • pp.135-140
    • /
    • 2015
  • The WDSS improves defensive capacity against web application layer DDoS attack by using web cache server and L7 switch which are added on the DDoS shelter system. When web DDoS attack occurs, security agents divert traffic from backbone network to sub-network of the WDSS and then DDoS protection device and L7 switch block abnormal packets. In the meantime, web cache server responds only to requests of normal clients and maintains stable web service. In this way, the WDSS can counteract the web DDoS attack which generates small traffic and depletes server-client session resource. Furthermore, the WDSS does not require IP tunneling because it is not necessary to retransfer the normal requests to original web server. In this paper, we validate operation of the WDSS and verify defensive capability against web application layer DDoS attacks. In order to do this, we built the WDSS on backbone network of an ISP. And we performed web DDoS tests by using a testing system that consists of zombie PCs. The tests were performed by three types and various amounts of web DDoS attacks. Test results suggest that the WDSS can detect small traffic of the web DDoS attacks which do not have repeat flow whereas the formal DDoS shelter system cannot.

Notes on Powdery mildew of Ailanthus altissima caused by Phyllactinia corylea (Pers.) Karst (Phyllactinia corylea (Pers.) Karst에 의(依)한 가중나무 흰가루병(病))

  • Kim, Ki Chung
    • Journal of Korean Society of Forest Science
    • /
    • v.4 no.1
    • /
    • pp.9-13
    • /
    • 1965
  • Powdery mildew of Ailanthus altissima Sw. was first reported by J.S. Park in Korea, 1961. According to his report, this disease was found on the leaves of this tree species collected in Jeongup, 1957, and in Taejon, 1958. He described morphological characters of this pathogen and described also that the causal fungus may be closely related with Phyllactinia corylea. This disease which appears dusty grayish yellow molds under surface of leaves was collected again by the author in Kwangju, 1962. The present works were undertaken to make clear the species of causal fungus by means of the morphology and pathogenecity. According to the following results, the pathogen was identified as Phyllactinia corylea (Pers.) Karst. Morphological characters of the fungus Mycelia persistent or more or less evanescent; matured conidia solitary, aseptate, short-clavate to clavate to clavate, hyaline or yellowish, granulate, $44.6-89.2{\times}9.3-24.2{\mu}$, average $64.8-17.8{\mu}$ in size; conidiophores elongate clavate or columnar, hyaline, 2-3 septate, $122.8-346.0{\times}3.7-7.4{\mu}$, average $208.8{\times}6.3{\mu}$; per-thecia usually scattered, rarely gregarious, dark brown to black, depressed globose to globose, $223.2-297.6{\mu}$, average $267.8{\mu}$ in diameter; appendages 12-19, usually 15 in number, hyaline, straight, needle-shaped, sharply pointed at the apex and bulbous at the base, aseptate, $93.0-310.0{\times}5.0-8.0{\mu}$, average $173.3{\times}6.4{\mu}$ in size; asci elongate ellipsoidal to broadly clavate, hyaline, more or less stalked, 8-13 in number, $68.5-76.6{\times}26.1-34.2{\mu}$, average $71.4{\times}29.0{\mu}$ in size; ascospores 2-4, usually 2 in number, hyaline or yellowish, aseptate, ellipsoidal or ovate, $27.7-34.2{\times}14.7-17.9{\mu}$, average $25.5{\times}13.9{\mu}$ in size. Pathogenicity of the fungi In order to make clear the species of the fungus and the pathogenic differences of Phyllactinia fungi which are collected around the contaminated area and seemed to be related to Ailanthus powdery mildew, some inoculation experiments were performed. 1. Cross inoculation to several tree species with their pathogen: Tested materials; Phyllactinia in question on Ailanthus altissima Sw. Ph. fraxini (DC.) Homma. On Alnus firma S. et Z. Ph. moricola (P. Henn.) Homma on morus alba L. According to the results of the experiments, the reactions were all negative with the exception of the original hosts of tested fungi. 2. Inoculation to Picrasma ailanthoides Planch. : The appearance of symptom on the leaves of P. ailanthoides is not distinct, but more or less mycelial growth. Therefore, under the optimal condition in glass chamber, it may be possible to success artificially.

  • PDF

A Study on the Landcover Classification using Band Ratioing Data of Landsat-TM (Landsat-TM의 밴드비 연산데이터를 이용한 토지피복분류에 관한 연구)

  • Kwon, Bong-Kyum;Yamada, Kiyoshi;Niren, Takaaki;Jo, Myung-Hee
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.6 no.2
    • /
    • pp.80-91
    • /
    • 2003
  • In this research, re-using band ratio data was proposed and examined as a method of raising the accuracy in landcover classification which is using satellite data.In order to determine the band which is used to calculation in the classified item, the six bands except the band 6 were combined with the band in which combination is possible and the landcover classification by MLC of supervised classification was carried out. In the result of landcover classification which is combined with forty nine combination, Two bands which were mostly used by band combination in the accuracy belonged inside the 10th place of a higher rank were selected and also calculated. landcover classification were performed again after the calculation result had been recombinated from the research. In addition, the new landcover classification result was compared and examined with the landcover classification using the old data. From the result of which was compared and examined the new landcover classification data recombinated calculation result with landcover classification using the original data, The classification accuracy of the new landcover classification data recombinated calculation result became low in ground but became improved in the all class. Specially The accuracy to urban area is very improved. therefore, it determined that reusing band ratio data is very useful when we need to analyze landcover classification and land information to urban area after that.

  • PDF

A Study of Trans-media in Fantasy Genre - Focusing on the Game of Thrones - (판타지 장르의 트랜스미디어 연구 -왕좌의 게임(Game of Thrones)을 중심으로-)

  • Jang, Dong-Gon;Kang, Ji-Young
    • Cartoon and Animation Studies
    • /
    • s.48
    • /
    • pp.173-197
    • /
    • 2017
  • The purpose of this study is to investigate the extensibility of transmedia contents of fantasy genre, and then to examine the characteristics of trans-media contents and analyze how the contents of fantasy genre have become trans-media. The definition and characteristics of the trans-media are distinguished from the existing theories such as One Source Multi Use (OSMU) and Crossmedia. At the same time, this study analyzes the extensibility of the trans-media contents applied to the fantasy genre and it compares with other medias such as novels, videos, games, etc. This shows that the game of the throne was more like to the second order adaptation through video adaptations that succeeded in success compared to the original novels that in expanding into trans-media compared with existing fantasy genre contents represented by the Lord of the Ring. The difference is that although the game of the throne is a fantasy genre content, it does not inherit the existing database genre elements, and it has been found that it has a different aspect from the existing customary form from the role of the character to the whole narrative. The analyzes presented in this study are equally valid for single content, not just for transmedia specific elements.

A Study on Cyber Punk Fashion Expressed in the Movies (영화에 표현된 사이버 펑크패션에 관한 연구)

  • Jung Yeoun-Ja
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.7 no.3
    • /
    • pp.181-188
    • /
    • 2005
  • This study attempted to investigate the plastic characteristics of cyber punk fashion with a focus on fashion in the cyber punk movies in order to inquire into how the influence of the cyber punk taking the lead in the spiritual culture and way of life of the humankind in the 21th century would be expressed in fashion. For this purpose, it sought to analyze the beauty of new fashion creating the cyber environment and identify its contemporary meaning. An attempt was made to investigate the image of cyber punk fashion with a focus on fashion expressed in the cyber punk movies. As a result, the following findings were obtained: First, the image of cyber punk fashion expressed in the cyber punk movies was simplicity, which was to express the modest silhouette and details exclusive of decoration. In addition to clean and smooth gloss, it contained the modest image of resistance', not 'revolt' by borrowing the partial motive and image from existing punk fashion. The change of cyber punk fashion into the characteristic of concise, smooth external appearance brought about the restraint of its image and symbolism as well as its plastic characteristic. Second, it was characterized by the Eroticism nature of emphasizing the body line while expressing the future and modest image or exposing the body. Cyber punk fashion expressed the avant-garde image by using materials that gave a mysterious and future feelings, as well as unsymmetrical silhouette, the slit of body-conscious line, coarse cutting, the method of do-constructing and reconstructing the silhouette, the method of applying diverse underwears such as corset, brassiere and the like. Third, cyber punk fashion was marked by the nature of mined sex. It had the masculine image by using the black color containing the image of masculinity and resistance in female clothing and expressing the suit, coat and military looks giving an masculine impression. And it expressed the image of mixed sexes with the masculine image in male clothing by borrowing feminine images such as body-conscious line, widely cut neckline, floral decoration, leggings and the like. Fourth, cyber punk fashion was marked by naturalness. It was expressed as clothing made from silhouette, knit, cotton and the like in the atmosphere expressing love, comfortableness and truth. This contained the image of naturalness, a return to the primitive, that human being wanted to return to their original figure in the future element. The cyber punk movie may contain a dismal, gloomy future image on the whole, which can be overcome, and shows the possibility that it may grow into the alternative culture, not the revolting culture. The movie of 'The Fifth Element' demonstrates the meaning and role that shows the bright future image. It is thought that designers should make efforts for cyber punk fashion to perform its role in changing the gloomy future image into the bright image of society

  • PDF

Study Focused on Task Process regarding Effective Information Transfer of Ancillary Tests in Diagnostic Pathology (병리추가조직검사 정보전달을 위한 업무프로세스 연구)

  • Ko, Jae-Nam;Park, Yun-Ik;Jung, Jin-Gyeong;Ahn, Sang-Ho;Kim, Jae-Ho;Shin, Hwa-Jeong;Hyun, Ji-Suk;Kim, Kyeong-Ho
    • Quality Improvement in Health Care
    • /
    • v.22 no.2
    • /
    • pp.95-108
    • /
    • 2016
  • Purpose: Ancillary tests such as immunohistochemistry or molecular testing for pathologic diagnosis are performed using ready-made tissue blocks for a histological examination. Various methods and processes during ancillary testing cause some of issues, particularly in the time required and the results reporting scheme. Methods: To solve these issues, we constructed real-time management software. When a pathologist or a clinician had ancillary tests examined using this software by selecting the codes of the needed ancillary tests on site and the system assigned the tests to each laboratory. Then, pathology technologists checked the referred tests and performed the examination. In clinical departments, serial number of each ancillary test can be matched the original pathologic ID. In the department of pathology, numbers of tissue blocks that needed additional tests could be indicated and detected using one-click detection system when a clinician referred the test. Results: Using this system resulted in simplifying the referral procedures from nine-steps to three-steps in each clinical department and from seven-steps to two-steps in department of pathology. Errors that happened on the paper-based request system were also reduced. Furthermore, the time required was saved by seven hours in pathologic laboratory on average. Mean durations from requesting to reporting of the ancillary test was reduced by three days for specimens of health promotion center. Conclusion: Construction of an effective information transfer system may be helpful for shortening the time required, reducing errors, and checking processing information of the tests in real time.

A Study on Policing Based on Crime Intelligence in UK (영국의 범죄정보 기반 경찰활동에 관한 연구)

  • Jang, Kwang-ho;Kim, Moon-kwi
    • Korean Security Journal
    • /
    • no.54
    • /
    • pp.101-125
    • /
    • 2018
  • In the police, crime intelligence is the basis of decision making for police's original activities in response to crime. Police decision making is done in various ways such as investigation and prevention of individual cases, allocation of resources, organization prioritization, etc. The purpose of this study was to investigate the activities of the UK policing in analyzing crime intelligence and to reflect them in the policing and to draw implications for the comparison with the Korean police. The UK operates a central police agency based on the local police system, and establishes a National Intelligence Model (NIM) system that operates crime intelligence throughout the country. In order to respond to crimes and risks through coordination and cooperation, rather than by centralized police activities, the intelligence department of the police agencies should not only prevent and suppress crime through the analysis of integrated crime information, but also make police decision-making. In contrast, the Korea police operate crime intelligence, such as statistics, case intelligence, and there is no integrated way to use it. In addition, there are few cases in which the organizational decision - making based on crime intelligence is utilized efficiently and systematically. For development, it is necessary to construct an integrated management system and analysis organization for crime intellgence. Criminal Intelligence Analysis Organizations should seek to reorganize the role of the current intelligence department or to operate a separate analysis system through the information system while maintaining the current role of each department.