• Title/Summary/Keyword: server

Search Result 7,875, Processing Time 0.036 seconds

GIS Information Generation for Electric Mobility Aids Based on Object Recognition Model (객체 인식 모델 기반 전동 이동 보조기용 GIS 정보 생성)

  • Je-Seung Woo;Sun-Gi Hong;Dong-Seok Park;Jun-Mo Park
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.4
    • /
    • pp.200-208
    • /
    • 2022
  • In this study, an automatic information collection system and geographic information construction algorithm for the transportation disadvantaged using electric mobility aids are implemented using an object recognition model. Recognizes objects that the disabled person encounters while moving, and acquires coordinate information. It provides an improved route selection map compared to the existing geographic information for the disabled. Data collection consists of a total of four layers including the HW layer. It collects image information and location information, transmits them to the server, recognizes, and extracts data necessary for geographic information generation through the process of classification. A driving experiment is conducted in an actual barrier-free zone, and during this process, it is confirmed how efficiently the algorithm for collecting actual data and generating geographic information is generated.The geographic information processing performance was confirmed to be 70.92 EA/s in the first round, 70.69 EA/s in the second round, and 70.98 EA/s in the third round, with an average of 70.86 EA/s in three experiments, and it took about 4 seconds to be reflected in the actual geographic information. From the experimental results, it was confirmed that the walking weak using electric mobility aids can drive safely using new geographic information provided faster than now.

Study on the Plan to Reduce the EVENT of the Gas Regulator (정압기 EVENT 감소방안 연구)

  • Kang-ok Yun;Tae-jun Eom;Ki-beom Kim;Yong-woo Lee;Hyoung-Min Lee;Byeong-Geun Gong
    • Journal of the Korean Institute of Gas
    • /
    • v.27 no.1
    • /
    • pp.57-62
    • /
    • 2023
  • The Gas Regulator EVENT is a signal sent by the Remote Terminal Unit(RTU) installed in each local gas regulator (hereinafter referred to as "regulator"), and is an abnormal alarm that can be intuitively checked in our client server. This is an important data that enables immediate dispatch order and initial action in the situation room when a regolator abnormality occurs, and can analyze the cause of the regulator abnormality. Looking at the trend of EVENT data for regulator over the past three years, there is a clear trend of increasing unchecked EVENT data. The increase in non-checking event (actual abnormality or noise event) may mean that firstly, mechanical or pressure abnormality occurs in the actual regulator, and secondly, there is no abnormality in the actual regulator, but communication error occurred in the RTU, reset. EVENT Data may be formed as if an abnormality occurred in the static voltage due to an error, sensor error, power failure (instantaneous power failure), etc. Among them, this study analyzed the recently generated unchecked EVENT data to identify critical noise events among RTU errors, which are noise events, and reviewed ways to increase the reliability of Regulator EVENTs by reducing them.

An Automatic ROI Extraction and Its Mask Generation based on Wavelet of Low DOF Image (피사계 심도가 낮은 이미지에서 웨이블릿 기반의 자동 ROI 추출 및 마스크 생성)

  • Park, Sun-Hwa;Seo, Yeong-Geon;Lee, Bu-Kweon;Kang, Ki-Jun;Kim, Ho-Yong;Kim, Hyung-Jun;Kim, Sang-Bok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.3
    • /
    • pp.93-101
    • /
    • 2009
  • This paper suggests a new algorithm automatically searching for Region-of-Interest(ROI) with high speed, using the edge information of high frequency subband transformed with wavelet. The proposed method executes a searching algorithm of 4-direction object boundary by the unit of block using the edge information, and detects ROIs. The whole image is splitted by $64{\times}64$ or $32{\times}32$ sized blocks and the blocks can be ROI block or background block according to taking the edges or not. The 4-directions searche the image from the outside to the center and the algorithm uses a feature that the low-DOF image has some edges as one goes to center. After searching all the edges, the method regards the inner blocks of the edges as ROI, and makes the ROI masks and sends them to server. This is one of the dynamic ROI method. The existing methods have had some problems of complicated filtering and region merge, but this method improved considerably the problems. Also, it was possible to apply to an application requiring real-time processing caused by the process of the unit of block.

Utility Analysis on Activating Web-Based Course Support System by Faculty in Universities (웹기반 강의지원시스템에 대한 대학교수의 활용도분석)

  • Kim, Kyung-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.221-232
    • /
    • 2009
  • To purpose of the study was to analyze faculty utility of Web-Based course support system in Universities. Data were collected from log file in server computer, 5,023 faculties and 12,733 courses offered at spring semester of 2009 in the Metropolitan area S, K, D universities were analyzed. Specifically, frequency and percentile of faculties and courses using course management system were analyzed. In addition, the frequencies and percentiles of courses using sub-functions of course management system were analyzed and X2 test used to examine the difference of frequencies of faculties and courses using course system at using announcement, providing instructional material, public bulletin board and free board. Results were as follows. The 62.28% of faculties and 50.3% of courses have used Web-Based course support system. The results of Subfunction utility analysis showed the highest use as 80.4%. in providing instructional material. However, the use of announcement functions and online discussion was more or less low. Results imply that most of faculties and course are using course management system as supplementary system of off-line instruction.

Performance analysis and prediction through various over-provision on NAND flash memory based storage (낸드 플래시 메모리기반 저장 장치에서 다양한 초과 제공을 통한 성능 분석 및 예측)

  • Lee, Hyun-Seob
    • Journal of Digital Convergence
    • /
    • v.20 no.3
    • /
    • pp.343-348
    • /
    • 2022
  • Recently, With the recent rapid development of technology, the amount of data generated by various systems is increasing, and enterprise servers and data centers that have to handle large amounts of big data need to apply high-stability and high-performance storage devices even if costs increase. In such systems, SSD(solid state disk) that provide high performance of read/write are often used as storage devices. However, due to the characteristics of reading and writing on a page-by-page basis, erasing operations on a block basis, and erassing-before-writing, there is a problem that performance is degraded when duplicate writes occur. Therefore, in order to delay this performance degradation problem, over-provision technology of SSD has been applied internally. However, since over-provided technologies have the disadvantage of consuming a lot of storage space instead of performance, the application of inefficient technologies above the right performance has a problem of over-costing. In this paper, we proposed a method of measuring the performance and cost incurred when various over-provisions are applied in an SSD and predicting the system-optimized over-provided ratio based on this. Through this research, we expect to find a trade-off with costs to meet the performance requirements in systems that process big data.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Analysis of Utilization Status about National GNSS Infrastructure Linked to Precise Positioning Service (정밀 위치결정 서비스에 연계한 국가 GNSS 인프라 활용현황 분석)

  • Park, Joon-Kyu;Jung, Kap-Yong
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.2
    • /
    • pp.401-408
    • /
    • 2017
  • GNSS(Global Navigation Satellite System) is positioning and navigation system using satellites. Accurate positioning is possible in all regions of the world using satellite signals. In Korea, GPS was introduced in the late 1980s. GPS is used in research and work in various fields such as navigation, surveying, and GIS. Since 1995, NGII(National Geographic Information Institute) has installed and operated CORS(Continuously Operating Reference Station) for the practical use of GNSS surveying, RINEX download and VRS(Virtual Reference Station) service was provided for precise positioning. Demand for these services is explosively increasing in the field of surveying. Therefore, there is a need for research to provide good service. In this study, status of national surveying infra structure was researched focused on CORS and its services. As a results, current status of CORS and service were presented. Users of VRS service has increased greatly. In order to provide stable service and advanced surveying, it is necessary to continuously upgrade services such as providing services for various GNSS satellites and securing stability through server redundancy in the data center.

A Study on the Analysis and the Direction of Improvement of the Korean Military C4I System for the Application of the 4th Industrial Revolution Technology (4차 산업혁명 기술 적용을 위한 한국군 C4I 체계 분석 및 성능개선 방향에 관한 연구)

  • Sangjun Park;Jee-won Kim;Jungho Kang
    • Convergence Security Journal
    • /
    • v.22 no.2
    • /
    • pp.131-141
    • /
    • 2022
  • Future battlefield domains are expanding to ground, sea, air, space, and cyber, so future military operations are expected to be carried out simultaneously and complexly in various battlefield domains. In addition, the application of convergence technologies that create innovations in all fields of economy, society, and defense, such as artificial intelligence, IoT, and big data, is being promoted. However, since the current Korean military C4I system manages warfighting function DBs in one DB server, the efficiency of combat performance is reduced utilization and distribution speed of data and operation response time. To solve this problem, research is needed on how to apply the 4th industrial revolution technologies such as AI, IoT, 5G, big data, and cloud to the Korean military C4I system, but research on this is insufficient. Therefore, this paper analyzes the problems of the current Korean military C4I system and proposes to apply the 4th industrial revolution technology in terms of operational mission, network and data link, computing environment, cyber operation, interoperability and interlocking capabilities.

Receptor binding motif surrounding sites in the Spike 1 protein of infectious bronchitis virus have high susceptibility to mutation related to selective pressure

  • Seung-Min Hong;Seung-Ji Kim;Se-Hee An;Jiye Kim;Eun-Jin Ha;Howon Kim;Hyuk-Joon Kwon;Kang-Seuk Choi
    • Journal of Veterinary Science
    • /
    • v.24 no.4
    • /
    • pp.51.1-51.17
    • /
    • 2023
  • Background: To date, various genotypes of infectious bronchitis virus (IBV) have co-circulated and in Korea, GI-15 and GI-19 lineages were prevailing. The spike protein, particularly S1 subunit, is responsible for receptor binding, contains hypervariable regions and is also responsible for the emerging of novel variants. Objective: This study aims to investigate the putative major amino acid substitutions for the variants in GI-19. Methods: The S1 sequence data of IBV isolated from 1986 to 2021 in Korea (n = 188) were analyzed. Sequence alignments were carried out using Multiple alignment using Fast Fourier Transform of Geneious prime. The phylogenetic tree was generated using MEGA-11 (ver. 11.0.10) and Bayesian analysis was performed by BEAST v1.10.4. Selective pressure was analyzed via online server Datamonkey. Highlights and visualization of putative critical amino acid were conducted by using PyMol software (version 2.3). Results: Most (93.5%) belonged to the GI-19 lineage in Korea, and the GI-19 lineage was further divided into seven subgroups: KM91-like (Clade A and B), K40/09-like, QX-like (I-IV). Positive selection was identified at nine and six residues in S1 for KM91-like and QX-like IBVs, respectively. In addition, several positive selection sites of S1-NTD were indicated to have mutations at common locations even when new clades were generated. They were all located on the lateral surface of the quaternary structure of the S1 subunits in close proximity to the receptor-binding motif (RBM), putative RBM motif and neutralizing antigenic sites in S1. Conclusions: Our results suggest RBM surrounding sites in the S1 subunit of IBV are highly susceptible to mutation by selective pressure during evolution.

A Study of Home-visit Care Agencies' Perceptions and Attitudes toward Home and Community Long-term care Agency Quality Assessment (HCLA-QA) Program (방문요양기관의 재가장기요양기관평가에 대한 인식 및 태도)

  • Han, Eun-Jeong;Lee, Jung-Suk;Kwon, Jinhee
    • 한국노년학
    • /
    • v.32 no.2
    • /
    • pp.467-485
    • /
    • 2012
  • National Health Insurance Corporation initiated Home and Community Long-term care Agency Quality Assessment(HCLA-QA) program in 2010. This study aims to explore long-term care agencies' perceptions and attitudes toward HCLA-QA program, focused on the home-visit care agencies. Total 473 agencies completed the questionnaires(response rate 13.6%), using the e-mail and fax survey methods with high-capacity web-fax server of NHIC. On the results of this study, we found the agencies' different perceptions and attitudes on HCLA-QA program according to their quality ratings as QA results. Compared to the agencies with low quality ratings, the agencies with high quality ratings tend to have more time for preparation, better understandings about HCLA-QA program, more positive perceptions that quality indicators generally are valid, and more affirmative attitudes that the notifications of QA results are helpful for agencies. Our findings can be very useful for establishing strategies for improving the HCLA-QA program. The policy makers, the insurer, and the agencies need to consider the opinions of the agencies with high quality ratings as well as the ones with low quality ratings.