• Title/Summary/Keyword: 갱신 성능

Search Result 785, Processing Time 0.022 seconds

Image Retrieval Using a Composite of MPEG-7 Visual Descriptors (MPEG-7 디스크립터들의 조합을 이용한 영상 검색)

  • 강희범;원치선
    • Journal of Broadcast Engineering
    • /
    • v.8 no.1
    • /
    • pp.91-100
    • /
    • 2003
  • In this paper, to improve the retrieval Performance, an efficient combination of the MPEG-7 visual descriptors, such as the edge histogram descriptor (EHD), the color layout descriptor (CLD), and the homogeneous texture descriptor (HTD), is proposed in the framework of the relevance feedback approach. The EHD represents spatial distribution of edges in local image regions and it is considered as an important feature to represent the content of the image. The CLD specifies spatial distribution of colors and is widely used in image retrieval due to its simplicity and fast operation speed. The HTD describes precise statistical distribution of the image texture. Both the feature vector for the query image and the weighting factors among the combined descriptors are adaptively determined during the relevance feedback. Experimental results show that the proposed method improves the retrieval performance significantly tot natural images.

A New Dynamic Paging Mechanism for HMIPv6 Networks (HMIPv6환경에서 새로운 동적 페이징 기법)

  • Jeong, Yu-Jin;Choe, Jong-Won
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.6
    • /
    • pp.687-695
    • /
    • 2005
  • With increasing demand of using mobile Internet, HMIPv6 is proposed by IETF to reduce location management traffics due to micro mobility and to provide IP-based movement. A paging mechanism combined with HMIPv6 can reduce the signaling traffics of a mobile node. We propose a dynamic paging mechanism in HMIPv6 which decides an optimal paging area for each mobile node by considering its characteristics. Total costs of a static paging mechanism and a dynamic paging mechanism are analyzed by mathematical formulas. As a result, we proved that the dynamic paging mechanism reduced total signal traffic costs more than a static paging mechanism.

People Counting Method using Moving and Static Points of Interest (동적 및 정적 관심점을 이용하는 사람 계수 기법)

  • Gil, Jong In;Mahmoudpour, Saeed;Whang, Whan-Kyu;Kim, Manbae
    • Journal of Broadcast Engineering
    • /
    • v.22 no.1
    • /
    • pp.70-77
    • /
    • 2017
  • Among available people counting methods, map-based approaches based on moving interest points have shown good performance. However, the stationary people counting is challenging in such methods since all static points of interest are considered as background. To include stationary people in counting, it is needed to discriminate between the static points of stationary people and the background region. In this paper, we propose a people counting method based on using both moving and static points. The proposed method separates the moving and static points by motion information. Then, the static points of the stationary people are classified using foreground mask processing and point pattern analysis. The experimental results reveal that the proposed method provides more accurate count estimation by including stationary people. Also, the background updating is enabled to solve the static point misclassification problem due to background changes.

A Near Saturation Routing Algorithm for Non-hieratical Networks (비계층적 통신망에서의 근사 포화형 경로설정 알고리즘)

  • 길계태;은종관;박영철;이상철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.16 no.11
    • /
    • pp.1037-1053
    • /
    • 1991
  • Flooding is known to be an effective routing mechanism not only in circuit switched networks but also packet switched networks since it minimizes the time required for up calls and does not have to maintain routing tables or distance tables by periodically intercommunicating among all the network nodes. However, one main drawback of it is the overhead on the control message signaling channels, In the paper, we propose an overlaying scheme on the existing mechanism that retains the desired properties of flooding, yet provides congestion control to the network. This is done by utilizing the wasted search messages to inform the network of the conditions of each path from one node to another. The overhead is to maintain a path table in each node. However, this overhead is not so critical. Also, this scheme can take advantages further by limiting the extent of message propagation through the network and by incorporating trunk reservation schemes additionally.

  • PDF

The Study of the Object Replication Management using Adaptive Duplication Object Algorithm (적응적 중복 객체 알고리즘을 이용한 객체 복제본 관리 연구)

  • 박종선;장용철;오수열
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.1
    • /
    • pp.51-59
    • /
    • 2003
  • It is effective to be located in the double nodes in the distributed object replication systems, then object which nodes share is the same contents. The nodes store an access information on their local cache as it access to the system. and then the nodes fetch and use it, when it needed. But with time the coherence Problems will happen because a data carl be updated by other nodes. So keeping the coherence of the system we need a mechanism that we managed the to improve to improve the performance and availability of the system effectively. In this paper to keep coherence in the shared memory condition, we can set the limited parallel performance without the additional cost except the coherence cost using it to keep the object at the proposed adaptive duplication object(ADO) algorithms. Also to minimize the coherence maintenance cost which is the bi99est overhead in the duplication method, we must manage the object effectively for the number of replication and location of the object replica which is the most important points, and then it determines the cos. And that we must study the adaptive duplication object management mechanism which will improve the entire run time.

  • PDF

HPR: Hierarchical Prefix Routing for Nested Mobile Networks (HPR: 중첩된 이동 망에 대한 계층적 프리픽스 라우팅)

  • Rho, Kyung-Taeg
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.165-173
    • /
    • 2006
  • Network Mobility Basic Support protocol enables mobile network to change their point of attachment to the Internet, but causes some problems such as suboptimal muting and multiple encapsulations. The proposed scheme, combining Prefix Delegation protocol with HMIPv6 concept can provide more effective route optimization and reduce the amount of packet losses and the burden of location registration for handoff. It also uses hierarchical mobile network prefix (HMNP) assignment and provides tree-based routing mechanism to allocate the location address of mobile network nodes (MNNs) and support micro-mobility. In this scheme, Mobility Management Router (MMR) not only maintains the binding informations for all MNNs in nested mobile networks, but also supports binding procedures to reduce the volume of handoff signals oyer the mobile network. The performance is evaluated using NS-2.

  • PDF

An Enhanced Affine Projection Sign Algorithm in Impulsive Noise Environment (충격성 잡음 환경에서 개선된 인접 투사 부호 알고리즘)

  • Lee, Eun Jong;Chung, Ik Joo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.420-426
    • /
    • 2014
  • In this paper, we propose a new affine projection sign algorithm (APSA) to improve the convergence speed of the conventional APSA which has been proposed to enable the affine projection algorithm (APA) to operate robustly in impulsive noise environment. The conventional APSA has two advantages; it operates robustly against impulsive noise and does not need calculation for the inverse matrix. The proposed algorithm also has the conventional algorithm's advantages and furthermore, better convergence speed than the conventional algorithm. In the conventional algorithm, each input signal is normalized by $l_2$-norm of all input signals, but the proposed algorithm uses input signals normalized by their corresponding $l_2$-norm. We carried out a performance comparison of the proposed algorithm with the conventional algorithm using a system identification model. It is shown that the proposed algorithm has the faster convergence speed than the conventional algorithm.

Elite Ant System for Solving Multicast Routing Problem (멀티캐스트 라우팅 문제 해결을 위한 엘리트 개미 시스템)

  • Lee, Seung-Gwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.147-152
    • /
    • 2008
  • Ant System(AS) is new meta heuristic for hard combinatorial optimization problem. It is a population based approach that uses exploitation of positive feedback as well as greedy search. It was first proposed for tackling the well known Traveling Salesman Problem. In this paper, AS is applied to the Multicast Routing Problem. Multicast Routing is modeled as the NP-complete Steiner tree problem. This is the shortest path from source node to all destination nodes. We proposed new AS to resolve this problem. The proposed method selects the neighborhood node to consider all costs of the edge and the next node in state transition rule. Also, The edges which are selected elite agents are updated to additional pheromone. Simulation results of our proposed method show fast convergence and give lower total cost than original AS and $AS_{elite}$.

  • PDF

A Study on an Efficient e-learning Content Creation and Maintenance Method (효과적인 e-learning 콘텐츠 생성 및 관리기법에 관한 연구)

  • Cho, Soo-Hyun;Kim, Young-Hak;Kim, Myoung-Hwan
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.3
    • /
    • pp.15-25
    • /
    • 2008
  • Recently, with the growing use of e-learning, instructors develop new online courses using a variety of contents and then store the results on their computers. These contents should be updated with new information as time goes on, and a new content also can be produced by reusing these ones. However, a lot of time will be needed for instructors to search, edit, and manage various contents stored from place to place on their computers. Currently, the development of the e-learning content management tool. which performs efficiently these functions on the PC environment, leaves much to be desired. Therefore, in this paper, we proposed an e-learning content creation and management system which can manage efficiently a variety of contents stored from different locations on an instructor's computer and can develop easily new online courses. The proposed system can be used widely to develop contents for instructors based on the PC environment. For performance evaluation, this paper compared the proposed system with the previous system according to the retrieval time of content keyword, and the experiment showed that our system is much better than the previous one.

  • PDF

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.