• Title/Summary/Keyword: 네트워크적 영역성

Search Result 628, Processing Time 0.03 seconds

The Multiple Continuous Query Fragmentation for the Efficient Sensor Network Management (효율적인 센서 네트워크 관리를 위한 다중 연속질의 분할)

  • Park, Jung-Up;Jo, Myung-Hyun;Kim, Hak-Soo;Lee, Dong-Ho;Son, Jin-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.867-878
    • /
    • 2006
  • In the past few years, the research of sensor networks is forced dramatically. Specially, while the research for maintaining the power of a sensor is focused, we are also concerned nth query processing related with the optimization of multiple continuous queries for decreasing in unnecessary energy consumption of sensor networks. We present the fragmentation algorithm to solve the redundancy problem in multiple continuous queries that increases in the count or the amount of transmitting data in sensor networks. The fragmentation algorithm splits one query into more than two queries using the query index (QR-4ree) in order to reduce the redundant query region between a newly created query and the existing queries. The R*-tree should be reorganized to the QR-tree right to the structure suggested. In the result, we preserve 20 percentage of the total energy in the sensor networks.

Reliable Continuous Object Detection Scheme in Wireless Sensor Networks (무선 센서 네트워크에서 신뢰성 있는 연속 개체 탐지 방안)

  • Nam, Ki-Dong;Park, Ho-Sung;Yim, Young-Bin;Oh, Seung-Min;Kim, Sang-Ha
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1171-1180
    • /
    • 2010
  • In wireless sensor networks, reliable event detection is one of the most important research issues. For the reliable event detection, previous works usually assume the events are only individual objects such as tanks and soldiers. Recently, many researches focus on detection of continuous objects such as wild fire and bio-chemical material, but they merely aim at methods to reduce communication costs. Hence, we propose a reliable continuous object detection scheme. However, it might not be trivial. Unlike individual objects that could be referred as a point, a continuous object is shown in a dynamic two-dimensional diagram since it may cover a wide area and it could dynamically alter its own shape according to physical environments, e.g. geographical conditions, wind, and so on. Hence, the continuous object detection reliability can not be estimated by the indicator for individual objects. This paper newly defines the reliability indicator for continuous object detection and proposes an error recovery mechanism relying on the estimation result from the new indicator.

All-fiber dynamic add-drop multiplexer based on acousto-optic interaction (음향광학 효과를 이용한 전광섬유 동적 파장가감기)

  • 박희수;송광용;윤석현;김병윤
    • Proceedings of the Optical Society of Korea Conference
    • /
    • 2002.07a
    • /
    • pp.52-53
    • /
    • 2002
  • 파장분할 다중화 광통신 선로 상에서, 특정 파장 채널을 임의로 선택하여 분리/첨가 할 수 있는 동적파장가감기(wavelength-division dynamic optical add-drop multiplexer)는 광 네트워크의 효율을 높이는데 핵심 소자라 할 수 있다. 지난 수년간 개발된 수많은 기술들 중에서, LiNbO$_3$ 광도파로 음향광학소자(acousto-optic tunable filter: AOTF)는 몇 가지의 특징적인 장점들을 보여줬는데, 예를 들면 넓은 영역의 파장 선택성, 짧은 스위칭 시간, 다중 채널 동작 가능성 등이다. (중략)

  • PDF

Design of two-pass RSVP over SBM network (SBM 네트워크에서 two-pass RSVP 의 설계)

  • 유희열;이종국;강성수
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2001.10c
    • /
    • pp.346-348
    • /
    • 2001
  • 최근에 등장한 Gigabit Ethernet은 LAN 에서 MAN 가지 영역을 확장하고 있다. 그리고, 품질 보장 서비스를 위해 RFC 2205에 정의된 RSVP(Resource Reservation Protocol)는 확장성 등의 내부적인 문제로 사용이 적다. 좀더 나은 품질 보장 서비스를 하기 위한 노력 중 하나로 RFC2814 에서는 SBM(Subnet Bandwidth Manager) 이라 하여 RSVP를 IEEE 802형태의 LAN에서 구현하자고 노력하고 있다. 이에 본 논문에서는 기존의 RSVP 의 문제점 중 하나인 killer problem 을 해결하기 위만 Two-pass RSVP 개념을 SBM에서 적용할 방안을 제시하고자 한다.

  • PDF

Architecture Description Model for Common IT Resource Identification in e-Government Systems (공동활용자원식별을 위한 전자정부 시스템 아키텍처 서술 방안)

  • Shin, Soo-Jeong;Choi, Young-Jin;Jung, Suk-Chun;Seo, Yong-Won
    • The KIPS Transactions:PartD
    • /
    • v.16D no.4
    • /
    • pp.631-642
    • /
    • 2009
  • Although the Korean government is making great effort to prevent the redundancy in IT investment and efficiently allocate the IT budget, actual achievements are quite limited because of the variety of IT resources and different architecture description among organizations and projects. Thus, a standardized description model of the system architecture is strongly needed to identify the common resources and improve the efficiency of IT investment. Therefore, in this paper, we have developed the function-network matrix model which can be used as the basic template for a standard for architecture description of e-Government systems. The function-network matrix model integrates the function tiers and the network areas into a single unified framework, which enables the functionality of each component and the flow of information clearly visible. Moreover, we described the architectures of Korean e-government’s citizen service systems using our model, resulting in clear demonstration of the similarities and differences between different systems, and easy identification of the common resources. Using the architecture description model developed in this research, the consolidation of national IT resources can be promoted, and non-expert IT users can easily recognize the architecture of their systems. In addition, more efficient and systematic IT resource management can be achieved using our model.

Personal Firewall Operating System Using API Hooking Modules (API 후킹 모듈을 이용한 개인 방화벽 운용 시스템)

  • Han, Jong-Gil;Kim, Jong-Chan;Ban, Kyeong-Jin;Kim, Chee-Yong;Kim, Eung-Kon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.551-553
    • /
    • 2011
  • The popularization and development of 3D display makes common users easy to experience a solid 3D virtual reality, the demand for virtual reality contents are increasing. This paper proposes VR panorama system using vanishing point location-based depth map generation method. VR panorama using depth map gives an effect that makes users feel staying at real place and looking around nearby circumstances.

  • PDF

Efficient Self-supervised Learning Techniques for Lightweight Depth Completion (경량 깊이완성기술을 위한 효율적인 자기지도학습 기법 연구)

  • Park, Jae-Hyuck;Min, Kyoung-Wook;Choi, Jeong Dan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.6
    • /
    • pp.313-330
    • /
    • 2021
  • In an autonomous driving system equipped with a camera and lidar, depth completion techniques enable dense depth estimation. In particular, using self-supervised learning it is possible to train the depth completion network even without ground truth. In actual autonomous driving, such depth completion should have very short latency as it is the input of other algorithms. So, rather than complicate the network structure to increase the accuracy like previous studies, this paper focuses on network latency. We design a U-Net type network with RegNet encoders optimized for GPU computation. Instead, this paper presents several techniques that can increase accuracy during the process of self-supervised learning. The proposed techniques increase the robustness to unreliable lidar inputs. Also, they improve the depth quality for edge and sky regions based on the semantic information extracted in advance. Our experiments confirm that our model is very lightweight (2.42 ms at 1280x480) but resistant to noise and has qualities close to the latest studies.

Energy Saving Algorithm of the Home Gateway considering Service Usage Patterns (서비스 사용 패턴을 고려한 홈 게이트웨이의 전력 절감 알고리즘)

  • Kong, In-Yeup
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.8
    • /
    • pp.1792-1798
    • /
    • 2010
  • Home Gateway is always on for continuous services of home networks. Ubiquitous home networks are extended. so power consumption of home gateways increases by geometric progression. Our algorithm is for home gateway to sleep, listen or wakeup according to network traffic adaptively, as well as to keep always-on service. To do this, it traces the accumulated average of previous sleep periods. In addition to this basic algorithm, we make the profiles for user's living pattern per the day to reflect network usages in detail and adaptively. As the simulation results by comparing with overall accumulated average and per-day accumulated average, in case of the overall accumulated average, the difference the estimation and real value is distributed from 0.43% to 4%. In contrast of this, in case of the per-day accumulated average is distributed from 0.06% to 2%. From this results, we know the profiling of per-day usage pattern can help reduce the difference of the real sleep period and the estimated sleep period.

The Framework of Research Network and Performance Evaluation on Personal Information Security: Social Network Analysis Perspective (개인정보보호 분야의 연구자 네트워크와 성과 평가 프레임워크: 소셜 네트워크 분석을 중심으로)

  • Kim, Minsu;Choi, Jaewon;Kim, Hyun Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.177-193
    • /
    • 2014
  • Over the past decade, there has been a rapid diffusion of electronic commerce and a rising number of interconnected networks, resulting in an escalation of security threats and privacy concerns. Electronic commerce has a built-in trade-off between the necessity of providing at least some personal information to consummate an online transaction, and the risk of negative consequences from providing such information. More recently, the frequent disclosure of private information has raised concerns about privacy and its impacts. This has motivated researchers in various fields to explore information privacy issues to address these concerns. Accordingly, the necessity for information privacy policies and technologies for collecting and storing data, and information privacy research in various fields such as medicine, computer science, business, and statistics has increased. The occurrence of various information security accidents have made finding experts in the information security field an important issue. Objective measures for finding such experts are required, as it is currently rather subjective. Based on social network analysis, this paper focused on a framework to evaluate the process of finding experts in the information security field. We collected data from the National Discovery for Science Leaders (NDSL) database, initially collecting about 2000 papers covering the period between 2005 and 2013. Outliers and the data of irrelevant papers were dropped, leaving 784 papers to test the suggested hypotheses. The co-authorship network data for co-author relationship, publisher, affiliation, and so on were analyzed using social network measures including centrality and structural hole. The results of our model estimation are as follows. With the exception of Hypothesis 3, which deals with the relationship between eigenvector centrality and performance, all of our hypotheses were supported. In line with our hypothesis, degree centrality (H1) was supported with its positive influence on the researchers' publishing performance (p<0.001). This finding indicates that as the degree of cooperation increased, the more the publishing performance of researchers increased. In addition, closeness centrality (H2) was also positively associated with researchers' publishing performance (p<0.001), suggesting that, as the efficiency of information acquisition increased, the more the researchers' publishing performance increased. This paper identified the difference in publishing performance among researchers. The analysis can be used to identify core experts and evaluate their performance in the information privacy research field. The co-authorship network for information privacy can aid in understanding the deep relationships among researchers. In addition, extracting characteristics of publishers and affiliations, this paper suggested an understanding of the social network measures and their potential for finding experts in the information privacy field. Social concerns about securing the objectivity of experts have increased, because experts in the information privacy field frequently participate in political consultation, and business education support and evaluation. In terms of practical implications, this research suggests an objective framework for experts in the information privacy field, and is useful for people who are in charge of managing research human resources. This study has some limitations, providing opportunities and suggestions for future research. Presenting the difference in information diffusion according to media and proximity presents difficulties for the generalization of the theory due to the small sample size. Therefore, further studies could consider an increased sample size and media diversity, the difference in information diffusion according to the media type, and information proximity could be explored in more detail. Moreover, previous network research has commonly observed a causal relationship between the independent and dependent variable (Kadushin, 2012). In this study, degree centrality as an independent variable might have causal relationship with performance as a dependent variable. However, in the case of network analysis research, network indices could be computed after the network relationship is created. An annual analysis could help mitigate this limitation.

A Design of a Network Module supporting Primitive Messaging Operations for MOM (MOM의 Primitive Messaging Operation을 지원하는 네트워크 모듈 설계)

  • Kang, Tae-Gun;Sohn, Kang-Min;Ham, Ho-Sang
    • Annual Conference of KIPS
    • /
    • 2003.11a
    • /
    • pp.115-118
    • /
    • 2003
  • 최근 MOM 기술은 비즈니스 로직을 수행하는 애플리케이션 서버의 필수적인 구성요소로서 자리잡고 있으며, 보통 수백에서 수천의 클라이언트 요청을 처리할 수 있는 능력을 제공한다. MOM 은 이러한 대용량의 클라이언트 요청을 효과적으로 처리하기 위해서 효율적이고 확장성있는(스케일러블) 네트워크 모듈이 필요하며, 다양한 네트워크 프로토콜을 지원해야 한다. MOM이 기본적으로 지원하는 메시징 기능은 PTP(Point-To-Point)와 publish/subscribe 메시징 도메인으로 나뉘는데 이 논문에서는 두 가지 메시징 도메인과 그룹통신 메시징 서비스 기능을 동시에 지원하는 MoIM-Message 시스템의 하부 통신 모듈의 설계에 대해 기술한다. PTP와 publish/subscribe 메시징을 지원하기 위해 세가지 프리미티브 메시징 오퍼레이션인 "synchronous send", "synchronous receive", "asynchronous receive"를 정의하였으며 하부 통신 모듈 역할을 하는 메시지 트랜스포트 관리 계층내의 트랜스포트 관리자 내에 구현되었다. 트랜스포트 관리자는 다양한 트랜스포트 프로토콜을 적용할 수 있도록 하기 위해 트랜스포트 어댑터로 설계되었으며, 대량의 통신 요청을 효과적으로 처리하기 위해 "polling with multiple service thread model" 기법을 적용하여 구현되었다. 또한, 모바일 클라이언트 환경을 지원하기 위해 클라이언트 측 통신 모듈을 IPaq PDA 상에 포팅하였다. 본 논문에서 제안하는 세 가지 프리미티브 메시징 오퍼레이션을 제공하는 통신 모듈은 MOM이 기본적으로 지원해야 할 메시징 도메인과 대용량의 클라이언트 요청을 효율적으로 처리할 수 있는 구조를 가진다.es}8$ 모드를 모두 사용한 경우와 $8{\times}8$ 단일모드를 사용한 경우보다 계산 시간이 감소하였음을 확인하였다.행중인 MoIM-Messge서버의 네트워크 모듈로 다중 쓰레드 소켓폴링 모델을 적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에

  • PDF