• Title/Summary/Keyword: 네트워크적 영역성

Search Result 628, Processing Time 0.028 seconds

Utilizing Context of Object Regions for Robust Visual Tracking

  • Janghoon Choi
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.2
    • /
    • pp.79-86
    • /
    • 2024
  • In this paper, a novel visual tracking method which can utilize the context of object regions is presented. Conventional methods have the inherent problem of treating all candidate regions independently, where the tracker could not successfully discriminate regions with similar appearances. This was due to lack of contextual modeling in a given scene, where all candidate object regions should be taken into consideration when choosing a single region. The goal of the proposed method is to encourage feature exchange between candidate regions to improve the discriminability between similar regions. It improves upon conventional methods that only consider a single region, and is implemented by employing the MLP-Mixer model for enhanced feature exchange between regions. By implementing channel-wise, inter-region interaction operation between candidate features, contextual information of regions can be embedded into the individual feature representations. To evaluate the performance of the proposed tracker, the large-scale LaSOT dataset is used, and the experimental results show a competitive AUC performance of 0.560 while running at a real-time speed of 65 fps.

A Self-Deployment Scheme Using Improved Potential Field in Mobile Sensor Networks (이동 센서 네트워크에서 개선된 포텐셜 필드를 사용한 자율 배치 방법)

  • Lee, Heon-Jong;Kim, Yong-Hwan;Han, Youn-Hee;Jeong, Young-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1B
    • /
    • pp.106-116
    • /
    • 2010
  • Sensor deployment makes an effect on not only covering of the interesting area but also reliable data acquisition and efficient resource management of sensor, so that sensors must be deployed at their better place. In traditional static wireless sensor networks, however, it is impossible to deploy the sensors manually when they are distributed in unexploited, hostile, or disaster areas. Therefore, if each sensor has locomotion capability, it can re-deploy itself using the location information of neighbor sensors. In our previous study, we showed that moving sensors to the centroids of their Voronoi polygon is efficient for extending the coverage area. In this paper, we present an improved potential-field-based sensor self-deployment scheme by combining the centroid of Voronoi polygon with the traditional potential-field scheme. Simulation results show that our scheme can achieve higher coverage in shorter time and less movement than the traditional potential-field scheme.

Comparing the 2015 with the 2022 Revised Primary Science Curriculum Based on Network Analysis (2015 및 2022 개정 초등학교 과학과 교육과정에 대한 비교 - 네트워크 분석을 중심으로 -)

  • Jho, Hunkoog
    • Journal of Korean Elementary Science Education
    • /
    • v.42 no.1
    • /
    • pp.178-193
    • /
    • 2023
  • The aim of this study was to investigate differences in the achievement standards from the 2015 to the 2022 revised national science curriculum and to present the implications for science teaching under the revised curriculum. Achievement standards relevant to primary science education were therefore extracted from the national curriculum documents; conceptual domains in the two curricula were analyzed for differences; various kinds of centrality were computed; and the Louvain algorithm was used to identify clusters. These methods revealed that, in the revised compared with the preceding curriculum, the total number of nodes and links had increased, while the number of achievement standards had decreased by 10 percent. In the revised curriculum, keywords relevant to procedural skills and behavior received more emphasis and were connected to collaborative learning and digital literacy. Observation, survey, and explanation remained important, but varied in application across the fields of science. Clustering revealed that the number of categories in each field of science remained mostly unchanged in the revised compared with the previous curriculum, but that each category highlighted different skills or behaviors. Based on those findings, some implications for science instruction in the classroom are discussed.

The review of neural basis for prosocial moral motivation and moral decision-making (친사회적-도덕적 동기 및 도덕적 의사결정의 신경학적 기제에 대한 개관 연구)

  • Jung, Ju-Youn;Han, Sang-Hoon
    • Science of Emotion and Sensibility
    • /
    • v.14 no.4
    • /
    • pp.555-570
    • /
    • 2011
  • In order to do morally right behavior that we cognitively know, prosocial moral motivation is necessary. Previous studies revealed emotion is important for prosocial moral motivation. This was supported by cognitive neuroscience studies using functional magnetic resonance imaging(fMRI) in which the activity of ventral striatum(VS) was observed when people made moral decision. VS was originally known as the core area of reward process but recently VS was found to respond also to social reward and even feeling of prosocial emotion itself. However it is not clear why VS was activated when people experience prosocial moral sentiments. The aims of this review article were to find situations in which people are prosocially and morally motivated and to understand more about the role of emotion as a moral motivator by examining evidence regarding the neural network, including VS, of prosocial moral motivation and moral decision-making.

  • PDF

An Efficient Mobility Agent Advertisement Mechanism for MIPMANET (MIPMANET에서 효율적인 이동성 에이전트 광고기법)

  • Park, Chan-Heum;Seo, Hyun-Gon;Kim, Ki-Hyung;Kim, Chong-Gun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.5
    • /
    • pp.343-354
    • /
    • 2006
  • There has been much research efforts trying to integrate mobile IP that has been proposed to guarantee the mobility of mobile nodes on MANET (Mobile Ad Hoc Networks) and wired integrated networks. To support the mobility service of nodes in MIPMANET, this paper proposes MAAM(Mobility Agent Advertisement Mechanism) and AMAAM protocols. In MAAM, the mobility agent of the mobile IP can maintain the information of ad hoc networks by broadcasting advertisement messages periodically. AMAAM(Aggregation based Mobility Agent Advertisement Mechanism) is an enhancement of MAAM for reducing the number of transmission of advertisement messages by aggregating them. The proposed schemes are applied in MIPMANET for agent advertisement mechanism. For the performance evaluation of both protocols, we simulated them by NS2. We evaluate the protocols by ns2 with such performance metrics as packet delivery ratio, transmission throughput, and energy consumption.

A Study on Hierarchical Structure and Blockchain-based Node Authentication Mechanism in MANET (MANET에서 계층적 구조와 블록체인 기반 노드 인증 기법에 관한 연구)

  • Yang, Hwanseok
    • Convergence Security Journal
    • /
    • v.19 no.3
    • /
    • pp.13-19
    • /
    • 2019
  • MANET has many security vulnerabilities because it consists of only mobile nodes using wireless. In particular, it is a very important factor determining network performance that excludes the participation of malicious nodes through accurate reliability measurements and authentication of nodes participating in the network. In this paper, we proposed a technique applied with blockchain technology in order to prevent forgery of authentication information for nodes participating in the network. And, an area-based hierarchical structure was applied to increase the efficiency of authentication for nodes and apply the optimal technique of block generation and exchange protocol. In addition, four data payloads were added to the block header in order to add authentication information for nodes in block. To improve the reliability by applying the blockchain technique to the hop-by-hop data transfer method between mobile nodes, blockchain exchange protocol through transaction creation, block packaging and verification processes were implemented. We performed the comparative experiment with the existing methods to evaluate the performance of the proposed method and confirmed the excellent performance by the experiment results.

Conflict Management Strategies of Police Managers - A case study - (경찰 관리자들의 조직 내 갈등 관리 전략 - 사례 연구를 중심으로 -)

  • Jung, Jeyong;Shin, So-Young
    • Korean Security Journal
    • /
    • no.58
    • /
    • pp.137-154
    • /
    • 2019
  • Conflict management within a police organization is one of the most significant areas from the organization management point of view. This study aims to explore procedural entrepreneurship of police mangers when they face difficulties in their workplaces. Adopting a case study strategy, this study examines real cases from three police agencies from Japan, the US, and South Korea. Interviewing police officers from theses different countries, six main themes are identified: (1) the pervasiveness of hierarchical authority, (2) procedural conflict, (3) organizational cultures, (4) the origin of their values and assumptions, (5) characteristics of the strategy, and (6) organizational learning. Research findings pointed out that there were more similarities than differences among the three cases, such as the pervasiveness of hierarchical authority, the significance of informal networks, and characteristics of informal networks. The main finding was that police managers used informal networks in order to overcome the procedural conflicts regardless of their nationality. All the participants relied on informal communications to raise the adaptability and survivability of their organizations. It was found that the Asian culture and American culture respectively permeated the three police agencies, supporting the role of informal networks in the formal organizations. This presents a paradox which well reflects the reality of organizations: informality within formality.

A Study on the Realization of Diskless and Stateless Security Policy Based High-speed Synchronous Network Infrastructure (Diskless와 Stateless 보안정책 기반의 고속화 동기 네트워크 인프라 구현에 관한 연구)

  • Seo, Woo-Seok;Jun, Moon-Seog
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.673-681
    • /
    • 2011
  • Among the network information services combined with a number of security technologies and required security policies, Infrastructure as a Service, a hardware plat-form service of Cloud Computing, has been provided since 2011. It is more or less similar to the existing central concentration method services, in terms of the specifications and technical aspects for given hardware category, but it is entirely different from them in that it overcomes the spatial limitations of specific network and targets the public network. Information security technology has also been prospering so that it could ensure the stability of offered hardware plat-forms. As currently supported hardware, Internet Data Center has been provided by virtualizing the previously offered servers and discs (backup discs), but the hardware plat-forms offered are somewhat limited. Meanwhile, the areas of security fields for offered services are confined to the center or include the TCP/IP-based SSL (Secure Sockets Layer) for the public network connected with clients, which shows that microscopic access security policies have been used. Therefore, this study was aimed to provide a realistic security mechanism for realizing defense policy, by expanding service areas into security devices and suggesting Diskless and Stateless security policy based high-speed synchronous network infrastructure.

An improved LEACH-C routing protocol considering the distance between the cluster head and the base station (클러스터 헤드와 기지국간의 거리를 고려한 향상된 LEACH-C 라우팅 프로토콜)

  • Kim, TaeHyeon;Park, Sea Young;Kwon, Oh Seok;Lee, Jong-Yong;Jung, Kye-Dong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.2
    • /
    • pp.373-377
    • /
    • 2022
  • Wireless sensor networks are being used in various fields. Wireless sensor networks are applied in many areas, such as security, military detection, environmental management, industrial control, and home automation. There is a problem about the limit of energy that the sensor network basically has. In this paper, we propose the LEACH-CCBD (Low Energy Adaptive Clustering hierarchy - Centrailized with Cluster and Basestation Distance) algorithm that uses energy efficiently by improving network transmission based on LEACH-C among the representative routing protocols. The LEACH-CCBD algorithm is a method of assigning a cluster head to a cluster head by comparing the sum of the distance from the member node to the cluster distance and the distance from the cluster node to the base station with respect to the membership of the member nodes in the cluster when configuring the cluster. The proposed LEACH-CCBD used Matlab simulation to confirm the performance results for each protocol. As a result of the experiment, as the lifetime of the network increased, it was shown to be superior to the LEACH and LEACH-C algorithms.

Cell-based Participant Management Model in Distributed Virtual Environment (셀분할 모델에 기반한 가상공간 다중참여자 관리기법)

  • 유석종
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2003.10a
    • /
    • pp.527-531
    • /
    • 2003
  • Previous researches on scalability problem of distributed virtual environment (DVE) have been mainly focused on spatial partitioning of area of interest (AOI). Congestion phenomena by avatar groups in AOI have been neglected relatively. However, AOI congestion is highly related to scalability of DVT because it exhausts system resources such as network bandwidth and rendering time, and could be a bar to perform collaboration among participants. In this paper, this will be defined as the problem that must be solved for the realization of the scalable DVE, and a model will be proposed to measure and control congestion situation in AOI. The purposes of the proposed model are to prevent high density of participants in AOI, and to protect stable collaboration in DVE. For evaluation of the performance it is compared with a previous method by defining the resource cost model which is dynamically activated to AOI congestion.

  • PDF