• Title/Summary/Keyword: 네트워크 지도

Search Result 12,221, Processing Time 0.045 seconds

Design and Implementation of user centric pavilion information guide system based on commercial mobile device (모바일 기기 기반 사용자 중심형 전시관 정보 안내 시스템의 설계 및 구현)

  • Yun Hyun-Joo;Bu So-Young;Choi Yoo-Joo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.2 s.40
    • /
    • pp.187-199
    • /
    • 2006
  • This paper proposes the design of user centric pavilion information guide system based on mobile device such as PDA. which is composed of system interface factors as user wants. The suggested information guide system is convenient for user carrying because it is based on PDA mobile device and the used liquid browser system makes all data information displayed on a small screen in contrast with the other browser system. Indeed, factors of system interface can be re-composed by user interaction. And this system can effectively provide the detail information about the exhibited objects as various media data such as text, image, voice, music, video etc. The proposed system is made up of media database server. mobile system control server and mobile system interface which accepts user interaction and displays the information. Each system is networked based on TCP/IP and uses XML (extensible Markup Language) and JAVA 2 micro edition to be able to update data. This feature enhances a wide use to be able to load this system on the any mobile device.

  • PDF

Research of Mobile 3D Dance Contents Construction Using Motion Capture System (모션캡처 시스템을 이용한 모바일 3D 댄스 콘텐츠 제작 연구)

  • Kim Nam-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.98-107
    • /
    • 2006
  • By improving performance of mobile machine(3D engine, 3D accelerator chip set, etc) and developing wireless network technology, a demand for actual contents of users is being increased rapidly. But, there are some difficulties yet for the speedy development of actual contents because of the limitation of development resources that is dependent on each mobile device's different performance. In general, much of the animated character-creation work for mobile environment is still done manually by experienced animator with the method of key frame processing. However, it needs a lot of time and more costs for creating motion. Additionally, it is possible to cause a distortion of motion. In this paper, I solved the difficulties by using a optical motion capture system, it was able to acquire accurate motion data more easily and quickly, and then it was possible to make 3D dance contents efficiently. Also, I showed techniques of key reduction and controlling frame number for using huge amounts of motion capture data in mobile environment which requires less resources. In making 3D dance contents, using an optical motion capture system was verified that it was more efficient to make and use actual-reality contents by creating actual character motion and by decreasing processing time than existing method.

  • PDF

The Utilization of Big Data's Disaster Management in Korea (국내 재난관리 분야의 빅 데이터 활용 정책방안)

  • Shin, Dong-Hee;Kim, Yong-Moon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.377-392
    • /
    • 2015
  • In today's data-driven society, we've been hearing a great deal about the power of Big Data over the last couple of years. At the same time, it has become the most important issue that the problems is caused by the data collection, management and utilization. Moreover, Big Data has a wide applications ranging from situation awareness, decision-making to the area to enable for the foreseeable future with man-made and analysis of data. It is necessary to process data into meaningful information given that the huge amount of structured and unstructured data being created in the private and the public sector, even in disaster management. This data should be public and private sector at the same time for the appropriate linkage analysis for effective disaster management. In this paper, we conducted a literature review and case study efficient Big Data to derive the revitalization of national disaster management. The study obtained data on the role and responsibility of the public sector and the private sector to leverage Big Data for promotion of national disaster management plan. Both public and private sectors should promote common development challenges related to the openness and sharing of Big Data, technology and expansion of infrastructure, legal and institutional maintenance. The implications of the finding were discussed.

Mutiagent based on Attacker Traceback System using SOM (SOM을 이용한 멀티 에이전트 기반의 침입자 역 추적 시스템)

  • Choi Jinwoo;Woo Chong-Woo;Park Jaewoo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.11 no.3
    • /
    • pp.235-245
    • /
    • 2005
  • The rapid development of computer network technology has brought the Internet as the major infrastructure to our society. But the rapid increase in malicious computer intrusions using such technology causes urgent problems of protecting our information society. The recent trends of the intrusions reflect that the intruders do not break into victim host directly and do some malicious behaviors. Rather, they tend to use some automated intrusion tools to penetrate systems. Most of the unknown types of the intrusions are caused by using such tools, with some minor modifications. These tools are mostly similar to the Previous ones, and the results of using such tools remain the same as in common patterns. In this paper, we are describing design and implementation of attacker-traceback system, which traces the intruder based on the multi-agent architecture. The system first applied SOM to classify the unknown types of the intrusion into previous similar intrusion classes. And during the intrusion analysis stage, we formalized the patterns of the tools as a knowledge base. Based on the patterns, the agent system gets activated, and the automatic tracing of the intrusion routes begins through the previous attacked host, by finding some intrusion evidences on the attacked system.

Parameter-Efficient Neural Networks Using Template Reuse (템플릿 재사용을 통한 패러미터 효율적 신경망 네트워크)

  • Kim, Daeyeon;Kang, Woochul
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.5
    • /
    • pp.169-176
    • /
    • 2020
  • Recently, deep neural networks (DNNs) have brought revolutions to many mobile and embedded devices by providing human-level machine intelligence for various applications. However, high inference accuracy of such DNNs comes at high computational costs, and, hence, there have been significant efforts to reduce computational overheads of DNNs either by compressing off-the-shelf models or by designing a new small footprint DNN architecture tailored to resource constrained devices. One notable recent paradigm in designing small footprint DNN models is sharing parameters in several layers. However, in previous approaches, the parameter-sharing techniques have been applied to large deep networks, such as ResNet, that are known to have high redundancy. In this paper, we propose a parameter-sharing method for already parameter-efficient small networks such as ShuffleNetV2. In our approach, small templates are combined with small layer-specific parameters to generate weights. Our experiment results on ImageNet and CIFAR100 datasets show that our approach can reduce the size of parameters by 15%-35% of ShuffleNetV2 while achieving smaller drops in accuracies compared to previous parameter-sharing and pruning approaches. We further show that the proposed approach is efficient in terms of latency and energy consumption on modern embedded devices.

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

Analysis regarding Complaints of Courier Consumers and Workers in the Parcel Delivery Service by using Topic Model (토픽모델을 활용한 택배 서비스 소비자와 종사자의 불만 사항 분석)

  • Shin, Jin Gyu
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.2
    • /
    • pp.39-48
    • /
    • 2020
  • Many studies have been conducted to analyze factors that affect customer satisfaction, and service quality improvement in the parcel delivery industry. Most of these studies have a limited number of respondents using methods such as surveys and interviews. Therefore, this study aims to supplement the shortcomings of previous studies, by searching and analyzing the common major topics related to the complaints pointed out by consumers and suppliers in the parcel delivery service with cases of consumer counseling, and articles that reflect the complaints of workers in the industry. In addition, by analyzing the trend of these topics, we attempted to discover new topics and suggest implications. In conclusion, topics such as delay/lost/wrong deliveries as well as the fierce competition in the parcel delivery industry, turned out to be central aspects. As a result of the topic trend analysis, talks with international couriers have recently increased, and many conflicts related to apartment parcel delivery have been dealt with. The topics presented in this study are mainly focused on the contents of previous studies, but we expect that new and valuable topics can be derived by adding other data and analysis methods, such as internal counseling and academic literature.

A Design of Secure Communication for Device Management Based on IoT (사물인터넷 기반 디바이스 관리를 위한 안전한 통신 프로토콜 설계)

  • Park, Jung-Oh;Choi, Do-Hyeon;Hong, Chan-Ki
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.11
    • /
    • pp.55-63
    • /
    • 2020
  • The IoT technology is a field that applies and converges the technologies in the existing industrial environment, instead of new technologies. The IoT technology is releasing various application services converged with other industries such as smart home, healthcare, construction, and automobile, and it is also possible to secure the work efficiency and convenience of users of IoT-based technologies. However, the security threats occurring in the IoT-based technology environment are succeeding to the vulnerability of the existing wireless network environment. And the occurrence of new and variant attacks in the combination with the ICT convergence environment, is causing damages. Thus, in the IoT technology-based environment, it would be necessary to have researches on the safe transmission of messages in the communication environment between user and device, and device and device. This thesis aims to design a safe communication protocol in the IoT-based technology environment. Regarding the suggested communication protocol, this thesis performed the safety analysis on the attack techniques occurring in the IoT technology-based environment. And through the performance evaluation of the existing PKI-based certificate issuance system and the suggested communication protocol, this thesis verified the high efficiency(about 23%) of communication procedure. Also, this thesis verified the reduced figure(about 65%) of the issued quantity of certificate compared to the existing issuance system and the certificate management technique.

Multi-Level Prediction for Intelligent u-life Services (지능형 u-Life 서비스를 위한 단계적 예측)

  • Hong, In-Hwa;Kang, Myung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.123-129
    • /
    • 2009
  • Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.

  • PDF

An Iterative Data-Flow Optimal Scheduling Algorithm based on Genetic Algorithm for High-Performance Multiprocessor (고성능 멀티프로세서를 위한 유전 알고리즘 기반의 반복 데이터흐름 최적화 스케줄링 알고리즘)

  • Chang, Jeong-Uk;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.6
    • /
    • pp.115-121
    • /
    • 2015
  • In this paper, we proposed an iterative data-flow optimal scheduling algorithm based on genetic algorithm for high-performance multiprocessor. The basic hardware model can be extended to include detailed features of the multiprocessor architecture. This is illustrated by implementing a hardware model that requires routing the data transfers over a communication network with a limited capacity. The scheduling method consists of three layers. In the top layer a genetic algorithm takes care of the optimization. It generates different permutations of operations, that are passed on to the middle layer. The global scheduling makes the main scheduling decisions based on a permutation of operations. Details of the hardware model are not considered in this layer. This is done in the bottom layer by the black-box scheduling. It completes the scheduling of an operation and ensures that the detailed hardware model is obeyed. Both scheduling method can insert cycles in the schedule to ensure that a valid schedule is always found quickly. In order to test the performance of the scheduling method, the results of benchmark of the five filters show that the scheduling method is able to find good quality schedules in reasonable time.