• Title/Summary/Keyword: 메모리 효율

Search Result 1,782, Processing Time 0.03 seconds

Adaptive Intra Fast Algorithm of H.264 for Video Surveillance (보안 영상 시스템에 적합한 H.264의 적응적 인트라 고속 알고리즘)

  • Jang, Ki-Young;Kim, Eung-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12C
    • /
    • pp.1055-1061
    • /
    • 2008
  • H.264 is the prominent video coding standard in various applications such as real-time streaming and digital multimedia broadcasting, since it provides enhanced compression performance, error resilience tools, and network adaptation. Compression efficiency of H.264 has been improved, however, it requires more computing and memory access than traditional methods. In this paper we proposed adaptive intra fast algorithm for real-time video surveillance system reducing the encoding complexity of H264/A VC. For this aim, temporal interrelationship between macroblock in the previous and the current frame is used to decide the encoding mode of macroblock fast. As a result, though video quality was deteriorated a little, less than 0.04dB, and bit rate was somewhat increased in suggested method, however, proposed method improved encoding time significantly and, in particular, encoding time of an image with little changes of neighboring background such as surveillance video was more shortened than traditional methods.

Analysis of Encryption and Decryption Processes of Realm Database and Its Application (Realm 데이터베이스 암·복호화 프로세스 및 기반 애플리케이션 분석)

  • Youn, Byungchul;Park, Myungseo;Kim, Jongsung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.369-378
    • /
    • 2020
  • Due to the widespread use of mobile devices, smartphone penetration and usage rate continue to increase and there is also an increasing amount of data that need to be stored and managed in applications. Therefore, recent applications use mobile databases to store and manage user data. Realm database, developed in 2014, is attracting more attention from developers because of advantages of continuous updating, high speed, low memory usage, simplicity and readability of the code. It also supports an encryption to provide confidentiality and integrity of personal information stored in the database. However, since the encryption can be used as an anti-forensic technique, it is necessary to analyze the encryption and decryption processes provided by Realm Database. In this paper, we analyze the structure of Realm Database and its encryption and decryption process in detail, and analyze an application that supports an encryption to propose the use cases of the Realm Database.

A Study on the Implementation Methods of the MLP Recognizer for Handwritten Numerals and Non-Numerals (필기체 숫자와 비숫자의 인식을 위한 MLP 인식기의 구현 방법에 관한 연구)

  • Lim, Kil-Taek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.1119-1122
    • /
    • 2005
  • This paper describes the implementation methods of the MLP (mulilayer perteptrons) recognizers for numerals and non-nummerals. The MLP has known to be a very efficient classifier to recognize handwritten numerals in terms of recognition accuracy, speed, and memory requirements. The MLP in the previous researches, however, focuses on the only numeral inputs and does not pay attention to non-numeral inputs with respect to recognition accuracy, rejection rates, and other characteristics. In this paper, we present some implementation methods of the MLP in the environments that numeral and non-numerals are mixed. The MLP had been developed by three methods, and investigated with three error types introduced. The experiments had been conducted on a total of about 63,000 numerals and non-numerals. The promising method to recognize numeral and non-numerals is described in terms of the three error types.

  • PDF

Implementation of CoAP Protocol for USN Environment (CoAP 프로토콜 구현과 USN 환경 적용)

  • Min, Kyoung-Ju;Kim, Yong-Woon;Yoo, Sang-Keun;Kim, Hyoung-Jun;Jung, Heo-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1189-1197
    • /
    • 2011
  • To manage sensing information such as temperature, humidity and so on efficiently, it is need to use special purpose protocol. In this reason, IETF WG proposed CoAP protocol, and it is on Internet draft. If it is possible to work on a specific protocol, sensor end-nodes and network devices will be managed efficiently. However, end-nodes have restricted resources, it is hard to applying to CoAP protocol directly. In this paper we analyse a CoAP protocol stack for USN. To verify this protocol quickly, at first we implemented CoAP protocol stack over PC environments. After the logical verification, we applied this protocol to the USN environment. To do this, we ported CoAP protocol to Cygwin environment, and proposed solutions for hardware dependencies, and it is verified through experiments.

A Slice Information Based Labeling Algorithm for 3-D Volume Data (Slice 정보에 기반한 3차원 볼륨 데이터의 레이블링 알고리즘)

  • 최익환;최현주;이병일;최흥국
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.7
    • /
    • pp.922-928
    • /
    • 2004
  • We propose a new 3 dimensional labeling method based on slice information for the volume data. This method is named SIL (Slice Information based Labeling). Compare to the conventional algorithms, it has advantages that the use of memory is efficient and it Is possible to combine with a variety of 2 dimensional labeling algorithms for finding an appropriate labeling algorithm to its application. In this study, we applied SIL to confocal microscopy images of cervix cancer cell and compared the results of labeling. According to the measurement, we found that the speed of Sd combined with, CCCL (Contour based Connected Component Labeling) is almost 2 times higher than that of other methods. In conclusion, considering that the performance of labeling depends on a kind of image, we obtained that the proposed method provide better result for the confocal microscopy cell volume data.

An Optimal Resource Configuration Method based on Probability Model for VBR Video Server (VBR 비디오 서버를 위한 확률 모델 기반의 최적 자원 구성)

  • Cho, Dae-Hyun;Son, Jin-Hyun;Kim, Myoung-Ho;Lee, Yoon-Joon
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.334-343
    • /
    • 2001
  • Most of currently used videos have variable bit rate(VBR) characteristics. Since the display rate of VBR videos compared to CBR videos vary with time, it is not proper to configure resources of the VBR video server using the method proposed for the CBR video server. In this paper we propose an optimal resource configuration method for the VBR video server which is based on the probability model. The proposed method decides the amount of disk and memory, and the disk access cycle of the video server with the lowest hardware cost, while preserving the throughput of the video server. In addition, we show the usefulness of the method through the various experiments.

  • PDF

A Data Protection Scheme based on Hilbert Curve for Data Aggregation in Wireless Sensor Network (센서 네트워크에서 데이터 집계를 위한 힐버트 커브 기반 데이터 보호 기법)

  • Yoon, Min;Kim, Yong-Ki;Chang, Jae-Woo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.11
    • /
    • pp.1071-1075
    • /
    • 2010
  • Because a sensor node in wireless sensor networks(WSNs) has limited resources, such as battery capacity and memory, data aggregation techniques have been studied to manage the limited resources efficiently. Because sensor network uses wireless communication, a data can be disclosed by attacker. Thus, the study on data protection schemes for data aggregation is essential in WSNs. But the existing data aggregation methods require both a large number of computation and communication, in case of network construction and data aggregation processing. To solve the problem, we propose a data protection scheme based on Hilbert-curve for data aggregation. Our scheme can minimizes communications among neighboring sensor nodes by using tree-based routing. Moreover, it can protect the data from attacker by doing encryption through a Hilbert-curve technique based on a private seed, Finally, we show that our scheme outperforms the existing methods in terms of message transmission and average sensor node lifetime.

Design and Implementation of Multimedia Education System on Mobile Device (모바일 단말에서의 SMIL을 이용한 멀티미디어 교육 시스템 설계 및 구현)

  • Lim Young-Jin;Seo Jung-Hee;Park Hung-Bog
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.581-584
    • /
    • 2006
  • Cellular phones have been popularized and some of them even have access to the Internet. But the utilization of mobile phones has not been for education but only focused on particular services due to the text-based low capacity. This thesis proposes a multimedia education system using cell phones with SMIL. We can decrease the size of the parser and refute the resources of CPU by designing SMIL tag only, which is needed for multimedia education. In addition, the macro method for producing information for lectures will make possible decreased transmission quantity of multimedia contents and increased transmission efficiency. This will lead to overcoming the matter of insufficient CPU and memory, which is common to most mobile phone terminals.

  • PDF

Hardware Implementation of Rasterizer with SIMD Architecture Applicable to Mobile 3D Graphics System (모바일 3차원 그래픽스 시스템에 적용 가능한 SIMD 구조를 갖는 래스터라이저의 하드웨어 구현)

  • Ha, Chang-Soo;Sung, Kwang-Ju;Choi, Byeong-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.313-315
    • /
    • 2010
  • In this paper, we describe research results of developing hardware rasterizer that is applicable to mobile 3D graphics system, designed in SIMD architecture and verified in FPGA. Tile-based scan conversion unit is designed like SIMD architecture running four tiles simultaneously and each tile traverses pixels hierarchical in 3-level so that visiting counts is minimized. As experimental results, $8{\times}8$ is the most efficient size of tile and the last step of tile traversing is performed on $2{\times}2$ sized subtile. The rasterizer supports flat shading and gouraud shading and texture mapper supports affine mapping and perspective corrected mapping. Also, texture mapper supports point sampling mode and bilinear interpolating sampling mode and two types of wrapping modes and various blending modes. The rasterzer operates as 120Mhz on xilinx vertex4 $l{\times}100$ device. To easy verification, texture memory and frame buffer are generated as block rom and block ram.

  • PDF

Design of Quality Evaluation Model for Mobile Application (모바일애플리케이션 품질평가 모델 설계)

  • Suh, Jee-Hoon;Choi, Jae-Hyun;Kim, Jong-Bae;Park, Jea-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.10
    • /
    • pp.2451-2461
    • /
    • 2014
  • Mobile application is software executing on smart devices regardless of the time and place. Many individuals and companies have provided a lot of mobile applications services. However, there is not certain standard in terms of application's quality evaluation because study is deficient compared with increase amount of development of mobile application. Moreover, mobile application basically has many special characteristics. For these reasons mobile application is required special standard of quality different from general software. To satisfy these needs, I design and propose mobile application evaluation model. Evaluation model is mapped by characteristics of mobile application based on ISO/IEC 25000's quality characteristics and propose each quality characteristics and metrics. For verification, scenario-based studies were applied to quality model and carried out.