• Title/Summary/Keyword: 정보획득효율성

Search Result 527, Processing Time 0.03 seconds

Practical Connector Patterns for Designing Component Frameworks (컴포넌트 프레임워크 설계를 위한 실용적인 커넥터 패턴)

  • 민현기;김수동
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.43-53
    • /
    • 2004
  • Component-based development(CBD) has acquired a substantial acceptance in both academia and industry as an effective inter-organizational reuse technology. A component framework in product line engineering(PLE) which consists of related components, connectors and their semantics has a greater potential for reusability than components. In frameworks, components are glued with association, dependency and connections. Problems occur like affecting the implementation code of components when they are glued and replaced because the association and dependency relationships between COTS components which are acquired for application development do not match exactly. Especially, a connector may not only connect related components, but also mate partially-matched COTS components fit together. However, little has been studied to date about connectors that can be used practically. In this paper, we present a meta-model for connectors and show how a connector can be designed and implemented in practice. We propose five main patterns of connectors. Proposed major patterns Provide design guidelines for practical and efficient connector configuration based on component framework. And also, applying techniques and applied case studies of the major patterns show greatly increased applicability and reusability of the component without component modification.

Spatial and Temporal Resolution Selection for Bit Stream Extraction in H.264 Scalable Video Coding (H.264 SVC에서 비트 스트림 추출을 위한 공간과 시간 해상도 선택 기법)

  • Kim, Nam-Yun;Hwang, Ho-Young
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.1
    • /
    • pp.102-110
    • /
    • 2010
  • H.264 SVC(Scalable Video Coding) provides the advantages of low disk storage requirement and high scalability. However, a streaming server or a user terminal has to extract a bit stream from SVC file. This paper proposes a bit stream extraction method which can get the maximum PSNR value while date bit rate does not exceed the available network bandwidth. To do this, this paper obtains the information about extraction points which can get the maximum PSNR value offline and decides the spatial/temporal resolution of a bit stream at run-time. This resolution information along with available network bandwidth is used as the parameters to a bit stream extractor. Through experiment with JSVM reference software, we proved that proposed bit stream extraction method can get a higher PSNR value.

An Adaptive Rank-Based Reindexing Scheme for Lossless Indexed Image Compression (인덱스 이미지에서의 무손실 압축을 위한 적응적 순위 기반 재인덱싱 기법)

  • You Kang-Soo;Lee Bong-Ju;Jang Euee S.;Kwak Hoon-Sung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.658-665
    • /
    • 2005
  • Re-assignment scheme of index in index image is called reindexing. It has been well known that index image can be reindexed without losslessness. In this paper, we introduces an adaptive rank based reindexing scheme using co-occurrence frequency between neighboring pixels. Original index image can be converted into rank image by the proposed scheme. Using the proposed scheme, a better compression efficiency can be expected because most of the reindexed values(rank) get distributed with a smaller variance than the original index image. Experinental results show that the proposed scheme achieves a much better compression performance over GIF, arithmetic coding, Zeng's algorithm and RIAC scheme.

Binarization and Stroke Reconstruction of Low Quality Character Image for Effective Character Recognition (효과적인 문자 인식을 위한 저 품질 문자 영상의 이진화 및 획 재구성 방법)

  • Kim, Do-Hyeon;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.608-618
    • /
    • 2007
  • Image binarization is an important preprocessing to identify the object of interest by dividing pixels into the background and object. We proposes efficient binarization method and a stroke reconstruction method of the low quality character image for an effective character recognition. First, the character image is binarized by using the both advantages of local and global thresholding method and then the noise elimination around the character stroke and the hole filling on the stoke by the analysis of the binarized stroke image are performed to enhance the quality of the character stroke. Proposed binarization algorithm for character image achieved an efficiency of both processing speed and performance by the adaptive threshold selection. Moreover, We could get a high qualify binary image by a stroke reconstruction of the step-by-step denoising process.

Distributed Control Framework based on Mobile Agent Middleware

  • Lee, Yon-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.12
    • /
    • pp.195-202
    • /
    • 2020
  • The control system for the efficiency of resource utilization in sensor network environment based on object detection and environmental sensor requires active control function which based on sensor data acquisition and transmission functions and server's data analysis. Using active rule-based mobile agent middleware, this paper proposes a new distributed control framework that reduces the load of central sensor data server in sensor network environment by implementing remote data sensing and Zigbee-based communication with server and data analysis method of server. In addition, we implemented a power-saving system prototype using active rule-based distributed control methods that applied consumer's demand and environmental variables, and verified the validity of the proposed system through experiments and evaluations in the mobile agent middleware environment. The proposed system is a system framework that can efficiently autonomously control distributed objects in the sensor network environment, and it can be applied effectively to the development of demand response service based on optimal power control for the smart power system in the future.

Development of an integrated platform for flood analysis in the smart city (스마트시티 홍수분석 연계플랫폼 개발)

  • Koo, Bonhyun;Oh, Seunguk;Koo, Jaseob;Shim, Kyucheoul
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.1
    • /
    • pp.61-69
    • /
    • 2021
  • In this study, in order to efficiently perform smart city river management, we developed an integrated platform that connects flood analysis models on the web and provides information by converting input and output data into a database. In the integrated platform, a watershed analysis model, a river flow analysis model and an urban runoff analysis model were applied to perform flood analysis in smart city. This platform is able to obtain more reliable results by step-by-step approach to urban runoff that may occur in smart city through the applied model. In addition, since all analysis processes such as data collection, input data generation and result storage are performed on the web, anyone in an environment that can access the web without special equipment or tools can perform analysis and view results. Through this, it is expected that smart city managers can efficiently manage urban runoff and nearby rivers, and can also be used as educational materials for urban outflows.

Research and Development of Citation Matcher for Reference Parsing and Cross-Reference Linking (참고문헌 자동파싱 및 참조링킹을 위한 Citation Matcher 연구 및 개발)

  • Lee, Sang-gi;Kim, Sun-tae;Lee, Yong-sik;Yi, Tae-seok
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2007.11a
    • /
    • pp.426-429
    • /
    • 2007
  • CrossRef operates a cross-publisher citation linking system based on the DOI(R) global identifier. The number of organization building a reference citations linking structure through CrossRef is increasing. This paper concentrates on developing a Citation Matcher Solution to effectively build the reference linking structure. Citation Matcher automatically builds and processes the reference citation and identifier mapping which used to be handled manually. After the copy & paste of the reference citation, analyzation is processed to parse the journal title, author name, volume, issue, and start pages from the free style text. CrossRef, PubMed, and YesKISTI's identifiers are collected by through a standardized method. Renovation of the building process for domestic scholastic resources' reference linking and matching will be made possible by using a Citation Matcher. The connection between resources and seamless access for the electronic full-text will enhance the usability.

  • PDF

Multiple Object Tracking and Identification System Using CCTV and RFID (감시 카메라와 RFID를 활용한 다수 객체 추적 및 식별 시스템)

  • Kim, Jin-Ah;Moon, Nammee
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.51-58
    • /
    • 2017
  • Because of safety and security, Surveillance camera market is growing. Accordingly, Study on video recognition and tracking is also actively in progress, but There is a limit to identify object by obtaining the information of object identified and tracked. Especially, It is more difficult to identify multiple objects in open space like shopping mall, airport and others utilized surveillance camera. Therefore, This paper proposed adding object identification function by using RFID to existing video-based object recognition and tracking system. Also, We tried to complement each other to solve the problem of video and RFID based. Thus, through the interaction of system modules We propose a solution to the problems of failing video-based object recognize and tracking and the problems that could be cased by the recognition error of RFID. The system designed to identify the object by classifying the identification of object in four steps so that the data reliability of the identified object can be maintained. To judge the efficiency of this system, this demonstrated by implementing the simulation program.

Improved a Mutual Authentication Protocol in RFID based on Hash Function and CRC Code (개선된 해시함수와 CRC 코드 기반의 RFID 상호인증 프로토콜)

  • Oh, Se-Jin;Yun, Tae-Jin;Lee, Chang-Hee;Lee, Jae-Kang;Chung, Kyung-Ho;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2C
    • /
    • pp.132-139
    • /
    • 2012
  • In 2011, Woosik Bae proposed a NLMAP(New Low-cost Mutual Authentication Protocol) in RFID based on hash function. They argued that minimize computation such as random number generation. In addition, NLMAP is safe against replay attack, spoofing attack, traffic analysis and eavesdropping attack due to using mutual authentication. So, when applied to RFID system has advantage such as providing a high level of security at a lower manufacturing cost. However, unlike their argue, attacker can obtain Tag's hash computed unique identification information. This paper proves possible the location tracking and spoofing attack using H(IDt) by attacker. In addition, we propose the improved a mutual authentication protocol in RFID based on hash function and CRC code. Also, our protocol is secure against various attacks and suitable for efficient RFID systems better than NLMAP.

A LSB-based Efficient Selective Encryption of Fingerprint Images for Embedded Processors (임베디드 프로세서에 적합한 LSB 기반 지문영상의 효율적인 부분 암호화 방법)

  • Moon, Dae-Sung;Chung, Yong-Wha;Pan, Sung-Bum;Moon, Ki-Young;Kim, Ju-Man
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.10
    • /
    • pp.1304-1313
    • /
    • 2006
  • Biometric-based authentication can provide strong security guarantee about the identity of users. However, security of biometric data is particularly important as the compromise of the data will be permanent. In this paper, we propose a secure and efficient protocol to transmit fingerprint images from a fingerprint sensor to a client by exploiting characteristics of fingerprint images. Because the fingerprint sensor is computationally limited, however, such encryption algorithm may not be applied to the full fingerprint images in real-time. To reduce the computational workload on the resource-constrained sensor, we apply the encryption algorithm to a specific bitplane of each pixel of the fingerprint image. We use the LSB as specific bitplane instead of MSB used to encrypt general multimedia contents because simple attacks can reveal the fingerprint ridge information even from the MSB-based encryption. Based on the experimental results, our proposed algorithm can reduce the execution time of the full encryption by a factor of six and guarantee both the integrity and the confidentiality without any leakage of the ridge information.

  • PDF