• Title/Summary/Keyword: 컴퓨터형 서비스

Search Result 727, Processing Time 0.036 seconds

Real-Time Object Recognition Using Local Features (지역 특징을 사용한 실시간 객체인식)

  • Kim, Dae-Hoon;Hwang, Een-Jun
    • Journal of IKEEE
    • /
    • v.14 no.3
    • /
    • pp.224-231
    • /
    • 2010
  • Automatic detection of objects in images has been one of core challenges in the areas such as computer vision and pattern analysis. Especially, with the recent deployment of personal mobile devices such as smart phone, such technology is required to be transported to them. Usually, these smart phone users are equipped with devices such as camera, GPS, and gyroscope and provide various services through user-friendly interface. However, the smart phones fail to give excellent performance due to limited system resources. In this paper, we propose a new scheme to improve object recognition performance based on pre-computation and simple local features. In the pre-processing, we first find several representative parts from similar type objects and classify them. In addition, we extract features from each classified part and train them using regression functions. For a given query image, we first find candidate representative parts and compare them with trained information to recognize objects. Through experiments, we have shown that our proposed scheme can achieve resonable performance.

Performance Analysis of OFDM-DSRC System Using LMMSE Equalization Technique (LMMSE 등화기법을 적용한 OFDM-DSRC 시스템의 성능분석)

  • Sung Tae-Kyung;Kim Soon-Young;Rhee Myung-Soo;Cho Hyung-Rae
    • Journal of Navigation and Port Research
    • /
    • v.29 no.1 s.97
    • /
    • pp.23-28
    • /
    • 2005
  • The signal in wireless multi-path channel is affected by fading and ISI because of high data rate transmission, so the signal has the high error rate. The present modulation and demodulation method of DSRC system can not expect sufficient for providing data service over 1 Mbps, so the channel equalization and advanced modulation and demodulation methods are required. OFDM is generally known as an effective technique for high data rate transmission system, since it can prevent ISI by inserting a guard interval. However, a guard interval longer than channel delay spread has to be used in each OFDM symbol period, thus resulting a considerable loss in the efficiency of channel utilization Therefore the equalizer is necessary to cancel ISI to accommodate advanced ITS service with higher bit rate and longer channel delay spread condition In this paper, the channel equalizer for the OFDM -DSRC system was designed and its performance in a multi-path fading environment was evaluated with computer simulation.

Design and Implementation of Distributed Object Framework Supporting Audio/Video Streaming (오디오/비디오 스트리밍을 지원하는 분산 객체 프레임 워크 설계 및 구현)

  • Ban, Deok-Hun;Kim, Dong-Seong;Park, Yeon-Sang;Lee, Heon-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.4
    • /
    • pp.440-448
    • /
    • 1999
  • 본 논문은 객체지향형 분산처리 환경 하에서 오디오나 비디오 등과 같은 실시간(real-time) 스트림(stream) 데이타를 처리하는 데 필요한 소프트웨어 기반구조를 설계하고 구현한 내용을 기술한다. 본 논문에서 제시한 DAViS(Distributed Object Framework supporting Audio/Video Streaming)는, 오디오/비디오 데이타의 처리와 관련된 여러 소프트웨어 구성요소들을 분산객체로 추상화하고, 그 객체들간의 제어정보 교환경로와 오디오/비디오 데이타 전송경로를 서로 분리하여 처리한다. 분산응용프로그램 작성자는 DAViS에서 제공하는 서비스들을 이용하여, 기존의 분산프로그래밍 환경이 제공하는 것과 동일한 수준에서 오디오/비디오 데이타에 대한 처리를 표현할 수 있다. DAViS는, 새로운 형식의 오디오/비디오 데이타를 처리하는 부분을 손쉽게 통합하고, 하부 네트워크의 전송기술이나 컴퓨터시스템 관련 기술의 진보를 신속하고 자연스럽게 수용할 수 있도록 하는 유연한 구조를 가지고 있다. Abstract This paper describes the design and implementation of software framework which supports the processing of real-time stream data like audio and video in distributed object-oriented computing environment. DAViS(Distributed Object Framework supporting Audio/Video Streaming), proposed in this paper, abstracts software components concerning the processing of audio/video data as distributed objects and separates the transmission path of data between them from that of control information. Based on DAViS, distributed applications can be written in the same abstract level as is provided by the existing distributed environment in handling audio/video data. DAViS has a flexible internal structure enough to easily incorporate new types of audio/video data and to rapidly accommodate the progress of underlying network and computer system technology with very little modifications.

Enhanced Server Availability for DDoS Amplification Attack Using CLDAP Protocol (CLDAP 프로토콜을 이용한 DDoS 증폭공격에 대한 서버 가용성 향상방안 연구)

  • Choi, Suk June;Kwak, Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.1
    • /
    • pp.19-26
    • /
    • 2018
  • Recently, DDoS amplification attacks using servers that provide Microsoft Active Directory information using CLDAP protocol are increasing. Because CLDAP is an open standard application that allows a wide range of directory information to be accessed and maintained in a network, the server is characterized by its openness to the Internet. This can be exploited by the Reflector server to perform an amplification attack by an attacker. In addition, this attack can be attacked with a packet that is amplified 70 times more than the conventional UDP-based flooding attack, and it can block service to small and medium sized server. Therefore, in this paper, we propose an algorithm that can reduce the DDoS amplification attack using CLDAP server and implement the corresponding CLDAP server environment virtually, and implement and demonstrate the corresponding algorithm. This provides a way to ensure the availability of the server.

Term Clustering and Duplicate Distribution for Efficient Parallel Information Retrieval (효율적인 병렬정보검색을 위한 색인어 군집화 및 분산저장 기법)

  • 강재호;양재완;정성원;류광렬;권혁철;정상화
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.1_2
    • /
    • pp.129-139
    • /
    • 2003
  • The PC cluster architecture is considered as a cost-effective alternative to the existing supercomputers for realizing a high-performance information retrieval (IR) system. To implement an efficient IR system on a PC cluster, it is essential to achieve maximum parallelism by having the data appropriately distributed to the local hard disks of the PCs in such a way that the disk I/O and the subsequent computation are distributed as evenly as possible to all the PCs. If the terms in the inverted index file can be classified to closely related clusters, the parallelism can be maximized by distributing them to the PCs in an interleaved manner. One of the goals of this research is the development of methods for automatically clustering the terms based on the likelihood of the terms' co-occurrence in the same query. Also, in this paper, we propose a method for duplicate distribution of inverted index records among the PCs to achieve fault-tolerance as well as dynamic load balancing. Experiments with a large corpus revealed the efficiency and effectiveness of our method.

Adaptive EDCF for IEEE802.11e MAC Protocol (IEEE 802.11e MAC의 성능향상을 위한 적응형 EDCF)

  • Kim Kunsu;Kim Beomjoon;Park Jungshin;Lee Jaiyong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1A
    • /
    • pp.62-69
    • /
    • 2005
  • Efforts for standardization of medium access control (MAC) protocol in IEEE802.11e have been made to support quality of service (QoS) in IEEE802.11e MAC protocol. Enhanced disoibuted coordination function (EDCF) of 802.11e MAC protocol is modified to support QoS for packets that have differentiated priority. However, EDCF still has the problem of throughput optimization and priority support. Therefore, we have proposed a scheme called adaptive EDCF for both supporting priority of packets and throughput optimization. We have derived the relation between the number of nodes and contention window size for throughput optimization. Based on the analytic results, we have evaluated the performance of the proposed scheme using OPNET simulations. The simulation results show that using the proposed scheme can improve the overall throughput regardless of the number of nodes and the decrement of the throughput with increasing the number of nodes can be alleviated. Additionally, we have shown that the adaptive EDCF can support priority of packets more effectively than existing EDCF.

Personalized Information Recommendation System on Smartphone (스마트폰 기반 사용자 정보추천 시스템 개발)

  • Kim, Jin-A;Kwon, Eung-Ju;Kang, Sanggil
    • Journal of Information Technology and Architecture
    • /
    • v.9 no.1
    • /
    • pp.57-66
    • /
    • 2012
  • Recently, with a rapidly growing of the mobile content market, a variety of mobile-based applications are being launched. But mobile devices, compared to the average computer, take a lot of effort and time to get the final contents you want to use due to the restrictions such as screen size and input methods. To solve this inconvenience, a recommender system is required, which provides customized information that users prefer by filtering and forecasting the information.In this study, an tailored multi-information recommendation system utilizing a Personalized information recommendation system on smartphone is proposed. Filtering of information is to predict and recommend the information the individual would prefer to by using the user-based collaborative filtering. At this time, the degree of similarity used for the user-based collaborative filtering process is Euclidean distance method using the Pearson's correlation coefficient as weight value.As a real applying case to evaluate the performance of the recommender system, the scenarios showing the usefulness of recommendation service for the actual restaurant is shown. Through the comparison experiment the augmented reality based multi-recommendation services to the existing single recommendation service, the usefulness of the recommendation services in this study is verified.

Open Based Network Security System Architecture (개방형 네트워크 보안 시스템 구조)

  • Kim, Chang-Su;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.4
    • /
    • pp.643-650
    • /
    • 2008
  • If existing system need to expand security part, the security was established after paying much cost, processing of complicated installation and being patient with inconvenience at user's view because of closed structure. In this thesis, those defects could be overcome by using open security tools and constructing security server, which is firewall of 'bastion' form including proxy server, certification server and so on. Also each security object host comes to decide acceptance or denial where each packet comes from, then determines security level each hosts. Precisely it is possible choosing the packets from bastion host or following at the other policies. Although an intruder enter into inside directly, it is constructed safely because encryption algorithm is applied at communication with security object host. This thesis suggests more flexible, independent and open security system, which improves existing security through systematic linkage between system security and network security.

In the Digital Big Data Classroom Reality and Application of Smart Education : Learner-Centered Education using Edutech (디지털 빅데이터 교실에서 스마트교육의 실제와 활용 : 에듀테크를 활용한 학습자 중심 교육)

  • Kim, Seong-Hee
    • Journal of Korea Entertainment Industry Association
    • /
    • v.15 no.4
    • /
    • pp.279-286
    • /
    • 2021
  • In this study, we looked at the appearance of Edutech, which is being put into the educational field after Corona 19, with the advent of the 4th industrial revolution. In the era of the 4th industrial revolution, the infrastructure, data, and service of Smart Stick that actively utilized ICT became the main pillars of smart education. In particular, smart education is being implemented through e-learning, smart learning, and edutech, and on this basis, it has become possible through the expansion and use of the Internet and computers, the dissemination of smart devices, and a software foundation using big data. Based on this, it was confirmed that Edutech is being implemented through the establishment of a quarantine safety net, a learning safety net, and a care safety net for individual learners and safe life based on artificial intelligence. Lastly, in order for edutech education using big data to become a discourse for everyone, it is necessary to consider artificial intelligence and ethics in the use and application of edutech.

Analysis of Cyber Incident Artifact Data Enrichment Mechanism for SIEM (SIEM 기반 사이버 침해사고 대응을 위한 데이터 보완 메커니즘 비교 분석)

  • Lee, Hyung-Woo
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.5
    • /
    • pp.1-9
    • /
    • 2022
  • As various services are linked to IoT(Internet of Things) and portable communication terminals, cyber attacks that exploit security vulnerabilities of the devices are rapidly increasing. In particular, cyber attacks targeting heterogeneous devices in large-scale network environments through advanced persistent threat (APT) attacks are on the rise. Therefore, in order to improve the effectiveness of the response system in the event of a breach, it is necessary to apply a data enrichment mechanism for the collected artifact data to improve threat analysis and detection performance. Therefore, in this study, by analyzing the data supplementation common elements performed in the existing incident management framework for the artifacts collected for the analysis of intrusion accidents, characteristic elements applicable to the actual system were derived, and based on this, an improved accident analysis framework The prototype structure was presented and the suitability of the derived data supplementary extension elements was verified. Through this, it is expected to improve the detection performance when analyzing cyber incidents targeting artifacts collected from heterogeneous devices.