• Title/Summary/Keyword: 패턴 지도 방안

Search Result 376, Processing Time 0.029 seconds

Noise Reduction in Real-time Context Aware using Wearable Device (웨어러블 기기를 이용한 실시간 상황인식에서의 잡음제거)

  • Kim, Tae Ho;Suh, Dong Hyeok;Yoon, Shin Sook;Ryu, Keun Ho
    • Journal of Digital Contents Society
    • /
    • v.19 no.9
    • /
    • pp.1803-1810
    • /
    • 2018
  • Recently, many researches related to IoT (Internet of Things) have been actively conducted. In order to improve the context aware function of smart wearable devices using the IoT, we proposed a noise reduction method for the event data of the sensor part. In thisstudy, the adoption of the low - pass filter induces the attenuation of the abnormally measured value, and the benefit was obtained from the situation recognition using the event data of the sensor. As a result, we have validated attenuation for abnormal or excessive noise using event data detected and reported by 3-axis acceleration sensors on some devices, such as smartphones and smart watches. In addition, various pattern data necessary for real - time context aware were obtained through noise pattern analysis.

An Automatic Issues Analysis System using Big-data (빅데이터를 이용한 자동 이슈 분석 시스템)

  • Choi, Dongyeol;Ahn, Eungyoung
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.2
    • /
    • pp.240-247
    • /
    • 2020
  • There have been many efforts to understand the trends of IT environments that have been rapidly changed. In a view point of management, it needs to prepare the social systems in advance by using Big-data these days. This research is for the implementation of Issue Analysis System for the Big-data based on Artificial Intelligence. This paper aims to confirm the possibility of new technology for Big-data processing through the proposed Issue Analysis System using. We propose a technique for semantic reasoning and pattern analysis based on the AI and show the proposed method is feasible to handle the Big-data. We want to verify that the proposed method can be useful in dealing with Big-data by applying latest security issues into the system. The experiments show the potentials for the proposed method to use it as a base technology for dealing with Big-data for various purposes.

Activity Data Modeling and Visualization Method for Human Life Activity Recognition (인간의 일상동작 인식을 위한 동작 데이터 모델링과 가시화 기법)

  • Choi, Jung-In;Yong, Hwan-Seung
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1059-1066
    • /
    • 2012
  • With the development of Smartphone, Smartphone contains diverse functions including many sensors that can describe users' state. So there has been increased studies rapidly about activity recognition and life pattern recognition with Smartphone sensors. This research suggest modeling of the activity data to classify extracted data in existing activity recognition study. Activity data is divided into two parts: Physical activity and Logical Activity. In this paper, activity data modeling is theoretical analysis. We classified the basic activity(walking, standing, sitting, lying) as physical activity and the other activities including object, target and place as logical activity. After that we suggested a method of visualizing modeling data for users. Our approach will contribute to generalize human's life by modeling activity data. Also it can contribute to visualize user's activity data for existing activity recognition study.

Abnormal SIP Packet Detection Mechanism using Co-occurrence Information (공기 정보를 이용한 비정상 SIP 패킷 공격탐지 기법)

  • Kim, Deuk-Young;Lee, Hyung-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.11 no.1
    • /
    • pp.130-140
    • /
    • 2010
  • SIP (Session Initiation Protocol) is a signaling protocol to provide IP-based VoIP (Voice over IP) service. However, many security vulnerabilities exist as the SIP protocol utilizes the existing IP based network. The SIP Malformed message attacks may cause malfunction on VoIP services by changing the transmitted SIP header information. Additionally, there are several threats such that an attacker can extract personal information on SIP client system by inserting malicious code into SIP header. Therefore, the alternative measures should be required. In this study, we analyzed the existing research on the SIP anomaly message detection mechanism against SIP attack. And then, we proposed a Co-occurrence based SIP packet analysis mechanism, which has been used on language processing techniques. We proposed a association rule generation and an attack detection technique by using the actual SIP session state. Experimental results showed that the average detection rate was 87% on SIP attacks in case of using the proposed technique.

A Multi-stage Markov Process Model to Evaluate the Performance of Priority Queues in Discrete-Event Simulation: A Case Study with a War Game Model (이산사건 시뮬레이션에서의 우선순위 큐 성능분석을 위한 다단계 마코브 프로세스 모델: 창조 모델에 대한 사례연구)

  • Yim, Dong-Soon
    • Journal of the Korea Society for Simulation
    • /
    • v.17 no.4
    • /
    • pp.61-69
    • /
    • 2008
  • In order to evaluate the performance of priority queues for future event list in discrete-event simulations, models representing patterns of enqueue and dequeue processes are required. The time complexities of diverse priority queue implementations can be compared using the performance models. This study aims at developing such performance models especially under the environment that a developed simulation model is used repeatedly for a long period. The developed performance model is based on multi-stage Markov process models; probabilistic patterns of enqueue and dequeue are considered by incorporating non-homogeneous transition probability. All necessary parameters in this performance model would be estimated by analyzing a results obtained by executing the simulation model. A case study with a war game simulation model shows how the parameters defined in muti-stage Markov process models are estimated.

  • PDF

Pattern-based Depth Map Generation for Low-complexity 2D-to-3D Video Conversion (저복잡도 2D-to-3D 비디오 변환을 위한 패턴기반의 깊이 생성 알고리즘)

  • Han, Chan-Hee;Kang, Hyun-Soo;Lee, Si-Woong
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.2
    • /
    • pp.31-39
    • /
    • 2015
  • 2D-to-3D video conversion vests 3D effects in a 2D video by generating stereoscopic views using depth cues inherent in the 2D video. This technology would be a good solution to resolve the problem of 3D content shortage during the transition period to the full ripe 3D video era. In this paper, a low-complexity depth generation method for 2D-to-3D video conversion is presented. For temporal consistency in global depth, a pattern-based depth generation method is newly introduced. A low-complexity refinement algorithm for local depth is also provided to improve 3D perception in object regions. Experimental results show that the proposed method outperforms conventional methods in terms of complexity and subjective quality.

CUDA-based Object Oriented Programming Techniques for Efficient Parallel Visualization of 3D Content (3차원 콘텐츠의 효율적인 병렬 시각화를 위한 CUDA 환경 기반 객체 지향 프로그래밍 기법)

  • Park, Tae-Jung
    • Journal of Digital Contents Society
    • /
    • v.13 no.2
    • /
    • pp.169-176
    • /
    • 2012
  • This paper presents a parallel object-oriented programming (OOP) platform for efficient visualization of three-dimensional content in CUDA environments. For this purpose, this paper discusses the features and limitations in implementing C++ object-oriented codes using CUDA and proposes the solutions. Also, it presents how to implement a 3D parallel visualization platform based on the MVC (Model/View/Controller) design pattern. Also, it provides sample implementations for integral MLS (iMLS) and signed distance fields (SDFs) based on the Marching Cubes and Raytracing. The proposed approach enables GPU parallel processing only by implementing simple interfaces. Based on this, developers can expect general benefits that are common in general OOP techniques including abstractization and inheritance. Though I implemented only two specific samples in this paper, I expect my approach can be widely applied to general computer graphics problems.

An Interference Coordination Technique Utilizing Sub-Arrays and Its Performance in Cellular Systems (부 어레이 빔포밍을 활용하는 간섭 제어 기법 및 셀룰러 시스템에서의 성능 평가)

  • Kang, Hosik;Lee, Donghyun;Sung, Wonjin
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.25 no.6
    • /
    • pp.653-663
    • /
    • 2014
  • To cope with an increasing amount of data traffic, research efforts are being made to maximize the data rate by reducing the interference between the transmission nodes. This paper also focuses on interference control schemes utilizing antenna sub-array beam-forming. The first scheme relies on horizontal beam rotation which utilizes three types of narrow beam patterns. Different beam patterns are applied to transmit signals in rotating fashion to control the interference. The second scheme is based on user-specific sub-array beamforming, which uses the precoding matrix based on users' location and controls the amount of interference in the multi-user environment. The performance of the proposed schemes is evaluated using the computer simulation to demonstrate the performance enhancement.

Workflow Pattern Extraction based on ACTA Formalism (ACTA 형식론에 기반한 워크플로우 패턴추출)

  • Lee Wookey;Bae Joonsoo;Jung Jae-yoon
    • Journal of KIISE:Databases
    • /
    • v.32 no.6
    • /
    • pp.603-615
    • /
    • 2005
  • As recent business environments are changed and become complex, a more efficient and effective business process management are needed. This paper proposes a new approach to the automatic execution of business processes using Event-Condition-Action (ECA) rules that can be automatically triggered by an active database. First of all, we propose the concept of blocks that can classify process flows into several patterns. A block is a minimal unit that can specify the behaviors represented in a process model. An algorithm is developed to detect blocks from a process definition network and transform it into a hierarchical tree model. The behaviors in each block type are modeled using ACTA formalism. This provides a theoretical basis from which ECA rules are identified. The proposed ECA rule-based approach shows that it is possible to execute the workflow using the active capability of database without users' intervention.

Personalized Search based on Community through Automatic Analysis of Query Patterns (질의어 패턴 자동분석을 통한 커뮤니티 기반 개인화 검색)

  • Park, Gun-Woo;Lee, Sang-Hoon
    • Journal of KIISE:Databases
    • /
    • v.36 no.4
    • /
    • pp.321-326
    • /
    • 2009
  • Since the existing Web search engines don't sufficiently reflect user's search intent, it is very difficult to find out accurate information that users want to find. Therefore, a lot of researches, study for personalized search, to enhance satisfaction of Web search results by analyzing search pattern and applying it to search are in progress in these days. Web searchers can more efficiently find information and easily obtain appropriate information through the personalized search. In this paper, we propose the personalized search based on community through the analysis of web users' query patterns and interest. Consequently, when applying query frequency, interest and community to web search, we are able to the confirm that the search results which hit to the search intent of the individual are provided.