• Title/Summary/Keyword: Computer Usage

Search Result 1,234, Processing Time 0.03 seconds

CLUSTER ANALYSIS FOR REGION ELECTRIC LOAD FORECASTING SYSTEM

  • Park, Hong-Kyu;Kim, Young-Il;Park, Jin-Hyoung;Ryu, Keun-Ho
    • Proceedings of the KSRS Conference
    • /
    • 2007.10a
    • /
    • pp.591-593
    • /
    • 2007
  • This paper is to cluster the AMR (Automatic Meter Reading) data. The load survey system has been applied to record the power consumption of sampling the contract assortment in KEPRI AMR. The effect of the contract assortment change to the customer power consumption is determined by executing the clustering on the load survey results. We can supply the power to customer according to usage to the analysis cluster. The Korea a class of the electricity supply type is less than other country. Because of the Korea electricity markets exists one electricity provider. Need to further divide of electricity supply type for more efficient supply. We are found pattern that is different from supplied type to customer. Out experiment use the Clementine which data mining tools.

  • PDF

A Study about Pipe inspection System for Computer Vision (컴퓨터 비젼을 이용한 파이프 검사시스템에 대한 연구)

  • 박찬호;이병룡;양순용;안경관;오현옥
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2002.10a
    • /
    • pp.521-525
    • /
    • 2002
  • In this paper, a computer-vision based pipe-inspection algorithm is developed. The algorithm uses the modified Hough transformation and a line-scanning approach to identify the edge line and radius of the pipe image, from which the eccentricity and dimension of the pipe-end is calculated. Line and circle detection was performed using Laplace operator with input image, which are acquired from the front and side cameras. In order to minimize the memory usage and the processing time, a clustering method with the modified Hough transformation for line detection. The dimension of inner and outer radius of pipe is calculated by proposed line-scanning method. The method scans several lines along the X and Y axes, calculating the eccentricity of inner and outer circle, by which pipes with wrong end-shape can be classified removed.

  • PDF

Energy-aware Multi-dimensional Resource Allocation Algorithm in Cloud Data Center

  • Nie, Jiawei;Luo, Juan;Yin, Luxiu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.9
    • /
    • pp.4320-4333
    • /
    • 2017
  • Energy-efficient virtual resource allocation algorithm has become a hot research topic in cloud computing. However, most of the existing allocation schemes cannot ensure each type of resource be fully utilized. To solve the problem, this paper proposes a virtual machine (VM) allocation algorithm on the basis of multi-dimensional resource, considering the diversity of user's requests. First, we analyze the usage of each dimension resource of physical machines (PMs) and build a D-dimensional resource state model. Second, we introduce an energy-resource state metric (PAR) and then propose an energy-aware multi-dimensional resource allocation algorithm called MRBEA to allocate resources according to the resource state and energy consumption of PMs. Third, we validate the effectiveness of the proposed algorithm by real-world datasets. Experimental results show that MRBEA has a better performance in terms of energy consumption, SLA violations and the number of VM migrations.

The Adaptive SPAM Mail Detection System using Clustering based on Text Mining

  • Hong, Sung-Sam;Kong, Jong-Hwan;Han, Myung-Mook
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.6
    • /
    • pp.2186-2196
    • /
    • 2014
  • Spam mail is one of the most general mail dysfunctions, which may cause psychological damage to internet users. As internet usage increases, the amount of spam mail has also gradually increased. Indiscriminate sending, in particular, occurs when spam mail is sent using smart phones or tablets connected to wireless networks. Spam mail consists of approximately 68% of mail traffic; however, it is believed that the true percentage of spam mail is at a much more severe level. In order to analyze and detect spam mail, we introduce a technique based on spam mail characteristics and text mining; in particular, spam mail is detected by extracting the linguistic analysis and language processing. Existing spam mail is analyzed, and hidden spam signatures are extracted using text clustering. Our proposed method utilizes a text mining system to improve the detection and error detection rates for existing spam mail and to respond to new spam mail types.

Analysis Performance Characterics of Dynamic Signature File Methods

  • Yoo, Jae-Soo;Choi, Kil-Seong;Kim, Myoung-Ho
    • Journal of Electrical Engineering and information Science
    • /
    • v.2 no.4
    • /
    • pp.37-45
    • /
    • 1997
  • With rapid increase of information requirements from various application areas, there has been much research on dynamic information storage structures that effectively support insertions, deletions and updates. In this appear we evaluate the performance of he existing dynamic signature file methods such as the S-tree, Quick Filter and HS file and provide guidelines for the most effective usage to a given operational environment. We derive analytic performance evaluation models of the storage structures based on retrieval time, storage overhead and insertion time. We also perform extensive experiments with various data distributions such as uniform, normal and exponential distributions. The relationships among various performance parameters are throughly investigated. We show through performance comparison based on analytic models and experiments that regardless of data distribution, the HS file significantly improves performance in both the retreival time and the storage overhead over S-tree and Quick Filter.

  • PDF

Correction of Text Character Skeleton for Effective Trajectory Recovery

  • Vu, Hoai Nam;Na, In Seop;Kim, Soo Hyung
    • International Journal of Contents
    • /
    • v.11 no.3
    • /
    • pp.7-13
    • /
    • 2015
  • One of the biggest problems of skeletonization is the occurrence of distortions at the junction point of the final binary image. At the junction area, a single point usually becomes a small stroke, and the corresponding trajectory task, as well as the OCR, consequently becomes more complicated. We therefore propose an adaptive post-processing method that uses an adaptive threshold technique to correct the distortions. Our proposed method transforms the distorted segments into a single point so that they are as similar to the original image as possible, and this improves the static handwriting images after the skeletonization process. Further, we attained promising results regarding the usage of the enhanced skeletonized images in other applications, thereby proving the expediency and efficiency of the proposed method.

Impediment to Device Utility Through the Constraint on USIM Card Usage Range (USIM 사용 범위 제한을 통한 장치 활용성의 저해)

  • Shin, Hyeon-Jun;Youn, Hee-Yong
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2014.01a
    • /
    • pp.349-352
    • /
    • 2014
  • 본 논문에서는 WCDMA, LTE에 이르기까지 USIM을 사용한 국내 이동통신서비스 시장에서 단말기정보를 사용하여 USIM에 의한 사용자 인증을 제한하여 이용자의 정상적인 통신서비스의 이용을 제한하는 현상이 벌어지고 있는것과 관련하여 국내에서 USIM을 사용하기 시작한 뒤부터 최근에 이르기까지 어떻게 이용자의 USIM 사용을 제한하여 장치 활용성을 저해하여 왔는지에 대한 방법과, 이로 인하여 유비쿼터스 컴퓨팅의 5-Any 중(中) 하나인 Any-Device성(性)을 저해하는 현상과 영향에 대하여 논한다.

  • PDF

A Study on the Factors in the use of Office Automation Information Technology (사무자동화 정보기술 이용의 영향요인에 관한 실증연구)

  • 곽두진;김성국;이정관
    • Journal of the Korea Society of Computer and Information
    • /
    • v.4 no.3
    • /
    • pp.121-129
    • /
    • 1999
  • The purpose of this study is to examine the effects of Critical Factors in the use of Personal Computer, Office Automation Information Technology. The author presents a therortical model related Office Automation Information Technology by end-users and suggests how this model should be conceptualized. A model was estimated with data from 98 end-users. The results revealed that degree of organizational support. demographic charateristic, and useful to the task was positively related to usage of Office Automation Information Technology.

Analysis and Optimal Control of Linear Time-delay Systems via Fast Walsh Transform (고속윌쉬변환에 의한 선형시지연계의 해석 및 최적제어)

  • Han, Sang-In;Lee, Myeong-Gyu;Kim, Jin-Tae;An, Du-Su
    • The Transactions of the Korean Institute of Electrical Engineers A
    • /
    • v.48 no.5
    • /
    • pp.601-606
    • /
    • 1999
  • A Walsh function method is proposed in this report for the analysis and optimal control of linear time-delay systems, which is based on the Picard's iterative approximation and fast Walsh transformation. In this research, the following results are obtained: 1) The differential and integral equation can be solved by transforming into a simple algebraic equation as it was possible with the usual orthogonal function method: 2) General orthogonal function methods require usage of Walsh operational matrices for delay or advance and many calculations of inverse matrices, which are not necessary in this method. Thus, the control problems of linear time-delay systems can be solved much faster and readily.

  • PDF