• Title/Summary/Keyword: Effective Uses

Search Result 1,666, Processing Time 0.027 seconds

Salt and Pepper Noise Removal Algorithm based on Euclidean Distance Weight (유클리드 거리 가중치를 기반한 Salt and Pepper 잡음 제거 알고리즘)

  • Chung, Young-Su;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.11
    • /
    • pp.1637-1643
    • /
    • 2022
  • In recent years, the demand for image-processing technology in digital marketing has increased due to the expansion and diversification of the digital market, such as video, security, and machine intelligence. Noise-processing is essential for image-correction and reconstruction, especially in the case of sensitive noises, such as in CT, MRI, X-ray, and scanners. The two main salt and pepper noises have been actively studied, but the details and edges are still unsatisfactory and tend to blur when there is a lot of noise. Therefore, this paper proposes an algorithm that applies a weight-based Euclidean distance equation to the partial mask and uses only the non-noisy pixels that are the most similar to the original as effective pixels. The proposed algorithm determines the type of filter based on the state of the internal pixels of the designed partial mask and the degree of mask deterioration, which results in superior noise cancellation even in highly damaged environments.

A Baltic Dry Index Prediction using Deep Learning Models

  • Bae, Sung-Hoon;Lee, Gunwoo;Park, Keun-Sik
    • Journal of Korea Trade
    • /
    • v.25 no.4
    • /
    • pp.17-36
    • /
    • 2021
  • Purpose - This study provides useful information to stakeholders by forecasting the tramp shipping market, which is a completely competitive market and has a huge fluctuation in freight rates due to low barriers to entry. Moreover, this study provides the most effective parameters for Baltic Dry Index (BDI) prediction and an optimal model by analyzing and comparing deep learning models such as the artificial neural network (ANN), recurrent neural network (RNN), and long short-term memory (LSTM). Design/methodology - This study uses various data models based on big data. The deep learning models considered are specialized for time series models. This study includes three perspectives to verify useful models in time series data by comparing prediction accuracy according to the selection of external variables and comparison between models. Findings - The BDI research reflecting the latest trends since 2015, using weekly data from 1995 to 2019 (25 years), is employed in this study. Additionally, we tried finding the best combination of BDI forecasts through the input of external factors such as supply, demand, raw materials, and economic aspects. Moreover, the combination of various unpredictable external variables and the fundamentals of supply and demand have sought to increase BDI prediction accuracy. Originality/value - Unlike previous studies, BDI forecasts reflect the latest stabilizing trends since 2015. Additionally, we look at the variation of the model's predictive accuracy according to the input of statistically validated variables. Moreover, we want to find the optimal model that minimizes the error value according to the parameter adjustment in the ANN model. Thus, this study helps future shipping stakeholders make decisions through BDI forecasts.

Pest Prediction in Rice using IoT and Feed Forward Neural Network

  • Latif, Muhammad Salman;Kazmi, Rafaqat;Khan, Nadia;Majeed, Rizwan;Ikram, Sunnia;Ali-Shahid, Malik Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.133-152
    • /
    • 2022
  • Rice is a fundamental staple food commodity all around the world. Globally, it is grown over 167 million hectares and occupies almost 1/5th of total cultivated land under cereals. With a total production of 782 million metric tons in 2018. In Pakistan, it is the 2nd largest crop being produced and 3rd largest food commodity after sugarcane and rice. The stem borers a type of pest in rice and other crops, Scirpophaga incertulas or the yellow stem borer is very serious pest and a major cause of yield loss, more than 90% damage is recorded in Pakistan on rice crop. Yellow stem borer population of rice could be stimulated with various environmental factors which includes relative humidity, light, and environmental temperature. Focus of this study is to find the environmental factors changes i.e., temperature, relative humidity and rainfall that can lead to cause outbreaks of yellow stem borers. this study helps to find out the hot spots of insect pest in rice field with a control of farmer's palm. Proposed system uses temperature, relative humidity, and rain sensor along with artificial neural network to predict yellow stem borer attack and generate warning to take necessary precautions. result shows 85.6% accuracy and accuracy gradually increased after repeating several training rounds. This system can be good IoT based solution for pest attack prediction which is cost effective and accurate.

Lifetime Escalation and Clone Detection in Wireless Sensor Networks using Snowball Endurance Algorithm(SBEA)

  • Sathya, V.;Kannan, Dr. S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.4
    • /
    • pp.1224-1248
    • /
    • 2022
  • In various sensor network applications, such as climate observation organizations, sensor nodes need to collect information from time to time and pass it on to the recipient of information through multiple bounces. According to field tests, this information corresponds to most of the energy use of the sensor hub. Decreasing the measurement of information transmission in sensor networks becomes an important issue.Compression sensing (CS) can reduce the amount of information delivered to the network and reduce traffic load. However, the total number of classification of information delivered using pure CS is still enormous. The hybrid technique for utilizing CS was proposed to diminish the quantity of transmissions in sensor networks.Further the energy productivity is a test task for the sensor nodes. However, in previous studies, a clustering approach using hybrid CS for a sensor network and an explanatory model was used to investigate the relationship between beam size and number of transmissions of hybrid CS technology. It uses efficient data integration techniques for large networks, but leads to clone attacks or attacks. Here, a new algorithm called SBEA (Snowball Endurance Algorithm) was proposed and tested with a bow. Thus, you can extend the battery life of your WSN by running effective copy detection. Often, multiple nodes, called observers, are selected to verify the reliability of the nodes within the network. Personal data from the source centre (e.g. personality and geographical data) is provided to the observer at the optional witness stage. The trust and reputation system is used to find the reliability of data aggregation across the cluster head and cluster nodes. It is also possible to obtain a mechanism to perform sleep and standby procedures to improve the life of the sensor node. The sniffers have been implemented to monitor the energy of the sensor nodes periodically in the sink. The proposed algorithm SBEA (Snowball Endurance Algorithm) is a combination of ERCD protocol and a combined mobility and routing algorithm that can identify the cluster head and adjacent cluster head nodes.This algorithm is used to yield the network life time and the performance of the sensor nodes can be increased.

Numerical Formulation of Thermo-Hydro-Mechanical Interface Element (열-수리-역학 거동 해석을 위한 경계면 요소의 수식화)

  • Shin, Hosung;Yoon, Seok
    • Journal of the Korean Geotechnical Society
    • /
    • v.38 no.9
    • /
    • pp.45-52
    • /
    • 2022
  • Because discontinuity in the rock mass and contact of soil-structure interaction exhibits coupled thermal-hydromechanical (THM) behavior, it is necessary to develop an interface element based on the full governing equations. In this study, we derive force equilibrium, fluid continuity, and energy equilibrium equations for the interface element. Additionally, we present a stiffness matrix of the elastoplastic mechanical model for the interface element. The developed interface element uses six nodes for displacement and four nodes for water pressure and temperature in a two-dimensional analysis. The fully coupled THM analysis for fluid injection into a fault can model the complicated evolution of injection pressure due to decreasing effective stress in the fault and thermal contraction of the surrounding rock mass. However, the result of hydromechanical analysis ignoring thermal phenomena overestimates hydromechanical variables.

Hybrid Transmitter Design for Massive MIMO Systems (대용량 MIMO 시스템을 위한 하이브리드 송신기 설계)

  • Seo, Bangwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.3
    • /
    • pp.49-55
    • /
    • 2022
  • In the next generation mobile communication systems, hybrid massive multiple-input multiple output (MIMO) can be used to highly improve an achievable rate without increasing the number of RF chains. Recently, successive-interference-cancellation (SIC) based hybrid precoder design scheme was proposed to reduce the complexity. However, since this scheme uses simple diagonal matrix for baseband precoding, it cannot solve an interference problem between the transmitted streams. Also, there is a limitation for improving the data rate because of the use of one phase shifter for analog precoding. To solve these problems, in this paper we propose a digital precoding based on the SVD of the effective channel and an analog precoding using two phase shifters. Through simulation, we show that the proposed scheme has better achievable rate and SINR performances than the conventional one.

WiFi CSI Data Preprocessing and Augmentation Techniques in Indoor People Counting using Deep Learning (딥러닝을 활용한 실내 사람 수 추정을 위한 WiFi CSI 데이터 전처리와 증강 기법)

  • Kim, Yeon-Ju;Kim, Seungku
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1890-1897
    • /
    • 2021
  • People counting is an important technology to provide application services such as smart home, smart building, smart car, etc. Due to the social distancing of COVID-19, the people counting technology attracted public attention. People counting system can be implemented in various ways such as camera, sensor, wireless, etc. according to service requirements. People counting system using WiFi AP uses WiFi CSI data that reflects multipath information. This technology is an effective solution implementing indoor with low cost. The conventional WiFi CSI-based people counting technologies have low accuracy that obstructs the high quality service. This paper proposes a deep learning people counting system based on WiFi CSI data. Data preprocessing using auto-encoder, data augmentation that transform WiFi CSI data, and a proposed deep learning model improve the accuracy of people counting. In the experimental result, the proposed approach shows 89.29% accuracy in 6 subjects.

Comparison of encryption algorithm performance between low-spec IoT devices (저 사양 IoT 장치간의 암호화 알고리즘 성능 비교)

  • Park, Jung Kyu;Kim, Jaeho
    • Journal of Internet of Things and Convergence
    • /
    • v.8 no.1
    • /
    • pp.79-85
    • /
    • 2022
  • Internet of Things (IoT) connects devices with various platforms, computing power, and functions. Due to the diversity of networks and the ubiquity of IoT devices, demands for security and privacy are increasing. Therefore, cryptographic mechanisms must be strong enough to meet these increased requirements, while at the same time effective enough to be implemented in devices with long-range specifications. In this paper, we present the performance and memory limitations of modern cryptographic primitives and schemes for different types of devices that can be used in IoT. In addition, detailed performance evaluation of the performance of the most commonly used encryption algorithms in low-spec devices frequently used in IoT networks is performed. To provide data protection, the binary ring uses encryption asymmetric fully homomorphic encryption and symmetric encryption AES 128-bit. As a result of the experiment, it can be seen that the IoT device had sufficient performance to implement a symmetric encryption, but the performance deteriorated in the asymmetric encryption implementation.

Ensuring the Quality of Higher Education in the United Kingdom Using Informatization

  • Andreikova, Iryna;Moiseienko, Natalia;Boichuk, Petro;Iliichuk, Liubomyra;Fedchenko, Karina;Bezliudnyi, Oleksandr;Sopivnyk, Ruslan
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.11
    • /
    • pp.324-330
    • /
    • 2022
  • The United Kingdom is known for the quality of its qualifications. There is a strict quality system with reputable bodies responsible for ensuring that high quality standards are met. In order for new qualifications to be accredited, they must meet all the requirements set out in the regulations for the quality and informatization of Education. The crucial role of the Agency for Quality Assurance of Higher Education (QAA) in the UK for creating high-quality management of higher education institutions is revealed, the influence of informatization tools on its effective mechanism as an independent entity is shown, and positive experience for the educational sector is highlighted. While the universities themselves are responsible for reviewing educational programs at the subject level, the QAA review focuses on verifying internal quality assurance, as well as systems and improvement strategies. The QAA uses a peer review process in which teams mostly consist of academic staff from other institutions to assess the quality of the institution's education. In Scotland, the team also includes an international reviewer. The student is also a member of the Scottish teams. In the UK, attention is paid to providing a cohort of experienced reviewers who can conduct high-quality monitoring and help with advice on improving education. All reviewers must complete training and have permission to participate in the review of educational programs. There are selected committees that are members of the QAA council, each of which is headed by a member of the Council or an independent person approved by the Council. Attention is drawn to the main areas of the QAA's work in the framework of environmental, social and corporate governance.

Contact Tracking Development Trend Using Bibliometric Analysis

  • Li, Chaoqun;Chen, Zhigang;Yu, Tongrui;Song, Xinxia
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.359-373
    • /
    • 2022
  • The new crown pneumonia (COVID-19) has become a global epidemic. The disease has spread to most countries and poses a challenge to the healthcare system. Contact tracing technology is an effective way for public health to deal with diseases. Many experts have studied traditional contact tracing and developed digital contact tracking. In order to better understand the field of contact tracking, it is necessary to analyze the development of contact tracking in the field of computer science by bibliometrics. The purpose of this research is to use literature statistics and topic analysis to characterize the research literature of contact tracking in the field of computer science, to gain an in-depth understanding of the literature development status of contact tracking and the trend of hot topics over the past decade. In order to achieve the aforementioned goals, we conducted a bibliometric study in this paper. The study uses data collected from the Scopus database. Which contains more than 10,000 articles, including more than 2,000 in the field of computer science. For popular trends, we use VOSviewer for visual analysis. The number of contact tracking documents published annually in the computer field is increasing. At present, there are 200 to 300 papers published in the field of computer science each year, and the number of uncited papers is relatively small. Through the visual analysis of the paper, we found that the hot topic of contact tracking has changed from the past "mathematical model," "biological model," and "algorithm" to the current "digital contact tracking," "privacy," and "mobile application" and other topics. Contact tracking is currently a hot research topic. By selecting the most cited papers, we can display high-quality literature in contact tracking and characterize the development trend of the entire field through topic analysis. This is useful for students and researchers new to field of contact tracking ai well as for presenting our results to other subjects. Especially when comprehensive research cannot be conducted due to time constraints or lack of precise research questions, our research analysis can provide value for it.