• Title/Summary/Keyword: Information Transferring

Search Result 404, Processing Time 0.022 seconds

Design and Implementation of BNN based Human Identification and Motion Classification System Using CW Radar (연속파 레이다를 활용한 이진 신경망 기반 사람 식별 및 동작 분류 시스템 설계 및 구현)

  • Kim, Kyeong-min;Kim, Seong-jin;NamKoong, Ho-jung;Jung, Yun-ho
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.4
    • /
    • pp.211-218
    • /
    • 2022
  • Continuous wave (CW) radar has the advantage of reliability and accuracy compared to other sensors such as camera and lidar. In addition, binarized neural network (BNN) has a characteristic that dramatically reduces memory usage and complexity compared to other deep learning networks. Therefore, this paper proposes binarized neural network based human identification and motion classification system using CW radar. After receiving a signal from CW radar, a spectrogram is generated through a short-time Fourier transform (STFT). Based on this spectrogram, we propose an algorithm that detects whether a person approaches a radar. Also, we designed an optimized BNN model that can support the accuracy of 90.0% for human identification and 98.3% for motion classification. In order to accelerate BNN operation, we designed BNN hardware accelerator on field programmable gate array (FPGA). The accelerator was implemented with 1,030 logics, 836 registers, and 334.904 Kbit block memory, and it was confirmed that the real-time operation was possible with a total calculation time of 6 ms from inference to transferring result.

A Study on Transfer Convenience Evaluation Indicators for Urban Railway Stations (도시철도 역사의 환승 편의성 평가지표 연구)

  • Kim, Hwang Bae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.43 no.6
    • /
    • pp.793-799
    • /
    • 2023
  • This study classifies the types of urban railway stations that reflect the location characteristics of urban railway stations, the structure and form of station taxes, and the number of users, and the level of inconvenience in the transfer movement line for users by station type, the number and connectivity of transfer information, and the level of transfer convenience facilities. The number of installations, conflicts between users, and transfer information signs were analyzed. As a result of data analysis, it was found that the factors that cause the most inconvenience to urban rail users when transferring are the length and curvature of the transfer line, pedestrian density and number of passengers in the transfer passage, presence or absence of transportation convenience facilities, and the size and height of transfer information letters. These transfer inconveniences were objectified, quantified, and presented as evaluation indicators that can measure the transfer convenience of urban railway stations. Additionally, an evaluation scale was developed to measure the service level for each evaluation indicator. The evaluation scale for each indicator presented six levels by applying linear interpolation based on the maximum and minimum values of data derived through field surveys. However, it is judged that a comprehensive evaluation of transfer convenience that combines the importance and weight of each convenience evaluation indicator should be established through future research.

A Method for Reconstructing Original Images for Captions Areas in Videos Using Block Matching Algorithm (블록 정합을 이용한 비디오 자막 영역의 원 영상 복원 방법)

  • 전병태;이재연;배영래
    • Journal of Broadcast Engineering
    • /
    • v.5 no.1
    • /
    • pp.113-122
    • /
    • 2000
  • It is sometimes necessary to remove the captions and recover original images from video images already broadcast, When the number of images requiring such recovery is small, manual processing is possible, but as the number grows it would be very difficult to do it manually. Therefore, a method for recovering original image for the caption areas in needed. Traditional research on image restoration has focused on restoring blurred images to sharp images using frequency filtering or video coding for transferring video images. This paper proposes a method for automatically recovering original image using BMA(Block Matching Algorithm). We extract information on caption regions and scene change that is used as a prior-knowledge for recovering original image. From the result of caption information detection, we know the start and end frames of captions in video and the character areas in the caption regions. The direction for the recovery is decided using information on the scene change and caption region(the start and end frame for captions). According to the direction, we recover the original image by performing block matching for character components in extracted caption region. Experimental results show that the case of stationary images with little camera or object motion is well recovered. We see that the case of images with motion in complex background is also recovered.

  • PDF

Multi-hop Routing Protocol based on Neighbor Conditions in Multichannel Ad-hoc Cognitive Radio Networks (인지 무선 애드혹 네트워크에서의 주변 상황을 고려한 협력적 멀티홉 라우팅 방법)

  • Park, Goon-Woo;Choi, Jae-Kark;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.4A
    • /
    • pp.369-379
    • /
    • 2011
  • During the routing process between nodes on the CR(Cognitive Radio) network conducting for efficient use of limited frequency resources, spectrum handover process due to the appearance of the PU occupies most of the routing latency, and also decreases the reliability of the path. In this paper, a cooperative routing protocol in a multi-channel environment is proposed. The source node broadcasts a message with available channel lists and probability of PU appearance during its route guidance. The intermediate nodes re-transmit the message, received from the source node, and update and maintain the information, status table of the path. The destination node determines the optimal path and sends a reply message to the selected path after it receives the messages from the intermediate nodes. The average probability of the PU appearance and the average time of the PU appearance are updated while transferring data. During data transmission the channel with the lowest probability of appearance of the PU is selected dynamically and if a PU appears on the current channel partial repairment is performed. It is examined that reliability of the selected path considerably is improved and the routing cost is reduced significantly compared to traditional routing methods.

Design and Forensic Analysis of a Zero Trust Model for Amazon S3 (Amazon S3 제로 트러스트 모델 설계 및 포렌식 분석)

  • Kyeong-Hyun Cho;Jae-Han Cho;Hyeon-Woo Lee;Jiyeon Kim
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.2
    • /
    • pp.295-303
    • /
    • 2023
  • As the cloud computing market grows, a variety of cloud services are now reliably delivered. Administrative agencies and public institutions of South Korea are transferring all their information systems to cloud systems. It is essential to develop security solutions in advance in order to safely operate cloud services, as protecting cloud services from misuse and malicious access by insiders and outsiders over the Internet is challenging. In this paper, we propose a zero trust model for cloud storage services that store sensitive data. We then verify the effectiveness of the proposed model by operating a cloud storage service. Memory, web, and network forensics are also performed to track access and usage of cloud users depending on the adoption of the zero trust model. As a cloud storage service, we use Amazon S3(Simple Storage Service) and deploy zero trust techniques such as access control lists and key management systems. In order to consider the different types of access to S3, furthermore, we generate service requests inside and outside AWS(Amazon Web Services) and then analyze the results of the zero trust techniques depending on the location of the service request.

Treatment of upper and lower 3D printing CAD-CAM dentures using the POP (PNUD Occlusal Plane) Bow system, a prefabricated occlusal plane transfer device: A case report (조립식 교합 평면 인기 장치 POP (PNUD Occlusal Plane) Bow 시스템을 이용한 3D 프린팅 CAD-CAM 의치치료 증례)

  • Seol-Hwa Lee;Chang-Mo Jeong;Mi-Jung Yun;Jung-Bo Huh;So-Hyoun Lee
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.61 no.1
    • /
    • pp.44-54
    • /
    • 2023
  • In order to manufacture functional and esthetic prostheses, it is essential to accurately transmit information about the patient's occlusal plane. In particular, in the case of a completely edentulous patient, the occlusal plane is very important to correctly support the soft tissue, to achieve aesthetic harmony with the facial appearance, and to properly pronounce it, and to form a balanced occlusal relationship for stable mastication. In the conventional method, various facebow systems were used to transmit patient's information from the clinic to the laboratory, but there were several limitations in the process of transferring them to CAD. To simplify this process, a prefabricated POP (PNUD Occlusal Plane) Bow system was recently developed. In this case, a CAD-CAM (Computer-aided design-computer-aided manufacturing) treatment dentures reflecting the patient's occlusal plane information was manufactured using the POP Bow system during the treatment of a completely edentulous patient, and aesthetic and functional satisfaction was obtained.

Adaptive Design Techniques for High-speed Toggle 2.0 NAND Flash Interface Considering Dynamic Internal Voltage Fluctuations (고속 Toggle 2.0 낸드 플래시 인터페이스에서 동적 전압 변동성을 고려한 설계 방법)

  • Yi, Hyun Ju;Han, Tae Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.49 no.9
    • /
    • pp.251-258
    • /
    • 2012
  • Recently, NAND Flash memory structure is evolving from SDR (Single Data Rate) to high speed DDR(Double Data Rate) to fulfill the high performance requirement of SSD and SSS. Accordingly, the proper ways of transferring data that latches valid data stably and minimizing data skew between pins by using PHY(Physical layer) circuit techniques have became new issues. Also, rapid growth of speed in NAND flash increases the operating frequency and power consumption of NAND flash controller. Internal voltage variation margin of NAND flash controller will be narrowed through the smaller geometry and lower internal operating voltage below 1.5V. Therefore, the increase of power budge deviation limits the normal operation range of internal circuit. Affection of OCV(On Chip Variation) deteriorates the voltage variation problem and thus causes internal logic errors. In this case, it is too hard to debug, because it is not functional faults. In this paper, we propose new architecture that maintains the valid timing window in cost effective way under sudden power fluctuation cases. Simulation results show that the proposed technique minimizes the data skew by 379% with reduced area by 20% compared to using PHY circuits.

The research of new Multimedia design developmenton Internet(Focus on the layout) (인터넷에서의 뉴멀티미디어 디자인 개발에 관한 연구 -레이아웃을 중심으로-)

  • 류성현;신계옥;이은주;이현주;배경선
    • Archives of design research
    • /
    • v.20
    • /
    • pp.111-120
    • /
    • 1997
  • Recently, rapidly increasing internet Websites are providing us with the new kinds of multimedia informations without borders acting as the center for exchanging informations. Such new media informations through the internet passes informations via light on the monitor and provides the various informations, with the differentiation from the traditional printing media, it can be searched with electronic commands in limited space. In the process of adapting the new technologies, new media has successfully responded to the fast change and the development of its needs by experiencing the trials and errors, steadily establishing the stable position with its new information transferring and exchanging methods. The representative hompage of websites of information transformations means the first page containing no lower directories and consist of titles, icons, symbols and addresses and can design them in consideration of graphical process, planning, contents and others. Such hompages are very important since the graphical images shows its visual expressions deciding the total meanings of the hompages. In this research, we have analyzed the visual factors of frequencies, ratio of areas, distributions, alignment methodologies on layouts of hompages consisting titles, icons, contents and symbols, etc. from randomly picked samples of 161 hompages of websites in the internets of various areas. Generally, the homepages are designed with graphical expressions in personal way and the feedbacks and responses of such may differs, but we think, this can be used as reference materials for the analysis of new media in objective way. Also, it can be used as the base informations for arrangement and planning of designs with the characteristics of graphics and Graphic User Interfaces in the background which are implemented over internet.

  • PDF

A Study on a Real Time Presentation Method for Playing of a Multimedia mail on Internet (인터넷상의 동영상 메일을 재생하기 위한 실시간 연출 기법 연구)

  • Im, Yeong-Hwan;Lee, Seon-Hye
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.877-890
    • /
    • 1999
  • In this paper, a multimedia mail including video, sound, graphic data has been proposed as the next generation mail of the text based mail. In order to develop the multimedia mail, the most outstanding problem is the fact that the multimedia data are too huge to send them to the receiving end directly. The fact of big data may cause many problems in both transferring and storing the data of the multimedia mail. Our main idea is to separate between a control program for the multimedia presentation and multimedia data. Since the size of a control program is as small as a plain text mail, it has no problem to send it attached to the internet mail to the receiver directly. Instead, the big multimedia data themselves may remain on the sender's computer or be sent to a designated server so that the data may be transferred to the receiver only when the receiver activates the play of the multimedia mail. In this scheme, our research focus is paced on the buffer management and the thread scheduling for the real time play of the multimedia mail on internet. Another problem is to provide an easy way of editing a multimedia presentation for an ordinary people having no programming knowledge. For the purposed, VIP(Visual Interface Player) has been used and the results or multimedia mail implemented on LAN has been described.

  • PDF

Routing for Enhancing Source-Location Privacy with Low Delivery Latency in Sensor Networks (센서 네트워크에서 낮은 전달 지연으로 근원지 위치 기밀을 강화하는 라우팅)

  • Tscha, Yeong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.8B
    • /
    • pp.636-645
    • /
    • 2008
  • Most of routing schemes that protect the source's location from a malicious attacker usually make use of a path of a long length per message for the sake of lengthening the safety period. The biggest problem to such approaches is taking a very long latency in transferring messages to the destination. In this paper we show the problem to find the least-cost single path that is enough to keep the source-location always secure from the attacker, provided that it is used for the delivery of a set of messages given in priori, is NP-complete. Consequently we propose a routing protocol GSLP-w(GPSR-based Source-Location Privacy with crew size co) that is a trade-off between two extreme approaches. The advantage of GSLP-co lies in its enhanced safety period for the source and its lowered delivery latency in messaging. We consider NSP(Normalized Sefety Period) and NDL(Normalized Delivery Latency), measured in terms of the least number of hops to the destination, to achieve tangible interpretation of the results. We ran a simulation to confirm our claim by generating 100 topologies of 50,000 nodes with the average number of neighbors being 8. The results show that GSLP-$\omega$ provides more enhanced NSP compared to other protocols GSLP, an earlier version of GSLP-$\omega$, and PR-SP(Phantom Routing - Single Path), the most notable existing protocol for the source-location privacy, and less NDL than that of GSLP but more than that of PR-SP.