• Title/Summary/Keyword: Internal Network Information

Search Result 505, Processing Time 0.027 seconds

Indoor Scene Classification based on Color and Depth Images for Automated Reverberation Sound Editing (자동 잔향 편집을 위한 컬러 및 깊이 정보 기반 실내 장면 분류)

  • Jeong, Min-Heuk;Yu, Yong-Hyun;Park, Sung-Jun;Hwang, Seung-Jun;Baek, Joong-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.3
    • /
    • pp.384-390
    • /
    • 2020
  • The reverberation effect on the sound when producing movies or VR contents is a very important factor in the realism and liveliness. The reverberation time depending the space is recommended in a standard called RT60(Reverberation Time 60 dB). In this paper, we propose a scene recognition technique for automatic reverberation editing. To this end, we devised a classification model that independently trains color images and predicted depth images in the same model. Indoor scene classification is limited only by training color information because of the similarity of internal structure. Deep learning based depth information extraction technology is used to use spatial depth information. Based on RT60, 10 scene classes were constructed and model training and evaluation were conducted. Finally, the proposed SCR + DNet (Scene Classification for Reverb + Depth Net) classifier achieves higher performance than conventional CNN classifiers with 92.4% accuracy.

A Design of ALE-compliant RFID Middleware System (ALE 기반 RFID 미들웨어 시스템 설계)

  • Hong, Yeon-Mi;Cho, Yoon-Sang;Byun, Ji-Woong;No, Young-Sik;Park, Sang-Yeol;Oh, Sang-Hyun;Byun, Yung-Cheol
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2006.11a
    • /
    • pp.469-473
    • /
    • 2006
  • Nowadays, to realize ubiquitous computing environment, many research activities have been going on within various kinds of research domains including automatic identification, sensor network, home network, telematics and so on. Especially, RFID middle-ware that supports the aggregation of RFID tag data, control and management, and the integration with legacy systems has recently gained a lot of attention. Meanwhile, EPCglobal defined an ALE(Application Level Events) standard specification, which exists between RFID readers and applications, and substitutes the previous systems called Savant. In the specification internal structures and implementation technologies of ALE are not mentioned and only external interfaces are defined. This approach easies the verification of standard compliance and inter-operability of the layer. In this paper, we present the design of ALE-compliant RFID middle-ware systems that process RFID tag data efficiently.

  • PDF

Asynchronous Message Delivery among Mobile Sensor Nodes in Stationary Sensor Node based Real-Time Location Systems (고정형 센서 노드 기준 위치인식 시스템에서 이동형 센서 노드 간 비동기 메시지 전송방법)

  • Kim, Woo-Jung;Jeong, Seol-Young;Kim, Tae-Hyon;Kang, Soon-Ju
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.2B
    • /
    • pp.148-158
    • /
    • 2011
  • Stationary nodes and mobile nodes co-exist wireless sensor network(WSN) can provide variety of new services. The stationary sensor node acts not only the gathering the environmental sensing data but also a access point to bidirectional communication with numerous mobile sensor nodes(mobile node), and the mobile sensor nodes are installed inside mobile objects and identify the location in real-time and monitor the internal status of the object. However, only using the legacy WSN protocol, it is impossible to set up the stable network due to the several reasons caused by the free-mobility of the mobile nodes. In this paper, we suggest three methods to increase the hit-ratio of the asynchronous message delivery(AMD) among mobile nodes. We verified the performance of the suggested methods under the stationary-mobile co-existed WSN testbed.

Implementation and performance evaluation of SS No.7 in B-ISDN networks (B-ISDN 망에서 공통선 신호 기능의 구현 및 성능 평가)

  • Rhee, Woo-Seop;Kim, Hwa-Suk;An, Yoon-Young;Kwon, Yool
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.5
    • /
    • pp.1397-1408
    • /
    • 1998
  • Service networks for the future communication networks will be combined by the B-ISDN networks. These service networks also will use SS No.7 as the signaling transport network for the control of user requriement service. Therefore, ITU-T recommended B-ISDN signaling layers for SS No.7 as a substitute for N-ISDN MTP signaling layer. In this paper, we propose the implementation structure and describe the characteristics and functions of each signaling layer of SS No.7, which are adapted to ATM switching system, and evaluate a performance. The structure of SSCOP transmission buffer using a linked list and an unit frame length is proposed for SAAL layer and the implementation structure and internal routing method according to the ATM switching system are also proposed for MTP-3b layer. Additionally, we propose the ISUP/B-ISUP level interworking structure using only associated mode, which are presented in the first stage of B-ISDN as the effective internatworking structure of SS No.7 for the circuit related signaling network between the existing N-ISDN networks and B-ISDN networks.

  • PDF

An Evaluation of Multimedia Data Downstream with PDA in an Infrastructure Network

  • Hong, Youn-Sik;Hur, Hye-Sun
    • Journal of Information Processing Systems
    • /
    • v.2 no.2
    • /
    • pp.76-81
    • /
    • 2006
  • A PDA is used mainly for downloading data from a stationary server such as a desktop PC in an infrastructure network based on wireless LAN. Thus, the overall performance depends heavily on the performance of such downloading with PDA. Unfortunately, for a PDA the time taken to receive data from a PC is longer than the time taken to send it by 53%. Thus, we measured and analyzed all possible factors that could cause the receiving time of a PDA to be delayed with a test bed system. There are crucial factors: the TCP window size, file access time of a PDA, and the inter-packet delay that affects the receiving time of a PDA. The window size of a PDA during the downstream is reduced dramatically to 686 bytes from 32,581 bytes. In addition, because flash memory is embedded into a PDA, writing data into the flash memory takes twice as long as reading the data from it. To alleviate these, we propose three distinct remedies: First, in order to keep the window size at a sender constant, both the size of a socket send buffer for a desktop PC and the size of a socket receive buffer for a PDA should be increased. Second, to shorten its internal file access time, the size of an application buffer implemented in an application should be doubled. Finally, the inter-packet delay of a PDA and a desktop PC at the application layer should be adjusted asymmetrically to lower the traffic bottleneck between these heterogeneous terminals.

Design Scheme of A Micro Real-Time Control System with CAN and RTOS (CAN과 RTOS를 내장한 소형 실시간 시스템 설계 기법)

  • Lim, Young-Gyu;Kim, Dong-Seoung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.5
    • /
    • pp.207-215
    • /
    • 2014
  • In this paper, we propose a Micro Real-Time Control System (MRTCS) for decreasing the delay during interrupts processing and data transfer on sensor nodes. The MRTCS consists of a control, sensor nodes based on Controller Area Network (CAN) device. The control node was designed with Real Time Operating System (RTOS) on top of the small Micro Control Unit (sMCU). Sensor nodes have the CAN device without sMCU, which have multiple Digital Inputs, Outputs (DI/DO) and the CAN controller. We have evaluated with OCTAVE v3.6.4 from open source for system performance. Simulation results show that the system performance was increased through the delay reducing for interrupt processing and internal data transfer. We verify that a proposed MRTCS approach will be adapted to various real-time control system.

An Optimal Design of a TDMA Baseband Modem for Relay Protocol (중계 프로토콜을 위한 TDMA 기저대역 중계모뎀의 최적 설계)

  • Bae, Yongwook;Ahn, Byoungchul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.6
    • /
    • pp.124-131
    • /
    • 2014
  • This paper describes a design of an adaptive baseband modem based on TDMA(time division multiple access) with a relay protocol function for wireless personal area networks. The designed baseband modem is controlled by a master synchronization signal and can be configured a relay network up to 14 hops. For efficient data relay communications, the internal buffer design is optimized by implementing a priority memory bus controller to a single port memory. And the priority memory bus controller is also designed to minimize the number of synthesized logic gates. To implement the synchronization function of the narrowband TDMA relay communication, the number of gates has been reduced by dividing the frame synchronization circuits and the network slot synchronization circuits. By using these methods, the number of gates are used about 37%(34,000 gates) on Xilinx FPGA XC6SLX9 which has 90,000 gates. For the 1024-bit frame size with a 32-bit synchronization word, the communication reception rate is 96.4%. The measured maximum transmission delay of the designed baseband modem is 230.4 msec for the 14-hop relay communication.

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.

Mutual Authentication Protocol for Safe Data Transmission of Multi-distributed Web Cluster Model (다중 분산 웹 클러스터모델의 안전한 데이터 전송을 위한 상호 인증 프로토콜)

  • Lee, Kee-Jun;Kim, Chang-Won;Jeong, Chae-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.731-740
    • /
    • 2001
  • Multi-distributed web cluster model expanding conventional cluster system is the cluster system which processes large-scaled work demanded from users with parallel computing method by building a number of system nodes on open network into a single imaginary network. Multi-distributed web cluster model on the structured characteristics exposes internal system nodes by an illegal third party and has a potential that normal job performance is impossible by the intentional prevention and attack in cooperative work among system nodes. This paper presents the mutual authentication protocol of system nodes through key division method for the authentication of system nodes concerned in the registration, requirement and cooperation of service code block of system nodes and collecting the results and then designs SNKDC which controls and divides symmetrical keys of the whole system nodes safely and effectively. SNKDC divides symmetrical keys required for performing the work of system nodes and the system nodes transmit encoded packet based on the key provided. Encryption packet given and taken between system nodes is decoded by a third party or can prevent the outflow of information through false message.

  • PDF

Correspondence Strategy for Big Data's New Customer Value and Creation of Business (빅 데이터의 새로운 고객 가치와 비즈니스 창출을 위한 대응 전략)

  • Koh, Joon-Cheol;Lee, Hae-Uk;Jeong, Jee-Youn;Kim, Kyung-Sik
    • Journal of the Korea Safety Management & Science
    • /
    • v.14 no.4
    • /
    • pp.229-238
    • /
    • 2012
  • Within last 10 years, internet has become a daily activity, and humankind had to face the Data Deluge, a dramatic increase of digital data (Economist 2012). Due to exponential increase in amount of digital data, large scale data has become a big issue and hence the term 'big data' appeared. There is no official agreement in quantitative and detailed definition of the 'big data', but the meaning is expanding to its value and efficacy. Big data not only has the standardized personal information (internal) like customer information, but also has complex data of external, atypical, social, and real time data. Big data's technology has the concept that covers wide range technology, including 'data achievement, save/manage, analysis, and application'. To define the connected technology of 'big data', there are Big Table, Cassandra, Hadoop, MapReduce, Hbase, and NoSQL, and for the sub-techniques, Text Mining, Opinion Mining, Social Network Analysis, Cluster Analysis are gaining attention. The three features that 'bid data' needs to have is about creating large amounts of individual elements (high-resolution) to variety of high-frequency data. Big data has three defining features of volume, variety, and velocity, which is called the '3V'. There is increase in complexity as the 4th feature, and as all 4features are satisfied, it becomes more suitable to a 'big data'. In this study, we have looked at various reasons why companies need to impose 'big data', ways of application, and advanced cases of domestic and foreign applications. To correspond effectively to 'big data' revolution, paradigm shift in areas of data production, distribution, and consumption is needed, and insight of unfolding and preparing future business by considering the unpredictable market of technology, industry environment, and flow of social demand is desperately needed.