• Title/Summary/Keyword: Internet Based Laboratory

Search Result 495, Processing Time 0.026 seconds

A Novel Cross-Layer Dynamic Integrated Priority-Computing Scheme for 3G+ Systems

  • Wang, Weidong;Wang, Zongwen;Zhao, Xinlei;Zhang, Yinghai;Zhou, Yao
    • Journal of Communications and Networks
    • /
    • v.14 no.1
    • /
    • pp.15-20
    • /
    • 2012
  • As Internet protocol and wireless communications have developed, the number of different types of mobile services has increased gradually. Existing priority-computing schemes cannot satisfy the dynamic requirements of supporting multiple services in future wireless communication systems, because the currently used factors, mainly user priority, are relatively simple and lack relevancy. To solve this problem and provide the desired complexity, dynamic behavior, and fairness features of 3G and beyond 3G mobile communication systems, this paper proposes a novel cross-layer dynamic integrated priority-computing scheme that computes the priority based on a variety of factors, including quality of service requirements, subscriber call types, waiting time, movement mode, and traffic load from the corresponding layers. It is observed from simulation results that the proposed dynamic integrated priority scheme provides enhanced performance.

Implementation of data synchronization for local disks in Linux high availability system (리눅스 고가용 시스템에서 로컬 디스크 간 데이터 동기화 구현)

  • Park, seong-jong;Lee, cheol-hoo
    • Proceedings of the Korea Contents Association Conference
    • /
    • 2008.05a
    • /
    • pp.547-550
    • /
    • 2008
  • Recently, changes in the environment of user-centric internet service such as blog, UCC and IPTV and ubiquitous computing based on web service are needed to high availability system platform. High availability system is to provide safe service continuously even if system failure occurs in clustering system at the network. And it is necessary to synchronize data for reliable service in high availability system. In this paper, I implement DRBD(Disk Replicated Block Device) which is synchronization technique for data of local disks in high availability system.

  • PDF

Data-processing pipeline and database design for integrated analysis of mycoviruses

  • Je, Mikyung;Son, Hyeon Seok;Kim, Hayeon
    • International journal of advanced smart convergence
    • /
    • v.8 no.3
    • /
    • pp.115-122
    • /
    • 2019
  • Recent and ongoing discoveries of mycoviruses with new properties demand the development of an appropriate research infrastructure to analyze their evolution and classification. In particular, the discovery of negative-sense single-stranded mycoviruses is worth noting in genome types in which double-stranded RNA virus and positive-sense single-stranded RNA virus were predominant. In addition, some genomic properties of mycoviruses are more interesting because they have been reported to have similarities with the pathogenic virus family that infects humans and animals. Genetic information on mycoviruses continues to accumulate in public repositories; however, these databases have some difficulty reflecting the latest taxonomic information and obtaining specialized data for mycoviruses. Therefore, in this study, we developed a bioinformatics-based pipeline to efficiently utilize this genetic information. We also designed a schema for data processing and database construction and an algorithm to keep taxonomic information of mycoviruses up to date. The pipeline and database (termed 'mycoVDB') presented in this study are expected to serve as useful foundations for improving the accuracy and efficiency of future research on mycoviruses.

QoS Model for Supporting high Quality Multimedia Services (고품질의 멀티미디어 서비스 제공을 위한 QoS 모델)

  • Song, Myung-Won;Lim, In-Seub;Jung, Soon-Key
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.9B
    • /
    • pp.802-812
    • /
    • 2008
  • This paper proposes QoS Model which has tested and analyzed the capabilities of provisioning multimedia service in high speed Internet environment. We have tested quality measurement test for VoIP/MoIP, VoD, IPTV services and analyzed the level of QoS and QoS degradation by constructing test laboratory consisted of 46 subscribers which provided by 3 telecom operators. Besides, We propose QoS Model to apply for BcN application based on analysis result and prove proposed model by constructing test lab in KOREN environment. It is expected that telecom will use this results as a valuable information to construct All-IP network based on NGN(NGN:Next Generation Network).This paper proposes QoS Model which has tested and analyzed the capabilities of provisioning multimedia service in high speed Internet environment. It is expected that telecom will use this results as a valuable information to construct All-IP network based on NGN.

Design and Implementation of e-Logistics System supporting Efficient Moving Objects Trajectory Management (효율적인 차량 궤적 관리를 지원하는 물류관리시스템의 설계 및 구현)

  • Lee, Eung-Jae;Nam, Kwang-Woo;Ryu, Keun-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.9 no.2
    • /
    • pp.30-41
    • /
    • 2006
  • This paper proposes an e-logistics system supporting efficient vehicle moving trajectory management. Recent advances in wireless communications have given rise to a number of location-based services including logistics vehicle tracking, cellular phone user's location finding, and location-based commerce. Logistics systems typically entail tracking vehicles for purposes of the logistics center knowing the whereabouts of the vehicles and/or consignments. Moreover, storing and managing location trajectory of continuously moving vehicles and consignments is necessary for supporting efficient logistics plan and consignment. The proposed system is able to manage spatial objects in GIS as well as logistic information in the mobile environment. And for the efficiently managing and retrieving of transporting trajectory of logistics, we extend previous moving object indexing method, TB-Tree, to use multi-version framework and evaluate data updating performance. It is able to apply the proposed method to develop mobile contents services based on continuously changing location of moving object in the mobile environment.

  • PDF

Two person Interaction Recognition Based on Effective Hybrid Learning

  • Ahmed, Minhaz Uddin;Kim, Yeong Hyeon;Kim, Jin Woo;Bashar, Md Rezaul;Rhee, Phill Kyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.751-770
    • /
    • 2019
  • Action recognition is an essential task in computer vision due to the variety of prospective applications, such as security surveillance, machine learning, and human-computer interaction. The availability of more video data than ever before and the lofty performance of deep convolutional neural networks also make it essential for action recognition in video. Unfortunately, limited crafted video features and the scarcity of benchmark datasets make it challenging to address the multi-person action recognition task in video data. In this work, we propose a deep convolutional neural network-based Effective Hybrid Learning (EHL) framework for two-person interaction classification in video data. Our approach exploits a pre-trained network model (the VGG16 from the University of Oxford Visual Geometry Group) and extends the Faster R-CNN (region-based convolutional neural network a state-of-the-art detector for image classification). We broaden a semi-supervised learning method combined with an active learning method to improve overall performance. Numerous types of two-person interactions exist in the real world, which makes this a challenging task. In our experiment, we consider a limited number of actions, such as hugging, fighting, linking arms, talking, and kidnapping in two environment such simple and complex. We show that our trained model with an active semi-supervised learning architecture gradually improves the performance. In a simple environment using an Intelligent Technology Laboratory (ITLab) dataset from Inha University, performance increased to 95.6% accuracy, and in a complex environment, performance reached 81% accuracy. Our method reduces data-labeling time, compared to supervised learning methods, for the ITLab dataset. We also conduct extensive experiment on Human Action Recognition benchmarks such as UT-Interaction dataset, HMDB51 dataset and obtain better performance than state-of-the-art approaches.

Design of New Fine Dust Measurement Method applying LoG Edge Detection Technique (LoG 윤곽선 검출 기법을 적용한 새로운 미세먼지 측정 방법 설계)

  • Jang, Taek-Jin;Lin, Chi-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.69-73
    • /
    • 2022
  • In this paper, we propose a new method for measuring fine dust through a LoG(Laplacian of Gaussian)-based edge detection technique. CCTV-based images in a video are collected for fine dust measurement, and image ranges are designated through RoI(Region of Interest). After clustering by applying the GMM(Gaussian Mix Model) to the specified area, we detect edge through the LoG algorithm and measure the detected edge strength. The concentration of fine dust is determined based on the measured intensity data of the edge. In this paper, we propose algorithm as the effectiveness of experiment. As a result of collecting and applying CCTV image in the video installed around the laboratory of this school for a month from June to July, the measured result value was proved through this experiment to be sufficient to calculate the concentration and range of fine dust.

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

Object detection in financial reporting documents for subsequent recognition

  • Sokerin, Petr;Volkova, Alla;Kushnarev, Kirill
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.1-11
    • /
    • 2021
  • Document page segmentation is an important step in building a quality optical character recognition module. The study examined already existing work on the topic of page segmentation and focused on the development of a segmentation model that has greater functional significance for application in an organization, as well as broad capabilities for managing the quality of the model. The main problems of document segmentation were highlighted, which include a complex background of intersecting objects. As classes for detection, not only classic text, table and figure were selected, but also additional types, such as signature, logo and table without borders (or with partially missing borders). This made it possible to pose a non-trivial task of detecting non-standard document elements. The authors compared existing neural network architectures for object detection based on published research data. The most suitable architecture was RetinaNet. To ensure the possibility of quality control of the model, a method based on neural network modeling using the RetinaNet architecture is proposed. During the study, several models were built, the quality of which was assessed on the test sample using the Mean average Precision metric. The best result among the constructed algorithms was shown by a model that includes four neural networks: the focus of the first neural network on detecting tables and tables without borders, the second - seals and signatures, the third - pictures and logos, and the fourth - text. As a result of the analysis, it was revealed that the approach based on four neural networks showed the best results in accordance with the objectives of the study on the test sample in the context of most classes of detection. The method proposed in the article can be used to recognize other objects. A promising direction in which the analysis can be continued is the segmentation of tables; the areas of the table that differ in function will act as classes: heading, cell with a name, cell with data, empty cell.

Distributed Social Medical IoT for Monitoring Healthcare and Future Pandemics in Smart Cities

  • Mansoor Alghamdi;Sami Mnasri;Malek Alrashidi;Wajih Abdallah;Thierry Val
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.135-155
    • /
    • 2024
  • Urban public health monitoring in smart cities focuses on the control of conditions and health challenges in urban environments. Considering the rapid spread of diseases and pandemics, it is important for health authorities to trace people carrying the virus. In smart cities, this tracing must be interoperable and intelligent, especially in indoor surfaces characterized by small distances between people. Therefore, to fight pandemics, it is necessary to start with the already-existing digital equipment of the Internet of Things, such as connected objects and smartphones. In this study, the developed system is employed to provide a social IoT network and suggest a strategy which allows reliable traceability without threatening the privacy of users. This IoT-based system allows respecting the social distance between persons sharing public services in smart cities without applying smartphone applications or severe confinement. It also permits a return to normal life in case of viral pandemic and ensures the much-desired balance between economy and health. The present study analyses previous proposed social distance systems then, unlike these studies, suggests an intelligent and distributed IoT based strategy for positioning students. Two scenarios of static and dynamic optimization-based placement of Bluetooth Low Energy devices are proposed and an experimental study shows the contribution and complementarity of the introduced contact tracing strategy with the applications on smartphones.