• Title/Summary/Keyword: Level-set 기법

Search Result 363, Processing Time 0.022 seconds

A Cell Loss Constraint Method of Bandwidth Renegotiation for Prioritized MPEG Video Data Transmission in ATM Networks (ATM망에서 우선 순위가 주어진 MPEG 비디오 데이터 전송시 대역폭 재협상을 통한 셀 손실 방지 기법)

  • Yun, Byoung-An;Kim, Eun-Hwan;Jun, Moon-Seog
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1770-1780
    • /
    • 1997
  • Our problem is improvement of image quality because it is inevitable cell loss of image data when traffic congestion occurs. If cells are discarded indiscriminately in transmission of MPEG video data, it occurs severe degradation in quality of service(QOS). In this paper, to solve this problem, we propose two method. The first, we analyze the traffic characteristics of an MPEG encoder and generate high priority and low priority data stream. During network congestion, only the least low priority cells are dropped, and this ensures that the high priority cells are successfully transmitted, which, in turn, guarantees satisfactory QoS. In this case, the prioritization scheme for the encoder assigns components of the data stream to each priority level based on the value of a parameter ${\beta}$. The second, Number of high priority cells are increased when value of ${\beta}$ is large. It occurs the loss of high priority cell in the congestion. To prevent it, this paper is regulated to data stream rate as buffer occupancy with UPC controller. Therefore, encoder's bandwidth can be calculated renegotiation of the encoder and networks. In this paper, the encoder's bandwidth requirements are characterized by a usage parameter control (UPC) set consisting of peak rate, burstness, and sustained rate. An adaptive encoder rate control algorithm at the Networks Interface Card(NIC) computes the necessary UPC parameter to maintain the user specified quality of service. Simulation results are given for a rate-controlled VBR video encoder operating through an ATM network interface which supports dynamic UPC. These results show that dynamic bandwidth renegotiation of prioritized data stream could provided bandwidth saving and significant quality gains which guarantee high priority data stream.

  • PDF

Practical Quality Model for Measuring Service Performance in SOA (SOA 서비스 성능 측정을 위한 실용적 품질모델)

  • Oh, Sang-Hun;Choi, Si-Won;Kim, Soo-Dong
    • The KIPS Transactions:PartD
    • /
    • v.15D no.2
    • /
    • pp.235-246
    • /
    • 2008
  • Service-Oriented Architecture (SOA) is emerging as an effective approach for developing applications by dynamically discovering and composing reusable services. Generally, the benefits of SOA are known as low-development cost, high agility, high scalability, business level reuse, etc. However, a representative problem for widely applying SOA is the performance problem. This is caused by the nature of SOA such as service deployment and execution in distributed environment, heterogeneity of service platforms, use of a standard message format, etc. Therefore, performance problem has to be overcome to effectively apply SOA, and service performance has to be measured precisely to analyze where and why the problem has occurred. Prerequisite for this is a definition of a quality model to effectively measure service performance. However, current works on service performance lacks in defining a practical and precise quality model for measuring performance which adequately addresses the execution environment and features of SOA. Hence, in this paper, we define a quality model which includes a set of practical metrics for measuring service performance and an effective technique to measure the value of the proposed metrics. In addition, we apply the metrics for Hotel Reservation Service System (HRSS) to show the practicability and usefulness of the proposed metrics.

An Ontology - based Transformation Method from Feature Model to Class Model (온톨로지 기반 Feature 모델에서 Class 모델로의 변환 기법)

  • Kim, Dong-Ri;Song, Chee-Yang;Kang, Dong-Su;Baik, Doo-Kwon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.5
    • /
    • pp.53-67
    • /
    • 2008
  • At present, for reuse of similar domains between feature model and class model. researches of transformation at the model level and of transformation using ontology between two models are being made. but consistent transformation through metamodel is not made. And the factors of modeling transformation targets are not sufficient, and especially, automatic transformation algorithm and supporting tools are not provided so reuse of domains between models is not activated. This paper proposes a method of transformation from feature model to class model using ontology on the metamodel. For this, it re-establishes the metamodel of feature model, class model, and ontology, and it defines the properties of modelling factors for each metamodel. Based on the properties, it defines the profiles of transformation rules between feature mndel and ontology, and between ontology and class model, using set theory and propositional calculus. For automation of the transformation, it creates transformation algorithm and supporting tools. Using the proposed transformation rules and tools, real application is made through Electronic Approval System. Through this, it is possible to transform from the existing constructed feature model to the class model and to use it again for a different development method. Especially, it is Possible to remove ambiguity of semantic transformation using ontology, and automation of transformation maintains consistence between models.

  • PDF

Comparison of the flow estimation methods through GIUH rainfall-runoff model for flood warning system on Banseong stream (반성천 홍수경보 시스템을 위한 GIUH기반 한계홍수량 산정기법 비교연구)

  • Seong, Kiyoung;Ahn, Yujin;Lee, Taesam
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.5
    • /
    • pp.347-354
    • /
    • 2021
  • In the past few years, various damages have occurred in the vicinity of rivers due to flooding. In order to alleviate such flood damage, structural and non-structural measures are being established, and one of the important non-structural measures is to establish a flood warning system. In general, in order to establish a flood warning system, the water level of the flood alarm reference point is set, the critical flow corresponding thereto is calculated, and the warning precipitation amount corresponding to the critical flow is calculated through the Geomorphological Instantaneous Unit Hydrograph (GIUH) rainfall-runoff model. In particular, when calculating the critical flow, various studies have calculated the critical flow through the Manning formula. To compare the adequacy of this, in this study, the critical flow was calculated through the HEC-RAS model and compared with the value obtained from Manning's equation. As a result of the comparison, it was confirmed that the critical flow calculated by the Manning equation adopted excessive alarm precipitation values and lead a very high flow compared to the existing design precipitation. In contrast, the critical flow of HEC-RAS presented an appropriate alarm precipitation value and was found to be appropriate to the annual average alarm standard. From the results of this study, it seems more appropriate to calculate the critical flow through HEC-RAS, rather than through the existing Manning equation, in a situation where various river projects have been conducted resulting that most of the rivers have been surveyed.

An Investigation of Supporting North Korea Vocational Training by Interchange and Cooperation Scenarios (교류협력 단계별 북한 직업훈련 실행 시나리오 구축 방안)

  • Kim, So-young;Lee, Young-Min;Lee, Woo-Young
    • Journal of Practical Engineering Education
    • /
    • v.10 no.1
    • /
    • pp.73-79
    • /
    • 2018
  • The purpose of this study is to explore the supporting scenario to promote vocational training in North Korea in terms of cooperation level. To this end, we have embarked on a regional and industry based vocational training program by predicting the political and social situation of North Korea and staging three scenarios systematically. These scenarios were designed originally based on the Futures Group methodology. The first scenario is to establish a technical training center in one area, focusing on the electrical, electronics, and clothing sectors. The second scenario is to set up a pilot campus of vocational training college in one region by selecting the electric, electronic, and automobile industries as its main industries. The third scenario is to establish five vocational training college campuses in North Korea, focusing on electricity and electronics, IT manufacturing, telecommunications, heavy industry, and women-specialized industries. We suggested the followings: First, establishing goals and strategies for North Korean vocational training and establishing road maps. Second, the North Korean vocational training governance system needs to be established. Third, R & D infrastructure for vocational training needs to be established. Fourth, HRD and HRM system in North Korea vocational training field needs to be established. In addition, the role of public and private employment services centers to provide them should be strengthening.

A study on national cybersecurity policy agenda in Korea using national cyber capability assessment model (국가 사이버 역량평가 모델을 활용한 국내 사이버안보 정책 의제 도출 연구)

  • Song, Minkyoung;Bae, Sunha;Kim, So-Jeong
    • Journal of Digital Convergence
    • /
    • v.19 no.8
    • /
    • pp.89-100
    • /
    • 2021
  • The National Cyber Capability Assessment(NCCA) could be used as meaningful information for improving national cyber security policy because it provides information on the elements necessary for strengthening national cyber capabilities and the level of each country. However, there were few studies on improving cyber capabilities using the NCCA result in Korea. Therefore, we analyzed the result of National Cyber Power Index(NCPI) conducted by Belfer Center of Harvard Univ. by applying modified-IPA method to derive cybersecurity policy agendas for Korea. As a result, the need to set agendas on surveillance and offensive cyber capability and improve the effectiveness of policy implementation for intelligence and defense was drawn. Moreover, we suggested need for in-depth study of each policy agenda deduced from preceding research data as a future tasks. And it is expected to increase practical use of NCCA for domestic policy analysis by developing and using our own NCCA model which considered analysis framework proposed in this study.

Transaction Pattern Discrimination of Malicious Supply Chain using Tariff-Structured Big Data (관세 정형 빅데이터를 활용한 우범공급망 거래패턴 선별)

  • Kim, Seongchan;Song, Sa-Kwang;Cho, Minhee;Shin, Su-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.21 no.2
    • /
    • pp.121-129
    • /
    • 2021
  • In this study, we try to minimize the tariff risk by constructing a hazardous cargo screening model by applying Association Rule Mining, one of the data mining techniques. For this, the risk level between supply chains is calculated using the Apriori Algorithm, which is an association analysis algorithm, using the big data of the import declaration form of the Korea Customs Service(KCS). We perform data preprocessing and association rule mining to generate a model to be used in screening the supply chain. In the preprocessing process, we extract the attributes required for rule generation from the import declaration data after the error removing process. Then, we generate the rules by using the extracted attributes as inputs to the Apriori algorithm. The generated association rule model is loaded in the KCS screening system. When the import declaration which should be checked is received, the screening system refers to the model and returns the confidence value based on the supply chain information on the import declaration data. The result will be used to determine whether to check the import case. The 5-fold cross-validation of 16.6% precision and 33.8% recall showed that import declaration data for 2 years and 6 months were divided into learning data and test data. This is a result that is about 3.4 times higher in precision and 1.5 times higher in recall than frequency-based methods. This confirms that the proposed method is an effective way to reduce tariff risks.

3D Printing-Based Ultrafast Mixing and Injecting Systems for Time-Resolved Serial Femtosecond Crystallography (시간 분해 직렬 펨토초 결정학을 위한 3차원 프린팅 기반의 초고속 믹싱 및 인젝팅 시스템)

  • Ji, Inseo;Kang, Jeon-Woong;Kim, Taeyung;Kang, Min Seo;Kwon, Sun Beom;Hong, Jiwoo
    • Korean Chemical Engineering Research
    • /
    • v.60 no.2
    • /
    • pp.300-307
    • /
    • 2022
  • Time-resolved serial femtosecond crystallography (TR-SFX) is a powerful technique for determining temporal variations in the structural properties of biomacromolecules on ultra-short time scales without causing structure damage by employing femtosecond X-ray laser pulses generated by an X-ray free electron laser (XFEL). The mixing rate of reactants and biomolecule samples, as well as the hit rate between crystal samples and x-ray pulses, are critical factors determining TR-SFX performance, such as accurate image acquisition and efficient sample consumption. We here develop two distinct sample delivery systems that enable ultra-fast mixing and on-demand droplet injecting via pneumatic application with a square pulse signal. The first strategy relies on inertial mixing, which is caused by the high-speed collision and subsequent coalescence of droplets ejected through a double nozzle, while the second relies on on-demand pneumatic jetting embedded with a 3D-printed micromixer. First, the colliding behaviors of the droplets ejected through the double nozzle, as well as the inertial mixing within the coalesced droplets, are investigated experimentally and numerically. The mixing performance of the pneumatic jetting system with an integrated micromixer is then evaluated by using similar approaches. The sample delivery system devised in this work is very valuable for three-dimensional biomolecular structure analysis, which is critical for elucidating the mechanisms by which certain proteins cause disease, as well as searching for antibody drugs and new drug candidates.

Leision Detection in Chest X-ray Images based on Coreset of Patch Feature (패치 특징 코어세트 기반의 흉부 X-Ray 영상에서의 병변 유무 감지)

  • Kim, Hyun-bin;Chun, Jun-Chul
    • Journal of Internet Computing and Services
    • /
    • v.23 no.3
    • /
    • pp.35-45
    • /
    • 2022
  • Even in recent years, treatment of first-aid patients is still often delayed due to a shortage of medical resources in marginalized areas. Research on automating the analysis of medical data to solve the problems of inaccessibility for medical services and shortage of medical personnel is ongoing. Computer vision-based medical inspection automation requires a lot of cost in data collection and labeling for training purposes. These problems stand out in the works of classifying lesion that are rare, or pathological features and pathogenesis that are difficult to clearly define visually. Anomaly detection is attracting as a method that can significantly reduce the cost of data collection by adopting an unsupervised learning strategy. In this paper, we propose methods for detecting abnormal images on chest X-RAY images as follows based on existing anomaly detection techniques. (1) Normalize the brightness range of medical images resampled as optimal resolution. (2) Some feature vectors with high representative power are selected in set of patch features extracted as intermediate-level from lesion-free images. (3) Measure the difference from the feature vectors of lesion-free data selected based on the nearest neighbor search algorithm. The proposed system can simultaneously perform anomaly classification and localization for each image. In this paper, the anomaly detection performance of the proposed system for chest X-RAY images of PA projection is measured and presented by detailed conditions. We demonstrate effect of anomaly detection for medical images by showing 0.705 classification AUROC for random subset extracted from the PadChest dataset. The proposed system can be usefully used to improve the clinical diagnosis workflow of medical institutions, and can effectively support early diagnosis in medically poor area.

A Study on the Design Preference Survey for Development of Auxiliary Therapy Products Utilizing Music of Mild Cognitive Impairment (경도인지장애인의 음악을 활용한 보조 치료기기 제품개발을 위한 디자인 선호도 조사에 관한 연구)

  • Lee, Hae Goo
    • Korea Science and Art Forum
    • /
    • v.31
    • /
    • pp.355-365
    • /
    • 2017
  • The future population of Korea is expected to reach the second highest level in the world by 2060 for the elderly. It is because of the rapid development of low fertility and medical technology. The burden of society for the elderly is expected to increase steadily. The elderly person firstly appears functional disorder. They have low ability in memory and in cognitive will be. Their activities are therefore limited. And economic production capacity is sharply reduced. Self-sufficiency is a difficult situation. They need help in economic and social aspects. Products for them need research and development. The elderly have a Mild Cognitive Impairment(MCI) stage with poor cognitive abilities. It is effective to combine pharmacological and non-pharmacological treatment methods for people with mild cognitive impairment. The effects of non-pharmacological treatments on music have been proven. This paper is a study on the appearance from the viewpoint of design in the development of ancillary instruments using music therapy techniques with Digital Convergence. For this study, we investigated the preference for external appearance of mild cognitive impairment. Two times surveys were conducted. As a result, the design of home care product for the hard cognitive impaired was different from that of a conventional game machine or set top box. It should be designed according to the user's special circumstances. They are memory and cognitive abilities. Products that meet physical and mental changes must be developed.