• Title/Summary/Keyword: Memory Problem

Search Result 1,086, Processing Time 0.026 seconds

Efficient Design of a Disaster Broadcasting System using LTE Modem (이동 LTE모뎀을 활용한 재난방송시스템 설계)

  • Moon, Chaeyoung;Kim, Semin;Ryoo, Kwangki
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.10a
    • /
    • pp.292-294
    • /
    • 2018
  • Recently, damage caused by natural disasters such as fire, earthquake, heavy rains and heavy snow is increasing. In addition, traffic accidents due to freezing, fog and fire in tunnels and bridges are frequently occurring. In such a disaster situation, it is very important to take prompt action by the person in charge of managing the facility and area.To this end, a disaster broadcasting system is used, but in the existing system, the broadcasting room and the speaker are connected by a wired connection. Also, the person in charge has to be in the broadcasting room to broadcast, which has a problem of delaying the time. In this paper, we design a disaster broadcasting system using LTE modem. The designed system enables a broadcasting person to make a call to a broadcasting system from anywhere using a cellular phone and a public telephone. Broadcasting via telephone is possible only with the telephone number pre-registered in the system and can be registered / deleted by the administrator. The registered telephone number, incoming voice file, and announcement voice for automatic broadcasting are stored in the system internal SD memory for convenient management. This disaster broadcasting system is expected to contribute to quick and convenient disaster broadcasting.

  • PDF

Dynamic Management of Equi-Join Results for Multi-Keyword Searches (다중 키워드 검색에 적합한 동등조인 연산 결과의 동적 관리 기법)

  • Lim, Sung-Chae
    • The KIPS Transactions:PartA
    • /
    • v.17A no.5
    • /
    • pp.229-236
    • /
    • 2010
  • With an increasing number of documents in the Internet or enterprises, it becomes crucial to efficiently support users' queries on those documents. In that situation, the full-text search technique is accepted in general, because it can answer uncontrolled ad-hoc queries by automatically indexing all the keywords found in the documents. The size of index files made for full-text searches grows with the increasing number of indexed documents, and thus the disk cost may be too large to process multi-keyword queries against those enlarged index files. To solve the problem, we propose both of the index file structure and its management scheme suitable to the processing of multi-keyword queries against a large volume of index files. For this, we adopt the structure of inverted-files, which are widely used in the multi-keyword searches, as a basic index structure and modify it to a hierarchical structure for join operations and ranking operations performed during the query processing. In order to save disk costs based on that index structure, we dynamically store in the main memory the results of join operations between two keywords, if they are highly expected to be entered in users' queries. We also do performance comparisons using a cost model of the disk to show the performance advantage of the proposed scheme.

Iterative Series Methods in 3-D EM Modeling (급수 전개법에 의한 3차원 전자탐사 모델링)

  • Cho In-Ky;Yong Hwan-Ho;Ahn Hee-Yoon
    • Geophysics and Geophysical Exploration
    • /
    • v.4 no.3
    • /
    • pp.70-79
    • /
    • 2001
  • The integral equation method is a powerful tool for numerical electromagnetic modeling. But the difficulty of this technique is the size of the linear equations, which demands excessive memory and calculation time to invert. This limitation of the integral equation method becomes critical in inverse problem. The conventional Born approximation, where the electric field in the anomalous body is approximated by the background field, is very rapid and easy to compute. However, the technique is inaccurate when the conductivity contrast between the body and the background medium is large. Quasi-linear, quasi-analytical and extended Born approximations are novel approaches to 3-D EM modeling based on the linearization of the integral equations for scattered EM field. These approximation methods are much less time consuming than full integral equation method and more accurate than conventional Born approximation. They we, however, still approximate methods for 3-D EM modeling. Iterative series methods such as modified Born, quasi-linear and quasi-analytical can be used to increase the accuracy of various approximation methods. Comparisons of numerical performance against a full integral equation and various approximation codes show that the iterative series methods are very accurate and almost always converge. Furthermore, they are very fast and easy to implement on a computer. In this study, extended Born series method is developed and it shows more accurate result than that of other series methods. Therefore, Iterative series methods, including extended Born series, open principally new possibilities for fast and accurate 3-D EM modeling and inversion.

  • PDF

Physical and Electrical Characteristics of SrBi$_2$Ta$_2$O$_9$ thin Films Etched with Inductively Coupled Plasma Reactive Ion Etching System (유도결합형 플라즈마 반응성 이온식각 장치를 이용한 SrBi$_2$Ta$_2$O$_9$ 박막의 물리적, 전기적 특성)

  • 권영석;심선일;김익수;김성일;김용태;김병호;최인훈
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.9 no.4
    • /
    • pp.11-16
    • /
    • 2002
  • In this study, the dry etching characteristics of $SrBi_2Ta_2O_9$ (SBT) thin films were investigated by using ICP-RIE (inductively coupled plasma-reactive ion etching). The etching damage and degradation were analyzed with XPS (X-ray photoelectron spectroscopy) and C-V (Capacitance-Voltage) measurement. The etching rate increased with increasing the ICP power and the capacitively coupled plasma (CCP) power. The etch rate of 900$\AA$/min was obtained with 700 W of ICP power and 200 W of CCP power. The main problem of dry etching is the degradation of the ferroelectric material. The damage-free etching characteristics were obtained with the $Ar/C1_2/CHF_3$ gas mixture of 20/14/2 when the ICP power and CCP power were biased at 700 W and 200 W, respectively. The experimental results show that the dry etching process with ICP-RIE is applicable to the fabrication of the single transistor type ferroelectric memory device.

  • PDF

Password-Based Authentication Protocol for Remote Access using Public Key Cryptography (공개키 암호 기법을 이용한 패스워드 기반의 원거리 사용자 인증 프로토콜)

  • 최은정;김찬오;송주석
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.1
    • /
    • pp.75-81
    • /
    • 2003
  • User authentication, including confidentiality, integrity over untrusted networks, is an important part of security for systems that allow remote access. Using human-memorable Password for remote user authentication is not easy due to the low entropy of the password, which constrained by the memory of the user. This paper presents a new password authentication and key agreement protocol suitable for authenticating users and exchanging keys over an insecure channel. The new protocol resists the dictionary attack and offers perfect forward secrecy, which means that revealing the password to an attacher does not help him obtain the session keys of past sessions against future compromises. Additionally user passwords are stored in a form that is not plaintext-equivalent to the password itself, so an attacker who captures the password database cannot use it directly to compromise security and gain immediate access to the server. It does not have to resort to a PKI or trusted third party such as a key server or arbitrator So no keys and certificates stored on the users computer. Further desirable properties are to minimize setup time by keeping the number of flows and the computation time. This is very useful in application which secure password authentication is required such as home banking through web, SSL, SET, IPSEC, telnet, ftp, and user mobile situation.

Development of T-commerce Processing Payment Module Using IC Credit Card(EMV) (IC신용카드(EMV)를 이용한 T-커머스 결제처리 모듈 개발)

  • Choi, Byoung-Kyu;Lee, Dong-Bok;Kim, Byung-Kon;Heu, Shin
    • The KIPS Transactions:PartA
    • /
    • v.19A no.1
    • /
    • pp.51-60
    • /
    • 2012
  • IC(Integrated circuits)card, generally be named smard card, embedded MPU(Micro Processor Unit) of small-size, memory, EEPROM, Card Operating System(COS) and security algorithm. The IC card is used in almost all industry such as a finance(credit, bank, stock etc.), a traffic, a communication, a medical, a electronic passport, a membership management and etc. Recently, a application field of IC card is on the increase by method for payments of T-commerce, as T-commerce is becoming a new growth engine of the broadcating industry by trend of broadcasting and telecommunication convergence, smart mechanization of TV. For example, we can pay in IC credit card(or IC cash card) on T-Commerce. or we can be provided TV banking service in IC cash card such as ATM. However, so far, T-commerce payment services have weakness in security such as storage and disclosure of card information as well as dropping sharply about custom ease because of taking advantage of card information input method using remote control. To solve this problem, This paper developed processing payment module for implementing TV electronic payment system using IC credit card payment standard, EMV.

Correlation between Subjective and Objective Cognitive-Linguistic Tests in Older Adults (정상 노년층의 인지-언어 능력에 대한 주-객관적 평가 간 상관성)

  • Lee, Mi-Sook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.5
    • /
    • pp.548-556
    • /
    • 2016
  • Cognitive-linguistic changes that normally accompany aging are often simply an annoyance, but in some instances they may herald a more perilous course of decline to a state of neurological disease. This study investigated the correlation between subjective and objective tests on cognitive-linguistic abilities in older adults and the predictors of objective performances. Healthy elders over 65 years of age (n=63) and their informants (n=63) completed the subjective and objective cognitive-linguistic tests (ISCOLE and CAPTBI) from July of 2015 to February of 2016. The main findings were as follows: performance on the self-report test was not significantly different from that on the informant-report test. Additionally, eight domains in older adults group and 15 domains in the informants group were significantly associated with performance on the objective test. Finally, language on the informant-report test was a predictor of several abilities including problem solving and memory on the informant-report test predicted executive function and language. The present study demonstrates that two groups have significant differences in correlation between subjective and objective tests on the cognitive-linguistic abilities, and there are more relevant domains in rating by informants. These findings have implications for the use of cognitive-linguistic evaluation and preventive intervention in clinical settings.

Application of MPI Technique for Distributed Rainfall-Runoff Model (분포형 강우유출모형 병렬화 처리기법 적용)

  • Chung, Sung-Young;Park, Jin-Hyeog;Hur, Young-Teck;Jung, Kwan-Sue
    • Journal of Korea Water Resources Association
    • /
    • v.43 no.8
    • /
    • pp.747-755
    • /
    • 2010
  • Distributed Models have relative weak points due to the amount of computer memory and calculation time required for calculating water flow using a numerical analysis based on kinematic wave theory when compared to the conceptual models used so far. Typically, the distributed models have been mainly applied to small basins. It was necessary to decrease the resolution of the grid to make it applicable for large scale watersheds, and because it would take up too much time to calculate using a higher resolution. That has been one of the more difficult factors in applying the model for actual work. In this paper, MPI (Message Passing Interface) technique was applied to solve the problem of calculation time as it is one of the demerits of the distributed model for performing physical and complicated numerical calculations for large scale watersheds. The comparison studies were performed a single domain and a divided small domain in Yongdam Dam watershed in case of typoon 'Ewiniar' at 2006. They were compared to analyze the application effects of parallelization technique. As a result, a maximum of 10 times the amount of calculation time was saved but keeping the level of quality for discharge by using parallelization code rather than a single processor.

Static Analysis Based on Backward Control Flow Graph Generation Method Model for Program Analysis (프로그램 분석을 위한 정적분석 기반 역추적 제어흐름그래프 생성 방안 모델)

  • Park, Sunghyun;Kim, Yeonsu;Noh, Bongnam
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1039-1048
    • /
    • 2019
  • Symbolic execution, an automatic search method for vulnerability verification, has been technically improved over the last few years. However, it is still not practical to analyze the program using only the symbolic execution itself. One of the biggest reasons is that because of the path explosion problem that occurs during program analysis, there is not enough memory, and you can not find the solution of all paths in the program using symbolic execution. Thus, it is practical for the analyst to construct a path for symbolic execution to a target with vulnerability rather than solving all paths. In this paper, we propose a static analysis - based backward CFG(Control Flow Graph) generation technique that can be used in symbolic execution for program analysis. With the creation of a backward CFG, an analyst can select potential vulnerable points, and the backward path generated from that point can be used for future symbolic execution. We conducted experiments with Linux binaries(x86), and indeed showed that potential vulnerability selection and backward CFG path generation were possible in a variety of binary situations.

Fire Detection using Deep Convolutional Neural Networks for Assisting People with Visual Impairments in an Emergency Situation (시각 장애인을 위한 영상 기반 심층 합성곱 신경망을 이용한 화재 감지기)

  • Kong, Borasy;Won, Insu;Kwon, Jangwoo
    • 재활복지
    • /
    • v.21 no.3
    • /
    • pp.129-146
    • /
    • 2017
  • In an event of an emergency, such as fire in a building, visually impaired and blind people are prone to exposed to a level of danger that is greater than that of normal people, for they cannot be aware of it quickly. Current fire detection methods such as smoke detector is very slow and unreliable because it usually uses chemical sensor based technology to detect fire particles. But by using vision sensor instead, fire can be proven to be detected much faster as we show in our experiments. Previous studies have applied various image processing and machine learning techniques to detect fire, but they usually don't work very well because these techniques require hand-crafted features that do not generalize well to various scenarios. But with the help of recent advancement in the field of deep learning, this research can be conducted to help solve this problem by using deep learning-based object detector that can detect fire using images from security camera. Deep learning based approach can learn features automatically so they can usually generalize well to various scenes. In order to ensure maximum capacity, we applied the latest technologies in the field of computer vision such as YOLO detector in order to solve this task. Considering the trade-off between recall vs. complexity, we introduced two convolutional neural networks with slightly different model's complexity to detect fire at different recall rate. Both models can detect fire at 99% average precision, but one model has 76% recall at 30 FPS while another has 61% recall at 50 FPS. We also compare our model memory consumption with each other and show our models robustness by testing on various real-world scenarios.