• 제목/요약/키워드: Network Visibility

Search Result 113, Processing Time 0.024 seconds

The Establishment of Walking Energy-Weighted Visibility ERAM Model to Analyze the 3D Vertical and Horizontal Network Spaces in a Building (3차원 수직·수평 연결 네트워크 건축 공간분석을 위한 보행에너지 가중 Visibility ERAM 모델 구축)

  • Choi, Sung-Pil;Piao, Gen-Song;Choi, Jae-Pil
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.11
    • /
    • pp.23-32
    • /
    • 2018
  • The purpose of this study is to establish a walking energy weighted ERAM model that can predict the pedestrian volume by the connection structure of the vertical and horizontal spaces within a three-dimensional building. The process of building a walking-energy weighted ERAM model is as follows. First, the spatial graph was used to reproduce three-dimensional buildings with vertical and horizontal spatial connection structures. Second, the walking energy was measured on the spatial graph. Third, ERAM model was used to apply weights with spatial connection properties in random walking environment, and the walking energy weights were applied to the ERAM model to calculate the walk energy weighted ERAM values and visualize the distribution of pedestrian flow. To verify the validation of the established model, existing and proposed spatial analysis models were compared to real space. The results of this study are as follows : The model proposed in this study showed as much elaborated estimation of pedestrian traffic flow in real space as in traditional spatial analysis models, and also it showed much higher level of forecasting pedestrian traffic flow in real space than existing models.

Single Image-based Enhancement Techniques for Underwater Optical Imaging

  • Kim, Do Gyun;Kim, Soo Mee
    • Journal of Ocean Engineering and Technology
    • /
    • v.34 no.6
    • /
    • pp.442-453
    • /
    • 2020
  • Underwater color images suffer from low visibility and color cast effects caused by light attenuation by water and floating particles. This study applied single image enhancement techniques to enhance the quality of underwater images and compared their performance with real underwater images taken in Korean waters. Dark channel prior (DCP), gradient transform, image fusion, and generative adversarial networks (GAN), such as cycleGAN and underwater GAN (UGAN), were considered for single image enhancement. Their performance was evaluated in terms of underwater image quality measure, underwater color image quality evaluation, gray-world assumption, and blur metric. The DCP saturated the underwater images to a specific greenish or bluish color tone and reduced the brightness of the background signal. The gradient transform method with two transmission maps were sensitive to the light source and highlighted the region exposed to light. Although image fusion enabled reasonable color correction, the object details were lost due to the last fusion step. CycleGAN corrected overall color tone relatively well but generated artifacts in the background. UGAN showed good visual quality and obtained the highest scores against all figures of merit (FOMs) by compensating for the colors and visibility compared to the other single enhancement methods.

A Study of Perception of Golfwear Using Big Data Analysis (빅데이터를 활용한 골프웨어에 관한 인식 연구)

  • Lee, Areum;Lee, Jin Hwa
    • Fashion & Textile Research Journal
    • /
    • v.20 no.5
    • /
    • pp.533-547
    • /
    • 2018
  • The objective of this study is to examine the perception of golfwear and related trends based on major keywords and associated words related to golfwear utilizing big data. For this study, the data was collected from blogs, Jisikin and Tips, news articles, and web $caf{\acute{e}}$ from two of the most commonly used search engines (Naver & Daum) containing the keywords, 'Golfwear' and 'Golf clothes'. For data collection, frequency and matrix data were extracted through Textom, from January 1, 2016 to December 31, 2017. From the matrix created by Textom, Degree centrality, Closeness centrality, Betweenness centrality, and Eigenvector centrality were calculated and analyzed by utilizing Netminer 4.0. As a result of analysis, it was found that the keyword 'brand' showed the highest rank in web visibility followed by 'woman', 'size', 'man', 'fashion', 'sports', 'price', 'store', 'discount', 'equipment' in the top 10 frequency rankings. For centrality calculations, only the top 30 keywords were included because the density was extremely high due to high frequency of the co-occurring keywords. The results of centrality calculations showed that the keywords on top of the rankings were similar to the frequency of the raw data. When the frequency was adjusted by subtracting 100 and 500 words, it showed different results as the low-ranking keywords such as J. Lindberg in the frequency analysis ranked high along with changes in the rankings of all centrality calculations. Such findings of this study will provide basis for marketing strategies and ways to increase awareness and web visibility for Golfwear brands.

The Volume and the Quality of Media Visibility according to the Hierarchy of Offender and the Victim (가해자와 피해자의 위계(hierarchy)에 따른 매체가시성(media visibility)의 양과 질 네트워크 분석)

  • Hong, Ju-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.8
    • /
    • pp.520-534
    • /
    • 2017
  • A sex offense report highlights the victim as well as the offender involved in the sex crime. This study explored the hierarchy between the offender and the victim, based on the frequency analysis and network analysis. In case that the perpetrator is a celebrity, the media focuses more on the celebrity's actions. The volume of reports for cases where the offender has a position superior to the victim's (offender superior relationship) is larger than for those where the two have a horizontal relationship. The press highlights the celebrity in offender superior relationships and the victim in horizontal relationships. The celebrity is held responsible for the cause of the crime in the offender superior relationship. However, the victim him/herself is held responsible for the perpetrated offense in horizontal relationships. According to the results of the analyses in this study, the press fails to protect human rights and privacy in offender superior relationships.

AMPLITUDE CORRECTION FACTORS OF KOREAN VLBI NETWORK OBSERVATIONS

  • LEE, SANG-SUNG;BYUN, DO-YOUNG;OH, CHUNG SIK;KIM, HYO RYOUNG;KIM, JONGSOO;JUNG, TAEHYUN;OH, SE-JIN;ROH, DUK-GYOO;JUNG, DONG-KYU;YEOM, JAE-HWAN
    • Journal of The Korean Astronomical Society
    • /
    • v.48 no.5
    • /
    • pp.229-236
    • /
    • 2015
  • We report results of investigation of amplitude calibration for very long baseline interferometry (VLBI) observations with Korean VLBI Network (KVN). Amplitude correction factors are estimated based on comparison of KVN observations at 22 GHz correlated by Daejeon hardware correlator and DiFX software correlator in Korea Astronomy and Space Science Institute (KASI) with Very Long Baseline Array (VLBA) observations at 22 GHz by DiFX software correlator in National Radio Astronomy Observatory (NRAO). We used the observations for compact radio sources, 3C 454.3, NRAO 512, OJ 287, BL Lac, 3C 279, 1633+382, and 1510–089, which are almost unresolved for baselines in a range of 350-477 km. Visibility data of the sources obtained with similar baselines at KVN and VLBA are selected, fringe-fitted, calibrated, and compared for their amplitudes. We find that visibility amplitudes of KVN observations should be corrected by factors of 1.10 and 1.35 when correlated by DiFX and Daejeon correlators, respectively. These correction factors are attributed to the combination of two steps of 2-bit quantization in KVN observing systems and characteristics of Daejeon correlator.

Model of the RFID-based Product Traceability Service in u-SCM (u-SCM에서 RFID 기반 제품 추적 서비스 모델)

  • Shin, Myeong-Sook;Song, Gi-Beum;Ahn, Seong-Soo;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.954-957
    • /
    • 2007
  • The u-SCM to persue unification of the whole Supply Chain through ubiquitous computing and technical interface is raised its head for enterprise to secure endless competitive advantage and grow up constantly. This can be especially a matter of primary concern for business process elevation on various industry. The other side, The Traceability Service propelled both nationally and internationally is propelled specific industry to offer visibility and traceability of each manufacture on supply chain related to induce RFID, but standard Traceability Service Architecture isn't decided yet. This paper propose Model of Product Traceability Service which is based on EPCglobal Network to be the whole world standard architecture for the sake of efficient and perfect manufacture management on entire supply chain based on RFID.

  • PDF

Research on Cyber-terrorism preparation scheme (사이버테러 대응방안에 관한 연구)

  • Kim, Yeon Jun;Kim, Sang Jin
    • Convergence Security Journal
    • /
    • v.16 no.3_2
    • /
    • pp.33-42
    • /
    • 2016
  • While evolving information-oriented society provides a lot of benefits to the human life, new types of threats have been increasing. Particularly, cyber terrorism, happen on the network that is composed of a computer system and information communication network, and the mean and scale of damage has reached a serious level. In other words, it is hard to locate cyber terror since it occurs in the virtual space, not in the real world, so identifying "Who is attacking?" (Non-visibility, non-formulas), or "Where the attack takes place?" (trans-nation) are hard. Hackers, individuals or even a small group of people, who carried out the cyber terror are posing new threats that could intimidate national security and the pace and magnitude of threats keep evolving. Scale and capability of North Korea's cyber terrorism are assessed as world-class level. Recently, North Korea is focusing on strengthen their cyber terrorism force. So improving a response system for cyber terror is a key necessity as North Korea's has emerged as a direct threat to South Korean security. Therefore, Korea has to redeem both legal and institutional systems immediately to perform as a unified control tower for preemptive response to cyber terrors arise from North Korea and neighboring countries.

A Target Position Reasoning System for Disaster Response Robot based on Bayesian Network (베이지안 네트워크 기반 재난 대응 로봇의 탐색 목표 추론 시스템)

  • Yang, Kyon-Mo;Seo, Kap-Ho;Lee, Jongil;Lee, Seokjae;Suh, Jinho
    • The Journal of Korea Robotics Society
    • /
    • v.13 no.4
    • /
    • pp.213-219
    • /
    • 2018
  • In this paper, we introduce a target position reasoning system based on Bayesian network that selects destinations of robots on a map to explore compound disaster environments. Compound disaster accidents have hazardous conditions because of a low visibility and a high temperature. Before firefighters enter the environment, the robots notify information in advance, such as victim's positions, number of victims, and status of debris of building. The problem of the previous system is that the system requires a target position to operate the robots and the firefighter need to learn how to use the robot. However, selecting the target position is not easy because of the information gap between eyewitness accounts and map coordinates. In addition, learning the technique how to use the robots needs a lot of time and money. The proposed system infers the target area using Bayesian network and selects proper x, y coordinates on the map based on image processing methods of the map. To verify the proposed system, we designed three example scenarios based on eyewetinees testimonies and compared time consumption between human and the system. In addition, we evaluate the system usability by 40 subjects.

Satellite Navigation Systems, As The Development Of Digitalization Of The Marine Corridor

  • Vorokhobin, Igor;Burmaka, Igor;Ivanov, Oleksandr;Perepechayev, Sergiy;Naboka, Ivan;Kulakov, Maksym
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.11
    • /
    • pp.241-247
    • /
    • 2021
  • In the article, an analysis of the factors was carried out, which injected into the efficiency of the function of navigation systems in the minds of unimportance. Carrying out analyzes allowing for the visibility of relevant direct adjustments to the effectiveness of the function Inertial navigation systems in the minds of non-value. The designation of the navigation system was assigned to a complex of navigation systems on ships processing of the vector of navigation parameters, so that they can be victorious in the control systems of the ship's collapse, and the safety of floating is safe.

Influence of HAPS and GEO Satellite under SANDU Layering and Gas Attenuations

  • Harb, Kamal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.93-100
    • /
    • 2021
  • Satellite communication for high altitude platform stations (HAPS) and geostationary orbit (GEO) systems suffers from sand and dust (SANDU) storms in desert and arid regions. The focus of this paper is to propose common relations between HAPS and GEO for the atmospheric impairments affecting the satellite communication networks operating above Ku-band crossing the propagation path. A double phase three-dimensional relationship for HAPS and GEO systems is then presented. The comparison model present the analysis of atmospheric attenuation with specific focus on sand and dust based on particular size, visibility, adding gas effects for different frequency, and propagation angle to provide systems' operations with a predicted vision of satellite parameters' values. Thus, the proposed system provides wide range of selecting applicable parameters, under different weather conditions, in order to achieve better SNR for satellite communication.