• Title/Summary/Keyword: Research Information Systems

Search Result 12,210, Processing Time 0.044 seconds

Event Cognition-based Daily Activity Prediction Using Wearable Sensors (웨어러블 센서를 이용한 사건인지 기반 일상 활동 예측)

  • Lee, Chung-Yeon;Kwak, Dong Hyun;Lee, Beom-Jin;Zhang, Byoung-Tak
    • Journal of KIISE
    • /
    • v.43 no.7
    • /
    • pp.781-785
    • /
    • 2016
  • Learning from human behaviors in the real world is essential for human-aware intelligent systems such as smart assistants and autonomous robots. Most of research focuses on correlations between sensory patterns and a label for each activity. However, human activity is a combination of several event contexts and is a narrative story in and of itself. We propose a novel approach of human activity prediction based on event cognition. Egocentric multi-sensor data are collected from an individual's daily life by using a wearable device and smartphone. Event contexts about location, scene and activities are then recognized, and finally the users" daily activities are predicted from a decision rule based on the event contexts. The proposed method has been evaluated on a wearable sensor data collected from the real world over 2 weeks by 2 people. Experimental results showed improved recognition accuracies when using the proposed method comparing to results directly using sensory features.

Cache Sensitive T-tree Index Structure (캐시를 고려한 T-트리 인덱스 구조)

  • Lee Ig-hoon;Kim Hyun Chul;Hur Jae Yung;Lee Snag-goo;Shim JunHo;Chang Juho
    • Journal of KIISE:Databases
    • /
    • v.32 no.1
    • /
    • pp.12-23
    • /
    • 2005
  • In the past decade, advances in speed of commodity CPUs have iu out-paced advances in memory latency Main-memory access is therefore increasingly a performance bottleneck for many computer applications, including database systems. To reduce memory access latency, cache memory incorporated in the memory subsystem. but cache memories can reduce the memory latency only when the requested data is found in the cache. This mainly depends on the memory access pattern of the application. At this point, previous research has shown that B+ trees perform much faster than T-trees because B+ trees are more cache conscious than T-trees, and also proposed 'Cache Sensitive B+trees' (CSB. trees) that are more cache conscious than B+trees. The goal of this paper is to make T-trees be cache conscious as CSB-trees. We propose a new index structure called a 'Cache Sensitive T-trees (CST-trees)'. We implemented CST-trees and compared performance of CST-trees with performance of other index structures.

A Selective Error Control Scheme based on Timely Retransmission in Multimedia Communications (멀티미디어통신에서 적시 재전송에 기반한 선택적인 오류 제어 방법)

  • Jeong, Chung-Il;Gwon, Do-Han;Park, Chang-Yun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1225-1236
    • /
    • 1999
  • 기존의 오류 제어 방법들은 실시간 특성과 신축적인 신뢰성을 가지는 멀티미디어 통신 응용의 특징을 충분히 반영하지 못하고 있다. 본 연구는 기존의 재전송을 기반으로 하는 방법에 두 가지 기법을 추가하여 이 문제에 접근하였다. 첫째, 실시간 데이타의 마감 시간을 고려하여 미리 재전송을 실시하는 사전 재전송과 시간적으로 불가능하다고 판단될 때 복구를 포기하는 재전송 포기를 통한 적시 재전송 기법이다. 둘째, 요구되는 신뢰성에 근접하도록 오류가 많이 발생하였을 때만 재전송을 하는 선택적 오류 제어 기법이다. 본 연구는 두 기법을 적용한 오류 제어 프로토콜을 구현하고 네트워크 환경을 바꾸어 가며 성능을 검사하였다. 실험 결과, 제안된 오류 제어 방법은 전체적인 오류 제어 부하는 감소시키면서 오류 복구율을 높인다는 점을 확인하였다.Abstract The current error control schemes do not fit well to the characteristics of multimedia communications: real-time transmission and flexible reliability requirements. This research proposes a new error control scheme, which extends the retransmission-based error control with the following two mechanisms. First, error recovery is performed in two timely fashions: one is retransmission in advance where a retransmission is performed early enough for the deadline if an error is suspected, and the other is retransmission abort where a retransmission is given up if its recovery within the deadline seems to be impossible. Second, error control is selectively performed only when an actual error rate approaches to the threshold on a given reliability requirement. The proposed scheme has been implemented and experimented in various network environments. The performance results show that it has lower control overhead and higher error recovery than the existing schemes.

Transmission Time Analysis of the Disk Service Request Message in Mirrored Declustering Disk System (중복된 분산 저장 디스크 시스템에서 디스크 서비스 요구 메시지의 전송 시간 분석)

  • Gu, Bon-Geun;Kim, Seung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.10
    • /
    • pp.1248-1257
    • /
    • 1999
  • MDDS는 디스크 시스템의 성능을 향상시키기 위해 하이퍼큐브의 각 노드에 디스크 블록들을 분산 저장하며, 인접한 노드에서 분산 저장하고 있는 디스크 블록을 중복 저장하고 있는 디스크 시스템이다. 본 논문에서는 디스크 서비스 시간을 분석하기 위한 선행 연구로서 소스 노드에서 생성된 디스크 서비스 요구 메시지가 디스크 서비스를 제공하는 목적 노드에 수신될 때까지의 시간인 전송 시간을 분석한다. 이러한 메시지의 전송 시간을 분석하기 위해 이 메시지가 링크를 통해 전송되지 못하고 대기할 확률인 전송 대기 확률을 분석한다. 이들 메시지의 전송 대기 확률을 분석하기 위해 메시지가 각 링크에서 전송되지 못하고 대기해야 하는 시간인 전송 대기 시간을 분석한다. 또 디스크 서비스 요구 메시지의 전송을 위해 링크가 사용되는 비를 분석하며, 메시지의 전송 대기 확률, 전송 대기 시간, 메시지 전송을 위해 링크가 사용될 비를 이용하여 디스크 서비스 요구 메시지의 전송 시간을 분석한다. Abstract Mirrored Declustering Disk System(MDDS) is the disk system to enhance the performance of disk system for hypercube. In MDDS, each node stores the disk blocks using the declustering technique. And the node also duplicates the disk blocks stored in neighboring nodes. In this paper, as the leading research for analyzing the disk service time, we analyze the transmission time of the disk service request message from the source node to the destination node. To analyze the transmission time of disk service request message, we analyze the probability of blocking the message related to the disk service request. For the analysis of the blocking probability, we analyze the blocking time at the link. We also analyze the rate at which the transmission link is used for transferring the disk service requests. And we analyze the transmission time of disk service request message by using the blocking probability, the blocking time, and the usage rate of link for transmitting the message.

A Study of Collaboration Service Model for Supporting Functional Resources in Smart Device (스마트 단말기 상의 기능적 지원을 위한 협업 서비스 모델 연구)

  • Song, Sumi;Yoon, YongIk
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.4 no.5
    • /
    • pp.161-170
    • /
    • 2015
  • This research aims to propose new direction of mobile collaborative service by supplying functional supports which surpass data resource in smart devices. In this paper, we present Smart Collaboration Service Model that supports two types of collaboration, so called Supplying Collaboration and Sharing Collaboration. This model is a platform for supporting the resources as follows; sharing of data contact in other devices and supplying of special functions, like camera operation and picture transmission from other devices. To show its applicability, a prototype of Smart Collaboration Service Model has been implemented in the Android application for exchanging contact data and renting camera function. We expect that Smart Collaboration Service Model is to help the emergence for a new type of collaboration service. Also, user can reduces resource wastes for device as well as form personal smart space by utilizing all devices owned.

An Study on the Impact of N/A Check Item on the Security Level Result through Empirical Verification (실증검증을 통한 N/A 점검항목이 보안 수준 결과에 미치는 영향에 관한 연구)

  • Lee, Jun Ho;Sung, Kyung Sang;Oh, Hea Seok
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.8
    • /
    • pp.271-276
    • /
    • 2014
  • This study analyzed that N/A check items affect the results of the security level degree, when performing vulnerability analysis evaluation. For this, we were used vulnerability analysis evaluation range, check items and quantitative calculation method. Furthermore, were applied grade and weight for the importance of the items. In addition, because technology develop rapidly, the institution is always exposed risk. therefore, this study was carried out empirical analysis by applying RAL(Risk Acceptabel Level). According to the analyzed result N/A check items factors affecting the level of security has been proven. In other words, this study found that we shall exclude inspection items irrelevant to the institution characteristics, when perform vulnerability analysis evaluation. In this study suggested that security level evaluation shall performed, after that exclude items irrelevant to the institution characteristics based on empirical verification. And also, it proposed that model research is required for establish check items for which analysis-evaluate vulnerability based on empirical verification.

Reduction of Presentation Latency in Thin-Client of Cloud System (클라우드 시스템의 씬 클라이언트에서의 표시 지연 절감)

  • Kang, Seung Soo;Ko, Hyun;Yoon, Hee Yong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.4
    • /
    • pp.163-176
    • /
    • 2013
  • Cloud-based streaming game service has numerous merits, but it may suffer from presentation latency in a thin-client. It is an important issue especially for game service which needs instantaneous response to user inputs. This research proposes the methods for reducing the presentation latency between the server unit and the thin-client unit. The approaches proposed to be employed with server unit include the source/sync video format equalization, encoding format configuration according to the media type, and the S/W implementation for transmitting clock periodically. The methods for the thin-client unit include the decreasing the number of instructions, use of light encryption algorithm, and improvement on H/W decoding. The proposed schemes are tested with a commercialized streaming service platform, which reveals the reduction of presentation latency as large as a few hundred milliseconds and reaches the acceptable level (about 100 milliseconds).

Analysis of Teacher's ICT Literacy and Level of Programming Ability for SW Education (SW교육을 위한 교사의 ICT 리터러시와 프로그래밍 능력 수준 측정)

  • Shim, Jaekwoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.91-98
    • /
    • 2018
  • As the importance of computing technology is emphasized, Korea has revised the educational curriculum to teach SW education compulsory at the elementary and secondary school level. For successful SW education, it is very important not only to require an educational environment and educational materials, but also to obtain the capacity of the teachers who are responsible for SW education. However, due to the lack of research on specifically examining the present state of teachers' SW competencies, there are many deficiencies in establishing a concrete teacher's training and a support plan for SW education. This study is to develop test tools and apply to measure a common sense about a computer, the latest IT technology algorithm design and a programming ability for the purpose of evaluating the SW competency of current teachers. As a result of the study, the understanding of common sense about a computer and the latest IT technology is very high, on the other hand the algorithm design and programming ability were analyzed as low. Therefore, the implications for SW education teacher's training and a process of prospective teachers' training are derived.

Study on Program Partitioning and Data Protection in Computation Offloading (코드 오프로딩 환경에서 프로그램 분할과 데이터 보호에 대한 연구)

  • Lee, Eunyoung;Pak, Suehee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.9 no.11
    • /
    • pp.377-386
    • /
    • 2020
  • Mobile cloud computing involves mobile or embedded devices as clients, and features small devices with constrained resource and low availability. Due to the fast expansion of smart phones and smart peripheral devices, researches on mobile cloud computing attract academia's interest more than ever. Computation offloading, or code offloading, enhances the performance of computation by migrating a part of computation of a mobile system to nearby cloud servers with more computational resources through wired or wireless networks. Code offloading is considered as one of the best approaches overcoming the limited resources of mobile systems. In this paper, we analyze the factors and the performance of code offloading, especially focusing on static program partitioning and data protection. We survey state-of-the-art researches on analyzed topics. We also describe directions for future research.

Development of Emergency Response System by Risk Assessment Methodology in Energy Facility (에너지 시설물의 위험성 평가에 따른 비상대응 시스템 구축)

  • Lee, Heon-Seok;Kang, Seung-Gyun;Jung, In-Hee;Kim, Bum-Su;Yoo, Jin-Hwan;Park, Chul-Hwan;Kim, Dae-Heum;Ko, Jae-Wook
    • Journal of the Korean Institute of Gas
    • /
    • v.12 no.2
    • /
    • pp.118-123
    • /
    • 2008
  • There are many facilities, such as facilities for high pressure gas storage and systems related to high pressure pipes, to handle hazardous materials in energy industries. Because the foundation of the proper risk analysis and management system has not been established, there is the possibility of an accident and Korea has met higher accident rate than developed countries. These accidents in energy facilities could cause great damage to facilities including the surrounding area, We have conducted the present research in order to systematize the emergency response system (ERS) using a lot of information on the degree of damage in an accident by consequence analysis.

  • PDF