• Title/Summary/Keyword: Stream processing

Search Result 720, Processing Time 0.024 seconds

A Study on the Detection and Statistical Feature Analysis of Red Tide Area in South Coast Using Remote Sensing (원격탐사를 이용한 남해안의 적조영역 검출과 통계적 특징 분석에 관한 연구)

  • Sur, Hyung-Soo;Lee, Chil-Woo
    • The KIPS Transactions:PartB
    • /
    • v.14B no.2
    • /
    • pp.65-70
    • /
    • 2007
  • Red tide is becoming hot issue of environmental problem worldwide since the 1990. Advanced nations, are progressing study that detect red tide area on early time using satellite for sea. But, our country most seashores bends serious. Also because there are a lot of turbid method streams on coast, hard to detect small red tide area by satellite for sea that is low resolution. Also, method by sea color that use one feature of satellite image for sea of existent red tide area detection was most. In this way, have a few feature in image with sea color and it can cause false negative mistake that detect red tide area. Therefore, in this paper, acquired texture information to use GLCM(Gray Level Co occurrence Matrix)'s texture 6 information about high definition land satellite south Coast image. Removed needless component reducing dimension through principal component analysis from this information. And changed into 2 principal component accumulation images, Experiment result 2 principal component conversion accumulation image's eigenvalues were 94.6%. When component with red tide area that uses only sea color image and all principal component image. displayed more correct result. And divided as quantitative,, it compares with turbid stream and the sea that red tide does not exist using statistical feature analysis about texture.

The Implementation of Multi-Channel Audio Codec for Real-Time operation (실시간 처리를 위한 멀티채널 오디오 코덱의 구현)

  • Hong, Jin-Woo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.14 no.2E
    • /
    • pp.91-97
    • /
    • 1995
  • This paper describes the implementation of a multi-channel audio codec for HETV. This codec has the features of the 3/2-stereo plus low frequency enhancement, downward compatibility with the smaller number of channels, backward compatibility with the existing 2/0-stereo system(MPEG-1 audio), and multilingual capability. The encoder of this codec consists of 6-channel analog audio input part with the sampling rate of 48 kHz, 4-channel digital audio input part and three TMS320C40 /DSPs. The encoder implements multi-channel audio compression using a human perceptual psychoacoustic model, and has the bit rate reduction to 384 kbit/s without impairment of subjective quality. The decoder consists of 6-channel analog audio output part, 4-channel digital audio output part, and two TMS320C40 DSPs for a decoding procedure. The decoder analyzes the bit stream received with bit rate of 384 kbit/s from the encoder and reproduces the multi-channel audio signals for analog and digital outputs. The multi-processing of this audio codec using multiple DSPs is ensured by high speed transfer of date between DSPs through coordinating communication port activities with DMA coprocessors. Finally, some technical considerations are suggested to realize the problem of real-time operation, which are found out through the implementation of this codec using the MPEG-2 layer II sudio coding algorithm and the use of the hardware architecture with commercial multiple DSPs.

  • PDF

A Credit Card Sensing System based on Shared Key for Promoting Electronic Commerce (전자상거래 촉진을 위한 공유키 기반 신용카드 조회 시스템)

  • Jang, Si-Woong;Shin, Byoung-Chul;Kim, Yang-Kok
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1059-1066
    • /
    • 2003
  • In this paper, the magnetic sensing system is designed and implemented for the safe security in internet commerce system. When the payment is required inthe internet commerce system, the magnetic sensing system will get the information from a credit card without keyboard input and then encrypt and transmit the information to server. The credit card sensing system, which is proposed in this paper, is safe from keyboard hacking because it encrypts card information immediately in its internal chip and sends the information to host system. For the protection of information, the magnetic sensing system is basically based on a synchronous stream cipher cryptosystem which is related to a group of matrices. The size of matrices and the bits of keys for the best performances are determined for various cases. It is shown that for credit card payments. matrices of size 2 have good performance even at most 128bits keys with the consideration of inverse matrices. For authentication of general-purpose data, the magnetic sensing system needs more than 1.5KB data and in this case, the optimum size of matrices is 2 or 3 at more 256bits keys with consideration of inverse matrices.

Development of a GIS-Based Basin Water Balance Analysis Model (GIS 기반의 유역물수지 분석모형 개발)

  • Hwang, Eui-Ho;Kim, Kye-Hyun;Park, Jin-Hyeog;Lee, Geun-Sang
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.4
    • /
    • pp.34-45
    • /
    • 2004
  • Existing Semangeum's water balance analysis simplifies whole basin to single basin and achieved volume of effluence that produce by Kajiyama way to foundation. But Semangeum is complicated and various rice-wine strainer supply system. And there is difficulty to apply as elastic when water balance element is changed at free point. Divided to unit possession station for suitable water balance analysis model application to Semangeum in this study. And developed basin water balance model of GIS base that can do details analysis is bite about development and transfer of an appropriation in the budget of basin water resources. Achieved study including abstraction and concept design that use UML (unified modeling language) diagram for details analysis, stream network composition for rice-wine strainer supply system application, preprocessing of GIS base and postprocessing module development, model revision and verification etc. Support of this water balance analysis model is available to establish efficient water resources administration plan through outward flow process analysis of water resources. And support is considered to be possible in more convenient and, reasonable water resources administration way establishment by minimizing manual processing in systematic water resources government official to user and support diversified analysis system.

  • PDF

Object Tracking And Elimination Using Lod Edge Maps Generated from Modified Canny Edge Maps (수정된 캐니 에지 맵으로부터 만들어진 LOD 에지 맵을 이용한 물체 추적 및 소거)

  • Park, Ji-Hun;Jang, Yung-Dae;Lee, Dong-Hun;Lee, Jong-Kwan;Ham, Mi-Ok
    • The KIPS Transactions:PartB
    • /
    • v.14B no.3 s.113
    • /
    • pp.171-182
    • /
    • 2007
  • We propose a simple method for tracking a nonparameterized subject contour in a single video stream with a moving camera and changing background. Then we present a method to eliminate the tracked contour object by replacing with the background scene we get from other frame. First we track the object using LOD (Level-of-Detail) canny edge maps, then we generate background of each image frame and replace the tracked object in a scene by a background image from other frame that is not occluded by the tracked object. Our tracking method is based on level-of-detail (LOD) modified Canny edge maps and graph-based routing operations on the LOD maps. We get more edge pixels along LOD hierarchy. Our accurate tracking is based on reducing effects from irrelevant edges by selecting the stronger edge pixels, thereby relying on the current frame edge pixel as much as possible. The first frame background scene is determined by camera motion, camera movement between two image frames, and other background scenes are computed from the previous background scenes. The computed background scenes are used to eliminate the tracked object from the scene. In order to remove the tracked object, we generate approximated background for the first frame. Background images for subsequent frames are based on the first frame background or previous frame images. This approach is based on computing camera motion. Our experimental results show that our method works nice for moderate camera movement with small object shape changes.

A Study on the Systematic Integration of WASP5 Water Quality Model with a GIS (GIS와 WASP5 수질모델의 유기적 통합에 관한 연구)

  • 최성규;김계현
    • Spatial Information Research
    • /
    • v.9 no.2
    • /
    • pp.291-307
    • /
    • 2001
  • In today's environmental engineering practice, many technologies such as GIS have been adopted to analyze chemical and biological process in water bodies and pollutants movements on the land surface. However, the linkage between spatially represented land surface pollutants and the in-stream processes has been relatively weak. This lack of continuity needs to develop a method in order to link the spatially-based pollutant source characterization with the water quality modeling. The objective of this thesis was to develop a two-way(forward and backward) link between ArcView GIS software and the USEPA water quality model, WASP5. This thesis includes a literature review, the determination of the point source and non-point source loadings from WASP5 modeling, and the linkage of a GIS with WASP5 model. The GIS and model linkage includes pre-processing of the input data within a GIS to provide necessary information for running a model in the forms of external input files. The model results has been post-processed and stored in the GIS database to be reviewed in a user defined form such as a chart, or a table. The interface developed from this study would provide efficient environment to support the easier decision making form water quality management.

  • PDF

Mobile Presentation using Transcoding Method of Region of Interest (관심 영역의 트랜스코딩 기법을 이용한 모바일 프리젠테이션)

  • Seo, Jung-Hee;Park, Hung-Bog
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.197-204
    • /
    • 2010
  • An effective integration of web-based learning environment and mobile device technology is considered as a new challenge to the developers. The screen size, however, of the mobile device is too small, and its performance is too inferior. Due to the foregoing limit of mobile technology, displaying bulk data on the mobile screen, such as a cyber lecture accompanied with real-time image transmission on the web, raises a lot of problems. Users have difficulty in recognizing learning contents exactly by means of a mobile device, and continuous transmission of video stream with bulky information to the mobile device arouses a lot of load for the mobile system. Thus, an application which is developed to be applied in PC is improper to be used for the mobile device as it is, a player which is fitting for the mobile device should be developed. Accordingly, this paper suggests mobile presentation using transcoding techniques of the field concerned. To display continuous video frames of learning image, such as a cyber lecture or remote lecture, by means of a mobile device, the performance difference between high-resolution digital image and mobile device should be surmounted. As the transcoding techniques to settle the performance difference causes damage of image quality, high-quality image may be guaranteed by application of trial and error between transcoding and selected learning resources.

A MapReduce-Based Workflow BIG-Log Clustering Technique (맵리듀스기반 워크플로우 빅-로그 클러스터링 기법)

  • Jin, Min-Hyuck;Kim, Kwanghoon Pio
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.87-96
    • /
    • 2019
  • In this paper, we propose a MapReduce-supported clustering technique for collecting and classifying distributed workflow enactment event logs as a preprocessing tool. Especially, we would call the distributed workflow enactment event logs as Workflow BIG-Logs, because they are satisfied with as well as well-fitted to the 5V properties of BIG-Data like Volume, Velocity, Variety, Veracity and Value. The clustering technique we develop in this paper is intentionally devised for the preprocessing phase of a specific workflow process mining and analysis algorithm based upon the workflow BIG-Logs. In other words, It uses the Map-Reduce framework as a Workflow BIG-Logs processing platform, it supports the IEEE XES standard data format, and it is eventually dedicated for the preprocessing phase of the ${\rho}$-Algorithm that is a typical workflow process mining algorithm based on the structured information control nets. More precisely, The Workflow BIG-Logs can be classified into two types: of activity-based clustering patterns and performer-based clustering patterns, and we try to implement an activity-based clustering pattern algorithm based upon the Map-Reduce framework. Finally, we try to verify the proposed clustering technique by carrying out an experimental study on the workflow enactment event log dataset released by the BPI Challenges.

An Access Control Model for Privacy Protection using Purpose Classification (사용목적 분류를 통한 프라이버시 보호를 위한 접근제어 모델)

  • Na Seok-Hyun;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.39-52
    • /
    • 2006
  • Recently purpose is used by an crucial part to security management when collecting data about privacy. The W3C(World Wide Web Consortium) describes a standard spec to control personal data that is provided by data providers who visit the web site. But they don't say anymore about security management about personal data in transit after data collection. Recently several researches, such as Hippocratic Databases, Purpose Based Access Control and Hippocratic in Databases, are dealing with security management using purpose concept and access control mechanism after data collection a W3C's standard spec about data collection mechanism but they couldn't suggest an efficient mechanism for privacy protection about personal data because they couldn't represent purpose expression and management of purposes sufficiently. In this paper we suggest a mechanism to improve the purpose expression. And then we suggest an accesscontrol mechanism that is under least privilege principle using the purpose classification for privacy protection. We classify purpose into Along purpose structure, Inheritance purpose structure and Stream purpose structure. We suggest different mechanisms to deal with then We use the role hierarchy structure of RBAC(Role-Based Access Control) for flexibility about access control and suggest mechanisms that provide the least privilege for processing the task in case that is satisfying using several features of purpose to get least privilege of a task that is a nit of business process.

Heat Integration and Economic Analysis of Dry Flue Gas Recirculation in a 500 MWe Oxy-coal Circulating Fluidized-bed (CFB) Power Plant with Ultra-supercritical Steam Cycle (순환 유동층 보일러와 초초임계 증기 사이클을 이용한 500 MWe급 순산소 화력발전소의 건식 재순환 흐름의 열 교환 및 경제성 분석)

  • Kim, Semie;Lim, Young-Il
    • Korean Chemical Engineering Research
    • /
    • v.59 no.1
    • /
    • pp.60-67
    • /
    • 2021
  • This study presented techno-economic analysis of a 500 MWe oxy-coal power plant with CO2 capture. The power plant included a circulating fluidized-bed (CFB), ultra-supercritical steam turbine, flue gas conditioning (FGC), air separation unit (ASU), and CO2 processing unit (CPU). The dry flue gas recirculation (FGR) was used to control the combustion temperature of CFB. One FGR heat exchanger, one heat exchanger for N2 stream exiting ASU, and a heat recovery from CPU compressor were considered to enhance heat efficiency. The decrease in the temperature difference (ΔT) of the FGR heat exchanger that means the increase in heat recovery from flue gas enhanced the electricity and exergy efficiencies. The annual cost including the FGR heat exchanger and FGC cooling water was minimized at ΔT = 10 ℃, where the electricity efficiency, total capital cost, total production cost, and return on investment were 39%, 1371 M$, 90 M$, and 7%/y, respectively.