• Title/Summary/Keyword: Time-Efficiency of Algorithm

Search Result 1,633, Processing Time 0.027 seconds

Enhanced Mode Estimation Method for Intra/Inter Prediction in H.264/AVC (H.264/AVC에서 향상된 인트라/인터 예측을 위한 모드 추정 방법)

  • Park, Kyung-Seok;Kim, Min-Jun;Jun, Jae-Hyun;Ryu, Sang-Ryul;Kim, Snng-Ho
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.4
    • /
    • pp.1830-1838
    • /
    • 2012
  • The intra prediction and the motion estimation of inter prediction occupy 70 ~ 80% of whole compression time in H.264/AVC. Compression efficiency has been higher, but complexity has increased and coding time has also increased much more. This paper proposes a block size decision method of the intra prediction and mode decision method which minimize the loss of video quality during the encoding and shorten the time spent. This paper, in addition, proposes an algorithm which determines the method of adaptive block mode for motion estimation of inter prediction. We investigated PSNR and the intra prediction and inter prediction of time-consuming calculations in order to measure video quality degradation and complexity through experiments. Consequently, when you use all three methods, these methods showed that average coding time is shortened as about 500 to 600ms in every frame in the case of all experimented videos, keeping video quality nearly similar, compared with existing methods of H.264.

An Approach Using LSTM Model to Forecasting Customer Congestion Based on Indoor Human Tracking (실내 사람 위치 추적 기반 LSTM 모델을 이용한 고객 혼잡 예측 연구)

  • Hee-ju Chae;Kyeong-heon Kwak;Da-yeon Lee;Eunkyung Kim
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.43-53
    • /
    • 2023
  • In this detailed and comprehensive study, our primary focus has been placed on accurately gauging the number of visitors and their real-time locations in commercial spaces. Particularly, in a real cafe, using security cameras, we have developed a system that can offer live updates on available seating and predict future congestion levels. By employing YOLO, a real-time object detection and tracking algorithm, the number of visitors and their respective locations in real-time are also monitored. This information is then used to update a cafe's indoor map, thereby enabling users to easily identify available seating. Moreover, we developed a model that predicts the congestion of a cafe in real time. The sophisticated model, designed to learn visitor count and movement patterns over diverse time intervals, is based on Long Short Term Memory (LSTM) to address the vanishing gradient problem and Sequence-to-Sequence (Seq2Seq) for processing data with temporal relationships. This innovative system has the potential to significantly improve cafe management efficiency and customer satisfaction by delivering reliable predictions of cafe congestion to all users. Our groundbreaking research not only demonstrates the effectiveness and utility of indoor location tracking technology implemented through security cameras but also proposes potential applications in other commercial spaces.

SVC Based Multi-channel Transmission of High Definition Multimedia and Its Improved Service Efficiency (SVC 적용에 의한 다매체 멀티미디어 지원 서비스 효율 향상 기법)

  • Kim, Dong-Hwan;Cho, Min-Kyu;Moon, Seong-Pil;Lee, Jae-Yeal;Jun, Jun-Gil;Chang, Tae-Gyu
    • Journal of IKEEE
    • /
    • v.15 no.2
    • /
    • pp.179-189
    • /
    • 2011
  • This paper presents an SVC based multi-channel transmission technique. Transmission of high definition multimedia and its service efficiency can be significantly improved by the proposed method. In this method, the HD stream is divided into the two layer streams, i.e., a base layer stream and an enhancement layer stream. The divided streams are transmitted through a primary channel and an auxiliary channel, respectively. The proposed technique provides a noble mode switching technique which enables a seamless service of HD multimedia even under the conditions of abrupt and intermittent deterioration of the auxiliary channel. When the enhancement layer stream is disrupted by the channel monitoring in the mode switching algorithm, the algorithm works further to maintain the spatial and time resolution of the HD multimedia by upsampling and interpolating the base layer stream, consequently serving for the non disrupted play of the media. Moreover, the adoption of an adaptive switching algorithm significantly reduces the frequency of channel disruption avoiding the unnecessary switching for the short period variations of the channel. The feasibility of the proposed technique is verified through the simulation study with an example application to the simultaneous utilization of both Ku and Ka bands for HD multimedia broadcasting service. The rainfall modeling and the analysis of the satellite channel attenuation characteristics are performed to simulate the quality of service performance of the proposed HD broadcasting method. The simulation results obtained under a relatively poor channel (weather) situations show that the average lasting period of enhancement layer service is extended from 9.48[min] to 23.12[min] and the average switching frequency is reduced from 3.84[times/hour] to 1.68[times/hour]. It is verified in the satellite example that the proposed SVC based transmission technique best utilizes the Ka band channel for the service of HD broadcasting, although it is characterized by its inherent weather related poor reliability causing severe limitations in its independent application.

Detection of Complex Event Patterns over Interval-based Events (기간기반 복합 이벤트 패턴 검출)

  • Kang, Man-Mo;Park, Sang-Mu;Kim, Sank-Rak;Kim, Kang-Hyun;Lee, Dong-Hyeong
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.201-209
    • /
    • 2012
  • The point-based complex event processing handled an instantaneous event by using one time stamp in each event. However, the activity period of the event plays the important role in the field which is the same as the finance, multimedia, medicine, and meteorology. The point-based event is insufficient for expressing the complex temporal relationship in this field. In the application field of the real-time world, the event has the period. The events more than two kinds can be temporally overlapped. In addition, one event can include the other event. The relation about the events of kind of these can not be successive like the point-based event. This thesis designs and implements the method detecting the patterns of the complex event by using the interval-based events. The interval-based events can express the overlapping relation between events. Furthermore, it can include the others. By using the end point of beginning and end point of the termination, the operator of interval-based events shows the interval-based events. It expresses the sequence of the interval-based events and can detect the complex event patterns. This thesis proposes the algorithm using the active instance stack in order to raise efficiency of detection of the complex event patterns. When comprising the event sequence, this thesis applies the window push down technique in order to reduce the number of intermediate results. It raises the utility factor of the running time and memory.

Performance Improvement of Downlink Real-Time Traffic Transmission Using MIMO-OFDMA Systems Based on Beamforming (Beamforming 기반 MIMO-OFDMA 시스템을 이용한 하향링크 실시간 트래픽 전송 성능 개선)

  • Yang Suck-Chel;Park Dae-Jin;Shin Yo-An
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.3 s.345
    • /
    • pp.1-9
    • /
    • 2006
  • In this paper, we propose a MIMO-OFDMA (Multi Input Multi Output-Orthogonal Frequency Division Multiple Access) system based on beamforming for performance improvement of downlink real-time traffic transmission in harsh channel conditions with low CIR (Carrier-to-Interference Ratio). In the proposed system, we first consider the M-GTA-SBA (Modified-Grouped Transmit Antenna-Simple Bit Allocation) using effective CSI (Channel State Information) calculation procedure based on spatial resource grouping, which is adequate for the combination of MRT (Maximum Ratio Transmission) in the transmitter and MRC (Maximum Ratio Combining) in the receiver. In addition, to reduce feedback information for the beamforming, we also apply QEGT (Quantized Equal Gain Transmission) based on quantization of amplitudes and phases of beam weights. Furthermore, considering multi-user environments, we propose the P-SRA (Proposed-Simple Resource Allocation) algorithm for fair and efficient resource allocation. Simulation results reveal that the proposed MIMO-OFDMA system achieves significant improvement of spectral efficiency in low CRI region as compared to a typical open-loop MIMO-OFDMA system using pseudo-orthogonal space time block code and H-ARQ IR (Hybrid-Automatic Repeat Request Incremental Redundancy).

A Resource Scheduling Based on Iterative Sorting for Long-Distance Airborne Tactical Communication in Hub Network (허브 네트워크에서의 장거리 공중 전술 통신을 위한 반복 정렬 기반의 자원 스케줄링 기법)

  • Lee, Kyunghoon;Lee, Dong Hun;Lee, Dae-Hong;Jung, Sung-Jin;Choi, Hyung-Jin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.12
    • /
    • pp.1250-1260
    • /
    • 2014
  • In this paper, a novel resource scheduling, which is used for hub network based long distance airborne tactical communication, is proposed. Recently, some countries of the world has concentrated on developing data rate and networking performance of CDL, striving to keep pace with modern warfare, which is changed into NCW. And our government has also developed the next generation high capacity CDL. In hub network, a typical communication structure of CDL, hybrid FDMA/TDMA can be considered to exchange high rate data among multiple UAVs simultaneously, within limited bandwidth. However, due to different RTT and traffic size of UAV, idle time resource and unnecessary packet transmission delay can occur. And these losses can reduce entire efficiency of hub network in long distance communication. Therefore, in this paper, we propose RTT and data traffic size based UAV scheduling, which selects time/frequency resource of UAVs by using iterative sorting algorithm. The simulation results verified that the proposed scheme improves data rate and packet delay performance in low complexity.

A Neural Network for Long-Term Forecast of Regional Precipitation (지역별 중장기 강수량 예측을 위한 신경망 기법)

  • Kim, Ho-Joon;Paek, Hee-Jeong;Kwon, Won-Tae
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.2 no.2
    • /
    • pp.69-78
    • /
    • 1999
  • In this paper, a neural network approach to forecast Korean regional precipitation is presented. We first analyze the characteristics of the conventional models for time series prediction, and then propose a new model and its learning method for the precipitation forecast. The proposed model is a layered network in which the outputs of a layer are buffered within a given period time and then fed fully connected to the upper layer. This study adopted the dual connections between two layers for the model. The network behavior and learning algorithm for the model are also described. The dual connection structure plays the role of the bias of the ordinary Multi-Layer Perceptron(MLP), and reflects the relationships among the features effectively. From these advantageous features, the model provides the learning efficiency in comparison with the FIR network, which is the most popular model for time series prediction. We have applied the model to the monthly and seasonal forecast of precipitation. The precipitation data and SST(Sea Surface Temperature) data for several decades are used as the learning pattern for the neural network predictor. The experimental results have shown the validity of the proposed model.

  • PDF

Development of Optimum Traffic Safety Evaluation Model Using the Back-Propagation Algorithm (역전파 알고리즘을 이용한 최적의 교통안전 평가 모형개발)

  • Kim, Joong-Hyo;Kwon, Sung-Dae;Hong, Jeong-Pyo;Ha, Tae-Jun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.35 no.3
    • /
    • pp.679-690
    • /
    • 2015
  • The need to remove the cause of traffic accidents by improving the engineering system for a vehicle and the road in order to minimize the accident hazard. This is likely to cause traffic accident continue to take a large and significant social cost and time to improve the reliability and efficiency of this generally poor road, thereby generating a lot of damage to the national traffic accident caused by improper environmental factors. In order to minimize damage from traffic accidents, the cause of accidents must be eliminated through technological improvements of vehicles and road systems. Generally, it is highly probable that traffic accident occurs more often on roads that lack safety measures, and can only be improved with tremendous time and costs. In particular, traffic accidents at intersections are on the rise due to inappropriate environmental factors, and are causing great losses for the nation as a whole. This study aims to present safety countermeasures against the cause of accidents by developing an intersection Traffic safety evaluation model. It will also diagnose vulnerable traffic points through BPA (Back -propagation algorithm) among artificial neural networks recently investigated in the area of artificial intelligence. Furthermore, it aims to pursue a more efficient traffic safety improvement project in terms of operating signalized intersections and establishing traffic safety policies. As a result of conducting this study, the mean square error approximate between the predicted values and actual measured values of traffic accidents derived from the BPA is estimated to be 3.89. It appeared that the BPA appeared to have excellent traffic safety evaluating abilities compared to the multiple regression model. In other words, The BPA can be effectively utilized in diagnosing and practical establishing transportation policy in the safety of actual signalized intersections.

Analysis of Sun Tracking Performance of Various Types of Sun Tracking System used in Parabolic Dish Type Solar Thermal Power Plant (접시형 태양열 발전시스템에서 사용하는 여러 가지 형태의 태양추적시스템의 태양추적성능 분석)

  • Seo, Dong-Hyeok;Park, Young-Chil
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.4
    • /
    • pp.388-396
    • /
    • 2011
  • Sun tracking system is the most important subsystem in parabolic dish type solar thermal power plant, since it determines the amount of thermal energy to be collected, thus affects the efficiency of solar thermal power plant most significantly. Various types of sun tracking systems are currently used. Among them, use of photo sensors to located the sun(which is called sensor type) and use of astronomical algorithm to compute the sun position(which is called program type) are two of the mostly used methods. Recently some uses CCD sensor, like CCD camera, which is called image processing type sun tracking system. This work is concerned with the analysis of sun tracking performance of various types of sun tracking systems currently used in the parabolic dish type solar thermal power plant. We first developed a sun tracking error measurement system. Then, we evaluate the performance of five different types of sun tracking systems, sensor type, program type, hybrid type(use of sensor and computed sun position simultaneously), tracking error compensated program type and image processing type. Experimentally obtained data shows that the tracking error compensated program type sun tracking system is very effective and could provide a good sun tracking performance. Also the data obtained shows that the performance of sensor type sun tracking system is being affected by the cloud significantly, while the performance of a program type sun tracking system is being affected by the sun tracking system's mechanical and installation errors very much. Finally image processing type sun tracking system can provide accurate sun tracking performance, but costs more and requires more computational time.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.