• Title/Summary/Keyword: information priority

Search Result 2,391, Processing Time 0.032 seconds

A Fast and Dynamic Region-of-Interest Coding Method using the Adaptive Code-Block Discrimination Algorithm in JPEG2000 Images (JPEG2000 이미지에서 적응적 코드블록 판별 알고리즘을 이용한 동적 고속 관심영역 코딩 방법)

  • Kang, Ki-Jun;Seo, Yeong-Geon;Park, Jae-Heung;Yoo, Chang-Yeul;Park, Soon-Hwa;Lee, Jum-Suk;Lee, Bu-Kwon
    • The KIPS Transactions:PartB
    • /
    • v.14B no.5
    • /
    • pp.321-328
    • /
    • 2007
  • In this paper, we propose a fast and dynamic Region-of-Interest coding method using the adaptive code-block discrimination algorithm in JPEG2000 images which complements the implicit ROI coding method and the modified implicit ROI coding method. For reducing the time of discriminating the code block, the proposed method estimates the characteristics of the shape of ROI and makes the shape of boundaries, and classifies the patterns of each code block. The method improves the preferred processing and loss of wavelet coefficients of background within the ROI code blocks by adaptively classifying the code blocks with the percentage of content of the wavelet coefficients using the thresholds of ROI and background. Also, the priority control of wavelet coefficients of background within ROI code block supports the rapid ROI coding by processing in batch based on patterns unlike the existing methods that process with unit of wavelet coefficients. To show the usefulness of this method, we compared this to the existing methods. There is no difference in performance, but we confirmed very speedy in processing time.

A bidirectional full duplex medium access control protocol for underwater acoustic networks (수중 음향 네트워크를 위한 양방향 전이중 매체 접속 제어 프로토콜)

  • Kang, Sung Min;Hwang, Ho Young;Cho, Ho-Shin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.3
    • /
    • pp.211-217
    • /
    • 2017
  • In this paper, we propose a bidirectional full duplex MAC (Medium Access Control) protocol for underwater acoustic networks. An underwater sensor node can set a back-off timer according to the priority of transmission. When the back-off timer expires, the underwater sensor node acquires a transmission opportunity. If a source node wants to send data to a destination node, it broadcasts RTS (Request-To-Send) including ID of the destination node to neighbor nodes. The destination node receiving RTS sends CTS (Clear-To-Send) to the source node to inform the bidirectional full duplex communication. After the source node receives CTS, the source node and the destination node can send the data to each other. In the underwater environment, the existing MAC protocol may take a lot of time for successful transmission of data due to long underwater propagation delay. On the other hand, the proposed bidirectional full duplex MAC protocol improves the throughput by shortening the time for successful transmission of data. In this paper, we analyze the throughput of the proposed bidirectional full duplex MAC protocol. In addition, we show that the proposed bidirectional full duplex MAC protocol has better performance in the presence of the long underwater propagation delay compared with existing MAC protocols for underwater environments.

Assessment of Local Social Vulnerability in Facing Merapi Volcanic Hazard (메라피 화산재해에 대한 지역단위의 사회적 취약성 평가)

  • Lee, Sungsu;Maharani, Yohana Noradika;Yi, Waon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.6
    • /
    • pp.485-492
    • /
    • 2014
  • In regards to natural disasters, vulnerability analysis is a component of the disaster risk analysis with one of its objectives as a basis for planning priority setting activities. The volcano eruption raises many casualties and property in the surrounding area, especially when the volcano located in densely populated areas. Volcanic eruptions cannot be prevented, but the risk and vulnerability can be reduced which involve careful planning and preparations that anticipate a future crisis. The social vulnerability as social inequalities with those social factors can influence the susceptibility of various groups to harm and govern their ability to respond. This study carried out the methods of Social Vulnerability Index (SoVI) to measure the socially created vulnerability of the people living in Merapi proximal hamlets in Central Java, Indonesia that refers to the socioeconomic and demographic factors that affect the resilience of communities in order to describe and understand the social burdens of risk. Social vulnerability captured here, using a qualitative survey based-data such as interviews to local people with random ages and background to capture the answer vary, also interviews to stakeholders to help define social vulnerability variables. The paper concludes that by constructing the vulnerability index for the hamlets, the study reveals information about the distribution and causes of social vulnerability. The analysis using SoVI confirms that this method works well in ensuring that positive values indicating high social vulnerability and vice versa.

An Analysis of Perceptual Differences between Shippers and Operators for Service Quality of Frozen and Refrigerated Warehouses (냉동·냉장창고 서비스품질 향상을 위한 화주사 및 운영사의 인식차이 분석에 관한 연구)

  • Kim, Gwan-Ha;Lee, Hae-Chan;Yang, Tae-Hyeon;Park, Sung-Hoon;Yeo, Gi-Tae
    • Journal of Digital Convergence
    • /
    • v.18 no.4
    • /
    • pp.55-65
    • /
    • 2020
  • The factors for service quality improvement of frozen and refrigerated warehouses are derived and the differences in perception about service quality improvement between shippers and operators of frozen and refrigerated cargos are analyzed. The objective of this study is to propose quality improvement measures for frozen and refrigerated cargo services using the importance-performance analysis (IPA). As a result, 15 analysis factors were derived. It was found through independent sample t-test that there is no difference in perception about quality improvement between shippers and operators. Furthermore, four top priority investment areas were derived from the IPA: maintaining temperature and humidity, securing variable storage space, on-time stocking and releasing, and providing information service. Meanwhile, inventory management service ability, on-time stocking and releasing, and reliable cargo storage ability needed urgent improvement. This study has industrial implications in that it proposes practical improvement measures for service quality improvement.

An Empirical Study of the Recovery Experiment in Clinical Chemistry (임상화학검사실에서 회수율 실험의 실증적 연구)

  • Chang, Sang-Wu;Lee, Sang-Gon;Song, Eun-Young;Park, Yong-Won;Park, Byong-Ok
    • Korean Journal of Clinical Laboratory Science
    • /
    • v.38 no.3
    • /
    • pp.184-188
    • /
    • 2006
  • The purpose of the recovery experiment in clinical chemistry is performed to estimate proportional systematic error. We must know all measurements have some error margin in measuring analytical performance. Proportional systematic error is the type of error whose magnitude increases as the concentration of analyte increases. This error is often caused by a substance in the sample matrix that reacts with the sought for analyte and therefore competes with the analytical reagent. Recovery experiments, therefore, are used rather selectively and do not have a high priority when another analytical method is available for comparison purposes. They may still be useful to help understand the nature of any bias revealed in the comparison of kit experiments. Recovery should be expressed as a percentage because the experimental objective is to estimate proportional systematic error, which is a percentage type of error. Good recovery is 100.0%. The difference between 100 and the observed recovery(in percent) is the proportional systematic error. We calculated the amount of analyte added by multiplying the concentration of the analyte added solution by the dilution factor(mL standard)/(mL standard + mL specimen) and took the difference between the sample with addition and the sample with dilution. When making judgments on method performance, the observed that the errors should be compared to the defined allowable error. The average recovery needs to be converted to proportional error(100%/Recovery) and then compared to an analytical quality requirement expressed in percent. The results of recovery experiments were total protein(101.4%), albumin(97.4%), total bilirubin(104%), alkaline phosphatase(89.1%), aspartate aminotransferase(102.8), alanine aminotransferase(103.2), gamma glutamyl transpeptidase(97.6%), creatine kinase(105.4%), lactate dehydrogenase(95.9%), creatinine(103.1%), blood urea nitrogen(102.9%), uric acid(106.4%), total cholesterol(108.5), triglycerides(89.6%), glucose(93%), amylase(109.8), calcium(102.8), inorganic phosphorus(106.3%). We then compared the observed error to the amount of error allowable for the test. There were no items beyond the CLIA criterion for acceptable performance.

  • PDF

Efficient Connection of Migration Routes with Their Weights Using EGOSST (EGOSST를 이용한 이동 경로의 가중치를 반영한 효과적 연결)

  • Kim, In-Bum
    • The KIPS Transactions:PartA
    • /
    • v.18A no.5
    • /
    • pp.215-224
    • /
    • 2011
  • In this paper, a mechanism connecting all weighted migration routes with minimum cost with EGOSST is proposed. Weighted migration routes may be converted to weighted input edges considered as not only traces but also traffics or trip frequencies of moving object on communication lines, roads or railroads. Proposed mechanism can be used in more wide and practical area than mechanisms considering only moving object traces. In our experiments, edge number, maximum weight for input edges, and detail level for grid are used as input parameters. The mechanism made connection cost decrease average 1.07% and 0.43% comparing with the method using weight minimum spanning tree and weight steiner minimum tree respectively. When grid detail level is 0.1 and 0.001, while each execution time for a connecting solution increases average 97.02% and 2843.87% comparing with the method using weight minimum spanning tree, connecting cost decreases 0.86% and 1.13% respectively. This shows that by adjusting grid detail level, proposed mechanism might be well applied to the applications where designer must grant priority to reducing connecting cost or shortening execution time as well as that it can provide good solutions of connecting migration routes with weights.

Energy Efficient Distributed Intrusion Detection Architecture using mHEED on Sensor Networks (센서 네트워크에서 mHEED를 이용한 에너지 효율적인 분산 침입탐지 구조)

  • Kim, Mi-Hui;Kim, Ji-Sun;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.151-164
    • /
    • 2009
  • The importance of sensor networks as a base of ubiquitous computing realization is being highlighted, and espicially the security is recognized as an important research isuue, because of their characteristics.Several efforts are underway to provide security services in sensor networks, but most of them are preventive approaches based on cryptography. However, sensor nodes are extremely vulnerable to capture or key compromise. To ensure the security of the network, it is critical to develop security Intrusion Detection System (IDS) that can survive malicious attacks from "insiders" who have access to keying materials or the full control of some nodes, taking their charateristics into consideration. In this perper, we design a distributed and adaptive IDS architecture on sensor networks, respecting both of energy efficiency and IDS efficiency. Utilizing a modified HEED algorithm, a clustering algorithm, distributed IDS nodes (dIDS) are selected according to node's residual energy and degree. Then the monitoring results of dIDSswith detection codes are transferred to dIDSs in next round, in order to perform consecutive and integrated IDS process and urgent report are sent through high priority messages. With the simulation we show that the superiorities of our architecture in the the efficiency, overhead, and detection capability view, in comparison with a recent existent research, adaptive IDS.

Roles of the Specialized Education Recognized by Professional Panels (전문가 패널들이 인식하는 공업계고등학교의 전문교육 역할)

  • Oh, Seung-gyun
    • 대한공업교육학회지
    • /
    • v.33 no.1
    • /
    • pp.1-22
    • /
    • 2008
  • The purpose of this research is to clarify the elements of the function of the role of industrial high schools that its experts perceived. The content of this research is verify the function element required for the performance of the role of specialized education through content validity ratio(CVR). This research adopted the method of literature research and Delphi method, which is to collect and come to an agreement of the opinions of the 26 research panels. The first round is constructed by the semi-constructed questionnaire for the analysis of the opinions of the panels by inductive method. The second round is to categorize the result of the first one into 7 domains, and asked each category by Likert's 5 scale checklists, and statistically analyzed mean, medium, standard deviation, and quartile. The third round is to statistically analyze Mean, standard deviation, medium, and validity ratio(CVR) to reassure the opinions of the panels on the basis of the result of the first one. The categorized contents of the function required for the performance of the specialized education in this research is 'in-service visit and in-service training', 'licence acquiring education', 'employment counseling and job employment information', 'custom-made education connected with industry', 'career education' and 'enhancement of basic career competency'. The panels are divided into professors, teachers, professionals, and policy administrators, and they verified the validity rate of the function role and priority of emphasis. The result showed that the tendency of the education is converting from physical function-centered education to education of emotional attitude and competence of thought.

An Empirical Review of Korean Perception for Technological Risks (한국인의 위험인지에 대한 경험적 분석)

  • Chung, Ik-Jae
    • Journal of the Korean Society of Safety
    • /
    • v.22 no.6
    • /
    • pp.91-97
    • /
    • 2007
  • A survey of risk perception in Korea was conducted in 2001 with a special emphasis on industrial and technological risks. This article summarizes the characteristics of risk perception in consideration of socio-demographic background of respondents. The survey with sample size of 1,870 evaluates the perceived level of 25 risk items in the areas of transportation, chemicals, environment, industry, and nuclear power generation. Risks are categorized by using factor analysis to clarify attitudinal or behavioral properties of risk perception. Research findings show that the level of perceived risk does not correspond to the statistical level. Socio-demographic variables are significant predictors in explaining risk perception, or the discrepancies between "subjective" and "objective" risks. Effective risk communication can reduce the perceptional discrepancies, improve the awareness of technological risks, and ultimately facilitate the process of making and implementing policies for risk management and safety regulation. This article tries to provides policy guidelines for "Who is the target for risk communication" and "Which risk has the policy priority for safety improvement." Married females at the age of 30s and 40s with lower education and lower income in small cities are more vulnerable to risk misperception than other groups. More information and knowledge regarding unfamiliar, intangible, new technological risks should be delivered to the vulnerable groups for reducing perceptional bias. Society-wide safety can be improved by integrating policy, human, and social factors as well as techno-engineering advances.

Design of PKMS(Process based on KMS) System Architecture for Public Organization Utilizing Integration of Business Process Management & Knowledge Management (업무프로세스관리-지식관리의 통합을 이용한 공공업무에 효과적인 지식기반 업무처리시스템 구축)

  • Jee, Sung-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.15D no.5
    • /
    • pp.705-712
    • /
    • 2008
  • Recently, interests in the notion of PKMS(Process based on Knowledge Management System) utilizing BPMS(Business Process Management System) and KMS(Knowledge Management System) have been significantly increased. Specially, most public organizations require their own effective knowledge management strategies since public business service needs various knowledge types. Based on a comprehensive framework that reflects lifecycle requirements of KMS and BPMS, we propose an PKMS system architecture, which performs step-by-step knowledge-providing strategy in public organization. To propose a PKMS architecture, this paper first investigates inter-relationships between public business and various knowledge types, and classifies knowledge types into three groups and then we suggest knowledge management strategies considering priority order among knowledge groups. Based on the proposed knowledge management, a PKMS system architecture can combine the advantages of the KM and BPM paradigms. This paper presents the PKMS system applied to employment insurance business part in real environment and demonstrated the advantages via inter-relationships between KM and BPM requirements.