• Title/Summary/Keyword: time-synchronization

Search Result 1,153, Processing Time 0.027 seconds

Emotion Recognition Implementation with Multimodalities of Face, Voice and EEG

  • Udurume, Miracle;Caliwag, Angela;Lim, Wansu;Kim, Gwigon
    • Journal of information and communication convergence engineering
    • /
    • v.20 no.3
    • /
    • pp.174-180
    • /
    • 2022
  • Emotion recognition is an essential component of complete interaction between human and machine. The issues related to emotion recognition are a result of the different types of emotions expressed in several forms such as visual, sound, and physiological signal. Recent advancements in the field show that combined modalities, such as visual, voice and electroencephalography signals, lead to better result compared to the use of single modalities separately. Previous studies have explored the use of multiple modalities for accurate predictions of emotion; however the number of studies regarding real-time implementation is limited because of the difficulty in simultaneously implementing multiple modalities of emotion recognition. In this study, we proposed an emotion recognition system for real-time emotion recognition implementation. Our model was built with a multithreading block that enables the implementation of each modality using separate threads for continuous synchronization. First, we separately achieved emotion recognition for each modality before enabling the use of the multithreaded system. To verify the correctness of the results, we compared the performance accuracy of unimodal and multimodal emotion recognitions in real-time. The experimental results showed real-time user emotion recognition of the proposed model. In addition, the effectiveness of the multimodalities for emotion recognition was observed. Our multimodal model was able to obtain an accuracy of 80.1% as compared to the unimodality, which obtained accuracies of 70.9, 54.3, and 63.1%.

A Study on the Development of an Automatic Classification System for Life Safety Prevention Service Reporting Images through the Development of AI Learning Model and AI Model Serving Server (AI 학습모델 및 AI모델 서빙 서버 개발을 통한 생활안전 예방 서비스 신고 이미지 자동분류 시스템 개발에 대한 연구)

  • Young Sic Jeong;Yong-Woon Kim;Jeongil Yim
    • Journal of the Society of Disaster Information
    • /
    • v.19 no.2
    • /
    • pp.432-438
    • /
    • 2023
  • Purpose: The purpose of this study is to enable users to conveniently report risks by automatically classifying risk categories in real time using AI for images reported in the life safety prevention service app. Method: Through a system consisting of a life safety prevention service platform, life safety prevention service app, AI model serving server and sftp server interconnected through the Internet, the reported life safety images are automatically classified in real time, and the AI model used at this time An AI learning algorithm for generation was also developed. Result: Images can be automatically classified by AI processing in real time, making it easier for reporters to report matters related to life safety.Conclusion: The AI image automatic classification system presented in this paper automatically classifies reported images in real time with a classification accuracy of over 90%, enabling reporters to easily report images related to life safety. It is necessary to develop faster and more accurate AI models and improve system processing capacity.

Parallelization Method of Slice-based video CODEC (슬라이스 기반 비디오 코덱 병렬화 기법)

  • Nam, Jung-Hak;Ji, Bong-Il;Jo, Hyun-Ho;Sim, Dong-Gyu;Cho, Dae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.6
    • /
    • pp.48-56
    • /
    • 2010
  • Recently, we need to dramatically speed up real-time video encoding and decoding on mobile devices because complexity of video CODEC is significantly increasing along with the demand for multimedia service of high-quality and high-definition videos by users. A variety of research is conducted for parallelism of video processing using newly developed multi-core platforms. In this paper, we propose a method of parallelism based on slice partition of video compression CODEC. We propose a novel concept of a parallel slice for parallelism and propose a new coding order to be adequate to the parallel slice which keeps high coding efficiency. To minimize synchronization time of multiple parallel slices, we also propose a synchronization method to determinate whether the parallel slice could be independently decoded or not. Experimental results shows that we achieved 27.5% (40.7%) speed-up by parallelism with bit-rate increase of 3.4% (2.7%) for CIF sequences (720p sequences) by implementing the proposed algorithm on the H.264/AVC.

Meteorological Condition and Pest Management (기상환경과 병해충 발생 및 그 대책)

  • 현재선
    • KOREAN JOURNAL OF CROP SCIENCE
    • /
    • v.27 no.4
    • /
    • pp.361-370
    • /
    • 1982
  • The effects of climatic factors on organisms lire variable and complex, and it, however, can be interpreted in terms of those on the distribution and those on the population densities. The distribution of an organism may largely be determined by the temperatures, except some temporal organisms which are depended on the air mass movements. Population density of an organism is determined by various climatic factors, such as previous winter temperature, temperature of growing season and rainfall. The start of growing season of the rice plants has been shifted to earlier since last decade in Korea. This may mean that the overall climatic condition during the growing season might be considerably different from those in past years, and such a difference in climatic conditions might have close relation with the recent status of the diseases and insect pests through direct effects on the physiology and population dynamics of the organisms, as well as through on the biotic associations of the pest organisms. The white back planthopper and brown planthopper have become the key insect pests in Korea in recent years. They are migratory and have high reproductive pontentials and more generations than average residential insects. The synchronization of the migrants and physiological condition of the rice plants seems to be the important factors in relation to the recent outbreaks of these insects; the high reproductive rate can be obtained with the growth stage of rice being 30-50 days after transplanting. The modication of the microclimate associated with high plant density and some other introduced new cultural techniques also have some relation with the outbreak. The key diseases of the rice are the blast disease, sheath blight and the bacterial leaf blight. For the rice blast, the seedling blast and leaf blast during the early growing season and the neck blast, have become more serious, the former may be related to hotbed nursery and the later may be related to the high humidity in early August, and synchronization of the heading time which has been shifted to early part from middle or late part of August. In general, for the rice diseases, the development of the new races have been the most serious which are largely resulted from the introduction of the new varieties, but it also seems to be related with the prolonged periods of the favorable condition associated with the shifted growing seasons. In general, the diseases and insect pest problems have become much more variable and complex, and control measures should be based on the thorough knowledge of the ecology of the pest organisms, that is, effects of various environmental factors on the disease cycle; spore release, spore deposition, infection, colonization and sporulation of the disease organisms, and those on the development, reproductive potentials, dispersal, age specific responses of the insects. The well organized real-time pest management systems, such as alfalfa weevil management system developed at the Purdue University in U.S., is the prime importance for the implementation of the pest management principles.

  • PDF

Mutual-Backup Architecture of SIP-Servers in Wireless Backbone based Networks (무선 백본 기반 통신망을 위한 상호 보완 SIP 서버 배치 구조)

  • Kim, Ki-Hun;Lee, Sung-Hyung;Kim, Jae-Hyun
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.1
    • /
    • pp.32-39
    • /
    • 2015
  • The voice communications with wireless backbone based networks are evolving into a packet switching VoIP systems. In those networks, a call processing scheme is required for management of subscribers and connection between them. A VoIP service scheme for those systems requires reliable subscriber management and connection establishment schemes, but the conventional call processing schemes based on the centralized server has lack of reliability. Thus, the mutual-backup architecture of SIP-servers is required to ensure efficient subscriber management and reliable VoIP call processing capability, and the synchronization and call processing schemes should be changed as the architecture is changed. In this paper, a mutual-backup architecture of SIP-servers is proposed for wireless backbone based networks. A message format for synchronization and information exchange between SIP servers is also proposed in the paper. This paper also proposes a FSM scheme for the fast call processing in unreliable networks to detect multiple servers at a time. The performance analysis results show that the mutual backup server architecture increases the call processing success rates than conventional centralized server architecture. Also, the FSM scheme provides the smaller call processing times than conventional SIP, and the time is not increased although the number of SIP servers in the networks is increased.

Wireless Water Leak Detection System Using Sensor Networks (센서네트워크를 이용한 무선 누수 탐지 시스템)

  • Choi, Soo-Hwan;Eom, Doo-Seop
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.125-131
    • /
    • 2011
  • Water leak detection system is a system based on wireless sensor networks(WSNs) which detect a leak on water supply, localize the leak position and finally inform a water management center. A traditional leak detection method is to use experienced personnel who walk along a pipeline listening to the sound that is generated by the leaks and their effectiveness depend on the experience of the user. Also making more successful detection, it should be processed at middle of the night when people do not use water, as the result users have to operate the leak detection system at midnight. In this paper, we propose a new method for the water leak detection system based on the WSNs and describe it in detail. Leak detection devices which detect a leakage of water transmit and receive the result of water leak detection with each other by configuring WSNs to improve reliability of the detection result. Also, we analyzed the sound from water flowed in pipeline, proposed the pre-signal processing to separate a leakage sound from noisy sound. And lastly, It is especially important to make a time synchronization with water leak detection devices that are installed on the pipeline, we used 1PPS(1 Pulse Per Second) signal generated by GPS, therefore we could get a precise time synchronization. The proposed system set up in Namyangju and performances were evaluated.

Active Congestion Control Using Active Router′s Feedback Mechanism (액티브 라우터의 피드백 메커니즘을 이용한 혼잡제어 기법)

  • Choe, Gi-Hyeon;Jang, Gyeong-Su;Sin, Ho-Jin;Sin, Dong-Ryeol
    • The KIPS Transactions:PartC
    • /
    • v.9C no.4
    • /
    • pp.513-522
    • /
    • 2002
  • Current end-to-end congestion control depends only on the information of end points (using three duplicate ACK packets) and generally responds slowly to the network congestion. This mechanism can't avoid TCP global synchronization which TCP congestion window size is fluctuated during congestion occurred and if RTT (Round Trip Time) is increased, three duplicate ACK packets is not a correct congestion signal because congestion maybe already disappeared and the host may send more packets until receive the three duplicate ACK packets. Recently there is increasing interest in solving end-to-end congestion control using active network frameworks to improve the performance of TCP protocols. ACC (Active congestion control) is a variation of TCP-based congestion control with queue management In addition traffic modifications nay begin at the congested router (active router) so that ACC will respond more quickly to congestion than TCP variants. The advantage of this method is that the host uses the information provided by the active routers as well as the end points in order to relieve congestion and improve throughput. In this paper, we model enhanced ACC, provide its algorithm which control the congestion by using information in core networks and communications between active routers, and finally demonstrate enhanced performance by simulation.

Throughput Performance of Slotted ALOHA Communication System with Guard Time and Capture Effect (신호점유 현상과 보호시간을 고려한 슬롯형 알로아 통신 시스템의 성능분석)

  • 이현구;곽경섭
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.18 no.7
    • /
    • pp.989-998
    • /
    • 1993
  • In a bursty user traffic mode, ALOHA random multiple access protocol achieves higher performance than any conventional fixed assignment technique. One of central problems in slotted ALOHA is synchronization. Because of the long propagation delay in satellite mobile communication, packet may be spilt over into adjacent slots and thus guard time may be included between packet intervals. In conventional ALOHA channels, simultaneous transmission by two or more users results in a collision : the unsuccessful packets have to be retransmitted according to some retransmission algorithm. However, in a radio environment, users are often at different distances from the receiver : therefore, their received signals have substantially different power levels. The packet arriving with the highest energy now has a good chance of being detected accurately. Similarly, in some spread-spectrum random access systems, the earliest arriving packet dominates later arriving packets and thus captures the channel. In this paper slotted ALOHA channel with non zero guard time and capture probability is studied. Using the Markovian model, the performance of slotted ALOHA with guard time and capture effects is derived and compared with that of the conventional ALOHA via numerical analysis.

  • PDF

A Localization Using Multiple Round Trip Times in Wireless Sensor Networks (무선 센서 네트워크에서 다중 왕복시간차를 이용한 위치측정)

  • Jang, Sang-Wook;Ha, Rhan
    • Journal of KIISE:Information Networking
    • /
    • v.34 no.5
    • /
    • pp.370-378
    • /
    • 2007
  • In wireless sensor networks (WSNs), thousands of sensors are often deployed in a hostile environment. In such an environment, WSNs can be applied to various applications by using the absolute or relative location information of the sensors. Until now, the time-of-arrival (TOA) based localization method has been considered most accurate. In the TOA method, however, inaccuracy in distance estimation is caused by clock drift and clock skew between sensor nodes. To solve this problem, several numbers of periodic time synchronization methods were suggested while these methods introduced overheads to the packet traffic. In this paper, we propose a new localization method based on multiple round-trip times (RTOA) of a signal which gives more accurate distance and location estimation even in the presence of clock skew between sensor nodes. Our experimental results show that the Proposed RTOA method gives up to 93% more accurate location estimation.

The Password base System for the safe and Efficient Identification (안전하고 효율적인 신원확인을 위한 암호기반 시스템)

  • Park, Jong-Min;Park, Byung-Jun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.1
    • /
    • pp.81-86
    • /
    • 2009
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we propose a new identification scheme One Pass Identification. The security of Password base System is based on the square root problem, and Password base System is secure against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of Password base System is one, and Password base System processes the password and does not need the key. We think that Password base System is excellent for the consuming time to verify the prover.