2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.1-12
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
One method to compress a pair of stereo images is to compress the first image independently and then compress the second image by estimating the disparity between the two images. The first image was transformed using 2-D Discrete Cosine Transform, quantized using the JPEG quantization matrix and finally encoded into a bitstream using arithmetic encoding. The disparity between the two images was estimated by the Exhaustive Block Matching Algorithm (EBMA) and the resulting disparity vector was then encoded into a bitstream. The images were then decoded and were compared with the original images.
A New Enhancement Approach for Enhancing Image of Digital Cameras by Changing the Contrast
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.13-22
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This article introduces a new image Enhancement approach suitable for digital cameras. High contrast images are common in the scenes with dark shadows and bright light sources. It is difficult to show the details in both dark and light areas simultaneous on most display devices. For solving this problem, there are many methods of image enhancement proposed to improve the quality of the images. However, most of them often get poor results if the images are high contrast and have wide dynamic range. This method for enhancing the high-contrast digital camera images, which enhances the global brightness and contrast of images while preserving details. It is based on a two-scale decomposition of the image into a base layer, encoding large-scale variations, and a detail layer. The base layer is obtained using an edge preserving filter that is a weighted average of the local neighborhood samples, where the weights are computed based on temporal and radiometric distances between the center sample and the neighboring samples. Only the base layer image is enhanced automatically by using histogram equalization method, thereby preserving detail. The experimental results show the proposed method provides a significant enhancement for the high-contrast images and requires no parameter setting. And also in this work processing cost reduction when the new approach is followed.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.23-32
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In the present paper, the backbone and the broadband wireless access communication network technologies can increasingly provide unprecedented bandwidth capacities, the focus is being gradually shifted toward broadband access technologies capable of connecting the customer premises to the local exchange. Optical wireless is increasingly becoming an attractive option for multi gigabit per second within short range (up to 5 km) links where laying optical fiber is too expensive or impractical. For such links, a tracking scheme is essential to maintain proper pointing of the transceivers at each other to establish error-free communication The optical wireless technology is used mostly in wide bandwidth data transmission applications. As well as we have investigated the maximum transmission distance and data transmission bit rates that can be achieved within broadband wireless optical links for multi giga bit optical network applications. The wireless optical broadband access network architecture has been proposed as a flexible solution to meet the ever-demanding needs in access networks. At the wireless front end multi channel communication, with routers having multiple radio interfaces tuned to non overlapping channels, can be used to improve network throughput in a cost effective way.
Level Based Path Selection Technique in Large WSN for Hierarchical Architecture
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.33-44
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
One of the main design issues of wireless sensor network (WSN) is to prolong the network lifetime and prevent connectivity degradation by employing energy management techniques. But a single route does not make any solution of in terms of energy because it rapidly drains energy of relay nodes. As a result these nodes die quickly than others. In this paper, we present a novel level based path selection and data forwarding techniques for large WSN for hierarchical architecture. In this structure cluster head (CH) is responsible for data fusion and data forwarding. So CHs expense more energy than other nodes. In this work base station constructs multiple routes among the CHs based on the path cost. In the data forwarding phase a CH selects a path from its route cache by considering both path cost and residual energy. Simulation result shows that our proposed technique achieves much higher performance than the classical routing protocols such as LEACH, flooding.
Study and Performance Comparison of AODV & DSR on the basis of Path Loss Propagation Models
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.45-52
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Mobile Ad-Hoc networks (MANETs) are collection of mobile nodes that dynamically forming a temporary network without pre-existing network infrastructure and communicate with its neighbors to perform peer to peer communication and transmission. It offers unique benefits and versatility for certain environments and certain applications. Since there is no prerequisite fixed infrastructure and base stations, they can be created and used anytime, anywhere. Propagation models focused on predicting the average received signal strength at a given distance from the transmitter, as well as the variability of the signal strength in close spatial proximity to a particular location. The accuracy of any particular propagation model in any given condition will depend on the suitability among the constraints required by the model and depend on terrain. A number of propagation models like Free Space and Two Ray ground have been exist. In this paper, we present comparative study on the behavior of various routing protocols with path loss propagation models, various performance metrics used for this comparison such as packet delivery fraction, average jitter, throughput and average end to end delay. The studies would be helpful in choosing the correct protocol for any active operating environment.
Analysis of Performance in the Virtual Machines Environment
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.53-64
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a scheme that manages the Performance and resource of virtual machines that are used to host computing applications. As the size and complexity of modern computing systems keep increasing to meet the demanding requirements of Performance applications, manageability is becoming a important concern to achieve both performance and productivity computing. Meanwhile, virtual machine (VM) technologies have become well-liked in both industry and academia due to various features designed to ease system management and administration. While a VM-based environment can greatly help productivity on large-scale application system. In this paper, we provide an analytic framework for the performance analyzing either without running a system or in a run able real system. With these market trends toward virtual environments, many research groups are developing evaluation tools to check the performance of virtual systems and their overheads. However, the performance characterization in virtual environments has not been established yet for many challenging issues. However, achieving close to peak performance requires careful attention to a plethora of system details. The benefits of virtualization are typically considered to be server consolidation, (leading to the reduction of power and cooling costs) increased availability, isolation, ease of operating system deployment and simplified disaster recovery. One main challenge for virtualization, the need to maximize throughput with minimal loss of CPU and I/O efficiency.
Functional Architecture for 5G Mobile Networks
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.65-78
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper we propose novel network architecture for next generation 5G mobile networks. The proposed architecture is based on user-centric mobile concept in heterogeneous wireless environment. The implementation of the proposed architecture is performed in the service stratum, while the radio access technologies belong to the transport stratum regarding the Next Generation Networks approach. In the proposed architecture the mobile terminal has the possibility to change the Radio Access Technology - RAT based on certain user criteria. For the purpose of transparent change of the RATs by the mobile terminal, we introduce so-called Policy-Router as a new node in the core network, which establishes IP tunnels to the mobile terminal via different available RATs to the terminal. The selection of the RAT is performed by the mobile terminal using user agent for multi-criteria decision making, which is using the newly defined QoS policy-based routing procedure.
A Novel Fuzzy logic Based Impulse Noise Filtering Technique
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.79-88
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
A novel fuzzy logic based filtering technique is proposed to restore images corrupted by impulse noise. The proposed scheme is in two phases namely the detection of noisy pixels at all locations in the image using fuzzy knowledge based and application of recursive median filter on the corrupted pixels to remove the impulse noise. The performance of the proposed technique is tested on various test images corrupted at various noise densities and also compared with some of the existing filters. Experimental results show that the proposed technique exhibits superior performance than their counterparts and is efficiently capable of removing fixed-valued impulse noise densities, ranging from 5% to 40% in the image while at the same time effectively preserving the useful information in the image.
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.89-96
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
M-learning offers enterprises the ability to keep their employees engaged in ongoing learning activities that will enhance their productivity and effectiveness, while they work. M-learning can deliver "just in time learning" to enable workers to solve immediate problems and remember the solutions. Because of its portability and low cost, this concept can also be applied to basic education in rural and remote areas. This will greatly expand the educational opportunities and contribute to reducing digital gap in developing countries. The research population included all the extension agents in rural services centers in Phoomanat province (with population size N=78) and a census study was conducted. This study employed the ordinal logistic regression to design an efficient mobile training system in rural areas of Iran. Namely, the results indicated that the factors which affect on designing an efficient mobile training system are self-directed learning skills, Mobile skills, and Equipment factors.
Study of Impact Analysis of Software Requirement Change in SAP ERP
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.95-100
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As software systems become increasingly large and complex, the need increases to predict and control the effects of software changes. Our research objective is to provide an impact analysis methodology that uses historical change record for executable and non executable files in a software system to identify and prioritize potentially affected area of a system modification based on risk. Software Change Impact Analysis captures the latest information on the science and art of determining what software parts affect each other. It provides ideas for doing impact analysis better, presents a framework for the field, and focuses attention on important results. To identifies key impact analysis definitions and themes and illustrates the important themes to give a solid understanding for tackling impact analysis problems specifically in ERP. It includes study on software source code dependency analysis and software traceability analysis and shows how results from both areas can more effectively support impact analysis in software engineering repositories.
Visualizing Pipeline Sensors Datasets Using Augmented Reality Based Prototype
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.97-108
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Pipeline sensors generates significant amount of multivariate datasets during normal and leak situations. Therefore we have developed a data model to effectively manage such data and enhance the computational support needed for the effective data explorations. In this paper we discuss the development of an Augmented Reality (AR) - based scientific visualization system prototype that supports identification, localisation, and 3D visualisation of oil pipeline leakages sensors datasets. A challenge of this approach is to reduce the data inefficiency powered by the disparate, repeated, inconsistent and missing attributes of most available sensors datasets. To handle this challenge, this paper aim to develop an AR-based scientific visualization interface which automatically identifies, localise and visualizes all necessary data relevant to a particularly selected region of interest (ROI) along the virtual pipeline. Necessary system architectural supports needed as well as the interface requirements for such visualizations are also discussed in this paper.
Optimization of Operating Parameters of Desiccant Wheel for Rotation Speed
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology Vol.32 2011.07 pp.109-116
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Desiccant wheels are used in commercial and industrial applications to perform air dehumidification operations by utilizing low grade heat source. Software provided by the manufacturer is used to select a honeycombed rotary desiccant wheel as per requirements of the client on the website by Novel Air Technologies. The performance of the software has been verified by comparing the results obtained by the software with those published in reputed journals. Using the software, the performance of an adiabatic rotary dehumidifier is parametrically studied and the optimal rotational speed is determined by examining the moisture removed by process area in the desiccant wheel. Also the effect of air flow rate on the reactivation air and process air has been studied. The basic parameters for a particular wheel of thickness 200 mm and diameter 550 mm are: ambient air at 30 0C DBT and 17 g/kg humidity ratio, process air flow rate vary between 1.5 m/s to 5.5 m/s, reactivation air flow rate lies between 1.5 m/sec to 5.5 m/sec and rotational speed of wheel varies from 10 RPH to 40 RPH. On the basis of results the following recommendations have been made: It was observed that for low velocity of process air (1.5 m/s to 2.5 m/s), 10RPH and 20RPH are found to be optimum for operation. In case of high velocity (>2.5), little effect of RPH is observed, however the most optimum RPH is found to be 20. For both high and low reactivation inlet velocity, 20 RPH is the most optimum rotation speed. However, the best results are observed at 3.5m/s to 4.5m/s reactivation inlet velocity.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.