The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
SCADA historically is responsible for monitoring and controlling critical infrastructures and manufacturing processes in an isolated environment. But with the requirement of a timely access of information for making decisions, large and modern companies being in a geographically diverse location take advantage of the internet as an important communication channel to allow the exchange of data. However,...
Internet SCADA was developed to widen the coverage span of the SCADA system. In this section, a double checking scheme for Internet SCADA Environment is analyzed. This is to improve the accuracy of data and to improve the performance of SCADA Systems. This scheme uses data from weather API Providers. Many API Provider such as Google, Yahoo, etc have Weather API’s. Weather API’s can give weather condition...
The industrial control and SCADA systems that are responsible for monitoring and controlling our critical infrastructures and manufacturing processes historically have operated in isolated environments. These control systems and devices communicated with each other almost exclusively, and rarely shared information with systems outside their environment. As more components of control systems become...
Radio Frequency Identification (RFID) is a technology that uses electronic tags to store data which in turn can be accessed in real time wirelessly. There is great potential for RFID technology in our society. RFID tags can be used for supply chain management, inventory systems, animal tracking, instant payments or even human implantation. Standards in the RFID industry are examined with an emphasis...
The image recognition system using CCTV camera has been introduced to minimize not only loss of life and property but also traffic jam in the tunnel. In this paper, object detection algorithm is proposed to track vehicles. The proposed algorithm is to detect cars based on Adaboost and to track vehicles to use Kalman filtering. As results of simulations, it is shown that proposed algorithm is useful...
This paper describes the way of Music Retrieval Method based on audio feature analysis techniques which is proposed with three major new algorithms to improve performance of conventional way and implements the whole system including client and server side prototype. The first one of the major algorithms is to extract the high level melody feature from polyphonic music using harmonic structure attribute...
When we talk with hands-free in a car or noisy lobby, the performance of the echo canceller degrade because background noise added to echo caused by the distance from mouth to microphone is relatively long. It gives a reason for necessity of noise-robust and high convergence speed adaptive algorithm. And if acoustic echo canceller operated not perfectly, residual signal going through the echo canceller...
In this paper, a fire detection algorithm based on video processing is proposed. Probability feature of smoke and flame is model by Gaussian mixture model. The whole process is divided into three parts, candidate flame or smoke selection, Gaussian mixture model calculation, and flame or smoke decision. The algorithm was implemented with fixed point DSP. As results of experiments, it is shown that...
In this paper, we have redesigned the conception of SOA (Service oriented Architecture) by extension to existing service registry, and based on this definition; proposed a FIPA agent platform capable of capturing SOA components. According to the FIPA specification and reference model, we adopt several new Web service components called AgWebs in the FIPA agent system. They are designed the service...
Encryption is a well established technology for protecting sensitive data. Unfortunately, the integration of existing encryption techniques with database systems causes undesirable performance degradation. We propose the bucket ID transformation that supports range queries without exposing the order of plaintext. The Bucket ID Transformation is performed by modulo arithmetic or pseudo-random number...
In this paper, we reinterpreted the features of a set-top box system by applying a SOA (Service Oriented Architectures) like that used in the web-based Internet and improved the way messages are handled. Our set-top box system can respond to multiple requirements.
Rise in the use of mobile Internet is increasing the volume of data stored and managed on a daily basis beyond TB level. Google, Yahoo and Amazon, etc. are developing proprietary distributed computing platform technologies based on massive cluster to store and manage data in large quantity. One of the best-known applications of cloud computing is u-Healthcare service. u-Healthcare adopts cloud computing...
Wireless communication systems based on the Viterbi algorithm use various specifications which meets to error correction performance required by channel variations. Since decoder is designed with specification for the worst case channel state it wastes energy even in the good channel state. In this paper we present new Viterbi decoder architecture which can change its specification adaptively. It...
Republic of Korea became the norm in the smartphone. Especially social networking services have been spread with a smartphone. With the increasing use of social network service, privacy violations are increasing. A study deals with the privacy and the right of forgotten. Particularly the right to be forgotten has emerged recently. So the right to be forgotten is still under discussion. This article...
Recently, two or three among them are being integrated and applying to many fields such as agriculture, livestock industry, construction, medical service and so on. Therefore, there is increasing research to make an interface to integrate them. Therefore, we present an integrated adaptor of video, sensor data, and location information collected in mobile sensing nodes for tracking and surveillance...
This paper presents a low-complexity algorithm for an H.264/AVC encoder. The proposed motion estimation scheme determines the best coding mode for a given macroblock (MB) by finding motion-blurred MBs; identifying, before motion estimation, an early selection of MBs; and hence saving processing time for these MBs. It has been observed that human vision is more sensitive to the movement of well-structured...
This paper proposes the LQ-Servo control for input-time-delayed AQM(Active Queue Management) using Loop-shaping method. The proposed controller structure is made by both taking a traditional servo mechanism based on Linear Quadratic approach and augmenting a new state variable. And, the new loop shaping method is developed by shifting all zeros to a larger pole of AQM model to determine the design...
Recently, as the number of photos to be managed grows, photo classification becomes one of the most burdensome tasks. Besides, these technical advances encourage people to take duplicate photos for the more clear and the more user-wanted photos. This paper presents an automated clustering method to classify hundreds of photos considering the people’s recent photographing behavior. First, we partition...
As software is varied and grew in size, the importance of clear understanding and representing customer’s need, has been emphasized. It is not easy to drive and define critical system needs, since requirements in early stage of the development, is abstract and conceptual. In this paper, to drive clear customer’s requirements, Macrostruktur concept of textlinguistics is used. First, Macrostruktur of...
A CCTV to ensure the safety of the routine has been used as a tool. Especially in recent years, CCTV has improved the performance of the hardware. As an example, CCTV were realized connection to a smart phone and supporting high-definition CCTV with the advent of CCTV images. This paper is part of the study for an effective monitoring of the object to define the role of private CCTV Multiple CCTV...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.