• Title/Summary/Keyword: 사전등록

Search Result 208, Processing Time 0.022 seconds

Video Copy Detection Algorithm Against Online Piracy of DTV Broadcast Program (DTV 방송프로그램의 온라인 불법전송 차단을 위한 비디오 복사본 검출 알고리즘)

  • Kim, Joo-Sub;Nam, Je-Ho
    • Journal of Broadcast Engineering
    • /
    • v.13 no.5
    • /
    • pp.662-676
    • /
    • 2008
  • This paper presents a video copy detection algorithm that blocks online transfer of illegally copied DTV broadcast programs. Particularly, the proposed algorithm establishes a set of keyframes by detecting abrupt changes of luminance, and then exploits the spatio-temporal features of keyframes. Comparing with the preregistered features stored in the database of DTV broadcast programs, the proposed scheme performs a function of video filtering in order to distinguish whether an uploaded video is illegally copied or not. Note that we analyze only a set of keyframes instead of an entire video frame. Thus, it is highly efficient to identify illegal copied video when we deal with a vast size of broadcast programs. Also, we confirm that the proposed technique is robust to a variety of video edit-effects that are often applied by online video redistribution, such as apsect-ratio change, logo insertion, caption insertion, visual quality degradation, and resolution change (downscaling). In addition, we perform a benchmark test in which the proposed scheme outperforms previous techniques.

U-Healthcare user's privacy protection protocol with Implantable medical Device of State Information (상태정보에 따른 체내삽입형 장치를 부착한 유-헬스케어 환자의 프라이버시 보호 프로토콜)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.4C
    • /
    • pp.297-306
    • /
    • 2012
  • IT technology of U-healthcare system is being grafted onto medical services and the use of U-healthcare system are extending steadily. However, in case of patients using Implantable Medical Device (IMD) in U-healthcare system, patients' privacy protection and safe access to system recently has emerged as a major issue. This paper proposes a patients' privacy protection protocol to prevent any illegal accesses from third parties as state value and action value are synchronized after patients' information virtualization. The proposed protocol can limit the access range of patients' information according to authentication information of hospitals, doctors, nurses, and pharmacies registered in the U-healthcare server. Additionally, this protocol can increase management efficiency for patients' privacy by synchronizing state values and action values only for approved information and, by instituting this process, third parties cannot easily access patients' information.

A Study on VoiceXML Application of User-Controlled Form Dialog System (사용자 주도 폼 다이얼로그 시스템의 VoiceXML 어플리케이션에 관한 연구)

  • Kwon, Hyeong-Joon;Roh, Yong-Wan;Lee, Hyon-Gu;Hong, Hwang-Seok
    • The KIPS Transactions:PartB
    • /
    • v.14B no.3 s.113
    • /
    • pp.183-190
    • /
    • 2007
  • VoiceXML is new markup language which is designed for web resource navigation via voice based on XML. An application using VoiceXML is classified into mutual-controlled and machine-controlled form dialog structure. Such dialog structures can't construct service which provide free navigation of web resource by user because a scenario is decided by application developer. In this paper, we propose VoiceXML application structure using user-controlled form dialog system which decide service scenario according to user's intention. The proposed application automatically detects recognition candidates from requested information by user, and then system uses recognition candidate as voice-anchor. Also, system connects each voice-anchor with new voice-node. An example of proposed system, we implement news service with IT term dictionary, and we confirm detection and registration of voice-anchor and make an estimate of hit rate about measurement of an successive offer from information according to user's intention and response speed. As the experiment result, we confirmed possibility which is more freely navigation of web resource than existing VoiceXML form dialog systems.

The Effects of the Magic Program on Depression and Self-esteem in Rural Low-Income Children (마술요법이 농촌 빈곤아동의 우울과 자존감에 미치는 효과)

  • Park, Kyong-Mi;Gang, Moon-hee;Oh, Kyong-ok
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.207-213
    • /
    • 2017
  • The study aimed to evaluate the effects of the magic program on the depression and self-esteem in rural low-income children. A quasi-experimental study employing a nonequivalent control group and pre-post design was conducted. The participants were children aged 9 to 12 years old from community child center in K province (Experimental group=24, Control group=21). The experimental group participated in the program for 8 sessions for 8 weeks. Data were analyzed using ${\chi}^2$-test, independent t-test, repeated measures ANCOVA with SPSS 21.0 program. There were significant differences in depression (F=6.68, p=.013) and self-esteem (F=7.61, p=.009) of participants between experimental group and control group after completion of 8-session magic program. The results indicate that the magic program can be used to improve depression and self-esteem of low-income children.

Association Based Reasoning Method Using Rescorla-Wagner Model and Galton Free Association Test for Augmented Reality E-Commerce (증강현실 전자상거래 위한 Rescorla-Wagner 모형과 Galton 자유연상 실험을 활용한 연상 기반 추론 방법)

  • Kwon, Oh-Byung;Jung, Dong-Young
    • The Journal of Society for e-Business Studies
    • /
    • v.14 no.3
    • /
    • pp.131-151
    • /
    • 2009
  • Natural interface is important to select and provide the services in ubiquitous smart space such as u-plant, u-distribution. Augmented Reality(AR) has recently begun to receive attention as a realization tool for natural interface. AR provides virtual object on real environment and it differs from virtual reality. When AR is used, it has advantage to provide information intuitively and collaboratively. However AR is rarely used in e-commerce domain of ubiquitous smart space, and it has limitation which predefined information and services provide in a static manner. Hence, the purpose of this paper is to propose a methodology of AR based e-commerce which provides personalized association service by considering user's dynamic context. To do so, association algorithm is developed based on Rescorla-Wagner model and Galton's free association test.

  • PDF

TRIB : A Clustering and Visualization System for Responding Comments on Blogs (TRIB: 블로그 댓글 분류 및 시각화 시스템)

  • Lee, Yun-Jung;Ji, Jung-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartD
    • /
    • v.16D no.5
    • /
    • pp.817-824
    • /
    • 2009
  • In recent years, Weblog has become the most typical social media for citizens to share their opinions. And, many Weblogs reflect several social issues. There are many internet users who actively express their opinions for internet news or Weblog articles through the replying comments on online community. Hence, we can easily find internet blogs including more than 10 thousand replying comments. It is hard to search and explore useful messages on weblogs since most of weblog systems show articles and their comments to the form of sequential list. In this paper, we propose a visualizing and clustering system called TRIB (Telescope for Responding comments for Internet Blog) for a large set of responding comments for a Weblog article. TRIB clusters and visualizes the replying comments considering their contents using pre-defined user dictionary. Also, TRIB provides various personalized views considering the interests of users. To show the usefulness of TRIB, we conducted some experiments, concerning the clustering and visualizing capabilities of TRIB, with articles that have more than 1,000 comments.

The Effects of Loving-Kindness Meditation Intervention with Tea on the Mindfulness, Resilience, and Stress of College Students (자비명상이 대학생들의 마음챙김, 회복 탄력성 및 스트레스에 미치는 영향)

  • Kim, Joung-Gun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.4
    • /
    • pp.75-85
    • /
    • 2017
  • This study investigated the effect of loving-kindness meditation intervention on the mindfulness, resilience and stress of college students. Thirty students not receiving any training in meditation intervention were randomly divided into meditation (15 subjects) and control (15 subjects)groups. The meditation group underwent meditation for 10 weeks, once a week, about 80 minutes each time. The results revealed that the experimental group showed significant improvement effect on mindfulness, resilience, and stress compared to the control group. It was concluded that loving-kindness meditation can effectively improve mindfulness, resilience and stress for college students.

Step-by-step Approach for Effective Korean Unknown Word Recognition (한국어 미등록어 인식을 위한 단계별 접근방법)

  • Park, So-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.369-372
    • /
    • 2009
  • Recently, newspapers as well as web documents include many newly coined words such as "mid"(meaning "American drama" since "mi" means "America" in Korean and "d" refers to the "d" of drama) and "anseup"(meaning "pathetic" since "an" and "seup" literally mean eyeballs and moist respectively). However, these words cause a Korean analyzing system's performance to decrease. In order to recognize these unknown word automatically, this paper propose a step-by-step approach consisting of an unknown noun recognition phase based on full text analysis, an unknown verb recognition phase based on web document frequency, and an unknown noun recognition phase based on web document frequency. The proposed approach includes the phase based on full text analysis to recognize accurately the unknown words occurred once and again in a document. Also, the proposed approach includes two phases based on web document frequency to recognize broadly the unknown words occurred once in the document. Besides, the proposed model divides between an unknown noun recognition phase and an unknown verb recognition phase to recognize various unknown words. Experimental results shows that the proposed approach improves precision 1.01% and recall 8.50% as compared with a previous approach.

  • PDF

A Study on Hybrid Fuzzing using Dynamic Analysis for Automatic Binary Vulnerability Detection (바이너리 취약점의 자동 탐색을 위한 동적분석 정보 기반 하이브리드 퍼징 연구)

  • Kim, Taeeun;Jurn, Jeesoo;Jung, Yong Hoon;Jun, Moon-Seog
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.6
    • /
    • pp.541-547
    • /
    • 2019
  • Recent developments in hacking technology are continuing to increase the number of new security vulnerabilities. Approximately 80,000 new vulnerabilities have been registered in the Common Vulnerability Enumeration (CVE) database, which is a representative vulnerability database, from 2010 to 2015, and the trend is gradually increasing in recent years. While security vulnerabilities are growing at a rapid pace, responses to security vulnerabilities are slow to respond because they rely on manual analysis. To solve this problem, there is a need for a technology that can automatically detect and patch security vulnerabilities and respond to security vulnerabilities in advance. In this paper, we propose the technology to extract the features of the vulnerability-discovery target binary through complexity analysis, and select a vulnerability-discovery strategy suitable for the feature and automatically explore the vulnerability. The proposed technology was compared to the AFL, ANGR, and Driller tools, with about 6% improvement in code coverage, about 2.4 times increase in crash count, and about 11% improvement in crash incidence.

A study on the job creating process of ISE(public private certificate) (공인민간자격 산업보안관리사(ISE)의 창직 과정 고찰)

  • Yim, Heon-Wook
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.11-17
    • /
    • 2018
  • The number of certificates in Korea is about 32,364(2018.09). There are 252 national technical qualifications, 149 national professional qualifications, 99 public private qualifications, and 31,894 private qualifications. The purpose of this study is to examine the process by which KAITS ISE is created. The course was examined and formalized for 10 years from the establishment of KAITS to the first test. As a result of the research, (1) Preparatory considerations (2) Development of qualifications framework (3) Job analysis and drafting (4) Development of problem banks (5) Design of curriculum (6) Development of verification strategy (7) Execution of verification (8) Revenue plan (9) Expansion of qualification demand (10) Opinion formation. After that, the module of the creativity is studied. It is expected that it will be used as a model for certification development in industry security consulting experts.

  • PDF