• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.028 seconds

Effects of time compression on auditory working memory and decision making process in normal hearing subjects (시간 압축이 청각 작업기억과 의사 결정 과정에 미치는 영향)

  • Lim, Dukhwan
    • The Journal of the Acoustical Society of Korea
    • /
    • v.41 no.1
    • /
    • pp.64-69
    • /
    • 2022
  • Background music is presented simultaneously with target messages. The main content should be kept intact for some time to aid decision making process. The maintenance of this information requires auditory working memory. The temporal compression of background music may often adopted due to the limitation of the presentation time. In this study, auditory working memory and decision making proces were analyzed in terms of temporal compression ratios of the background music. A total of 37 subjects of early twenties joined the study. Selected products were categorized based on eigen values of multi-dimensional scaling. Four presentation conditions were cases with no background music, background music with no compression, background music with low compression, and background music high compression. Matched reponses were analyzed through repeated ANOVA. Results showed that the high involvement product required more working memory resources. However, the increased level of usage did not always lead to the corresponding changes in decision making process. This approach may be useful in analyzing the role of time compression and working memory in consumer behaviors.

Development of Educational Materials as a Card News Format for Milk Intake Education of the Elderly in Korea (노인 대상 우유 섭취 교육을 위한 카드뉴스 개발)

  • Kim, Sun Hyo
    • Journal of Korean Home Economics Education Association
    • /
    • v.34 no.1
    • /
    • pp.1-16
    • /
    • 2022
  • This study was performed to develop educational materials in the form of card news that can be easily accessed on mobile phones or the Internet for milk intake education of the elderly based on the scientific evidence and their needs. The themes included in the card news were selected based on the literature and focus group interviews with 10 elderly individuals (78.10±6.66 years old). For the selected themes, information that elderly users most want to know was selected for the purpose of effective communication, while reflecting the eating habits, lifestyle, living environment, and nutrition and health status of the elderly in Korea. The draft of the card news was reviewed by the researcher, consulted by experts, and surveyed with 50 elderly individuals (70.44±5.16 years old). Based on the results of the review, consultations, and the survey, a final draft of the card news consisting of 12 pages was completed. The card news of the present study is expected to be an effective educational material considering the high level of satisfaction (higher than 4 on the 5-point scales) indicated by the survey respondents. Therefore this card news is expected to help increase milk intake through friendly milk education for the elderly.

Analysis of Remote Driving Simulation Performance for Low-speed Mobile Robot under V2N Network Delay Environment (V2N 네트워크 지연 환경에서 저속 이동 로봇 원격주행 모의실험을 통한 성능 분석)

  • Song, Yooseung;Min, Kyoung-wook;Choi, Jeong Dan
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.3
    • /
    • pp.18-29
    • /
    • 2022
  • Recently, cooperative intelligent transport systems (C-ITS) testbeds have been deployed in great numbers, and advanced autonomous driving research using V2X communication technology has been conducted actively worldwide. In particular, the broadcasting services in their beginning days, giving warning messages, basic safety messages, traffic information, etc., gradually developed into advanced network services, such as platooning, remote driving, and sensor sharing, that need to perform real-time. In addition, technologies improving these advanced network services' throughput and latency are being developed on many fronts to support these services. Notably, this research analyzed the network latency requirements of the advanced network services to develop a remote driving service for the droid type low-speed robot based on the 3GPP C-V2X communication technology. Subsequently, this remote driving service's performance was evaluated using system modeling (that included the operator behavior) and simulation. This evaluation showed that a respective core and access network latency of less than 30 ms was required to meet more than 90 % of the remote driving service's performance requirements under the given test conditions.

Detection of Delay Attack in IoT Automation System (IoT 자동화 시스템의 지연 공격 탐지)

  • Youngduk Kim;Wonsuk Choi;Dong hoon Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.5
    • /
    • pp.787-799
    • /
    • 2023
  • As IoT devices are widely used at home, IoT automation system that is integrate IoT devices for users' demand are gaining populrity. There is automation rule in IoT automation system that is collecting event and command action. But attacker delay the packet and make time that real state is inconsistent with state recongnized by the system. During the time, the system does not work correctly by predefined automation rule. There is proposed some detection method for delay attack, they have limitations for application to IoT systems that are sensitive to traffic volume and battery consumption. This paper proposes a practical packet delay attack detection technique that can be applied to IoT systems. The proposal scheme in this paper can recognize that, for example, when a sensor transmits an message, an broadcast packet notifying the transmission of a message is sent to the Server recognized that event has occurred. For evaluation purposes, an IoT system implemented using Raspberry Pi was configured, and it was demonstrated that the system can detect packet delay attacks within an average of 2.2 sec. The experimental results showed a power consumption Overhead of an average of 2.5 mA per second and a traffic Overhead of 15%. We demonstrate that our method can detect delay attack efficiently compared to preciously proposed method.

Checksum Signals Identification in CAN Messages (CAN 통신 메시지 내의 Checksum Signal 식별 방법 연구)

  • Gyeongyeon Lee;Hyunghoon Kim;Dong Hoon Lee;Wonsuk Choi
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.747-761
    • /
    • 2024
  • Recently, modern vehicles have been controlled by Electronic Control Units (ECUs), by which the safety and convenience of drivers are highly improved. It is known that a luxury vehicle has more than 100 ECUs to electronically control its function. However, the modern vehicles are getting targeted by cyber attacks because of this computer-based automotive system. To address the cyber attacks, automotive manufacturers have been developing some methods for securing their vehicles, such as automotive Intrusion Detection System (IDS). This development is only allowed to the automotive manufacturers because they have databases for their in-vehicle network (i.e., DBC Format File) which are highly confidential. This confidentiality poses a significant challenge to external researchers who attempt to conduct automotive security researches. To handle this restricted information, in this paper, we propose a method to partially understand the DBC Format File by analyzing in-vehicle network traffics. Our method is designed to analyze Controller Area Network (CAN) traffics so that checksum signals are identified in CAN Frame Data Field. Also, our method creates a Lookup Set by which a checksum signal is correctly estimated for a given message. We validate our method with the publicly accessible dataset as well as one from a real vehicle.

A Study on the Interpretation of Cultural Heritage Sites for Public Education (대중교육을 위한 문화유적의 해석(Interpretation)에 관한 기본연구)

  • Han, Sang-U
    • KOMUNHWA
    • /
    • no.68
    • /
    • pp.41-57
    • /
    • 2006
  • The purpose of this study is to review educational value of cultural heritage sites first and then, to examine the importance of interpretation and interpretation methods and process briefly to utilize cultural heritage sites as important resources for public education and cultural tourism. The educational value of cultural heritage sites is not limited to provide visitors with various information on historical facts and events related to the cultural heritage site, but to provide the public with a new recognition of the importance of the preservation of cultural heritage sites by understanding the site well. In order to utilize the educational value of the cultural heritage site, interpretation must be emphasized as an important element of cultural heritage sites management and much attention should be given on the development and practice of interpretation programs in each cultural heritage site. In order to develop an interpretation program of the site, a specific target audience must be defined first to find most resonable scope and direction of an interpretation program and then, site specific interpretation themes (or a theme) should be developed from the interpretive topic. According to these defined elements, an interpretation program(s) is established by using various interpretation methods and techniques in order to provide visitors with useful information and knowledge on the site efficiently. Interpretation methods and techniques are various as defined by various ways and most effective methods or techniques are employed as a specific interpretation program is presented most effectively. The evaluation processes in planing stage, during developing stage, and after completion of interpretation program development are important processes to find out any problems of planed interpretation program and to revise or update the interpretation program. Conclusively, the direction of cultural heritage sites management in Korea has focused on the conservation and restoration of cultural heritage sites to preserve the original conditions of cultural heritage sites so far. This direction on current practice on cultural heritage sites management should he changed to more active utilization of the sites and interpretation of the sites is a way to accomplish the this goal.

  • PDF

An Interdisciplinary Approach to the Human/Posthuman Discourses Emerging From Cybernetics and Artificial Intelligence Technology (4차 산업혁명 시대의 사이버네틱스와 휴먼·포스트휴먼에 관한 인문학적 지평 연구)

  • Kim, Dong-Yoon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.836-848
    • /
    • 2019
  • This paper aims at providing a critical view over the cybernetics theory especially of first generation on which the artificial intelligence heavily depends nowadays. There has been a commonly accepted thought that the conception of artificial intelligence could not has been possible without being influenced by N. Wiener's cybernetic feedback based information system. Despite the founder of contemporary cybernetics' ethical concerns in order to avoid an increasing entropy phenomena(social violence, economic misery, wars) produced through a negative dynamics of the western modernity regarded as the most advanced form of humanism. In this civilizationally changing atmosphere, the newly born cybernetic technology was thus firmly believed as an antidote to these vices deeply rooted in humanism itself. But cybernetics has been turned out to be a self-organizing, self-controlling mechanical system that entails the possibility of telegraphing human brain (which are transformed into patterns) through the uploading of human brain neurons digitalized by the artificial intelligence embedded into computing technology. On this background emerges posthuman (or posthumanism) movement of which concepts have been theorized mainly by its ardent apostles like N. K. Hayles, Neil Bedington, Laurent Alexandre, Donna J. Haraway. The converging of NBIC Technologies leading to the opening of a much more digitalizing society has served as a catalyst to promote the posthuman representations and different narratives especially in the contemporary visual arts as well as in the study of humanities including philosophy and fictional literature. Once Bruno Latour wrote "Modernity is often defined in terms of humanism, either as a way of saluting the birth of 'man' or as a way of announcing his death. But this habit is itself modern, because it remains asymmetrical. It overlooks the simultaneous birth of 'nonhumaniy' - things, or objects, or beasts, - and the equally strange beginning of a crossed-out God, relegated to the sidelines."4) These highly suggestive ideas enable us to better understand what kind of human beings would emerge following the dazzlingly accelerating advancement of artificial intelligence technology. We wonder whether or not this newly born humankind would become essentially Homo Artificialis as a neuronal man stripping off his biological apparatus. However due to this unprecedented situation humans should deal with enormous challenges involving ethical, metaphysical, existential implications on their life.

An Efficient Core-Based Multicast Tree using Weighted Clustering in Ad-hoc Networks (애드혹 네트워크에서 가중치 클러스터링을 이용한 효율적인 코어-기반 멀티캐스트 트리)

  • Park, Yang-Jae;Han, Seung-Jin;Lee, Jung-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.3
    • /
    • pp.377-386
    • /
    • 2003
  • This study suggested a technique to maintain an efficient core-based multicast tree using weighted clustering factors in mobile Ad-hoc networks. The biggest problem with the core-based multicast tree routing is to decide the position of core node. The distance of data transmission varies depending on the position of core node. The overhead's effect on the entire network is great according to the recomposition of the multicast tree due to the movement of core node, clustering is used. A core node from cluster head nodes on the multicast tree within core area whose weighted factor is the least is chosen as the head core node. Way that compose multicast tree by weighted clustering factors thus and propose keeping could know that transmission distance and control overhead according to position andmobility of core node improve than existent multicast way, and when select core node, mobility is less, and is near in center of network multicast tree could verification by simulation stabilizing that transmission distance is short.

Embedded Multi-LED Display System based on Wireless Internet using Otsu Algorithm (오츠 알고리즘을 활용한 무선인터넷 기반 임베디드 다중 LED 전광판 시스템)

  • Jang, Ho-Min;Kim, Eui-Ryong;Oh, Se-Chun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.329-336
    • /
    • 2016
  • In the outdoor advertising and industrial sites, are trying to implement the LED electric bulletin board system that is based on image processing in order to express a variety of intention in real time. Recently, in various field, rather than simple text representation, the importance of intuitive communication using images is increasing. Thus, instead of outputting the simple input information for communication, a system that can output a real-time information being sought. Therefore, the system is directed to overcoming by converting the problem of mapping an image on a variety of conventional LED display that can not be output images, the possible image output formats. Using an LED of low power, it has developed to output the efficient messages and images within a limited resources. This paper provides a system capable of managing the LED display on the wireless network. Atmega2560, Wi-Fi module, using the server and Android applications client, rather than printing a text only, it is a system to reduce the load generated image output character output in to the conversion process as can be managed by the server.

Reconfiguration of Apache Storm for InfiniBand Communications (InfiniBand RDMA 통신을 위한 Apache Storm의 재구성)

  • Yang, Seokwoo;Son, Siwoon;Moon, Yang-Sae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.7 no.8
    • /
    • pp.297-306
    • /
    • 2018
  • In this paper, we address how to apply Apache Storm, a distributed stream processing framework, to InfiniBand, a high performance communication device. An easy way to run Storm on InfiniBand is to simply use IPoIP (IP over InfiniBand). However, this method causes a serious CPU load on the node, which is caused by frequent context switches and buffer copies. To solve this problem, we propose a new communication method using InfiniBand's Remote Direct Memory Access (RDMA) function in Storm. First, we design and implement RJ-Netty (RDMA/JXIO Netty), a new framework that replaces Netty, the legacy framework, to exploit RDMA functionality. Second, we reimplement the related classes so that Storm can use both existing Netty and new RJ-Netty. Third, we extend the JXIO server functionality so as to support multi-threading to maximize the performance of RJ-Netty. Experimental results show that the proposed RJ-Netty significantly reduces CPU load while improving message throughput compared to IPoIB as well as Ethernet. This paper is the first attempt to run Apache Storm on InfiniBand, and we believe that it is an excellent research result that improves the performance of Storm by using InfiniBand RDMA.