• Title/Summary/Keyword: 컴퓨터 사용 유형

Search Result 390, Processing Time 0.024 seconds

Design and Implementation of Content-based Video Database using an Integrated Video Indexing Method (통합된 비디오 인덱싱 방법을 이용한 내용기반 비디오 데이타베이스의 설계 및 구현)

  • Lee, Tae-Dong;Kim, Min-Koo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.6
    • /
    • pp.661-683
    • /
    • 2001
  • There is a rapid increase in the use of digital video information in recent years, it becomes more important to manage video databases efficiently. The development of high speed data network and digital techniques has emerged new multimedia applications such as internet broadcasting, Video On Demand(VOD) combined with video data processing and computer. Video database should be construct for searching fast, efficient video be extract the accurate feature information of video with more massive and more complex characteristics. Video database are essential differences between video databases and traditional databases. These differences lead to interesting new issues in searching of video, data modeling. So, cause us to consider new generation method of database, efficient retrieval method of video. In this paper, We propose the construction and generation method of the video database based on contents which is able to accumulate the meaningful structure of video and the prior production information. And by the proposed the construction and generation method of the video database implemented the video database which can produce the new contents for the internet broadcasting centralized on the video database. For this production, We proposed the video indexing method which integrates the annotation-based retrieval and the content-based retrieval in order to extract and retrieval the feature information of the video data using the relationship between the meaningful structure and the prior production information on the process of the video parsing and extracting the representative key frame. We can improve the performance of the video contents retrieval, because the integrated video indexing method is using the content-based metadata type represented in the low level of video and the annotation-based metadata type impressed in the high level which is difficult to extract the feature information of the video at he same time.

  • PDF

MUSIC THERAPY FOR ADOLESCENTS WITH CONDUCT DISORDER (품행장애 청소년의 음악치료 사례연구)

  • Jhin, Hea-Kyung;Kwon, Hea-Kyung
    • Journal of the Korean Academy of Child and Adolescent Psychiatry
    • /
    • v.11 no.1
    • /
    • pp.110-123
    • /
    • 2000
  • The short-term music therapy was performed for adolescents with conduct disorder admitted to Seoul National Mental Hospital for 3 months from Jun to September, 1998. This case study focused mainly on two female patients who participated regularly in the group music therapy. The music therapy process was divided into three phases;beginning, opening up, and closing. This music therapy session consisted of three parts;hello song as beginning, various musical activities, and sound & movement activity as closing. Free musical improvisation, song discussion, musical monodrama, and sound & movement were the mainly applied techniques. Free improvisation was used to enhance, motivate, identify and contain the adolescents' feelings and ideas. Song discussion was used to convey their thoughts and to support each other. Musical monodrama was used to make them have insights into interpersonal relationships. Sound & movement was used to enhance spontaneity. It made them explore their body and voice as an expressive medium. Throughout three months period of music therapy, patient A's communication skill, socialization, and behavior areas were assessed with improvement. She could use music as a symbolic form and was able to share her feelings about herself and her family. Patient B's self-expression and cognitive areas were assessed with improvement. She became more spontaneous and could verbalize her emotions during the group session. Music as a non-verbal and therefore often a non-threatening medium wherein so much can be expressed provided two female patients an atmosphere where a sense of trust may be regained.

  • PDF

A Study on the Difference of Strategies for Conflict Resolution between Rural Residents and Urban-to-Rural Migrants (게임이론에 근거한 농촌원주민과 귀농·귀촌인 간 갈등해결 전략차이 연구)

  • Kim, Tae-kyun;Park, Sang-hyeok
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.14 no.2
    • /
    • pp.151-163
    • /
    • 2019
  • In recent years, as the population of ear and aged villages has increased, the problem of conflict between rural residents and urban-to-rural migrants has been widespread. For successful rural community, such conflict resolution is more important than anything else. However, if we look at previous studies. It is true that there are many studies that focus on people who are not rural residents or urban-to-rural migrants. This study was conducted to find out the difference of strategies for conflict resolution between rural residents and urban-to-rural migrants. This study derives the factors of conflict based on the contents of previous studies, To see the difference, five strategies were used from the response strategies that were used in the 'Computer Prisoner's Dilemma Contest' held by Axelrod (2009). I would like to know what kind of strategies of rural residents and urban-to-rural migrants. All analyzes were done using SPSS 22.0 for Windows, and the results of each conflict resolution analysis showed that the indigenous conflicts were low All. Among the causes of conflict, the highest level of conflict was caused by the 'rural residents who did not understand urban culture'. The strategy is the most used, followed by tit for tat Strategy, and all-c strategy, in that order. However, It is not uncommon for employers to use a work-type strategy, and it can be seen that the strategy changes depending on the cause. As can be seen from the above results, The conflict resolution strategies are almost similar strategies. It can be seen that conflict resolution strategy is used differently according to personality. The purpose of this study is to investigate the differences in conflicts in the rural areas. In particular, it is meaningful to examine the choice of solution strategies based on game theory through reviewing prior research and eliciting actual conflict factors in the field. Successful rural settlement can be achieved not through stakeholder competition but through mutual cooperation by gaining cooperation to the other side. Mutual cooperation is more profitable than betrayal in various conflict situations. The secret to maintaining and communicating smoothly is not to use the other person to fill his or her selfish interests, but to reject it for profit, but to draw cooperation from the other party.

Homonym Disambiguation based on Mutual Information and Sense-Tagged Compound Noun Dictionary (상호정보량과 복합명사 의미사전에 기반한 동음이의어 중의성 해소)

  • Heo, Jeong;Seo, Hee-Cheol;Jang, Myung-Gil
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.12
    • /
    • pp.1073-1089
    • /
    • 2006
  • The goal of Natural Language Processing(NLP) is to make a computer understand a natural language and to deliver the meanings of natural language to humans. Word sense Disambiguation(WSD is a very important technology to achieve the goal of NLP. In this paper, we describe a technology for automatic homonyms disambiguation using both Mutual Information(MI) and a Sense-Tagged Compound Noun Dictionary. Previous research work using word definitions in dictionary suffered from the problem of data sparseness because of the use of exact word matching. Our work overcomes this problem by using MI which is an association measure between words. To reflect language features, the rate of word-pairs with MI values, sense frequency and site of word definitions are used as weights in our system. We constructed a Sense-Tagged Compound Noun Dictionary for high frequency compound nouns and used it to resolve homonym sense disambiguation. Experimental data for testing and evaluating our system is constructed from QA(Question Answering) test data which consisted of about 200 query sentences and answer paragraphs. We performed 4 types of experiments. In case of being used only MI, the result of experiment showed a precision of 65.06%. When we used the weighted values, we achieved a precision of 85.35% and when we used the Sense-Tagged Compound Noun Dictionary, we achieved a precision of 88.82%, respectively.

Block-based Color Image Segmentation Using Y/C Bit-Plane Sum]nation Image (Y/C 비트 평면합 영상을 이용한 블록 기반 칼라 영상 분할)

  • Kwak, No-Yoon
    • Journal of Digital Contents Society
    • /
    • v.1 no.1
    • /
    • pp.53-64
    • /
    • 2000
  • This paper is related to color image segmentation scheme which makes it possible to achieve the excellent segmented results by block-based segmentation using Y/C bit-plane summation image. First, normalized chrominance summation image is obtained by normalizing the image which is summed up the absolutes of color-differential values between R, G, B images. Secondly, upper 2 bits of the luminance image and upper 6bits of and the normalized chrominance summation image are bitwise operated by the pixel to generate the Y/C bit-plane summation image. Next, the Y/C bit-plane summation image divided into predetermined block size, is classified into monotone blocks, texture blocks and edge blocks, and then each classified block is merged to the regions including one more blocks in the individual block type, and each region is selectively allocated to unique marker according to predetermined marker allocation rules. Finally, fine segmented results are obtained by applying the watershed algorithm to each pixel in the unmarked blocks. As shown in computer simulation, the main advantage of the proposed method is that it suppresses the over-segmentation in the texture regions and reduces computational load. Furthermore, it is able to apply global parameters to various images with different pixel distribution properties because they are nonsensitive for pixel distribution. Especially, the proposed method offers reasonable segmentation results in edge areas with lower contrast owing to the regional characteristics of the color components reflected in the Y/C bit-plane summation image.

  • PDF

A Study on Development and Effect of Information Communication Technology (lCT) Based Science Unit - Focusing on 'Reproduction' of Science 10 (정보통신기술(ICT)을 활용한 과학학습지도안 개발과 효과에 관한 연구 - 10학년 과학 '생식' 단원을 중심으로)

  • Cho, Jung-Il;Yoo, Hyung-Bin;Kim, Hyun-A;Park, Soo-Jung
    • Journal of The Korean Association For Science Education
    • /
    • v.24 no.2
    • /
    • pp.193-201
    • /
    • 2004
  • The purpose of this study was to assess the effect of ICT on tenth grade students' understandings of and attitude toward reproduction. The subject of the study was 8 classes of 267 students. Four classes learned with help of lCT, but another four classes learned on the basis of a textbook. Understanding of reproduction and the attitude were assessed using a written test and a survey, respectively. The lCT was found to be effective to foster understanding of reproduction concepts and consciousness toward human reproduction. Discussions in the web enabled students get some feedbacks on their preconceptions from other students.

A New Secure Multicast Protocol in Micro-Mobility Environments using Secure Group Key (마이크로 모빌리티 환경에서 보안 그룹키를 이용한 안전한 멀티캐스트 프로토콜)

  • Kang, Ho-Seok;Shim, Young-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.6
    • /
    • pp.573-586
    • /
    • 2008
  • The improved performance and miniaturization of computer and the improvement of wireless communication technology have enabled the emergence of many high quality services. Among them multicast services are receiving much attention and their usage is increasing due to the increase of Internet multimedia services such as video conference, multimedia stream, internet TV, etc. Security plays an important role in mobile multicast services. In this paper, we proposed a secure multicast protocol for a hierarchical micro-mobility environment. The proposed secure multicast protocol provides security services such as authentication, access control, confidentiality and integrity using mechanisms including symmetric/asymmetric key crypto-algorithms and capabilities. To provide forward/backward secrecy and scalability, we used sub-group keys based on the hierarchical micro-mobility environment. With this security services, it is possible to guard against all kinds of security attacks performed by illegal mobile nodes. Attacks executed by internal nodes can be thwarted except those attacks which delete packet or cause network resources to be wasted. We used simulator to measure the performance of proposed protocol. As a result, the simulation showed that effect of these security mechanisms on the multicast protocol was not too high.

Design and Evaluation of an Edge-Fog Cloud-based Hierarchical Data Delivery Scheme for IoT Applications (사물인터넷 응용을 위한 에지-포그 클라우드 기반 계층적 데이터 전달 방법의 설계 및 평가)

  • Bae, Ihn-Han
    • Journal of Internet Computing and Services
    • /
    • v.19 no.1
    • /
    • pp.37-47
    • /
    • 2018
  • The number of capabilities of Internet of Things (IoT) devices will exponentially grow over the next years. These devices may generate a vast amount of time-constrained data. In the context of IoT, data management should act as a layer between the objects and devices generating the data and the applications accessing the data for analysis purposes and services. In addition, most of IoT services will be content-centric rather than host centric to increase the data availability and the efficiency of data delivery. IoT will enable all the communication devices to be interconnected and make the data generated by or associated with devices or objects globally accessible. Also, fog computing keeps data and computation close to end users at the edge of network, and thus provides a new breed of applications and services to end users with low latency, high bandwidth, and geographically distributed. In this paper, we propose Edge-Fog cloud-based Hierarchical Data Delivery ($EFcHD^2$) method that effectively and reliably delivers IoT data to associated with IoT applications with ensuring time sensitivity. The proposed $EFcHD^2$ method stands on basis of fully decentralized hybrid of Edge and Fog compute cloud model, Edge-Fog cloud, and uses information-centric networking and bloom filters. In addition, it stores the replica of IoT data or the pre-processed feature data by edge node in the appropriate locations of Edge-Fog cloud considering the characteristic of IoT data: locality, size, time sensitivity and popularity. Then, the performance of $EFcHD^2$ method is evaluated through an analytical model, and is compared to fog server-based and Content-Centric Networking (CCN)-based data delivery methods.

A Survey on Awareness and Availability on Items of 2018 Assistive Devices Distribution Program for the Disabled in the Occupational Therapists (2018년도 장애인 보조기기 교부사업 품목에 대한 작업치료사의 인식도와 활용도 조사)

  • Kim, Jeong-Eun;Park, Je-Min;Bae, Su-Yeong;Jung, Nam-hae
    • Korean Journal of Occupational Therapy
    • /
    • v.26 no.4
    • /
    • pp.85-95
    • /
    • 2018
  • Objective : The purpose of this study was to investigate the awareness and availability on items of 2018 assistive devices distribution program for the disabled in the occupational therapists. Methods : A total of 132 occupational therapists participated in the survey from May 1 to May 31. Results : 96.2% of the occupational therapists responded that assistive device is helpful in lives of the disabled people. Especially, they responded that assistive device is the most helpful in 'movement and mobility'. Awareness on an angle spoon/fork with built-up handle and universal cuff was the highest, while a visual signaling indicator was the lowest. Availability on an air cushion was the highest, while a visual signaling indicator and a voice guidance system were the lowest. 67.4% responded that 'sometimes' they use the assistive device and 77.3% responded they will utilize the assistive device. To improve awareness and availability, 43.2% needed financial support, 32.6% needed to add insurance bill and 22.7% needed related education. Conclusion : In the future, this result will be available as a basic data for the education about assistive device for the occupational therapists.

Expanding User Types for Utilizing Certified e-Document Authorities (공인전자문서보관소의 이용 활성화를 위한 사용자 유형 확대방안)

  • Song, Byoungho
    • The Korean Journal of Archival Studies
    • /
    • no.30
    • /
    • pp.175-204
    • /
    • 2011
  • Electronic records are generated not only in public sector but also in private sector. Records will be used across the public-private boundary. The Certified e-Document Authorities(CeDAs) may keep electronic documents in private sector for preservation and evidence, like the official Record Management Systems for Public sector. A CeDA is the Trusted Third Party (TTP) as a business to be entrusted and proof interchanging documents between parties. This CeDA system could be sustainable only if the CeDA earn the enough sales through enough uses. And yet, all the eight CeDA companies have not had enough users. How to utilize CeDAs is one of the hot issues in this area. In this paper, We analyze the threat to trustworthiness of CeDA due to payment of only one party among others, and describe the difficulty in use of CeDA for an individual user. These things make CeDAs cannot have enough users. To do address these, We expand the boundary of relevant parties for a document, present a delegate-establishing option under a joint name, show the needs of identifying and notifying minimum relevant parties, and suggest the proxy parties to help the individual users.