• 제목/요약/키워드: 태그 결합도

검색결과 94건 처리시간 0.033초

Demand Forecasting by the Mobile RFID Service Model (모바일 RFID 서비스 모델에 따른 수요예측)

  • Park, Yong-Jae;Lim, Kwang-Sun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 한국해양정보통신학회 2007년도 춘계종합학술대회
    • /
    • pp.495-498
    • /
    • 2007
  • Recently, as REID Tag and Reader has been attached to, and wireless internet has been added to a mobile phone, the commercialization of Mobile RFID Service to obtain necessary information on daily life and use various applications by using mobile communication infra is drawing nearer. A new returns by Mobile RFID Service can be expected, however, the exact demand forecasting for the Mobile RFID Service is essential to induce mass investment from related communication enterprises. This study tries to get a foothold in enlarging the investment from related communication enterprises through demand forecasting for the Mobile RFID Service and to be helpful to the decision on their investment by predicting the demand on the service various Mobile RFID Service Models.

  • PDF

An Efficient Web Image Caption Extraction Method based on Textual and Visual Information (텍스트 정보와 시각 특징 정보를 이용한 효과적인 웹 이미지 캡션 추출 방법)

  • Hwang Ji-Ik;Park Joo-Hyoun;Nang Jong-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 한국정보과학회 2006년도 한국컴퓨터종합학술대회 논문집 Vol.33 No.1 (B)
    • /
    • pp.346-348
    • /
    • 2006
  • 기존의 웹 이미지 검색 시스템들은 웹 페이지에 포함된 텍스트들의 출현빈도, 태그유형 등을 고려해 각 키워드들의 중요도를 평가하고 이를 이용해 이미지의 캡션을 결정한다. 하지만 텍스트 정보만으로 캡션을 결정할 경우, 키워드와 이미지 사이의 관련성을 평가할 수 없어 부적절한 캡션의 배제가 어렵고, 사람의 인지와 맞지 않는 캡션이 추출되는 문제점이 있다. 본 논문에서는 기존의 웹 이미지 마이닝 방법을 통해 웹 페이지로부터 캡션 후보 키워드를 추출하고, 자동 이미지 주석 방법을 통해 이미지의 개념 부류 키워드를 결정한 후, 두 종류의 키워드를 결할하여 캡션을 선택한다. 가능한 결합 방법으로는 키워드 병합 방법, 공통 키워드 추출 방법, 개념 부류 필터링 방범 캡션 후보 필터링 방법 등이 있다. 실험에 의하면 키워드 병합 방법은 높은 재현율을 가져 이미지에 대한 다양한 주석이 가능하고 공통 키워드 추출 방법과 개넘 부류 키워드 필터링 방법은 정확률이 높아 이미지에 대한 정확한 기술이 가능하다. 특히, 캡션 후보 키워드 필터링 방법은 기존의 방법에 비해 우수한 재현율과 정확률을 가지므로 기존의 방법에 비해 적은 개수의 캡션으로도 이미지를 정확하게 기술할 수 있으며 일반적인 웹 이미지 검색 시스템에 적용할 경우 효과적인 방법이다.

  • PDF

A Study on Light-weight Signature Scheme for NFC mCoupon Service (NFC mCoupon 서비스를 위한 경량화 서명 기법에 관한 연구)

  • Park, Sung-Wook;Lee, Im-Yeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제24권2호
    • /
    • pp.275-284
    • /
    • 2014
  • Recently, the combination of mobile and NFC aroused great momentum for Activation of NFC services market. Especially, mCoupon service using NFC has been utilized in a variety consumer marketing. However, mCoupons differ significantly from paper-based coupons because unprotected data can be easily copied or modified without significant cost by anyone. A high number of uncontrolled copies of coupons can result in a significant loss. In this paper, we proposed a light-weight signature scheme that is protected against illegal use in nfc mobile payment environment to using limited resources.

A Study on certification plan on Radio Frequency Identification for Airplane Use (항공산업에 활용되는 무선인식 기반 시스템 인증 방안)

  • Han, Sang-Ho
    • Aerospace Engineering and Technology
    • /
    • 제7권1호
    • /
    • pp.236-244
    • /
    • 2008
  • The evolution and application of RFID technologies have been at the forefront of allowing aviation industries to improve the quality of aircraft maintenance and air cargo handling. However, safety problems in airplane operation are arising from the hazards of frequencies transmitted due to RFID systems. Though the intensities of frequencies back-scattered from the tags are very weak, some malfunctions are anticipated due to induction coupling on aircraft wiring. Therefore, safety assessment such as electromagnetic compatability should be accomplished upon aircraft critical and essential equipments before installations.

  • PDF

Forgery Attack on New Authenticated Encryption (새로운 인증-암호화 모드 NAE에 대한 위조 공격)

  • Jeong, Ki-Tae;Lee, Chang-Hoon;Sung, Jae-Chul;Eun, Hi-Chun;Hong, Seok-Hie
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • 제17권1호
    • /
    • pp.103-107
    • /
    • 2007
  • This paper represents a forgery attack on new authenticated encryption mode $NAE^{[1]}$ which was proposed at JCCI 2003. NAE is a new authenticated encryption mode which is combined with CFB mode and CTR mode. And it provides confidentiality. In this paper, we show that it is possible to make a valid ciphertext-tag pair only by modifying a ciphertext.

A study on change of gamification marketing through social media -Focusing on the marketing of facebook fan page and instargram hashtag- (소셜미디어를 통한 게이미피케이션 마케팅의 변화 방향에 대한 연구 - 페이스북의 팬페이지와 인스타그램의 해시태그 마케팅을 중심으로 -)

  • Moon, Ha Na;Lee, Yoo Jin;Park, Seung Ho
    • Design Convergence Study
    • /
    • 제14권4호
    • /
    • pp.209-221
    • /
    • 2015
  • This study investigates in depth of the new marketing trend, in which social media, an effective marketing tool for promoting a new product, and gamification technic of engaging consumers in communication, are combined. Although gamification has been applied to various fields for a long time, conventional way of applying gamification is different from when it is combined with socialmedia. Therefore, this study examines the background and characteristics of the convergence phenomena between the social media and gamification based on the theoretical consideration of the social media and gamification. Then, the cases of social media marketing utilizing gamification are analyzed and classified into general participation, active participation, creative behavior, networking, and experiential type according to the user's different levels and ways of participation. As a result, when the social media and gamification are combined, the change of an aspect is found to be more meaningfully influential to today's consumers as in competition - achievement - relationship, compared to the conventional way of game mechanics. This study has significance in the way that it established a useful basis for the marketing strategy through the study of the new game mechanics that has been applied to social media marketing utilizing gamification.

Efficient Indirect Branch Predictor Based on Data Dependence (효율적인 데이터 종속 기반의 간접 분기 예측기)

  • Paik Kyoung-Ho;Kim Eun-Sung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • 제43권4호
    • /
    • pp.1-14
    • /
    • 2006
  • The indirect branch instruction is a most substantial obstacle in utilizing ILP of modem high performance processors. The target address of an indirect branch has the polymorphic characteristic varied dynamically, so it is very difficult to predict the accurate target address. Therefore the performance of a processor with speculative methodology is reduced significantly due to the many execution cycle delays in occurring the misprediction. We proposed the very accurate and novel indirect branch prediction scheme so called data-dependence based prediction. The predictor results in the prediction accuracy of 98.92% using 1K entries, and. 99.95% using 8K But, all of the proposed indirect predictor including our predictor has a large hardware overhead for restoring expected target addresses as well as tags for alleviating an aliasing. Hence, we propose the scheme minimizing the hardware overhead without sacrificing the prediction accuracy. Our experiment results show that the hardware is reduced about 60% without the performance loss, and about 80% sacrificing only the performance loss of 0.1% in aspect of the tag overhead. Also, in aspect of the overhead of storing target addresses, it can save the hardware about 35% without the performance loss, and about 45% sacrificing only the performance loss of 1.11%.

Ubiquitous u-Health System using RFID & ZigBee (RFID와 ZigBee를 이용한 유비쿼터스 u-Health 시스템 구현)

  • Kim Jin-Tai;Kwon Youngmi
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • 제43권1호
    • /
    • pp.79-88
    • /
    • 2006
  • In this paper, we designed and implemented ubiquitous u-Health system using RFE and ZigBee. We made a wireless protocol Kit which combines RFE Tag recognition and ZigBee data communication capability. The software is designed and developed on the TinyOS. Wireless communication technologies which hold multi-protocol stacks with RFID and result in the wireless ubiquitous world could be Bluetooth, ZigBee, 802.11x WLAN and so on. The environments that the suggested u-Health system may be used is un-manned nursing, which would be utilized in dense sensor networks such as a hospital. The the size of devices with RFID and ZigBee will be so smaller and smaller as a bracelet, a wrist watch and a ring. The combined wireless RFID-ZigBee system could be applied to applications which requires some actions corresponding to the collected (or sensed) information in WBAN(Wireless Body Area Network) and/or WPAN(Wireless Person Area Network). The proposed ubiquitous u-Health system displays some text-type alert message on LCD which is attached to the system or gives voice alert message to the adequate node users. RFE will be used as various combinations with other wireless technologies for some application-specific purposes.

STUDY ON THE SHEAR BOND STRENGTH OF ALL-IN-ONE DENTIN BONDING SYSTEM (우치에 대한 All-in-one 상아질 결합제의 전단결합강도 비교 연구)

  • Park, Hyung-Joo;Yoo, Seung-Hoon;Kim, Jong-Soo
    • Journal of the korean academy of Pediatric Dentistry
    • /
    • 제33권4호
    • /
    • pp.661-672
    • /
    • 2006
  • This study was performed to compare the shear bond strength of AQ Bond $Plus^{TM}$ with AQ $Bond^{TM}$ and Single $Bond^{TM}$. Also by observing the fractured interface under scanning electro-microscope, the fracture pattern and the quality of hybrid layer were analyzed. The possibility of clinical application of all-in-one system which has an advantage to reduce chair time for children with difficult behavior pattern was evaluated, The results obtained are as follows ; 1. There was no significant difference between AQ $Bond^{TM}$ and AQ Bond $Plus^{TM}$ in shear bond strength and Single Bond showed the highest bond strength with statistical significant difference (p<0.05). 2. Adhesive fracture pattern was mainly observed in both enamel/dentin in AQ $Bond^{TM}$ and AQ Bond $Plus^{TM}$ group while Single Bond group showed equal numbers for cohesive and adhesive pattern. 3. Under scanning electro-microscope, resin tags observed in AQ $Bond^{TM}$ and AQ Bond $Plus^{TM}$ were very weak and tangled while strong and thick tags were shown with many lateral branches in Single Bond. Careful case selection and accurate clinical application is recommended when using AQ $Bond^{TM}$ and AQ Bond $Plus^{TM}$considering the result showing its weaker strength than Single $Bond^{TM}$.

  • PDF

A Lightweight RFID Authentication Protocol Based on Hash Chain (해시체인기반의 경량화 RFID 인증 프로토콜)

  • Youn, Keun-Young;Kim, Dong-Seong;Park, Jong-Sou
    • Convergence Security Journal
    • /
    • 제6권1호
    • /
    • pp.45-53
    • /
    • 2006
  • It has been proposed that several RFID authentication protocols based on hash chain. Status based authentication protocol and challenge-response based authentication protocol are secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks but are vulnerable to Dos attacks. RFID authentication protocol with strong resistance against traceability and denial of service attack is secured against location tracking attack, spoofing attacks, replay attacks, DoS attacks but are vulnerable to traffic analysis attacks. The present study suggests a more secure and lightweight RFID authentication protocol which is combining the advantages of hash-chain authentication protocol and RFID authentication protocol with strong resistance against traceability and denial of service attack. The results of the secure analysts for a proposed protocol are illustrated that it is secured against location tracking attacks, spoofing attacks, replay attacks, traffic analysis attacks, Dos attacks and is a lightweight operation between server and tag.

  • PDF