• Title/Summary/Keyword: Computer usage

Search Result 1,229, Processing Time 0.03 seconds

Design and implementation of protection and management system of digital contents based on MPEG-21 IPMP (MPEG-21 IPMP 기반 디지털 콘텐츠 보호 관리 시스템 설계 및 구현)

  • Ryu Kwang-Hee;Kim Yun-Ki;Kim Kwang-Yong;Kim Jae-Gon;Hong Jin-Woo;Jung Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.149-152
    • /
    • 2006
  • The usage increase of digital contents required solution for protection technology and interoperability of system. MPEG proposed MPEG-21 Multimedia Frameworks. MPEG-21 IPMP is standard that provides the means to enable digital item and rights information to be persistently managed and protected across networks and devices. In this paper, MPEG-21 IPMP based system to protect digital contents designed by four structures of license server, production server, consumption server, tool sewer. License sewer create rights information document using the XML-based REL about multimedia contents of users. Production server makes a digital item by packaging multimedia resource and metadata, which is combined by REL information and IPMP information of multimedia resource. Consumption server takes care of the functions of players that use digital item, and tool server was implement to transmit for missing tool that night occur in all procedures.

  • PDF

A Java-based Dynamic Management Systemfor Heterogeneous Agents (이질적 에이전트를 위한 자바 기반의 동적 관리 시스템)

  • Jang, Ji-Hun;Choe, Jung-Min
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.26 no.7
    • /
    • pp.778-787
    • /
    • 1999
  • 이제까지 대부분의 다중 에이전트 시스템에서는 에이전트 사회에 속한 모든 응용 에이전트를 작업 요청에 관계없이 처음부터 구동시킨다고 가정하였다. 이러한 에이전트 정적 구동 방법은 에이전트 관리를 단순하게 해주는 이점을 제공하지만 워크플로우 관리나 전자상거래와 같이 매우 많은 수의 에이전트로 구성되는 응용 분야에서는 시스템 과부하와 자원의 낭비 등 많은 문제점을 초래한다. 동적 에이전트 관리는 이에 대한 해결책으로 아주 많은 수의 에이전트를 포함하는 다중 에이전트 시스템에서 현재 수행중인 작업에 관련된 에이전트만을 선별하여 구동시키고, 작업이 끝난 에이전트는 종료시킴으로써 자원의 낭비를 막고 에이전트간의 상호작용 시에 요구되는 에이전트 통신의 복잡도 부담을 감소시키는 효과를 낸다. 본 논문에서는 자바로 에이전트 관리 시스템을 구현하고, 이 관리 시스템을 통해 각기 다른 언어로 개발된 응용 에이전트가 분산된 환경에서 상호 협력을 통해 작업을 수행할 수 있는 기법을 제안한다. 사용자나 다른 에이전트의 요청으로 에이전트를 동적으로 수행시키기 위해 다른 언어로의 확장을 가능하게 하는 Java Native Interface(JNI)를 사용한 기술 및 이러한 이질적인 에이전트간의 원활한 통신을 위해서 KQML 언어 인터페이스를 통한 통신 기능을 제안한다. 이질적 에이전트의 동적 관리를 가능하게 함으로써 다중 에이전트 시스템의 자원 이용 효율성과 확장성을 높이고 다양한 환경 변화에 대한 적응성과 개선된 협동능력을 제공한다.Abstract It has been assumed that all application agents in a multi-agent system are pre-invoked and remain active regardless of whether they are actually used. Although this kind of static agent invocation simplifies the management of agents, it causes several problems such as the system overload and a waste of resources, especially in the areas of the workflow management and the electronic commerce that consist of tens and even hundreds of application agents. A solution for these problems is the scheme of dynamic agent management that selectively invokes only agents that are actually requested and terminates them when they are no longer needed. This method prevents a waste of system resources and alleviates the complexity of agent communications.This paper proposes an agent management system implemented in Java that supports interactions between application agents that are developed using different languages. Dynamic agent invocation is accomplished by Java Native Interface(JNI) that links two heterogeneous methods, and by KQML language interface that facilitates the communications between heterogeneous agents. This scheme of dynamic agent management provides efficient resource usage, easy extensibility, dynamic adaptibility to changes in the environment, and improved cooperation.

Information Technologies in the Formation of Environmental Consciousness in Future Professionals

  • Tomchuk, Mykhailo;Khrolenko, Maryna;Volokhata, Kateryna;Bakka, Yuliia;Ieresko, Oleg;Kambalova, Yanina
    • International Journal of Computer Science & Network Security
    • /
    • v.22 no.1
    • /
    • pp.331-339
    • /
    • 2022
  • The global process of transition from industrial to information society, as well as socio-economic changes taking place in Ukraine, require significant changes in many areas of state activity. It is especially connected with the reforms in the sphere of education. Today, national programs provide for the development of education on the basis of new progressive concepts, the introduction of the educational process of new pedagogical technologies and scientific achievements, the creation of a new system of information education, entrance of Ukaine into the transcontinental computer information system. Information technologies are qualitatively changing the key resources of development: this is no longer a space with fixed production, but primarily mobile finance and intelligence. They have a direct impact on the formation of personal growth, professional content and self-organization, emotional and psychological maturity and consciousness, and so on. One of the main factors in ensuring the stability and social education of the country's citizens is the culture of security, the formation and development of which is an urgent problem today. Comprehensive and systematic development of security culture will significantly increase the readiness of the population, the level of environmental, labor and patriotic education, reduce human losses, material damage from emergencies. Ecological education can be carried out more successfully only gradually and in accordance with the socio-psychological periods of one's development: kindergarten - school - college - university. The creation of such a system of environmental education should be enshrined as the basis of state environmental policy as a constitutional norm with the usage of information technology. Graduates of universities, who are the future of our country, after mastering the skills of basic environmental education must have a high level of environmental culture, which is, in turn, part of general human culture, and investigate environmental issues from the standpoint of their profession. It is known that with the help of environmental education the collective intelligence of society is formed, which can predict human activities and processes occurring in nature, and in some way to help with the elimination of crises. It is through environmental education that another system of human values is being formed, which places great emphasis on intangible wealth and solidarity, and great responsibility of humanity for the ecological state of the native country; provides a higher standard of living as a result of sustainable development, through the introduction of information technology in this system. To improve the quality of life, we need better knowledge, which must be implemented through information technology at the international level.

Hate Speech Detection Using Modified Principal Component Analysis and Enhanced Convolution Neural Network on Twitter Dataset

  • Majed, Alowaidi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.1
    • /
    • pp.112-119
    • /
    • 2023
  • Traditionally used for networking computers and communications, the Internet has been evolving from the beginning. Internet is the backbone for many things on the web including social media. The concept of social networking which started in the early 1990s has also been growing with the internet. Social Networking Sites (SNSs) sprung and stayed back to an important element of internet usage mainly due to the services or provisions they allow on the web. Twitter and Facebook have become the primary means by which most individuals keep in touch with others and carry on substantive conversations. These sites allow the posting of photos, videos and support audio and video storage on the sites which can be shared amongst users. Although an attractive option, these provisions have also culminated in issues for these sites like posting offensive material. Though not always, users of SNSs have their share in promoting hate by their words or speeches which is difficult to be curtailed after being uploaded in the media. Hence, this article outlines a process for extracting user reviews from the Twitter corpus in order to identify instances of hate speech. Through the use of MPCA (Modified Principal Component Analysis) and ECNN, we are able to identify instances of hate speech in the text (Enhanced Convolutional Neural Network). With the use of NLP, a fully autonomous system for assessing syntax and meaning can be established (NLP). There is a strong emphasis on pre-processing, feature extraction, and classification. Cleansing the text by removing extra spaces, punctuation, and stop words is what normalization is all about. In the process of extracting features, these features that have already been processed are used. During the feature extraction process, the MPCA algorithm is used. It takes a set of related features and pulls out the ones that tell us the most about the dataset we give itThe proposed categorization method is then put forth as a means of detecting instances of hate speech or abusive language. It is argued that ECNN is superior to other methods for identifying hateful content online. It can take in massive amounts of data and quickly return accurate results, especially for larger datasets. As a result, the proposed MPCA+ECNN algorithm improves not only the F-measure values, but also the accuracy, precision, and recall.

An Exploratory Study on the Relationship between SNS Use during a Task and Task Performance: An Analysis of Task Complexity Difference (작업 수행 중 SNS 사용과 작업 성과의 관계에 관한 탐색적 연구: 작업의 난이도에 따른 차이 분석)

  • Jinyoung Min
    • Information Systems Review
    • /
    • v.19 no.3
    • /
    • pp.105-125
    • /
    • 2017
  • Although the relationship between social networking sites (SNS) use and performance has been widely studied, most of these studies have focused on comparing the SNS users' overall performance with that of non-SNS users instead of examining how using SNS midway of a task affects one's task performance. To address this research gap, an experiment was conducted to examine SNS use during a task and its influence on the performance of that task. In this experiment, the role of SNS in various situations was examined by reviewing the literature on break and performance as well as the types of breaks and tasks. Owing to its exploratory nature, this study used various types of data, such as electroencephalography interpretation data generated from a brain-computer interface, self-reported data, and data recorded by a computer. Those participants who used SNS showed an improved performance compared with those who took a short break while doing a simple task. Further analysis showed that the degree of SNS usage and engagement with SNS had positive effects on the participants' simple task performance, while social presence and reassurance of self-worth had negative and positive effects on the participants' complex task performance, respectively.

Design and Implementation of IoT based Low cost, Effective Learning Mechanism for Empowering STEM Education in India

  • Simmi Chawla;Parul Tomar;Sapna Gambhir
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.4
    • /
    • pp.163-169
    • /
    • 2024
  • India is a developing nation and has come with comprehensive way in modernizing its reducing poverty, economy and rising living standards for an outsized fragment of its residents. The STEM (Science, Technology, Engineering, and Mathematics) education plays an important role in it. STEM is an educational curriculum that emphasis on the subjects of "science, technology, engineering, and mathematics". In traditional education scenario, these subjects are taught independently, but according to the educational philosophy of STEM that teaches these subjects together in project-based lessons. STEM helps the students in his holistic development. Youth unemployment is the biggest concern due to lack of adequate skills. There is a huge skill gap behind jobless engineers and the question arises how we can prepare engineers for a better tomorrow? Now a day's Industry 4.0 is a new fourth industrial revolution which is an intelligent networking of machines and processes for industry through ICT. It is based upon the usage of cyber-physical systems and Internet of Things (IoT). Industrial revolution does not influence only production but also educational system as well. IoT in academics is a new revolution to the Internet technology, which introduced "Smartness" in the entire IT infrastructure. To improve socio-economic status of the India students must equipped with 21st century digital skills and Universities, colleges must provide individual learning kits to their students which can help them in enhancing their productivity and learning outcomes. The major goal of this paper is to present a low cost, effective learning mechanism for STEM implementation using Raspberry Pi 3+ model (Single board computer) and Node Red open source visual programming tool which is developed by IBM for wiring hardware devices together. These tools are broadly used to provide hands on experience on IoT fundamentals during teaching and learning. This paper elaborates the appropriateness and the practicality of these concepts via an example by implementing a user interface (UI) and Dashboard in Node-RED where dashboard palette is used for demonstration with switch, slider, gauge and Raspberry pi palette is used to connect with GPIO pins present on Raspberry pi board. An LED light is connected with a GPIO pin as an output pin. In this experiment, it is shown that the Node-Red dashboard is accessing on Raspberry pi and via Smartphone as well. In the final step results are shown in an elaborate manner. Conversely, inadequate Programming skills in students are the biggest challenge because without good programming skills there would be no pioneers in engineering, robotics and other areas. Coding plays an important role to increase the level of knowledge on a wide scale and to encourage the interest of students in coding. Today Python language which is Open source and most demanding languages in the industry in order to know data science and algorithms, understanding computer science would not be possible without science, technology, engineering and math. In this paper a small experiment is also done with an LED light via writing source code in python. These tiny experiments are really helpful to encourage the students and give play way to learn these advance technologies. The cost estimation is presented in tabular form for per learning kit provided to the students for Hands on experiments. Some Popular In addition, some Open source tools for experimenting with IoT Technology are described. Students can enrich their knowledge by doing lots of experiments with these freely available software's and this low cost hardware in labs or learning kits provided to them.

The Character and Negotiability of Air Waybill (항공화물운송상(航空貨物運送狀)의 성질(性質)과 유통성(流通性))

  • Lee, Kang-Bin
    • The Korean Journal of Air & Space Law and Policy
    • /
    • v.4
    • /
    • pp.65-85
    • /
    • 1992
  • The air waybill is supposed to be made out by the consignor. If the carrier makes it out, he is deemed, subject to proof to the contrary, to have done so on behalf of the consignor. The air waybill shall be made out in three original parts. The first part shall be marked "for the carrier", and shall be signed by the consignor. The second part shall be marked "for the consignee", it shall be signed by the consignor and by the carrier and shall accompany the goods. The third part shall be signed by the carrier and handed by him to the consignor, after the goods have been accepted. According to the original Warsow Convention article 8, the air waybill must contain 17 particulars or items. However, the Hague Protocol reduced to three the number of particulars required to appear on the air waybill. Only one item is obligatory, namely, the notice that the carriage is subject to the rules of the Warsaw Convention. The absence of the air waybill entails unlimited liability of the carrier because it deprives him of the right to avail himself of the provisions of the Warsaw Convention which exclude or limit his liability. The consignor shall be liable for all damages suffered by the carrier or any other person by reason of the irregularity, incorrectness or incompleteness of the particulars and statements in the air waybill. Although the contract of the carriage of goods by air is not a formal contract, the document of carriage is issued. The issue of air wayhill is not essential for the existence or validity of the contract, but serves merely as a means of proof. The Hague Protocol has lessened the consequences of the carrier's neglect to faithfully accomplish the required formalities. Henceforth, these formalities no longer constitute legal obligations. The air waybill is the consignment note used for the carriage of goods by air. It is often called an air consignment note and is not a document of title or transferable/negotiable instrument. It is basically a receipt for the goods for despatch and is prima facie evidence of the conditions of carriage. Each of the original parts of the air waybill has evidential value and possession of his part is a condition for the exercise by the consignor or cosignee of his rights under the contract of carriage. Oveall, it is an usage that under a documentary letter of credit, the consignee on the air waybill is the opening bank of the letter of credit, and the notify party is the importer who applied for the letter of credit. In Korea there is an usage as to process of cargo delivery in air transportation as follows: The carrier carries the cargo into the bonded area of the airport and gives both the notice of arrival of the cargo and the consignee's air waybill to the notify party who is the importer. Then the notify party obtains the Letter of Guarantee from the opening bank in exchange for reimbursing the amount of the letter of credit or tendering the security therefor to the opening bank. The notify party then presents this document to the customs authorities for the process of customs clearance. The opening bank becomes a consignee only to ensure repayment of the funds it has expended, and the only interest of the opening bank as consignee is the reimbursement of the money paid to the exporter under the documentary letter of credit. Just as the bill of lading in maritime law, the air waybill has always been considered negotiable although the Warsaw Convention does not emphasize this aspect of negotiability. However, the Hague Protocol article 4 corrected the situation by stating that "nothing in this Convention prevents the issue of a negotiable air waybill." This provision officially recognizes that the air waybill must meet the needs of the present day business circles by being a negotiable instrument. Meanwhile, Montreal Additional Protocol no. 4 has brought important changes. Registration by computer is acceptable and the parties to the contract of carriage are allowed to replace the air waybill with a receipt for the goods. In conclusion, as the Warsaw Convention has not details of provisions relating to the issuing of the negotiable air waybill, it is hoped that there should be supplement to the Warsaw Convention and establishment of international commercial usage with regard to the negotiable air waybill.

  • PDF

A Study on Fashion illustration Based on Pop Art Technique (패션 일러스트레이션에서 보여지는 팝 아트적 표현 특성에 관한 연구)

  • Kim, Mi-Hyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.4
    • /
    • pp.659-668
    • /
    • 2008
  • Today, Fashion illustration has been diversified in its usage and respotlighted in the significance of its artistry by artists' interpretation and subjective perspectives. The purpose of this study is to find out theoretical reestablishment of this extended expression sphere and possible expression coverage of Fashion illustration. First, based on the Fashion illustration works revealing expressive features of Pop Art, this study reviews major considerations of Fashion illustration, i.e. assemblage, silk screen and new possible perspectives respectively. Therefore, based on the reviews, this study seeks to deduce pop art characteristics of expression technique found in Fashion illustration. Expression modes of Pop Art are represented broadly by assemblage, silk screen and new perspectives. Based on corresponding case analysis, this study could come to find out the following expressive features of pop art revealed in Fashion illustration: First, it is found that contemporary Fashion illustration pursues unbounded expressions and unprecedented styles owing to material variety. Second, it is found that contemporary Fashion illustration tries to adopt new and experimental techniques including computer program. Third, it is found that Fashion illustration characterized mainly by expressive features of Pop Art shows and pioneer a wide variety of application spheres including commercials(ads), newspaper or magazine illustration and cartoon ads simply beyond designer's creative drawing. Furthermore, it is expected that Pop Art's expressive features shown in Fashion illustration will evolve through a fusion with various experimental techniques, and keep having cultural and artistic influence in the future as well.

Internet Monitoring of Wind-Photovoltaic Hybrid Generation System (풍력-태양광 복합발전 시스템의 인터넷 모니터링)

  • Yang, Si-Chang;Moon, Chae-Joo;Chang, Young-Hak;Soh, Soon-Yeol;Chung, Ji-Hyun;Kim, Eui-Sun
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.4
    • /
    • pp.43-48
    • /
    • 2006
  • Recently, many researchers have shown great interest in wind-photovoltaic hybrid generation system which promotes electric power supply safely and progress of energy usage efficiently with complementary cooperation of a wind generation system and photovoltaic generation system. To use this hybrid generation system stably and effectively, we established a system which can acquire, analyse and save data and monitored remotely using internet. We constructed the signal conditioning circuit and used many kinds of converters to measure physical quantities such as wind velocity, intensity of illumination and temperature as well as many kinds of voltage and current for AC and DC. we acquired data from computer with data acquisition board, developed server program and client program which can download data that is monitored and saved in realtime at remote place. We analysed the measured data in relation to many conditions such as time and weather conditions.

Real Time User Location Information Protection Model Using Anonymity (익명성을 활용한 사용자의 실시간 위치정보 보호모델)

  • Mun, Hyung-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.10
    • /
    • pp.2316-2322
    • /
    • 2013
  • Due to the development of ICT, with using hardwares such as WiFi, 3G and GPS and so on, smartphone could have provided a lot of applications with novel functions rapidly. Through such applications, lots of personal information such as personal location, personal images, and list of phone calls is created, saved and widely used. Because there is lots of leakage of the stored personal information due to loss of phone and application, privacy violation have been important issue nowadays. Smartphone with GPS and Internet provides location information. To protect the information, the technologies that only the authorized user can access it while inquiring the location information have been proposed. In this paper, to minimize the identification information for location information subject and information user and anonymize the identifiable information such as phone number, we proposed a model that can reduce the leakage of information and avoid the wrong usage of the stored information in the server. This technique will be used for protecting privacy when developing the application that provides routing service through location history information.