• 제목/요약/키워드: Computing Contents

검색결과 807건 처리시간 0.026초

Design and Implementation of the Query Processor and Browser for Content-based Retrieval in Video Database (내용기반 검색을 위한 비디오 데이터베이스 질의처리기 및 브라우저의 설계 및 구현)

  • Lee, Hun-Sun;Kim, Yong-Geol;Bae, Yeong-Rae;Jin, Seong-Il
    • The Transactions of the Korea Information Processing Society
    • /
    • 제6권8호
    • /
    • pp.2008-2019
    • /
    • 1999
  • As computing technologies are rapidly progressed and widely used, the needs of high quality information have been increased. To satisfy these needs, it is essential to develop a system which can provide an efficient storing, managing and retrieving mechanism of complex multimedia data, esp. video data. In this paper, we propose a metadata model which can support content-based retrieval of video data. And we design and implement an integrated user interface for querying and browser for content-based retrieval in video database which can efficiently access and browse the video clip that user want to see. Proposed query processor and browser can support various user queries by integrating image feature, spatial temporal feature and annotation. Our system supports structure browsing of retrieved result, so users can more exactly and efficiently access relevant video clip. Without browsing the whole video clip, users can know the contents of video by seeing the storyboard. This storyboard facility makes users know more quickly the content of video clip.

  • PDF

Low-Latency Programmable Look-Up Table Routing Engine for Parallel Computers (병렬 컴퓨터를 위한 저지연 프로그램형 조견표 경로지정 엔진)

  • Chang, Nae-Hyuck
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제6권2호
    • /
    • pp.244-253
    • /
    • 2000
  • Since no single routing-switching combination performs the best under various different types of applications, a flexible network is required to support a range of polices. This paper introduces an implementation of a look-up table routing engine offering flexible routing and switching polices without performance degradation unlike those based on microprocessors. By deciding contents of look-up tables, the engine can implement wormhole routing, virtual cut-through routing, and packet switching, as well as hybrid switching, under a variety of routing algorithms. Since the routing engine has a piplelined look-up table architecture, the routing delay is as small as one flit, and thus it can overlap multiple routing actions without performance degradation in comparison with hardwired routers dedicated to a specific policy. Because four pipeline stages do not induce a hazard, expensive forwarding logic is not required. The routing engine can accommodate four physical links with a time shared cut-through bus or single link with a cross-bar switch. It is implemented using Xilinx 4000 series FPGA.

  • PDF

CNVR Detection Reflecting the Properties of the Reference Sequence in HLA Region (레퍼런스 시퀀스의 특성을 고려한 HLA 영역에서의 CNVR 탐지)

  • Lee, Jong-Keun;Hong, Dong-Wan;Yoon, Jee-Hee
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제16권6호
    • /
    • pp.712-716
    • /
    • 2010
  • In this paper, we propose a novel shape-based approach to detect CNV regions (CNVR) by analyzing the coverage graph obtained by aligning the giga-sequencing data onto the human reference sequence. The proposed algorithm proceeds in two steps: a filtering step and a post-processing step. In the filtering step, it takes several shape parameters as input and extracts candidate CNVRs having various depth and width. In the post-processing step, it revises the candidate regions to make up for errors potentially included in the reference sequence and giga-sequencing data, and filters out regions with high ratio of GC-contents, and returns the final result set from those candidate CNVRs. To verify the superiority of our approach, we performed extensive experiments using giga-sequencing data publicly opened by "1000 genome project" and verified the accuracy by comparing our results with those registered in DGV database. The result revealed that our approach successfully finds the CNVR having various shapes (gains or losses) in HLA (Human Leukocyte Antigen) region.

Anti-Spam for VoIP based on Turing Test (튜링 테스트 기반으로 한 VoIP 스팸방지)

  • Kim, Myung-Won;Kwak, Hu-Keun;Chung, Kyu-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • 제14권3호
    • /
    • pp.261-265
    • /
    • 2008
  • As increasing the user of VoIP service using ITSP(Internet Telephony Service Provider), the VoIP spam becomes a big problem. The spam used in the existing public telephone is detected by using the pattern inspection of call behavior because it is difficult to filter contents for the characteristic of real-time voice communication. However there is a false-positive problem. The threat on spam remains where spam with low threshold can't be detected or users share one number. In this paper, we propose anti-spam for VoIP based on luring test. The proposed method gives a user luring test and he/she can connect to a receiver if passing turing test. A ticket is given to a user that pass luring test and it reduces overhead of luring test in re-dial. The proposed method is implemented on ASUS WL-500G wireless router and Asterisk IP-PBX. Experimental results show the effectiveness of the proposed method.

A Study on the Push-based Distance Education System and Leveling Estimation Algorithm (Push 기반 원격교육 시스템과 수준별 문항평가 알고리즘에 관한 연구)

  • 김원영;김치수;김진수
    • Journal of Internet Computing and Services
    • /
    • 제2권3호
    • /
    • pp.19-25
    • /
    • 2001
  • An educational system using computers was first conceptualized by Dr. Donald Bitzer in the University of Illinois in the late 1950s. Since the PLATO system was developed in 1961, multilateral research were made for the last 30 years. Especially, the development of Internet and Information Technology has contributed to the advancement of the distance education system. This system has greatly changed the existing educational paradigm, As the result, new education system is being realized, This study suggests a distance education system based on ‘push’ technique, which is a means of active information transmission, In this system, the ‘push’ technique is combined with the existing distance education system. Through the combination, learning contents can be provided for learners without connecting the DB on the Internet. In addition, the process of getting new information is real-timed operation. Also, the treatment of item; and the algorithm of level-based item evaluation are devised in consideration of various levels of learners, so that evaluation of items appropriate to the levels of learners can be accomplished.

  • PDF

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • 제7권5호
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Property-based Hierarchical Clustering of Peers using Mobile Agent for Unstructured P2P Systems (비구조화 P2P 시스템에서 이동에이전트를 이용한 Peer의 속성기반 계층적 클러스터링)

  • Salvo, MichaelAngelG.;Mateo, RomeoMarkA.;Lee, Jae-Wan
    • Journal of Internet Computing and Services
    • /
    • 제10권4호
    • /
    • pp.189-198
    • /
    • 2009
  • Unstructured peer-to-peer systems are most commonly used in today's internet. But file placement is random in these systems and no correlation exists between peers and their contents. There is no guarantee that flooding queries will find the desired data. In this paper, we propose to cluster nodes in unstructured P2P systems using the agglomerative hierarchical clustering algorithm to improve the search method. We compared the delay time of clustering the nodes between our proposed algorithm and the k-means clustering algorithm. We also simulated the delay time of locating data in a network topology and recorded the overhead of the system using our proposed algorithm, k-means clustering, and without clustering. Simulation results show that the delay time of our proposed algorithm is shorter compared to other methods and resource overhead is also reduced.

  • PDF

An Analysis of Card News and Deconstructing News Values in Curated News Contents in the Digital Era

  • Hong, Seong Choul;Pae, Jung Kun
    • Journal of Internet Computing and Services
    • /
    • 제18권2호
    • /
    • pp.105-111
    • /
    • 2017
  • This paper explores the characteristics of curated news content. With content analysis of 1020 news clips, the study found that news values immersed in card news differed from those of traditional news. Specifically, timeliness was not regarded as a key factor in newsworthiness. Rather, information and social impacts were highly emphasized. Considering news consumers depend on traditional news for timely news, curated news content was not a replacement for traditional news but a supplement. By refurbishing photos from previous news reports and googling the web for related information, curated news reiterates social meaning and provides relevant information. Furthermore, salience of human interest can be explained by entertaining characteristics of curated news. In story forms, the list technique has several important points to stress, and was more frequently used than inverted pyramids. Another key finding of this study is man-on-the street as the most quoted main sources in the curatorial context.

A Study on Ubiquitous Environment and Furniture Design - Focus on Elements of Interior Design Trends -

  • Kim, Jong-Seo
    • Journal of the Korea Furniture Society
    • /
    • 제22권3호
    • /
    • pp.160-173
    • /
    • 2011
  • Increased internet use under a ubiquitous environment may be called as a great human information space revolution followed by Industrial Revolution. This revolution is exerting its significant influence over all the industry as a whole with speed faster than that of any other times. Along with this trend, if furniture design field that leads living culture should fail to jump on this main stream without noticing it, it may be reduced to a unpopular field some day without any sign of recovery. Under this background, this study is intended to recognize a goal aiming at understanding our rapidly changing living environment and leading our way positively. Currently, our surrounding living environment is immersed in computers here and there and Mark Weiser once defined a system that moves in advance before an action as ubiquitous computing and in this respect, I am going to observe a detailed transformation process of space. First nature of the space may be defined as atoms, a physical space equivalent to a spatial element and Bits space that is untouchable is usually called as 2nd space and a combination of atoms and Bits is an intelligent space - 3rd space - that can be intelligible without touching it and finally, this space is called as a ubiquitous space. This spatial transformation is developed by several changes of living environment and we may call it as living trend or interior design trend. Transformation in terms of social perspective, space structural perspective and digital technique perspective may be enumerated. These transformations were surveyed based on its contents being implemented at a future housing exhibition hosted by 5 construction companies along with fusion of information furniture and furniture depending on each housing space. In conclusion, it could be realized that most of the companies were decorating future space by implementing ubiquitous environment as a success factor of future housing market. It may be meaningful to note once again that under an interior environment, a fusion of furniture and information furniture is required considering interior trend elements.

  • PDF

A Study on Data Security of Web Local Storage (웹 로컬스토리지 데이터 보안을 위한 연구)

  • Kim, Ji-soo;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • 제17권3호
    • /
    • pp.55-66
    • /
    • 2016
  • A local storage of HTML5 is a Web Storage, which is stored permanently on a local computer in the form of files. The contents of the storage can be easily accessed and modified because it is stored as plaintext. Moreover, because the internet browser classifies the local storages of each domain using file names, the malicious attacker can abuse victim's local storage files by changing file names. In the paper, we propose a scheme to maintain the integrity and the confidentiality of the local storage's source domain and source device. The key idea is that the client encrypts the data stored in the local storage with cipher key, which is managed by the web server. On the step of requesting the cipher key, the web server authenticates whether the client is legal source of local storage or not. Finally, we showed that our method can detect an abnormal access to the local storage through experiments according to the proposed method.