• Title/Summary/Keyword: Digital contents

Search Result 8,445, Processing Time 0.038 seconds

Algorithm of GTS Time Slots Allocation Based on Weighted Fair Queuing in Environments of WBAN (WBAN 환경에서 Weighted Fair Queuing 기반의 GTS 타임 슬롯 할당 알고리즘)

  • Kim, Kyoung-Mok;Jung, Won-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.45-56
    • /
    • 2011
  • WBAN is short range wireless communication technology which is consists of several small devices close to, attached to or implanted into the human body. WBAN is classified into between medical and non-medical by applications based on technology and medical data with periodic characteristics is used the GTS method for transmitting data to guarantee the QoS. In this paper we proposed algorithm that resolve lack of GTSs while data transmit GTS method in superframe structure of WBAN. Coordinator dynamically allocates GTSs according to the data rate of devices and make devices share GTSs when lack of GTSs. We compared delay bounds, throughput for performance evaluation of the proposed algorithm. In other words, we proposed algorithm adaptive WFQ scheduling that GTS allocation support differential data rate in environments of WBAN. The experiment results show the throughput increased and the maximum delay decreased compared with Round Robin scheduling.

A Design on Security Model of Domestic Internet-based Broadcasting Service (국내 인터넷기반 방송서비스의 보안 모델 설계)

  • Seo, Hee-Suk;Kim, Sung-Jun;Ahn, Woo-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.6
    • /
    • pp.183-190
    • /
    • 2012
  • Internet Protocol Television(IPTV) is the use of an IP broadband network to deliver television (cable TV type) services to the end user. Traditional telecommunications service providers as well as alternate service providers and Internet service providers can utilize their IP networks (and broadband consumer access) to deliver broadcast TV, Video on Demand (VOD) and other Internet services to the consumer. As digital technologies progress, illegal copy and redistribution of IPTV content become easier and simpler. Therefore it is required to protect IPTV content or service. In this paper, we analyze the security threats and requirements. We also discuss related issues and solutions for IPTV.

Clinical evaluation of Acupuncture and Herb-Medication on Bell's palsy by DITI (컴퓨터 적외선(赤外線) 전신체열촬영(全身體熱撮影)을 통해 살펴본 Bell' palsy에 대한 한방적 치료의 임상적(臨床的) 고찰(考察))

  • Cho, Eun-Hee;Cho, Nam-Geun;Hur, Tae-Young;Cheon, Mi-Na
    • Journal of Acupuncture Research
    • /
    • v.17 no.2
    • /
    • pp.19-30
    • /
    • 2000
  • Object : This study is designed to evaluate effects of acupuncture and herb-medication by the data of DITI(Digital Infrared Thermographic Imaging) examination and the changes of clinical symptoms after the therapy of acupuncture and herb-medication in the patients with Bell's palsy. Contents : The conservative therapy with acupuncture and herb-medication was performed during 1-8weeks. The acupuncture points of S4, S6, G14, S2, BL2, SI18, TE23, LI4 and S36 was used. In the pre- and post therapy, DITI examinations were performed in patients who had Bell's palsy and were treated by acupuncture simultaneously, and then tried to correlate the results of clinical symptoms with the difference of thermographic findings at pre-and post acupuncture. Setting : The standard routine themographic examinations were performed with thermography (DITI) in the 16 patients with Bell's palsy at pre- and post acupuncture. patients : Thermographic imaging of 16cases was analyzed. They had diagnosed Bell's palsy. They were treated by acupuncture and moxibustion therapy in Wonkwang Oriental Hospital from Jauary, 1999 to February, 2000. Results : The results of treatment showes that 56.25% of patients achieved excellent recovery and 31.25% achieved good recovery. After compairing the DITI results before and after treatment, we found 43.75% of patients achieved excellent recovery and 43.75% achieved good recovery. Conclusion :Acupuncture showed good results over 87.5% in clinical evaluation and 87.5% in DITI. Thermographic examination showes terapeutic effect of acupuncture treatment.

  • PDF

Design of Transformation Engine for Mobile 3D Graphics (모바일 3차원 그래픽을 위한 기하변환 엔진 설계)

  • Kim, Dae-Kyoung;Lee, Jee-Myong;Lee, Chan-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.10
    • /
    • pp.49-54
    • /
    • 2007
  • As digital contents based on 3D graphics are increased, the requirement for low power 3D graphic hardware for mobile devices is increased. We design a transformation engine for mobile 3D graphic processor. We propose a simplified transformation engine for mobile 3D graphic processor. The area of the transformation engine is reduced by merging a mapping transformation unit into a projective transformation unit and by replacing a clipping unit with a selection unit. It consists of a viewing transformation unit a projective transformation unit a divide by w nit, and a selection unit. It can process 32 bit floating point format of the IEEE-754 standard or a reduced 24 bit floating point format. It has a pipelined architecture so that a vertex is processed every 4 cycles except for the initial latency. The RTL code is verified using an FPGA.

Data-Driven Senior Cognitive Response Modeling Using Cognitive Measurement Data (인지측정데이터를 이용한 데이터 기반 시니어 인지반응 모델링)

  • Lee, Seolhwa;Yun, Youdong;Ji, Hyesung;Lim, Heuiseok
    • The Journal of Korean Association of Computer Education
    • /
    • v.20 no.2
    • /
    • pp.57-65
    • /
    • 2017
  • The world's senior population is on the rise. In particular, unlike the past seniors who were in the digital insensitivity class, the smart seniors who want to continue to use smart devices and the Internet are emerging. Although the definition of senior is merely defined as a senior group, research on the characteristics of seniors has been done in psychology studies, but research using data based senior cognitive response is only at an early stage. In order to provide contents according to the cognitive characteristics of Smart Senior, there is a need to classify the cognitive characteristics of Smart Senior well. Therefore, this paper suggests a data - driven senior cognitive response modeling method that helps the enjoyment of culture for seniors through classification of cognitive responses to smart seniors.

Web Accessibility Compliance of Major Web Sites in Korea (국내 민간기업의 웹 접근성 준수 실태)

  • Hyun, J.H.;Hong, K.S.;Shin, K.W.;Min, H.K.
    • Journal of rehabilitation welfare engineering & assistive technology
    • /
    • v.1 no.1
    • /
    • pp.37-43
    • /
    • 2007
  • Internet is essential to live nowadays, but persons with disabilities are hard to use internet because people who develops and operate web sites don't think and comply the web accessibility standard. In order to solve this problem, Korea governments implement a lot of policies such as. making web accessibility standard, operating web accessibility education program, etc.. The purpose of this paper is examined the web accessibility compliance of major web sites such as portal, news, banking, education in Korea. In order to investigate the web accessibility compliance status of major web sites's in Korea, 15 web sites were chosen. This study was used the 4 major checkpoints that must be the crucial among 14 checkpoints in Internet Web Contents Accessibility Guidelines which was amended by Ministry of the Information and Communication in 2005. The results of this study showed that 15 major web sites in Korea didn't meet the 4 major checkpoints.

  • PDF

Study on the Amplitude Modification Audio Watermarking Technique for Mixed Music with High Inaudibility (높은 비가청성을 갖는 믹스 음악의 크기 변조 오디오 워터마킹 기술에 관한 연구)

  • Kang, Se-Koo;Lee, Young-Seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.67-74
    • /
    • 2016
  • In this paper, we propose a watermarking technology for a mixed music. The mixed music means recreated music that contained a number of musics in one audio clip. Royalty associated with the audio content is typically imposed by the full audio content. However, the calculation of royalties gives rise to conflict between copyright holders and users in the mixed music because it uses not full audio content but a fraction of that. To solve the conflict related with the mixed music, we propose a audio watermarking technique that inserts different watermarks for each audio in the audio that make up the mixed music. The proposed watermarking scheme might have poor SNR (signal to noise ratio) to embed to each audio clip. To overcome poor SNR problem, we used inaudible pseudo random sequence which modifies typical pseudo random sequence to canonical signed digit (CSD) form. The proposed method verifies the performance by each watermark extraction and the time internal estimation valies from the mixed music.

Semi-Fragile Image Watermarking for Authentication Using Wavelet Packet Transform Based on The Subband Energy (부대역 에너지 기반 웨이블릿 패킷 변환을 이용한 인증을 위한 세미 프레자일 영상 워터마킹)

  • Park, Sang-Ju;Kwon, Tae-Hyeon
    • The KIPS Transactions:PartB
    • /
    • v.12B no.4 s.100
    • /
    • pp.421-428
    • /
    • 2005
  • A new method of Semi-fragile image watermarking which ensures the integrity of the contents of digital image is presented. Proposed watermarking scheme embeds watermark in the form of quantization noise on the wavelet transform coefficients in a specific mid frequency subbands selected from a wavelet packet decomposition based on energy distribution of wavelet transform coefficients. By controlling the strength of embedded watermark using HVS (Human Visual System) characteristic, it is imperceptible by a human viewer while robust against non-malicious attack such as compression for storage and/or transmission. When an attack is applied on the original image, it is highly probable that wavelet transform coefficients not only at the exact attack positions but also the neighboring ones are modified. Therefore, proposed authentication method utilizes whether both current coefficient and its neighbors are damaged. together. So it can efficiently detect and accurately localize attacks inflicted on the content of original image. Decision threshold for authentication can be user controlled for different application areas as needed.

A Study on Encryption Method using Hash Chain and Session Key Exchange in DRM System (DRM 시스템에서 해쉬체인과 세션키 교환을 이용한 암호화 기법에 관한 연구)

  • Park, Chan-Kil;Kim, Jung-Jae;Lee, Kyung-Seok;Jun, Moon-Seog
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.843-850
    • /
    • 2006
  • This is devoted to first, to propose a hash chain algorithm that generates more secure key than conventional encryption method. Secondly, we proposes encryption method that is more secure than conventional system using a encryption method that encrypts each block with each key generated by a hash chain algorithm. Thirdly, After identifying the user via wired and wireless network using a user authentication method. We propose a divided session key method so that Although a client key is disclosed, Attackers cannot catch a complete key and method to safely transfer the key using a divided key method. We make an experiment using various size of digital contents files for performance analysis after performing the design and implementation of system. Proposed system can distribute key securely than conventional system and encrypt data to prevent attacker from decrypting complete data although key may be disclosed. The encryption and decryption time that client system takes to replay video data fie is analogous to the conventional method.

A Study of Improvement for Public Records Management Act: Based on KS X ISO 15489 ("공공기록물 관리에 관한 법률" 개선 방향에 관한 연구: KS X ISO 15489 표준에 입각하여)

  • Jeong, Ki-Ae;Kim, You-Seung
    • Journal of the Korean Society for information Management
    • /
    • v.26 no.1
    • /
    • pp.231-257
    • /
    • 2009
  • In South Korea the records management system nationwide has been developed based on 'the Act on public agencies' records management' which was first enacted in 1999. Furthermore, 'the Act on public records management 2006' has shifted a paradigm of records management to the digital records world. In this context, the records management standard, KS X ISO 15489 has a profound significance. Based on the principle of that there should not be any conflict between nationwide records management laws and standard, this study explores a meaning of the standard and discusses contradictive elements between the laws and standard. On the basis of the main contents of the standard's five categories, the study analyzes the laws in comparison with the standard. As a result, the study provides remedies for the current records management law and discusses a prospect of records management strategies in the 21st Century.