• Title/Summary/Keyword: Messages of Life

Search Result 138, Processing Time 0.023 seconds

Data Visualization of Site-Specific Underground Sounds

  • Tae-Eun, Kim
    • International journal of advanced smart convergence
    • /
    • v.13 no.1
    • /
    • pp.77-84
    • /
    • 2024
  • This study delves into the subtle sounds emanating from beneath the earth's surface to unveil hidden messages and the movements of life. It transforms these acoustic phenomena into digital data and reimagines them as visual elements. By employing Sismophone microphones and utilizing the FFT function in p5.js, it analyzes the intricate frequency components of subterranean sounds and translates them into various visual elements, including 3D geometric shapes, flowing lines, and moving particles. This project is grounded in the sounds recorded in diverse 'spaces of death,' ranging from the tombs of Joseon Dynasty officials to abandoned areas in modern cities. We leverage the power of sound to transcend space and time, conveying the concealed narratives and messages of forgotten places .Through the visualization of these sounds, this research blurs the boundaries between 'death' and 'life,' 'past' and 'present,' aiming to explore new forms of artistic expression and broaden perceptions through the sensory connection between sound and vision.

Design of a Smart TV Service System for Daily Life Notification (스마트 TV 생활 알리미 서비스 시스템 설계)

  • Choi, Jong Myung;Im, Do Yeon;Park, Kyung Woo;Oh, Soo Lyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.8 no.3
    • /
    • pp.23-31
    • /
    • 2012
  • With the advance of Smart TV technologies, TV watchers can enjoy the Internet and games while watching TV programs. Besides retrieving with some keywords in the Internet, people may want to access local information such as notifications from town, messages from children's schools, shopping information from local marts, and even reminder messages for visiting from hospitals while watching TV without using web-browser. In this paper, we introduce the daily life notification service scenarios and its functional and non-functional requirements. Furthermore, we also propose a system that provides the notification services, consists of smart TV apps and server systems. We also introduce the system architecture and the component design of the system. Our work will help smart TV service developers because this paper will give them some service scenarios, requirements, and system architecture and its component design.

Blockchain-Assisted Trust Management Scheme for Securing VANETs

  • Ahmed, Waheeb;Wu, Di;Mukathie, Daniel
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.609-631
    • /
    • 2022
  • The main goal of VANETs is to improve the safety of all road users. Therefore, the accuracy and trustworthiness of messages transmitted in VANETs are essential, given that life may rely on them. VANETs are provided with basic security services through the use of public key infrastructure-based authentication. However, the trust of users is still an open issue in VANETs. It is important to prevent bogus message attacks from internal vehicles as well as protect vehicle privacy. In this paper, we propose a trust management scheme that ensures trust in VANETs while maintaining vehicle privacy. The trust scheme establishes trust between vehicles where a trust value is assigned to every vehicle based on its behavior and messages are accepted only from vehicles whose trust value is greater than a threshold, therefore, protecting VANETs from malicious vehicles and eliminating bogus messages. If a traffic event happens, vehicles upload event messages to the reachable roadside unit (RSU). Once the RSU has confirmed that the event happened, it announces the event to vehicles in its vicinity and records it into the blockchain. Using this mechanism, RSUs are prevented from sending fake or unverified event notifications. Simulations are carried out in the context of bogus message attacks to evaluate the trust scheme's reliability and efficiency. The results of the simulation indicate that the proposed scheme outperforms the compared schemes and is highly resistant to bogus message attacks.

Identifying Mobile Owner based on Authorship Attribution using WhatsApp Conversation

  • Almezaini, Badr Mohammd;Khan, Muhammad Asif
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.317-323
    • /
    • 2021
  • Social media is increasingly becoming a part of our daily life for communicating each other. There are various tools and applications for communication and therefore, identity theft is a common issue among users of such application. A new style of identity theft occurs when cybercriminals break into WhatsApp account, pretend as real friends and demand money or blackmail emotionally. In order to prevent from such issues, data mining can be used for text classification (TC) in analysis authorship attribution (AA) to recognize original sender of the message. Arabic is one of the most spoken languages around the world with different variants. In this research, we built a machine learning model for mining and analyzing the Arabic messages to identify the author of the messages in Saudi dialect. Many points would be addressed regarding authorship attribution mining and analysis: collect Arabic messages in the Saudi dialect, filtration of the messages' tokens. The classification would use a cross-validation technique and different machine-learning algorithms (Naïve Baye, Support Vector Machine). Results of average accuracy for Naïve Baye and Support Vector Machine have been presented and suggestions for future work have been presented.

A Linguistic Approach to Communication Strategies of Biological Systems (생물체의 정보소통전략에 대한 언어학적 접근)

  • Kim, Soo-Yeon;Oh, Duk Jae
    • KSBB Journal
    • /
    • v.32 no.1
    • /
    • pp.29-34
    • /
    • 2017
  • The completion of the Human Genome Project that identified all 3 billion base pairs in the human genome can be seen as a step towards understanding the relay of information and intention within an organism, or in other words, the language of life. The faculty of human language, key to differentiating humans from other animate species, works for conveying information to others by mapping meaning to sound based on syntactic structures. This resemblance between life and language has not gone unnoticed; the literature on RNA transcription and translation research regularly uses linguistic metaphors and the biolinguistic perspective of language has also been studied. By examining the biological characteristics of language and the linguistic characteristics of life, this study aims to identify key mechanisms shared between the two systems in order to promote a stronger connection between them. It furthers this goal by pointing out two general messages to which these mechanisms aim, productivity and accuracy, and discovers what lesson these messages give to a human society geared for sustainability.

A Study on the Communication Effect of the Suicide Prevention Campaign Message: Focusing on Message Characteristics and Individual Difference (자살예방 캠페인 메시지의 커뮤니케이션 효과에 관한 연구: 메시지 특성과 개인차를 중심으로)

  • Sun, Hye-Jin
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.3
    • /
    • pp.183-195
    • /
    • 2018
  • This study attempts to analyze the effects of public advertising about suicide prevention and to investigate how the attitudes and perceptions of the message recipients differ according to the message framing type (positive vs. negative) and the appeal type (self-oriented/other-oriented). Positive messages, rather than negative messages, have a greater impact on people's respect for life and on attitudes to suicide. Respect for life attitudes were more positive among subjects who received an other-oriented message than among those who received a self-oriented message. Among the individual characteristics variables, the level of cognitive emotion regulation showed a significant impact on attitudes to respect for life and on attitudes to suicide.

Development of a Respiratory Nursing Program Using Recorder Playing for the Patients with Asthma and Measurement of Effectiveness (리코더를 활용한 천식환자의 호흡간호프로그램 개발 및 효과)

  • Jang, Hee-Jung
    • Journal of Korean Academy of Fundamentals of Nursing
    • /
    • v.18 no.1
    • /
    • pp.19-27
    • /
    • 2011
  • Purpose: This study was conducted to develop a respiratory nursing program using recorder playing for patients with asthma and to determine the effects of the program. Method: Participants were 26 patients with asthma (experimental group: 13, control group: 13). The experimental group participated in the respiratory nursing program for six months from April, to October, 2007. Content included playing a recorder, group education about asthma, and educational messages including cellular phone messages. The control group received usual care during the six months. Results: In this research the respiratory nursing program using recorders was developed in 3 stages: initial stage, advanced stage, and wrap up stage. Compared to the control group, fatigue status in the experimental group improved significantly as well as level of forced expiratory volume in 1 second. However significant differences were found in sleep status, mood, or quality of life. Conclusions: These results suggest that this respiratory nursing program for symptom management of patients with asthma led to improvements in self care activity. Nursing interventions are needed to maintain and further enhance the quality of life of these patients and the interventions should be implemented over a transition period.

Efficient Message Authentication Scheme for VANET (차량 애드혹 네트워크 환경에서 효율적인 메시지 인증 기법)

  • Yoo, Young-Jun;Lee, Jun-Ho;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.6
    • /
    • pp.37-47
    • /
    • 2009
  • In VANET, each vehicle can obtain traffic information from other vehicles or infrastructure, and they frequently exchange life-critical safety message. Therefore, it is necessary among vehicles to establish a secure channel for keeping the driver's safe and protecting the channel against several attack challenges. TSVC is a representative scheme which needs low communication and computation to be performed. But, there is a delay when verifying the messages because it is designed based on TESLA. Thus, it is not acceptable to use TSVC for sending the time-critical messages. In this paper, we propose a novel message authentication scheme which reduces a delay for the verification of messages. Therefore, the proposed scheme can be suitable to transmitting time-critical messages. Furthermore, the scheme supports to privacy preservation and can robust against DoS attacks.

Design Principles of Animated Pedagogical Agent and Instructional Message for Affective Learning

  • SON, Chanhee
    • Educational Technology International
    • /
    • v.15 no.1
    • /
    • pp.1-26
    • /
    • 2014
  • The purpose of this study was to develop design principles of both animated pedagogical agents as 'credible' persuasive message source and persuasive fear arousing instructional messages in order to help enhance attitude changes toward a certain issue. Based on the previous pedagogical agent research, this study drew the design principles providing ways to manipulate agent credibility level and fear arousing level of message. Consequently, it specified how to make pedagogical agents perceived less or more credible by learners by manipulating a variety of agent features. For fear arousing message, this study showed how fear arousing messages would be structured into one of three levels: non-threatening, moderately threatening, and strongly threatening. Two different agent conditions and three message conditions were actually developed and experimentally tested with the participants of 40 undergraduate students. The results showed that the agent design principles specified from the previous research worked well enough to make a distinction between the more credible agent and the less credible agent. The overall results of this study may indicate that the design strategies for fear arousing message are retained on the premise of some future refinements.

Design Of A Secure Authentication Protocol Against Phishing And Pharming Attacks (피싱과 파밍 공격에 대응하기 위한 인증 프로토콜 설계)

  • Kim, Ik Su;Choi, Jong Myung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • As individuals spend more time doing social and economic life on the web, the importance of protecting privacy against Phishing and Pharming attacks also increases. Until now, there have been researches on the methods of protection against Phishing and Pharming. However, these researches don't provide efficient methods for protecting privacy and don't consider Pharming attacks. In this paper, we propose an authentication protocol that protects user information from Phishing and Pharming attacks. In this protocol, the messages passed between clients and servers are secure because they authenticate each other using a hash function of password and location information which are certificated to clients and servers only. These messages are used only once, so that the protocol is secure from replay attacks and man-in-the-middle attacks. Furthermore, it is also secure from Pharming attacks.