• Title/Summary/Keyword: Technical Issue

Search Result 535, Processing Time 0.029 seconds

Development and Application of the Metadata Element for the Digital Comic Content (디지털 만화 콘텐츠 메타데이터 요소개발 및 적용)

  • Oh, Sang-Hoon;Cho, Hyun-Joo;Lee, Yong-Bae;Kang, Ji-Hoon;Myaeng, Sung-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1197-1204
    • /
    • 2004
  • Rights process problem was stated among actors that participated in digital contents distribution while it was various type of digital content service. In order to solve it, It was expressed conceptual and technical elements by reflecting a system. Among them, the interoperability of metadata became a important issue. As for the metadata for contents service, necessity about standardization is stated as a basic framework composing a service system. This paper proposed the metadata element which focus on the rights process that is being a key factor of a DRM(Digital Right Management) system for digital comics contents service. Therefore, it was verified by using Context Model of MPEG-21 RDD with interoperability between metadata elements which developed a XML format and the existing MPEG-21 RDD elements. The study results will become basic materials in the system design that considered metadata element development and interoperability of digital contents of other field

Distinction of Real Face and Photo using Stereo Vision (스테레오비전을 이용한 실물 얼굴과 사진의 구분)

  • Shin, Jin-Seob;Kim, Hyun-Jung;Won, Il-Yong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.7
    • /
    • pp.17-25
    • /
    • 2014
  • In the devices that leave video records, it is an important issue to distinguish whether the input image is a real object or a photo when securing an identifying image. Using a single image and sensor, which is a simple way to distinguish the target from distance measurement has many weaknesses. Thus, this paper proposes a way to distinguish a simple photo and a real object by using stereo images. It is not only measures the distance to the target, but also checks a three-dimensional effect by making the depth map of the face area. They take pictures of the photos and the real faces, and the measured value of the depth map is applied to the learning algorithm. Exactly through iterative learning to distinguish between the real faces and the photos looked for patterns. The usefulness of the proposed algorithm was verified experimentally.

Convergence of Relationship between Obesity and Periodontal Disease in Adults (성인의 비만과 치주질환과의 융합적 관계)

  • Lee, Yu-Hee;Choi, Jung-OK
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.11
    • /
    • pp.215-222
    • /
    • 2017
  • The purpose of this study was to investigate the relationship between oral health behaviors and periodontal diseases in adult obese people. Using the original data of the second phase of the 6th National Health and Nutrition Survey, the final 4381 adults were extracted. We analyzed frequency and technical statistics and chi - square test and multiple logistic regression analysis using SPSS statistical program to confirm the association between body mass index, number of brushing, drinking, smoking and oral health status and behavior. As a result, the prevalence of periodontal disease decreased as the number of toothbrushing increased, and the prevalence of periodontal disease increased as the body mass index increased. Through this study, obesity, a global health issue, should be more concerned with oral care and develop oral health management programs.

Critical Revision Issue and The Problems Appling in Practical Operation for UCP 600 (UCP 600의 주요개정 내용 및 실무적용상의 문제점에 대한 관한 연구)

  • Yang, Ui-Dong
    • International Commerce and Information Review
    • /
    • v.9 no.1
    • /
    • pp.381-399
    • /
    • 2007
  • UCP 600 will now come into effect on 1 July 2007, giving practitioners more than six months to prepare for the change. The vote on the UCP was also a favourable vote on eUCP Version 1.1 which was amended to bring it into conformity with the new rules. ICC Banking commission unanimeusly approved the revised UCP 600 on 26 October 2006 in paris convention. The most important revision of UCP600 have altered the technical and difficult to understand wording of UCP500 into plain simple precise and concise language, The singuler achievement of UCP600 is its elimination of phrase like "reasonable care" "reasonable time" and "an it's face" from the rule. The introduction of separate articles 2 and 3 on "Definitions" and "Interpretation" which contain the concept of "honour" along with the inclusion of certain ISBP wording in UCP, should bring about far greater clarity and precision than in many of the contentions articles in UCP500. The definition of negotiation should help lay to rest the controversies surrounding the terms of negotiation. The removal of reasonable time and the replacement by five banking days should speed the process and make L/Cs more attractive in the market, nevertheless UCP600 have many problems in appling it in practical field. For example the definition of credit, negotiation and purchase it's accepted or undertaken payment draft by accepting bank or deferred payment bank, the second advising bark's position etc. so, I will introduce in this thesis the important revised articles of UCP600 and investigate the problems in applying it in practicle field with reference to the specialist's opinion of the practical field and ICC opinions of drafting Group.

  • PDF

Proposal of Security Requirements for the Cloud Storage Virtualization System (클라우드 저장장치 가상화 시스템을 위한 보안 요구사항 제안)

  • Yeo, Youngmin;Lee, Chanwoo;Moon, Jongsub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1247-1257
    • /
    • 2013
  • The security vulnerabilities of cloud storage virtualization environments are different from those of the existing computer system and are difficult to be protected in the existing computer system environment. Therefore we need some technical measures to address this issue. First of all, the technology used in cloud storage virtualization environment needs to be thoroughly analyzed, and also, we should understand those security requirements of various stakeholders in the view of cloud storage service and perform the research on security guidelines of the research security requirements. In this paper, we propose security requirements based on layers and roles of cloud storage virtualization. The proposed security requirements can be a basement for development of solution of cloud storage virtualization security.

Analysis for Protocol Layer Technical Requirements of Wireless Mesh Networks Optimization (무선 메쉬 네트워크의 최적화를 위한 프로토콜 계층별 기술적 요구사항에 관한 분석)

  • Lee, Soon-Sik;Yun, Sang-Man;Lee, Sang-Wook;Jeon, Seong-Geun;Lee, Woo-Jae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.77-88
    • /
    • 2010
  • Wireless Mesh Networks are consist of mobility mesh clients and mesh routers. WMNs can communicate with heterogeneous networks such as IEEE 802.11, IEEE 802.15, IEEE 802.16 and sensor networks. WMNs which is based on ad hoc network are on research and developing to enhance WLANs, WPANs, or WMANs. WMNs can offer environment to serve human, service to person area, campus, and metro. But WMNs has many problems to solve about enhancing performance and generalization. Among them, Existing protocol layers has many problems enhancing to optimize WMNs. This document issues problems about WMNs in protocol layer and suggest the solutions. Also, suggests the requirements and the methods of QoS supporting issue.

Present Status and Future of Spent Fuel Management(1) - National Strategies and Their Implementations (사용후핵연료관리의 현황 및 미래(1) -국가별 관리전략과 그 이행-)

  • Park, Won-Jae;Suk, Tae-Won
    • Journal of Radiation Protection and Research
    • /
    • v.21 no.1
    • /
    • pp.59-72
    • /
    • 1996
  • The continuous expansions and development of nuclear power have led to generation of the significant volume of spent fuels and radioactive wastes. And so, safe and effective management of the spent fuel has been becoming internationally sensitive and significant issue since the early 1990s. Especially, more importance would be added in the view point of international politics, because of recent political changes in the countries of Eastern Europe including dissociation of the former Soviet Union and the difficulties faced by the nuclear industries worldwide. Accordingly, this paper is proposed to show an overview of national strategies and Policies on the spent fuel management, that are being assessed and carried out worldwide at this time. The overview is based on recent developments of the national strategies, their implementations and some related experiences presented in IAEA International meetings and some technical papers.

  • PDF

Geocoding of Low Altitude UAV Imagery using Affine Transformation Model (부등각사상변환을 이용한 저고도 UAV 영상의 지형보정)

  • Kim, Seong-Sam;Jung, Jae-Hoon;Kim, Eui-Myoung;Yoo, Hwan-Hee;Sohn, Hong-Gyoo
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.16 no.4
    • /
    • pp.79-87
    • /
    • 2008
  • There has been a strong demand for low altitude UAV development in rapid mapping not only to acquire high resolution image with much more low cost and weather independent, compared to satellite surveying or traditional aerial surveying, but also to meet many needs of the aerial photogrammetry. Especially, efficient geocoding of UAV imagery is the key issue. Contrary to high UAV potential for civilian applications, the technology development in photogrammetry for example direct georeferencing is in the early stage and it requires further research and additional technical development. In this study, two approaches are supposed for automatic geocoding of UAV still images by simple affine transformation and block adjustment of affine transformation using minimal ground control points and also evaluated the applicability and quality of geometric model compared to geocoded images generated by commercial S/W.

  • PDF

Multi-axial Vibration Test on MAST System with Field Data (국내도로 주행 시험을 통한 6축 진동시험 방법에 관한 연구)

  • Kim, Chan-Jung;Bae, Chul-Yong;Lee, Bang-Hyun;Kwon, Seong-Jin;Na, Byung-Chul
    • Transactions of the Korean Society for Noise and Vibration Engineering
    • /
    • v.16 no.7 s.112
    • /
    • pp.704-711
    • /
    • 2006
  • Vibration test on MAST(multi axial simulation table) system has several advantage over one-axial vibration test that could simulate 6-DOF, 3-axial translation and 3-axial moment, at the same time. Since field vibration motion can be fully represented with 6-DOF, multi-axial vibration test on vehicle component is widely conducted in technical leading companies to make sure its fatigue performance in vibration environment. On the way to fulfill the process, editing technique of obtained field data is key issue to success a reliable vibration testing with MAST system. Since the original signals are not only too large to fulfill it directly, but all of the measured data is not guarantee its convergency on generating its driving files, editing technique of the original signals are highly required to make some events that should meet the equal fatigue damage on the target component In this paper, key technique on editing a field data feasible for MAST system is described based on energy method in vibration fatigue. To explain its technique explicitly, author first introduced a process on field data acquisition of two vehicle component and then, representing events are produced to keep up with the editing strategy about a energy method. In the final chapter, a time information regarding a vibration test on MAST system is derived from the energy data which is critical information to perform a vibration test.

Design of an USB Security Framework for Double Use Detection (이중사용 방지를 위한 USB 보안 프레임워크의 설계)

  • Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.4
    • /
    • pp.93-99
    • /
    • 2011
  • Recently, the development of internet technology makes user's personal data used by being saved in USB. But there is a critical issue that personal data can be exposed with malicious purpose because that personal data doesn't need to be certificate to use. This paper proposes USB security framework to prevent a duplicate use of personal data for protecting the data which in USB. The proposed USB security framework performs certification process of user with additional 4bite of user's identification data and usage choice of USB security token before certification data when the framework uses USB security product in different network. It makes communication overhead and service delay increased. As a result of the experiment, packet certification delay time is more increased by average 7.6% in the proposed USB security framework than simple USB driver and USB Token, and procedure rate of certification server on the number of USB is also increased by average 9.8%.