• Title/Summary/Keyword: Traditional Korean Patterns

Search Result 1,016, Processing Time 0.032 seconds

Study Curation Service Utilizing th Learner Pattern Information from the Smart Learning (스마트러닝에서의 학습자 패턴 정보를 활용한 큐레이션 서비스 제공 방안 연구)

  • Yun, Jun-soo;Hwang, Hyun-seo;Park, Jin-tae;Seo, Kyoung-teak;Moon, Il-young;Kwon, Oh-young;Kim, Byeong-jun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.903-906
    • /
    • 2015
  • Over the recent industry -wide virtual world and the real world, broadcasting and telecommunications, IT technology and traditional industries, such as the fusion research has been conducted in a variety of fields. And training in the field of education is changing the paradigm of creativity to break the intrusive training center. In addition, the quality of interactive educational content technology to foster self-directed future talent is a situation that is required. The market has already surpassed the smartphone PC, smart devices and e-learning technologies are appearing new service called 'smart learning' as a new form of convergence of the educational system. In this paper, based on the direct development of a content authoring applications and Web sites, and cloud environments to the students collect and analyze patterns. Utilizing this information, we studied the curation service plans that recommend the appropriate content to fit the tastes of the learner.

  • PDF

A Study on the Operation Concept of Cyber Warfare Execution Procedures (사이버전 수행절차 운영개념에 관한 연구)

  • Kim, Sung-Joong;Yoo, JiHoon;Oh, HaengRok;Shin, Dongil;Shin, DongKyoo
    • Journal of Internet Computing and Services
    • /
    • v.21 no.2
    • /
    • pp.73-80
    • /
    • 2020
  • Due to the expansion of cyber space, war patterns are also changing from traditional warfare to cyber warfare. Cyber warfare is the use of computer technology to disrupt the activities of nations and organizations, especially in the defense sector. However, the defense against effective cyber threat environment is inadequate. To complement this, a new cyber warfare operation concept is needed. In this paper, we study the concepts of cyber intelligence surveillance reconnaissance, active defense and response, combat damage assessment, and command control in order to carry out cyber operations effectively. In addition, this paper proposes the concept of cyber warfare operation that can achieve a continuous strategic advantage in cyber battlefield.

The Utility of Perturbation, Non-linear dynamic, and Cepstrum measures of dysphonia according to Signal Typing (음성 신호 분류에 따른 장애 음성의 변동률 분석, 비선형 동적 분석, 캡스트럼 분석의 유용성)

  • Choi, Seong Hee;Choi, Chul-Hee
    • Phonetics and Speech Sciences
    • /
    • v.6 no.3
    • /
    • pp.63-72
    • /
    • 2014
  • The current study assessed the utility of acoustic analyses the most commonly used in routine clinical voice assessment including perturbation, nonlinear dynamic analysis, and Spectral/Cepstrum analysis based on signal typing of dysphonic voices and investigated their applicability of clinical acoustic analysis methods. A total of 70 dysphonic voice samples were classified with signal typing using narrowband spectrogram. Traditional parameters of %jitter, %shimmer, and signal-to-noise ratio were calculated for the signals using TF32 and correlation dimension(D2) of nonlinear dynamic parameter and spectral/cepstral measures including mean CPP, CPP_sd, CPPf0, CPPf0_sd, L/H ratio, and L/H ratio_sd were also calculated with ADSV(Analysis of Dysphonia in Speech and VoiceTM). Auditory perceptual analysis was performed by two blinded speech-language pathologists with GRBAS. The results showed that nearly periodic Type 1 signals were all functional dysphonia and Type 4 signals were comprised of neurogenic and organic voice disorders. Only Type 1 voice signals were reliable for perturbation analysis in this study. Significant signal typing-related differences were found in all acoustic and auditory-perceptual measures. SNR, CPP, L/H ratio values for Type 4 were significantly lower than those of other voice signals and significant higher %jitter, %shimmer were observed in Type 4 voice signals(p<.001). Additionally, with increase of signal type, D2 values significantly increased and more complex and nonlinear patterns were represented. Nevertheless, voice signals with highly noise component associated with breathiness were not able to obtain D2. In particular, CPP, was highly sensitive with voice quality 'G', 'R', 'B' than any other acoustic measures. Thus, Spectral and cepstral analyses may be applied for more severe dysphonic voices such as Type 4 signals and CPP can be more accurate and predictive acoustic marker in measuring voice quality and severity in dysphonia.

A study on the case of wearing Jungchimak and its form in the Joseon Dynasty (조선시대 중치막(中致莫)의 착용례와 형태 연구)

  • Keum, Jong-Suk
    • The Research Journal of the Costume Culture
    • /
    • v.22 no.5
    • /
    • pp.670-687
    • /
    • 2014
  • This study focused on Jungchimak (coats with side slits) which was typically worn by men in the mid and late Joseon Dynasty. It was done research by examining the case of wearing Jungchimak centering on literature and paintings and analyzing its changes in terms of its form based on the relics that have been found in order to suggest the standard for the evaluation of the period of Jungchimak. Results are as follows. First, men who wore Jungchimak were the king, crown prince and Aristocratic under the official uniform or other robes or as ordinary clothes and shroud. Second, Jungchimak for king was mostly made of Dan (satin damask) and mostly jade green & navy in color, and it commonly used dragon pattern, cloud and treasure pattern, or grape pattern. The fabric used to make Jungchimak for crown prince was Dan & Ju (coarse-finished silk) and puple, green, jade green & navy in color. The fabric used to make Jungchimak for Aristocratic was Ju and indigo or white in color. Third, 251 relics have been announced until now. Most of them were made of silk fabric and had cloud and flower patterns. Fourth, Jungchimak showed changes through time in terms of collar and sleeve shapes, the ratio of armhole to sleeve opening, Geotseop (panel sewn on front opening for overlapping), Dang and Mu (side panel), the ratio of the total length of outer collar to the length of side slits, and the ratio of chest size to the width of lower end.

Protein quality, hematological properties and nutritional status of albino rats fed complementary foods with fermented popcorn, African locust bean, and bambara groundnut flour blends

  • Ijarotimi, Oluwole Steve;Keshinro, Oluremi Olufunke
    • Nutrition Research and Practice
    • /
    • v.6 no.5
    • /
    • pp.381-388
    • /
    • 2012
  • The objective of this study was to determine protein quality and hematological properties of infant diets formulated from local food materials. The food materials were obtained locally, fermented, and milled into flour. The flours were mixed as 70% popcorn and 30% African locust bean (FPA), 70% popcorn and 30% bambara groundnut (FPB), and 70% popcorn, 20% bambara groundnut, and 10% African locust bean (FPAB). Proximate analysis, protein quality, hematological properties, and anthropometric measurements of the animals fed with the formulations were investigated. The protein contents of the formulated diets were significantly higher than that of Cerelac (a commercial preparation) ($15.75{\pm}0.01g$/100 g) and ogi (traditional complementary food) ($6.52{\pm}0.31g$/100 g). The energy value of FPAB ($464.94{\pm}1.22\;kcal$) was higher than those of FPA ($441.41{\pm}3.05\;kcal$) and FPB ($441.48{\pm}3.05\;kcal$). The biological value (BV) of FPAB (60.20%) was the highest followed by FPB (44.24%) and FPA (41.15%); however, BV of the diets was higher than that of ogi (10.03%) but lower than that of Cerelac (70.43%). Net protein utilization (NPU) of the formulations was 41.16-60.20%, whereas true protein digestibility was 41.05-60.05%. Metabolizable energy (232.98 kcal) and digestible energy (83.69 kcal) of FPAB were the highest, whereas that of FPA had the lowest values. The protein digestibility values corrected for amino acid score of the diets (0.22-0.44) were lower than that of Cerelac (0.52), but higher than that of ogi (0.21). The growth patterns and hematological properties (packed cell volume, red blood cells, hemoglobin, mean corpuscular hemoglobin concentration, mean corpuscular hemoglobin, and mean corpuscular volume) of the formulated diets were higher than those of ogi, but lower than those of Cerelac. In conclusion, we established that the FPAB food sample was rated best in terms of protein quality over the other formulated diets. Therefore, a FPAB blend may be used as a substitute for ogi.

MUVIS: Multi-Source Video Streaming Service over WLANs

  • Li Danjue;Chuah Chen-Nee;Cheung Gene;Yoo S. J. Ben
    • Journal of Communications and Networks
    • /
    • v.7 no.2
    • /
    • pp.144-156
    • /
    • 2005
  • Video streaming over wireless networks is challenging due to node mobility and high channel error rate. In this paper, we propose a multi-source video streaming (MUVIS) system to support high quality video streaming service over IEEE 802.1l-based wireless networks. We begin by collocating a streaming proxy with the wireless access point to help leverage both the media server and peers in the WLAN. By tracking the peer mobility patterns and performing content discovery among peers, we construct a multi-source sender group and stream video using a rate-distortion optimized scheme. We formulate such a multi-source streaming scenario as a combinatorial packet scheduling problem and introduce the concept of asynchronous clocks to decouple the problem into three steps. First, we decide the membership of the multisource sender group based on the mobility pattern tracking, available video content in each peer and the bandwidth each peer allocates to the multi-source streaming service. Then, we select one sender from the sender group in each optimization instance using asynchronous clocks. Finally, we apply the point-to-point rate-distortion optimization framework between the selected sender-receiver pair. In addition, we implement two different caching strategies, simple caching simple fetching (SCSF) and distortion minimized smart caching (DMSC), in the proxy to investigate the effect of caching on the streaming performance. To design more realistic simulation models, we use the empirical results from corporate wireless networks to generate node mobility. Simulation results show that our proposed multi-source streaming scheme has better performance than the traditional server-only streaming scheme and that proxy-based caching can potentially improve video streaming performance.

An Implementation of Network Intrusion Detection Engines on Network Processors (네트워크 프로세서 기반 고성능 네트워크 침입 탐지 엔진에 관한 연구)

  • Cho, Hye-Young;Kim, Dae-Young
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.2
    • /
    • pp.113-130
    • /
    • 2006
  • Recently with the explosive growth of Internet applications, the attacks of hackers on network are increasing rapidly and becoming more seriously. Thus information security is emerging as a critical factor in designing a network system and much attention is paid to Network Intrusion Detection System (NIDS), which detects hackers' attacks on network and handles them properly However, the performance of current intrusion detection system cannot catch the increasing rate of the Internet speed because most of the NIDSs are implemented by software. In this paper, we propose a new high performance network intrusion using Network Processor. To achieve fast packet processing and dynamic adaptation of intrusion patterns that are continuously added, a new high performance network intrusion detection system using Intel's network processor, IXP1200, is proposed. Unlike traditional intrusion detection engines, which have been implemented by either software or hardware so far, we design an optimized architecture and algorithms, exploiting the features of network processor. In addition, for more efficient detection engine scheduling, we proposed task allocation methods on multi-processing processors. Through implementation and performance evaluation, we show the proprieties of the proposed approach.

Quantified Lockscreen: Integration of Personalized Facial Expression Detection and Mobile Lockscreen application for Emotion Mining and Quantified Self (Quantified Lockscreen: 감정 마이닝과 자기정량화를 위한 개인화된 표정인식 및 모바일 잠금화면 통합 어플리케이션)

  • Kim, Sung Sil;Park, Junsoo;Woo, Woontack
    • Journal of KIISE
    • /
    • v.42 no.11
    • /
    • pp.1459-1466
    • /
    • 2015
  • Lockscreen is one of the most frequently encountered interfaces by smartphone users. Although users perform unlocking actions every day, there are no benefits in using lockscreens apart from security and authentication purposes. In this paper, we replace the traditional lockscreen with an application that analyzes facial expressions in order to collect facial expression data and provide real-time feedback to users. To evaluate this concept, we have implemented Quantified Lockscreen application, supporting the following contributions of this paper: 1) an unobtrusive interface for collecting facial expression data and evaluating emotional patterns, 2) an improvement in accuracy of facial expression detection through a personalized machine learning process, and 3) an enhancement of the validity of emotion data through bidirectional, multi-channel and multi-input methodology.

A Preliminary Study on the Roles of Fe Content and Neoformed Ca-rich Minerals in the Coloration of Ceramic Glazes

  • Lee, Min Hye;Han, Min Su;Kim, Ji Hye
    • Journal of Conservation Science
    • /
    • v.36 no.4
    • /
    • pp.275-283
    • /
    • 2020
  • Iron oxides are the essential coloring oxides in traditional ceramic glazes. However, when Fe is involved in the coloration in the form of ions or colloids in glazes with low Fe content, it is difficult to identify the iron oxide phases. Generally, in many these glazes, Ca-rich minerals are observed by X-ray diffraction (XRD) or microscopic images, owing to their devitrification by the high Ca content. This study attempts to elucidate the correlation between the crystalline structure and coloration in the glazes while mainly focusing on neoformed Ca-rich minerals and Fe content. An experimental firing was carried out to produce tree ash glazes, with pine tree ash and Buyeo feldspar. In the case of oxidation glazes, the scanning electron microscopy (SEM) images and XRD patterns did not exhibit any Ca-rich crystals, and all the visible light reflectance spectra lines exhibited a similar shape. In contrast, the reduction glazes divided into blue glazes and other colored glazes according to the shapes of their reflectance spectra. It was confirmed that the influence of Ca-rich minerals on the glaze color was more pronounced than the blue color of the reduction glazes when the Ca and feldspar contents were sufficiently high and low, respectively, to form wollastonite. As the Ca content increased and the elemental composition of the reduction glazes changed, the neoformation of the Ca-rich minerals, such as wollastonite, anorthite, diopside, and akermanite was sequentially observed.

Development of a Biometric Authentication System Based on Electroencephalography (뇌파 기반 개인 인증 시스템 개발)

  • Choi, Ga-Young;Kim, Eun-Ji;Kang, Ye-Na;Park, Su-Bin;Park, Su-Jin;Choi, Soo-In;Hwang, Han-Jeong
    • Journal of Biomedical Engineering Research
    • /
    • v.39 no.1
    • /
    • pp.43-47
    • /
    • 2018
  • Traditional electroencephalography (EEG)-based authentication systems generally use external stimuli that require user attention and relatively long time for authentication. The aim of this study is to investigate the feasibility of biometric authentication based on EEG without using any external stimuli. Seventeen subjects took part in the experiment and their EEGs were measured while repetitively closing and opening their eyes. For identifying each subject, we calculated inter- and intra-subject cross-correlation using changes in alpha activity (8-13 Hz) during eyes closed as compared to eyes open. In order to optimize the number of recording electrodes, we calculated authentication accuracy by progressively reducing the number of electrodes used in the analysis. Significant increase in alpha activity was observed for all subjects during eyes closed, focusing on occipital areas, and spatial patterns of changed alpha activity were considerably different between the subjects. A mean authentication accuracy of 92.45% was obtained, which was retained over 75% when using only 8 electrodes placed around occipital areas. Our results could demonstrate the feasibility of the proposed novel authentication method based on resting state EEGs.