• Title/Summary/Keyword: analysis of multimedia

Search Result 2,248, Processing Time 0.024 seconds

Analysis of Radio Propagation Environment in Busan Area for DTV Service (디지털 TV서비스를 위한 부산지역 전파환경 분석)

  • Sung Tae-Kyung;Weon Young-Su;Cho Hyung-Rae;Kim Ki-Moon
    • Journal of Navigation and Port Research
    • /
    • v.28 no.10 s.96
    • /
    • pp.869-874
    • /
    • 2004
  • Digital TV broadcasting's resolution or tone quality is very excellent than analog broadcasting and has many advantages including various multimedia functions such as home shopping, home banking, internet search, telecommuting, VOD, etc. In this study, it is essential to analyze the regional electromagnetic environment before Digital TV broadcasting, and therefore we analyzed Busan area's limitation using ETRI propagation model. For maintaining high-quality Digital TV signals, we measure electric field intensity wide and far in Busan including mountains area and high-rise buildings. Generally, it has lower value by a standard ETRI propagation model than simulated value about standard model, but distribution pattern are similar with it. Compared theoretical values with the measured results, they have similar values for flat area but very different values for crowded city area and mountains area So we conclude that ETRI propagation model and theoretical model are not suitable for Busan in a free space.

Study of Smart Integration processing Systems for Sensor Data (센서 데이터를 위한 스마트 통합 처리 시스템 연구)

  • Ji, Hyo-Sang;Kim, Jae-Sung;Kim, Ri-Won;Kim, Jeong-Joon;Han, Ik-Joo;Park, Jeong-Min
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.7 no.8
    • /
    • pp.327-342
    • /
    • 2017
  • In this paper, we introduce an integrated processing system of smart sensor data for IoT service which collects sensor data and efficiently processes it. Based on the technology of collecting sensor data to the development of the IoT field and sending it to the network · Based on the receiving technology, as various projects such as smart homes, autonomous running vehicles progress, the sensor data is processed and effectively An autonomous control system to utilize has been a problem. However, since the data type of the sensor for monitoring the autonomous control system varies according to the domain, a sensor data integration processing system applying the autonomous control system to various different domains is necessary. Therefore, in this paper, we introduce the Smart Sensor Data Integrated Processing System, apply it and use the window as a reference to process internal and external sensor data 1) receiveData, 2) parseData, 3) addToDatabase 3 With the process of the stage, we provide and implement the automatic window opening / closing system "Smart Window" which ventilates to create a comfortable indoor environment by autonomous control system. As a result, standby information is collected and monitored, and machine learning for performing statistical analysis and better autonomous control based on the stored data is made possible.

Fake News Detection on YouTube Using Related Video Information (관련 동영상 정보를 활용한 YouTube 가짜뉴스 탐지 기법)

  • Junho Kim;Yongjun Shin;Hyunchul Ahn
    • Journal of Intelligence and Information Systems
    • /
    • v.29 no.3
    • /
    • pp.19-36
    • /
    • 2023
  • As advances in information and communication technology have made it easier for anyone to produce and disseminate information, a new problem has emerged: fake news, which is false information intentionally shared to mislead people. Initially spread mainly through text, fake news has gradually evolved and is now distributed in multimedia formats. Since its founding in 2005, YouTube has become the world's leading video platform and is used by most people worldwide. However, it has also become a primary source of fake news, causing social problems. Various researchers have been working on detecting fake news on YouTube. There are content-based and background information-based approaches to fake news detection. Still, content-based approaches are dominant when looking at conventional fake news research and YouTube fake news detection research. This study proposes a fake news detection method based on background information rather than content-based fake news detection. In detail, we suggest detecting fake news by utilizing related video information from YouTube. Specifically, the method detects fake news through CNN, a deep learning network, from the vectorized information obtained from related videos and the original video using Doc2vec, an embedding technique. The empirical analysis shows that the proposed method has better prediction performance than the existing content-based approach to detecting fake news on YouTube. The proposed method in this study contributes to making our society safer and more reliable by preventing the spread of fake news on YouTube, which is highly contagious.

Study on security framework for cyber-hacking control facilities (제어시설 사이버공격 대응을 위한 사이버보안 프레임워크 (Framework) 연구)

  • Lee, Sang-Do;Shin, Yongtae
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.4
    • /
    • pp.285-296
    • /
    • 2018
  • Among many hacking attempts carried out in the past few years, the cyber-attacks that could have caused a national-level disaster were the attacks against nuclear facilities including nuclear power plants. The most typical one was the Stuxnet attack against Iranian nuclear facility and the cyber threat targeting one of the facilities operated by Korea Hydro and Nuclear Power Co., Ltd (Republic of Korea; ROK). Although the latter was just a threat, it made many Korean people anxious while the former showed that the operation of nuclear plant can be actually stopped by direct cyber-attacks. After these incidents, the possibility of cyber-attacks against industrial control systems has become a reality and the security for these systems has been tightened based on the idea that the operations by network-isolated systems are no longer safe from the cyber terrorism. The ROK government has established a realistic control systems defense concept and in the US, the relevant authorities have set up several security frameworks to prepare for the threats. This paper presented various cyber security attack cases and their scenarios against control systems, along with the analysis of countermeasures for them. Though this task, we attempt to identify the items that need to be considered when designing a domestic security framework to improve security and secure stability.

Implementation of Security Information and Event Management for Realtime Anomaly Detection and Visualization (실시간 이상 행위 탐지 및 시각화 작업을 위한 보안 정보 관리 시스템 구현)

  • Kim, Nam Gyun;Park, Sang Seon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.5
    • /
    • pp.303-314
    • /
    • 2018
  • In the past few years, government agencies and corporations have succumbed to stealthy, tailored cyberattacks designed to exploit vulnerabilities, disrupt operations and steal valuable information. Security Information and Event Management (SIEM) is useful tool for cyberattacks. SIEM solutions are available in the market but they are too expensive and difficult to use. Then we implemented basic SIEM functions to research and development for future security solutions. We focus on collection, aggregation and analysis of real-time logs from host. This tool allows parsing and search of log data for forensics. Beyond just log management it uses intrusion detection and prioritize of security events inform and support alerting to user. We select Elastic Stack to process and visualization of these security informations. Elastic Stack is a very useful tool for finding information from large data, identifying correlations and creating rich visualizations for monitoring. We suggested using vulnerability check results on our SIEM. We have attacked to the host and got real time user activity for monitoring, alerting and security auditing based this security information management.

Hardware-Software Cosynthesis of Multitask Multicore SoC with Real-Time Constraints (실시간 제약조건을 갖는 다중태스크 다중코어 SoC의 하드웨어-소프트웨어 통합합성)

  • Lee Choon-Seung;Ha Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.592-607
    • /
    • 2006
  • This paper proposes a technique to select processors and hardware IPs and to map the tasks into the selected processing elements, aming to achieve high performance with minimal system cost when multitask applications with real-time constraints are run on a multicore SoC. Such technique is called to 'Hardware-Software Cosynthesis Technique'. A cosynthesis technique was already presented in our early work [1] where we divide the complex cosynthesis problem into three subproblems and conquer each subproblem separately: selection of appropriate processing components, mapping and scheduling of function blocks to the selected processing component, and schedulability analysis. Despite good features, our previous technique has a serious limitation that a task monopolizes the entire system resource to get the minimum schedule length. But in general we may obtain higher performance in multitask multicore system if independent multiple tasks are running concurrently on different processor cores. In this paper, we present two mapping techniques, task mapping avoidance technique(TMA) and task mapping pinning technique(TMP), which are applicable for general cases with diverse operating policies in a multicore environment. We could obtain significant performance improvement for a multimedia real-time application, multi-channel Digital Video Recorder system and for randomly generated multitask graphs obtained from the related works.

Analysis & Design Electronic Commerce System Interface for The Blind (시각장애 사용자를 위한 전자상거래 인터페이스 분석 및 설계)

  • 박성제;강영무
    • Proceedings of the Korea Association of Information Systems Conference
    • /
    • 2001.12a
    • /
    • pp.413-426
    • /
    • 2001
  • 본 연구는 첫째, 정보통신기술의 발달이 시각장애인 복지 증진에 미칠 수 있는 가능성에 대한 이론적인 부분을 고찰하였다. 둘째, 우리나라 시각장애인 정보화의 문제점과 해결책을 도출하였고 셋째, 시각장애 사용자를 위한 전자상거래 인터페이스 디자인의 분석 및 설계를 통해 전자상거래에서 시각장애 사용자들이 큰 제약없이 사용할 수 있는 방안을 제시하고자 한다. 현재 시각장애인들의 웹 사용을 보면 시각장애 전용 S/W의 보조 하에 사용을 하고 있다. 그러한 보조 도구의 실정에 맞도록 텍스트 버전 및 Non-Frame버전, Alt-Text 옵션, 캡션 등을 넣어 접근성을 확보하고 인터넷을 큰 제약을 받지않고 이용할 수 있도록 웹 페이지의 설계가 필요한 실정이다. 이를 위하여 먼저 시각장애에 대한 개념과 원인 및 종류 그리고 특성을 통해 시각장애인에 대한 이론적 배경을 파악하였다. 그리고 시각장애인의 정보화 환경과 이용 현황과 시각장애인의 정보 접근을 제도적, 기기 및 소프트웨어 개발 측면에서 분석을 하였고, 장애인을 위한 정보통신기술 중 대표적인 사례를 검토해 보았다. 다음으로 국내외의 대표적인 전자상거래 사이트에서의 인터페이스를 화면구성(Layout), 텍스트(Text), 그래픽(Graphic), 멀티미디어(MultiMedia) 측면에서 분석을 하였다. 분석한 내용을 바탕으로 시각장애 사용자의 입력(User Input) 부분을 고려한 인터페이스 방향을 제시하고 프로토타입을 개발하여 시험 대상 사이트와의 만족도를 시각장애 사용자를 통해 비교 ·분석하였다. 결론부분에서는 정보불평등을 해소하고, 정보통신기술이 장애인의 복지향상에 기여하도록 하기 위해 전자상거래 싸이트에서의 시각 장애인들을 위한 방향을 제시하고자 한다.박의 표현, 등록 및 색인방법 (c) 공급 선박의 분류와 표현 방법 (d) 에이전트의 정보 수집을 위한 메시지 표현 방법 (e) 수집된 선박정보의 데이터베이스 저장 표현방법 (f) 요구 선박을 찾아주는 정보제공 서비스가 요구된다.동을 보여 조사대상 5호분, 6호분, 7호분, 중 가장 심한 거동을 보이고 있다. 이는 고분 벽돌의 깨짐이 6호분이 가장 심하다는 사실과 무관하지 않은 것으로 판단된다. 봉분내부의 토양층구조에 대한 지오레이다 영상단면을 분석한 결과 무령왕릉 연도상부의 누수지방지층이 심하게 균열되어 있음을 발견하였다. 이 곳은 고분내부로 직접누수가 발생하는 곳이다. 직접누수와 지하수 형태로 유입된 침투수는 고분군 주위의 지반의 함수비를 증가시켜 지반의 지지력을 약화시키고 또한 고분내로 서서히 유입되어 고분내부의 습도를 100%로 유지시키는 주된 원인이다. 이러한 높은 습도는 고분내의 남조류의 번식을 가져왔으며 남조류의 번식은 현재 6호분이 가장 심각하고 7호분이 우려되는 수준이며 5호분은 문제가 없는 것으로 판단된다. 이와 같이 고분군의 발굴후 인위적인 환경변화와 지속적인 강우침투 및 배수 불량의 영향은 고분군의 안정성에 상당한 위험을 초래하였으며, 현 상태는 각 고분에 대한 보강이 불가피한 것으로 판단된다. 고분 벽돌의 깨짐, 고분 벽체의 거동, 조류의 서식등을 포함하여 송산리 고분군에서 발생되고 있는 보존상의 제반 문제점들을 일차적으로 누수 및 침투수에 의한 결과이다. 그러므로 무엇보다도 고분군 내부 및 고분 주변으로의 강우 및 지하수 침투를 막는 차수 대책이 시급한 것으로 판단된다. 또한 이미 발생한 변위가 더 이상 진행되지 않도록 하중을 경감하고 토압의 균형을 이루는 보강대책이 시급한 실정이다. 고분군

  • PDF

A Study for Factors Influencing the Usage Increase and Decrease of Mobile Data Service: Based on The Two Factor Theory (모바일 데이터 서비스 사용량 증감에 영향을 미치는 요인들에 관한 연구: 이요인 이론(Two Factor Theory)을 바탕으로)

  • Lee, Sang-Hoon;Kim, Il-Kyung;Lee, Ho-Geun;Park, Hyun-Jee
    • Asia pacific journal of information systems
    • /
    • v.17 no.2
    • /
    • pp.97-122
    • /
    • 2007
  • Conventional networking and telecommunications infrastructure characterized by wires, fixed location, and inflexibility is giving way to mobile technologies. Numerous research reports point to the ultimate domination of wireless communication. With the increasing prevalence of advanced cell-phones, various mobile data services (hereafter MDS) are gaining popularity. Although cellular networks were originally introduced for voice communications, statistics indicate that data services are replacing the matured voice service as the growth engine for telecom service providers. For example, SK Telecom, the Korea's largest mobile service provider, reported that 25.6% of revenue and 28.5% of profit came from MDS in 2006 and the share is growing. Statistics also indicate that, in 2006, the average revenue per user (ARPU) for voice didn't change but MDS grew seven percents from the previous year, further highlighting its growth potential. MDS is defined "as an assortment of digital data services that can be accessed using a mobile device over a wide geographic area." A variety of MDS have been deployed, with a few reaching the status of killer applications. Many of them need to access the Internet through the cellular-phone infrastructure. In the past, when the cellular network didn't have acceptable bandwidth for data services, SMS (short messaging service) dominated MDS. Now, Internet-ready, next-generation cell-phones are driving rich digital data services into the fabric of everyday life, These include news on various topics, Internet search, mapping and location-based information, mobile banking and gaming, downloading (i.e., screen savers), multimedia streaming, and various communication services (i.e., email, short messaging, messenger, and chaffing). The huge economic stake MDS has on its stakeholders warrants focused research to understand associated dynamics behind its adoption. Lyytinen and Yoo(2002) pointed out the limitation of traditional adoption models in explaining the rapid diffusion of innovations such as P2P or mobile services. Also, despite the increasing popularity of MDS, unexpected drop in its usage is observed among some people. Intrigued by these observations, an exploratory study was conducted to examine decision factors of MDS usage. Data analysis revealed that the increase and decrease of MDS use was influenced by different forces. The findings of the exploratory study triggered our confirmatory research effort to validate the uni-directionality of studied factors in affecting MDS usage. This differs from extant studies of IS/IT adoption that are largely grounded on the assumption of bi-directionality of explanatory variables in determining the level of dependent variables (i.e., user satisfaction, service usage). The research goal is, therefore, to examine if increase and decrease in the usage of MDS are explained by two separate groups of variables pertaining to information quality and system quality. For this, we investigate following research questions: (1) Does the information quality of MDS increase service usage?; (2) Does the system quality of MDS decrease service usage?; and (3) Does user motivation for subscribing MDS moderate the effect information and system quality have on service usage? The research questions and subsequent analysis are grounded on the two factor theory pioneered by Hertzberg et al(1959). To answer the research questions, in the first, an exploratory study based on 378 survey responses was conducted to learn about important decision factors of MDS usage. It revealed discrepancy between the influencing forces of usage increase and those of usage decrease. Based on the findings from the exploratory study and the two-factor theory, we postulated information quality as the motivator and system quality as the de-motivator (or hygiene) of MDS. Then, a confirmative study was undertaken on their respective role in encouraging and discouraging the usage of mobile data service.

A Study for Strategy of On-line Shopping Mall: Based on Customer Purchasing and Re-purchasing Pattern (시스템 다이내믹스 기법을 활용한 온라인 쇼핑몰의 전략에 관한 연구 : 소비자의 구매 및 재구매 행동을 중심으로)

  • Lee, Sang-Gun;Min, Suk-Ki;Kang, Min-Cheol
    • Asia pacific journal of information systems
    • /
    • v.18 no.3
    • /
    • pp.91-121
    • /
    • 2008
  • Electronic commerce, commonly known as e-commerce or eCommerce, has become a major business trend in these days. The amount of trade conducted electronically has grown extraordinarily by developing the Internet technology. Most electronic commerce has being conducted between businesses to customers; therefore, the researches with respect to e-commerce are to find customer's needs, behaviors through statistical methods. However, the statistical researches, mostly based on a questionnaire, are the static researches, They can tell us the dynamic relationships between initial purchasing and repurchasing. Therefore, this study proposes dynamic research model for analyzing the cause of initial purchasing and repurchasing. This paper is based on the System-Dynamic theory, using the powerful simulation model with some restriction, The restrictions are based on the theory TAM(Technology Acceptance Model), PAM, and TPB(Theory of Planned Behavior). This article investigates not only the customer's purchasing and repurchasing behavior by passing of time but also the interactive effects to one another. This research model has six scenarios and three steps for analyzing customer behaviors. The first step is the research of purchasing situations. The second step is the research of repurchasing situations. Finally, the third step is to study the relationship between initial purchasing and repurchasing. The purpose of six scenarios is to find the customer's purchasing patterns according to the environmental changes. We set six variables in these scenarios by (1) changing the number of products; (2) changing the number of contents in on-line shopping malls; (3) having multimedia files or not in the shopping mall web sites; (4) grading on-line communities; (5) changing the qualities of products; (6) changing the customer's degree of confidence on products. First three variables are applied to study customer's purchasing behavior, and the other variables are applied to repurchasing behavior study. Through the simulation study, this paper presents some inter-relational result about customer purchasing behaviors, For example, Active community actions are not the increasing factor of purchasing but the increasing factor of word of mouth effect, Additionally. The higher products' quality, the more word of mouth effects increase. The number of products and contents on the web sites have same influence on people's buying behaviors. All simulation methods in this paper is not only display the result of each scenario but also find how to affect each other. Hence, electronic commerce firm can make more realistic marketing strategy about consumer behavior through this dynamic simulation research. Moreover, dynamic analysis method can predict the results which help the decision of marketing strategy by using the time-line graph. Consequently, this dynamic simulation analysis could be a useful research model to make firm's competitive advantage. However, this simulation model needs more further study. With respect to reality, this simulation model has some limitations. There are some missing factors which affect customer's buying behaviors in this model. The first missing factor is the customer's degree of recognition of brands. The second factor is the degree of customer satisfaction. The third factor is the power of word of mouth in the specific region. Generally, word of mouth affects significantly on a region's culture, even people's buying behaviors. The last missing factor is the user interface environment in the internet or other on-line shopping tools. In order to get more realistic result, these factors might be essential matters to make better research in the future studies.

Closed Integral Form Expansion for the Highly Efficient Analysis of Fiber Raman Amplifier (라만증폭기의 효율적인 성능분석을 위한 라만방정식의 적분형 전개와 수치해석 알고리즘)

  • Choi, Lark-Kwon;Park, Jae-Hyoung;Kim, Pil-Han;Park, Jong-Han;Park, Nam-Kyoo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.3
    • /
    • pp.182-190
    • /
    • 2005
  • The fiber Raman amplifier(FRA) is a distinctly advantageous technology. Due to its wider, flexible gain bandwidth, and intrinsically lower noise characteristics, FRA has become an indispensable technology of today. Various FRA modeling methods, with different levels of convergence speed and accuracy, have been proposed in order to gain valuable insights for the FRA dynamics and optimum design before real implementation. Still, all these approaches share the common platform of coupled ordinary differential equations(ODE) for the Raman equation set that must be solved along the long length of fiber propagation axis. The ODE platform has classically set the bar for achievable convergence speed, resulting exhaustive calculation efforts. In this work, we propose an alternative, highly efficient framework for FRA analysis. In treating the Raman gain as the perturbation factor in an adiabatic process, we achieved implementation of the algorithm by deriving a recursive relation for the integrals of power inside fiber with the effective length and by constructing a matrix formalism for the solution of the given FRA problem. Finally, by adiabatically turning on the Raman process in the fiber as increasing the order of iterations, the FRA solution can be obtained along the iteration axis for the whole length of fiber rather than along the fiber propagation axis, enabling faster convergence speed, at the equivalent accuracy achievable with the methods based on coupled ODEs. Performance comparison in all co-, counter-, bi-directionally pumped multi-channel FRA shows more than 102 times faster with the convergence speed of the Average power method at the same level of accuracy(relative deviation < 0.03dB).