• Title/Summary/Keyword: broadcast

Search Result 8,475, Processing Time 0.031 seconds

Control of Time-varying and Nonstationary Stochastic Systems using a Neural Network Controller and Dynamic Bayesian Network Modeling (신경회로망 제어기와 동적 베이시안 네트워크를 이용한 시변 및 비정치 확률시스템의 제어)

  • Cho, Hyun-Cheol;Lee, Jin-Woo;Lee, Young-Jin;Lee, Kwon-Soon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.17 no.7
    • /
    • pp.930-938
    • /
    • 2007
  • Captions which appear in images include information that relates to the images. In order to obtain the information carried by captions, the methods for text extraction from images have been developed. However, most existing methods can be applied to captions with fixed height of stroke's width. We propose a method which can be applied to various caption size. Our method is based on connected components. And then the edge pixels are detected and grouped into connected components. We analyze the properties of connected components and build a neural network which discriminates connected components which include captions from ones which do not. Experimental data is collected from broadcast programs such as news, documentaries, and show programs which include various height caption. Experimental result is evaluated by two criteria : recall and precision. Recall is the ratio of the identified captions in all the captions in images and the precision is the ratio of the captions in the objects identified as captions. The experiment shows that the proposed method can efficiently extract captions various in size.

TV Program Recommender System Using Viewing Time Patterns (시청시간패턴을 활용한 TV 프로그램 추천 시스템)

  • Bang, Hanbyul;Lee, HyeWoo;Lee, Jee-Hyong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.25 no.5
    • /
    • pp.431-436
    • /
    • 2015
  • As a number of TV programs broadcast today, researches about TV program recommender system have been studied and many researchers have been studying recommender system to produce recommendation with high accuracy. Recommender system recommends TV program to user by using metadata like genre, plot or calculating users' preferences about TV programs. In this paper, we propose a new TV program Collaborative Filtering Recommender System that exploits viewing time pattern like viewing ratio, relation with finish time and recently viewing history to calculate preference for high-quality of recommendation. To verify usefulness of our research, we also compare our method which utilizes viewing time patterns and baseline which simply recommends TV program of user's most frequently watched channel. Through this experiments, we show that our method very effectively works and recommendation performance increases.

Cross-layer Optimization for Multichannel Multiradio Multisession Wireless Networks with Network Coding (멀티채널 멀티라디오 멀티세션 무선 네트워크를 위한 네트워크 코딩 기반 계층간 최적화 기법)

  • Park, Museong;Yoon, Wonsik
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.18-24
    • /
    • 2013
  • Network coding has been extensively studied to increase the network throughput by exploiting the broadcast and overhearing capabilities. In this paper, we formulate a network utility maximization problem to improve the network utility in multichannel, multiradio and multisession wireless multihop network with intrasession network coding. To find the solution of this problem, we propose a congestion control, distributed rate control, and heuristic resource allocation algorithm. We find the network utility and evaluate the performance in multichannel, multiradio and multisession environment by using MATLAB. Finally, the results show that the proposed schemes can achieve throughput improvement by performing the network utility optimization in wireless multihop network.

An Analysis on the Contents Related to Hypertension In the Television Broadcast (영상매체의 고혈압관련 기사 내용 분석)

  • Ko Il Sun;Kim Tae Wha;Kim Eui Sook;Lee Sun Mi;Lee Jung Ja
    • Journal of Korean Public Health Nursing
    • /
    • v.18 no.1
    • /
    • pp.90-102
    • /
    • 2004
  • The purpose of the study was to analyze the current status of hypertension related information on the mass-media. Data were collected on the hypertension related reports in three major broadcasting centers, KBS1$\cdot$2, MBC, SBS, for 2 years, 1999-2001. Sample of the study was 134 reports. The results were as follows: 1. There were differences in frequencies by broadcasting center and programs. KBS and 9PM News were highest in proportions, $62.6\%\;and\;37.3\%$ respectively. 2. In regard to reporting time, $90\%$ were reported in the afternoon. and $62.5\%$ of those reports were in 9 PM, followed by 8PM. & 7PM. and 6AM. 3. In regard to area of the report, $35.8\%$ belonged to social section, followed by $26.1\%$ science. $15.7\%$ international. and $11.2\%$ life and health. 4. In terms of monthly distribution, December, November, and August had higher proportion of reports than other months as well as fall and winter. 5. There were higher proportion of reports containing 'treatment and management' with 'complication management' targeted to 'patients' than 'prevention' targeted to 'general population' in terms of content of the report. In summary, MBC and SBS were more focused on 'treatment and management' with KBS more focused on 'prevention'. There were more 'prevention' related reports in summer, and 'complication management' reports in the morning with 'treatment and management' reports in the afternoon.

  • PDF

Refactoring Effectiveness Analysis for Software Quality Enhancement : using AIS Mediation Server Program (소프트웨어 품질 향상을 위한 리팩토링 효과 분석 : AIS 중개 서버 프로그램을 대상으로)

  • Lee, Seo-Jeong;Lee, Jae-Wook;Hwang, Hoon-Kyu;Lee, Jang-Se
    • Journal of Navigation and Port Research
    • /
    • v.36 no.5
    • /
    • pp.363-370
    • /
    • 2012
  • Recently, International Maritime Organization has been developing e-navigation implementation strategy plan, which is focused on various services for vessel safety navigation. Then, different kinds of software will be developed in maritime area and with this, the quality issues are to be expected becoming more important. In this paper, we adopt software refactoring techniques to reduce the complexity of structure on source code level. It makes software program more effective to understand and modify, without any change of outward behavior. The existing AIS broadcast server program is used as an example for our trial, and calculating coupling and cohesion metric are introduced to analyze the refactoring effect, taking account of the maintainability of IEC/ISO9126 software quality standards.

MPLS and Video Stream broadcast multicast transport optimization through convergence (MPLS와 멀티캐스트 융합을 통한 Video Stream 방송 전송 최적화)

  • Hwang, Seong-Kyu;Han, Seung-Jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.6
    • /
    • pp.1330-1336
    • /
    • 2014
  • QoS techniques and transmitted in real-time communication with the advancement of technology a variety of applications and services are available these days, mobile devices bogeuphwa LTE technology to the development of multimedia services with high quality can be realized. In order to satisfy this condition simply with a router with an increased bandwidth expansion by considering the increase in the routing table of the network scalability problems included. Burst traffic data to be distributed according to the environment is to be centered. To do this, the destination -based routing method to transmit the current paper -based (Source routing) routing settings are required. In this paper, published by the IETF, IP switching system based on standardized protocol Label Switching Multi-Protocol Label Switching (MPLS) network by using the existing Best Effect is difficult to guarantee QoS for multimedia transmission in MPLS network environment using optimized QoS guarantees to transmit the multicast.

Hijacking Attack using Wireless Network Security Vulnerability in Drone and Its Countermeasure (드론의 무선 네트워크 보안 취약점을 이용한 탈취 및 대응)

  • Son, Juhwan;Sim, Jaebum;Lee, Jae-Gu;Cheong, Il-Ahn
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.327-330
    • /
    • 2017
  • In recent years, Drone(lightweight unmanned aerial vehicle) is used for broadcast shooting, disaster scene, leisure, observation and military purposes. However, as the use of drones increases the threat of hacking is also rising. Especially when a flying drone is seized, a dangerous situation can occur which is abused regardless of the driver's intention. Already in Iran and China, there is a case of hacking and stealing the drones of other countries under reconnaissance. In this paper, we analyze the security vulnerabilities of Wi-Fi and Bluetooth communication in wireless network which are used in drones for stealing the commercial drones. The results provide a countermeasure to safeguard the drones against attempts by the unauthorized attacker to take out the drones.

  • PDF

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

PID control using 8-bit microcontroller (8비트 마이크로컨트롤러를 사용한 PID 제어)

  • Lee, Donghee;Moon, Sangook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.407-408
    • /
    • 2016
  • A drone has been popularized to such an extent as to be seen in the near parks recently. The drone refers to an unmanned aerial vehicle(UVA) which can fly and be steered by a radio wave without a pilot and it has a airplane or helicopter shape. The drone was first started to be used from military purpose, but its usage has been expanded to the private such as broadcast shooting, crop-dusting, field discovery and hobby. However the drone that we can see often in the market is expansive, hard to be repaired when it broken down and has a discomfort of the short flight time. In this paper, to solve an uncomfortable talk on the cheap ATmega128 Using (Quad copter) drone for implementation. Axes gyroscope and accelerometers mcu between posture an attitude control, communications through drone control, pid. Receiver input them into transmitter signals of movements to control drone c the programming was implemented in on the basis of language.

  • PDF

Limited Reception Function based Two-Way Authentication T-DMB System (제한수신 기능을 통한 양방향 인증 T-DMB 시스템)

  • Lee, Jong-Won;Park, Sang-No;Yu, Dae-Sang;Kim, Jong-Moon;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.794-796
    • /
    • 2016
  • Recently terrestrial mobile multimedia broadcasting(T-DMB) service is being provided throughout the country are expanding and demand is increasing day by day. T-DMB has the advantage of being cheaper in cost than installing another mobile multimedia broadcasting. However, there are a variety data of additional and provide it difficult for localized emergency alert broadcasting services. In this paper, a method to solve this problem feature was designed to restrict incoming unidirectional / bidirectional authentication via T-DMB system. In the mobile device is received by the T-DMB broadcasting service authentication mechanism for re-transmission to the mobile device, and T-DMB receiving other registered users can view it impossible to receive the broadcast. Through the proposed system it is considered to be able to solve the problems of the existing T-DMB technology.

  • PDF