• Title/Summary/Keyword: contents access

Search Result 1,142, Processing Time 0.031 seconds

Digital Audio Watermarking Scheme Using Perceptual Modeling (지각 모델링을 이용한 디지털 오디오 워터마킹 방법)

  • 석종원;홍진우
    • Journal of Broadcast Engineering
    • /
    • v.6 no.2
    • /
    • pp.195-202
    • /
    • 2001
  • As a solution for copyright protection of digital multimedia contents, digital watermark technology is now drawing the attention. In this paper, we presented two novel audio watermarking algorithms as a solution for protecting unauthorized copy of digital audio. Proposed watermarking schemes include the psychoacoustic model of MPEG audio coding to achieve the perceptual transparency after watermark embedding and preprocessing procedure before correlation in watermark detection to extract copyright information without access to the original audio signal. Experimental results show that our watermarking scheme is robust to common signal Processing attacks and it Introduces no audible distortion after watermark insertion.

  • PDF

A Study on a Continuing Educational Program for Librarians - Based on Analysis of University Credits (학부 이수교과목 분석을 통한 현장 사서의 계속교육프로그램 개발에 관한 연구)

  • Ahn, In-Ja;Noh, Young-He;Choi, Sang-Ki;Kim, Hye-Joo
    • Journal of Korean Library and Information Science Society
    • /
    • v.43 no.1
    • /
    • pp.27-52
    • /
    • 2012
  • This paper proposes a continuing educational program for librarian, as to reinforce the professionalism. It researches the previous educational attainments of undergraduates who studied library science. Then it analyses the current continuing programs of the National Library of Korea and librarians' demands for the program. The research also compares ALA and SLA as foreign cases of continuing programs, and their trends observed from the newly opened sessions. This paper, therefore, reports a series of educational contents in library science by their subjects. The proposed curriculum includes subjects including electronic publishing and copyrights, Future of Library, Taxonomy and controlled vocabulary, Patent Information. Science Information Literacy, Open Access Program, The Value of Library, Licensed Issues, Customer Service program etc.

Development of Optimal Maze Path Game Using Java (3차원 최적 미로 게임 개발)

  • Kim, Ki-Bum;Baek, Tae-Gwan;Jeong, Gab-Joong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.113-116
    • /
    • 2007
  • This paper describes the development of an optimal 3D maze path game as web-based game contents. Client user using web can access and run java applet program with download of java byte code with the independence of hardware system. The optimal 3D maze path game developed in this paper consists of random maze path generation module, selected path input module, weighted optimal path search module, and path comparison module. It enhances the cognition faculty of game users with the comparison of the maze path searched by optimal path search algorithm and the selected maze path by game users.

  • PDF

A Study on Storing and Removing Method of Broadcasting Content for Personalized Consumption (개인화된 소비를 위한 방송 콘텐츠 저장 및 이동 방법에 관한 연구)

  • Jang, Jae-Seok;Jin, Sung-Ho;Kim, Hui-Yong;Ro, Yong-Man
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.7
    • /
    • pp.869-881
    • /
    • 2007
  • In this paper, storing and removing method of broadcasting content is proposed for personalized consumption. The main objective of this paper is to keep personalized information, such as additional contents, user creation data, usage history, with broadcasting content, and user can consume broadcasting content to accommodate individual preference. Consequently, proposed file format in this paper is based on MPEG-4 and MPEG-21 file format because they can access and extract data within file format easily and can keep spatiotemporal relation between data. In addition, TV-Anytime metadata is used for program description metadata. Finally, proposed method is verified with file format player and useful application scenarios.

  • PDF

A Exploratory Study on R&D Strategies Industrial Technology Security (산업기술 보호를 위한 기술적 보안의 탐색적 연구)

  • Kim, Kyung-Kyu;Choi, Seo Yun;Hur, Sunghye
    • Journal of Advanced Navigation Technology
    • /
    • v.13 no.1
    • /
    • pp.120-125
    • /
    • 2009
  • To enhance international competitiveness through the protection of cutting-edge industrial technology, it is essential to establish the policy for strengthening ability to develop industrial security technology and raising international competitiveness. In this study we investigated and analysed not only the ecumenic trend but also the present condition, then we executed the deduction of the industrial security technology development program in a aspect of government and analysed the current status of the technical security technology for developing security technology and increasing leaks of the advanced industrial technology.

  • PDF

Supporting Effective Collaborative Workspaces over Moodle (Moodle에서의 효과적인 협업 워크스페이스 지원)

  • Jin, Jae-Hwan;Lee, Hong-Chang;Lee, Myung-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.12
    • /
    • pp.2657-2664
    • /
    • 2012
  • Web-based learning receives much attention as an effective learning method because users can use the learning service at any time from any space. A learning management system(LMS) provides online educational environment among teachers and students, supporting various facilities to deliver educational contents. Since most of the existing LMSs support one-way or limited two-way teaching services among teachers and students, there are a lot of difficulties in performing collaboration among students and/or collaboration among teachers and students. In this paper, we describe the development of collaborative workspaces which provides effective collaborative educational environment on Moodle which is widely accepted as a typical LMS. Through the provided various types of collaborative workspaces, users can easily perform group activities, sharing educational with appropriate access control mechanism.

Analyzing Performance of MPEG-7 Video Signature for Video Copy Detection (동영상 복사본 검출을 위한 MPEG-7 Video Signature 성능분석)

  • Yu, Jeongsoo;Ryu, Jaesug;Nang, Jongho
    • KIISE Transactions on Computing Practices
    • /
    • v.20 no.11
    • /
    • pp.586-591
    • /
    • 2014
  • In recent years, we can access to video contents anywhere and at any time. Therefore distributed video is easily copied, transformed and republished. Since it brings copyright problem, similarity/duplicate detection and measurement is essential to identify the excessive content duplication. In this paper, we analysed various discernment of video which has been transformed with various ways using MPEG-7 Video Signature. MPEG-7 Video Signature, one of video copy detection algorithms, is block based abstraction. Thus we assume Video Signature is weak for spatial transform. The experiments show that MPEG-7 Video Signature is very weak for spatial transform which could occur general as we have assumed.

Development of the Evaluation Indicators for Universality of Public Library Services: Based on Universal Design Principles (유니버설디자인 원리에 기초한 공공도서관 서비스의 보편성 평가지표 개발)

  • Kim, Bo-Il;Kim, Jong-Ae
    • Journal of Korean Library and Information Science Society
    • /
    • v.44 no.2
    • /
    • pp.137-165
    • /
    • 2013
  • For public libraries to deliver appropriate information to various types of users in information society that allows people to access and use a variety of information, it is necessary to provide services applying the universal design principles in terms of universality. The purpose of this study is to develop the evaluation indicators for universality of public library services, which apply universal design principles to evaluate if public libraries provide appropriate services that meet their original purpose. The final 'Evaluation Indicators of Universality of Public Library Services' consist of six evaluation areas and 41 evaluation contents in 10 evaluation items. Each evaluation content is categorized into a relevant factor among five universal design applicable factors (Universality, Convenience, Recognition, Safety and Economic Feasibility) according to its characteristics.

A study of active college educational English (대학영어교육의 활성화 방안 연구)

  • Park, Han-Ki;Yang, Sung-Kap;Oh, Kwan-Young
    • English Language & Literature Teaching
    • /
    • v.11 no.3
    • /
    • pp.113-137
    • /
    • 2005
  • The purpose of this research is to introduce a new pedagogy for developing English education in the university. It is based on the favorable results of the application of Network English, which is a method that has been used in three classes at Y University for a period of one semester. Network English is a kind of integrated teaching method of offline and online education, and can be a learner-oriented educational method. The online aspect gives learners easier access to the text, regardless of time and place. And in addition to the characteristic of online itself, the various contents in conformity with the learning ability of learners are provided in the text, in order that the learners can get and maintain a desire for study without losing their interest in English. Although the offline part is not much different from traditional classes, the offline education can complement the deficiency of the online and also offer the learners the opportunity for questions and answers. From the results of application of Network English in three classes, the students were satisfied with the method and have more interest in English, which resulted in better grades.

  • PDF

A Design of XML Structure for Digital Signature (디지털 서명을 위한 XML 구조 설계)

  • 표성배
    • Journal of the Korea Society of Computer and Information
    • /
    • v.7 no.4
    • /
    • pp.66-74
    • /
    • 2002
  • Circulation of documents and data has two serious problems in this web-based system. The first of the problems is standardization problem which the flowing documents and data are not always standardized. the other is security problem which secret data can be hacked or cracked, and non-authenticated Person can access and change the contents with malicious intent. Therefore two issues come out on the web-based system, the first is how we can standardize the documents and data and the second is how we can assure safe flowing of them. One way of the standardizing methods is Mark-UP language which uses XML which is extended from SGML to redefine and use documents. And to ensure security of flowing documents we adopt digital signature system using public key and private key The focus of this study is to specify procedures for digital signature on the XML base. and to design XML components for the digital signature to assure information security in circulation of documents and data.

  • PDF