• Title/Summary/Keyword: information and communication

Search Result 41,923, Processing Time 0.066 seconds

A Method of Feature Extraction on Motor Imagery EEG Using FLD and PCA Based on Sub-Band CSP (서브 밴드 CSP기반 FLD 및 PCA를 이용한 동작 상상 EEG 특징 추출 방법 연구)

  • Park, Sang-Hoon;Lee, Sang-Goog
    • Journal of KIISE
    • /
    • v.42 no.12
    • /
    • pp.1535-1543
    • /
    • 2015
  • The brain-computer interface obtains a user's electroencephalogram as a replacement communication unit for the disabled such that the user is able to control machines by simply thinking instead of using hands or feet. In this paper, we propose a feature extraction method based on a non-selected filter by SBCSP to classify motor imagery EEG. First, we divide frequencies (4~40 Hz) into 4-Hz units and apply CSP to each Unit. Second, we obtain the FLD score vector by combining FLD results. Finally, the FLD score vector is projected onto the optimal plane for classification using PCA. We use BCI Competition III dataset IVa, and Extracted features are used as input for LS-SVM. The classification accuracy of the proposed method was evaluated using $10{\times}10$ fold cross-validation. For subjects 'aa', 'al', 'av', 'aw', and 'ay', results were $85.29{\pm}0.93%$, $95.43{\pm}0.57%$, $72.57{\pm}2.37%$, $91.82{\pm}1.38%$, and $93.50{\pm}0.69%$, respectively.

A Research on Extension Device of Korea Private Security Market (한국 민간경비 시장의 과제와 활성화 도입방안)

  • Park, Jun-Seok
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.173-198
    • /
    • 2008
  • As we took a look at above, this researcher suggest following device to extend Korea's private security industry's area. First, it is necessary to extend private investigation law's area grafting private security together. Second, it is necessary it is necessary to think of private security's role related key figure law, corresponding terror law, Presidential Security Service Guard law. Third, as a draft of a proposed law related prevention flowing out of industry techniques among industry security related law, passed, it is necessary private security's diversity, subdivision, composition through an enterprise security, and private security industry area's grafting together. Fourth, a research about private security company's investment and professional area's bringing up as well as business's extension device should be groped for the security consulting though total system management service. Fifth, there are no big difference education course and purpose, duty about a security police man law and security law's unification, so it is necessary to drive forward actively unification through government organization's cooperation. Sixth, a paradigm shift should be occured about private security service among policeman, citizen, and private security guards. Seventh, it is considered the role of security association is important. Lastly about a matter communication between the National Police Agency, and Security Association, not only look at from an authority's angle, collecting information, corresponding ability but now it is considered to grope each other cooperation device together among organizations not only the National Police Agency but also, National Organization, National Intelligence Service, the prosecution, Presidential Security Service Guard, Army etc.

  • PDF

The Header Compression Scheme for Real-Time Multimedia Service Data in All IP Network (All IP 네트워크에서 실시간 멀티미디어 서비스 데이터를 위한 헤더 압축 기술)

  • Choi, Sang-Ho;Ho, Kwang-Chun;Kim, Yung-Kwon
    • Journal of IKEEE
    • /
    • v.5 no.1 s.8
    • /
    • pp.8-15
    • /
    • 2001
  • This paper remarks IETF based requirements for IP/UDP/RTP header compression issued in 3GPP2 All IP Ad Hoc Meeting and protocol stacks of the next generation mobile station. All IP Network, for real time application such as Voice over IP (VoIP) multimedia services based on 3GPP2 3G cdma2000. Frames for various protocols expected in the All IP network Mobile Station (MS) are explained with several figures including the bit-for-bit notation of header format based on IETF draft of Robust Header Compression Working Group (ROHC). Especially, this paper includes problems of IS-707 Radio Link Protocol (RLP) for header compression which will be expected to modify in All IP network MS's medium access layer to accommodate real time packet data service[1]. And also, since PPP has also many problems in header compression and mobility aspects in MS protocol stacks for 3G cdma2000 packet data network based on Mobile IP (PN-4286)[2], we introduce the problem of solution for header compression of PPP. Finally. we suggest the guidelines for All IP network MS header compression about expected protocol stacks, radio resource efficiency and performance.

  • PDF

A Comparative Study on Korean Compulsory Multiple Prime Contract System (건설산업 제도개선을 위한 분할·분리 발주 제도의 선진화 방안 연구)

  • Kim, Sang-Bum;Cho, Ji-Hoon
    • Korean Journal of Construction Engineering and Management
    • /
    • v.14 no.2
    • /
    • pp.184-193
    • /
    • 2013
  • Procurement System for Korean construction industry has mainly been controlled by the complicated regulatory system which has been recognized as unflexible and remotely separated from the global standard. This has been identified by many Korean construction experts as one of the main reasons that hamper the Korean construction industry becoming the global leader. One commonly discussed regulatory system is the compulsory multiple contracting system that has been enforced for a long time. According to the Korean governmental contracting law 68-3, all construction projects cannot be divided into separate contracting packages with a few exceptions. Exceptions stated in the law include construction activities related electrical, Information communication, fire-fighting, and cultural assets which all are governed by the separate laws/acts controlled by the different governmental bodies. This research is to closely investigate multiple prime contracting system that has been compulsory in Korean construction industry and to provide policy recommendations to these restrictions. Although, there has been a long history of this compulsory contracting system, this study attempted to provide objective analysis on current status of the system as well as global standard on the issue. This study suggests main considerations when considering different contracting system such as rights of owners, flexibilities of regulatory systems, and efficiencies of conducting a construction project. It is envisioned that recommendations from this study, if accepted by the regulatory bodies, would improve the Korean construction contraction system by making it more compatible with global standard. Moreover, these would help making the Korean industry more effective in terms of regulatory restrictions.

Overlay Multicast Tree Building Algorithm for MDST and MST in Complete Network (완전 연결된 네트워크에서 MDST와 MST 목적을 갖는 오버레이 멀티캐스트 트리구현 알고리즘)

  • Cho, Myeong-Rai
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2010.08a
    • /
    • pp.71-89
    • /
    • 2010
  • It is strongly believed that multicast will become one of the most promising services on internet for the next generation. Multicast service can be deployed either on network-layer or application-layer. IP multicast (network-layer multicast) is implemented by network nodes (i.e., routers) and avoids multiple copies of the same datagram on the same link. Despite the conceptual simplicity of IP multicast and its obvious benefits, it has not been widely deployed since there remain many unresolved issues. As an alternative to IP multicast, overlay multicast (application-layer multicast) implements the multicast functionality at end hosts rather than routers. This may require more overall bandwidth than IP multicast because duplicate packets travel the same physical links multiple times, but it provides an inexpensive, deployable method of providing point-to-multipoint group communication. In this paper we develop an efficient method applied greedy algorithm for solving two models of overlay multicast tree building problem that is aimed to construct MDST (Minimum Diameter Spanning Tree : minimum cost path from a source node to all its receivers) and MST (Minimum Spanning Tree : minimum total cost spanning all the members). We also simulate and analyze MDST and MST.

  • PDF

A Study on the Change of the View of Love using Text Mining and Sentiment Analysis (텍스트 마이닝과 감성 분석을 통한 연애관의 변화 연구 : <공항가는 길>과 <이번 주 아내가 바람을 핍니다>를 중심으로)

  • Kim, Kyung-Ae;Ku, Jin-Hee
    • Journal of Digital Convergence
    • /
    • v.15 no.2
    • /
    • pp.285-294
    • /
    • 2017
  • In this study, change of the view of love was analyzed by big data analysis in TV drama of married person's love. Two dramas were selected for analysis with opposite theme of love story. The sympathy of audience for the one month period from the end of the drama was analyzed by text mining and sentiment analysis. In particular, changes in the meaning of home meaning are identified. Home is not 'a place where a husband and wife play a social role', but 'a place where they can share real sympathy and one can be happy'. If individuals are not happy, they need to break their homes. In this study, the current divorce rate and the question regarding the matter should be considered. But based on Google Trends, in Korean society, interest in marriage were still higher than romance. It means that people prefer to 'a love to get marriage' in Korean modern society, than 'love for love affair'. It seems to be reflection of cognition change, marriage should be based on true love. This study is expected to be applied to the study of trend change through social media.

A study on the service satisfaction of Chinese mobile Apps -Comparing paid and free services- (중국 모바일 앱 서비스 만족에 관한연구 -유료와 무료 모바일 서비스의 비교-)

  • Qin, Ying;Lee, Sang-Joon;Lee, Kyeong-Rak
    • Journal of Digital Convergence
    • /
    • v.15 no.4
    • /
    • pp.127-137
    • /
    • 2017
  • The role of smartphones is changing from a communication system for exchanging calls and information into a universal platform for cultural services. Also, satisfaction for mobile application services on smartphones is a very important factor in the smart business. In This paper, we analyze the effects of the outcome, service scape, costs, and especially the impact of whether costumers having to pay or free for the app on customer satisfaction. For this purpose, we analyzed survey data on service quality of mobile app service from Chinese mobile app service users. We also analyzed the moderating effects of paid and free mobile app services. As a result, it was confirmed that the quality, servicescape quality and cost of mobile app service that customers perceive have a positive effect on customer satisfaction. In addition, the effect of the cost of mobile app service perceived by the customer on customer satisfaction showed that free mobile app service was more significant than paid mobile app service. This paper can be used as an alternative to monetization for providing a mobile app service provider or a mobile app service provider who wants to switch mobile app service from free to paid service.

Implementation of a Photo-Input Game Interface Using Image Search (이미지 검색을 이용한 사진입력 게임 인터페이스 구현)

  • Lee, Taeho;Han, Jaesun;Park, Heemin
    • KIISE Transactions on Computing Practices
    • /
    • v.21 no.10
    • /
    • pp.658-669
    • /
    • 2015
  • The paradigm of game development changes with technological trends. If the system can analyze and determine undefined inputs, users' input choices are not restricted. Therefore, game scenarios can have multifarious flows depending upon the user's input data. In this paper, we propose a method of including an output plan in the game system that is based on the user's input but is not restricted to predefined choices. We have implemented an experimental game on the Android platform by combining network communication and APIs. The game interface works as follows: first, the user's input data is transmitted to the server using HTTP protocol; then, the server carries out an analysis on the input data; and finally, the server returns the decision result to the game device. The game can provide users a scenario that corresponds to the decision results. In this paper, we used an image file for the user's input data format. The server calculates similarities between the user's image file and reference images obtained from the Naver Image Search API and then returns determination results. We have confirmed the value of integrating the game development framework with other computing technologies demonstrating the potential of the proposed methods for application to various future game interfaces.

Planning Evacuation Routes with Load Balancing in Indoor Building Environments (실내 빌딩 환경에서 부하 균등을 고려한 대피경로 산출)

  • Jang, Minsoo;Lim, Kyungshik
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.7
    • /
    • pp.159-172
    • /
    • 2016
  • This paper presents a novel algorithm for searching evacuation paths in indoor disaster environments. The proposed method significantly improves the time complexity to find the paths to the evacuation exit by introducing a light-weight Disaster Evacuation Graph (DEG) for a building in terms of the size of the graph. With the DEG, the method also considers load balancing and bottleneck capacity of the paths to the evacuation exit simultaneously. The behavior of the algorithm consists of two phases: horizontal tiering (HT) and vertical tiering (VT). The HT phase finds a possible optimal path from anywhere of a specific floor to the evacuation stairs of the floor. Thus, after finishing the HT phases of all floors in parallel the VT phase begins to integrate all results from the previous HT phases to determine a evacuation path from anywhere of a floor to the safety zone of the building that could be the entrance or the roof of the building. It should be noted that the path produced by the algorithm. And, in order to define the range of graph to process, tiering scheme is used. In order to test the performance of the method, computing times and evacuation times are compared to the existing path searching algorithms. The result shows the proposed method is better than the existing algorithms in terms of the computing time and evacuation time. It is useful in a large-scale building to find the evacuation routes for evacuees quickly.

Energy-Efficient Multipath Routing Protocol for Supporting Mobile Events in Wireless Sensor Networks (무선 센서 네트워크에서 이동 이벤트를 지원하기 위한 에너지 효율적인 멀티패스 라우팅 프로토콜)

  • Kim, Hoewon;Lee, Euisin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.12
    • /
    • pp.455-462
    • /
    • 2016
  • Wireless sensor networks have been researched to gather data about events on sensor fields from sources at sinks. Multipath routing is one of attractive approaches to reliably send data against the problem of frequent breakages on paths from sources to sinks due to node and link failures. As mobile events such as humans, animals, and vehicles are considered, sources may be continuously generated according to the movement of the mobile event. Thus, mobile events provide new challenging issue in multipath routing. However, the research on multipath routing mainly focus on both efficient multipath construction from sources to static sinks and fast multipath reconstruction against path breakages. Accordingly, the previous multipath routing protocols request each source continuously generated by a mobile event to construct individual multipath from the source to sinks. This induces the increase of multipath construction cost in the previous protocols in proportion to the number of source. Therefore, we propose efficient multipath routing protocol for supporting continuous sources generated by mobile events. In the proposed protocol, new source efficiently reconstructs its multipath by exploiting the existing multipath of previous sources. To do this, the proposed protocol selects one among three reconstruction methods: a local reconstruction, a global partial one, and a global full one. For a selection decision, we provide an analytical energy consumption cost model that calculates the summation of both the multipath reconstruction cost and the data forwarding cost. Simulation results show that the proposed protocol has better performance than the previous protocol to provide multipath routing for mobile events.