• Title/Summary/Keyword: information overload

Search Result 531, Processing Time 0.031 seconds

Encryption Scheme for MPEG-4 Media Transmission Exploiting Frame Dropping (대역폭 감소를 적용한 MPEG-4 미디어 전송시의 암호화 기법 연구)

  • Shin, Dong-Kyoo;Shin, Dong-Il;Park, Se-Young
    • The KIPS Transactions:PartB
    • /
    • v.15B no.6
    • /
    • pp.575-584
    • /
    • 2008
  • According to the network condition, the communication network overload could be occurred when media transmitting. Many researches are being carried out to lessen the network overload, such as the filtering, load distributing, frame dropping and many other methods. Among these methods, one of effective method is frame dropping that reduces specified video frames for bandwidth diminution. B frames are dropped and then I, P frames are dropped according to dependency among the frames in frame dropping. This paper proposes a scheme for protecting copyrights by encryption, when we apply frame dropping to reduce bandwidth of media following MPEG-4 file format. We designed two kinds of frame dropping: first one stores and then sends the dropped files and the other drops frames in real-time when transmitting. We designed three kinds of encryption methods in which DES algorithm is used to encrypt MPEG-4 data: macro block encryption in I-VOP, macro block and motion vector encryption in P-VOP, and macro block and motion vector encryption in I, P-VOP. Based on these three methods, we implemented a digital right management solution for MPEG-4 data streaming. We compared the results of dropping, encryption, decryption and quality of video sequences to select an optimal method, and there is no noticeable difference between the video sequences recovered after frame dropping and the ones recovered without frame dropping. The best performance in encryption and decryption of frames was obtained when we apply the macro block and motion vector encryption in I, P-VOP.

Digital Twin-Based Communication Optimization Method for Mission Validation of Swarm Robot (군집 로봇의 임무 검증 지원을 위한 디지털 트윈 기반 통신 최적화 기법)

  • Gwanhyeok, Kim;Hanjin, Kim;Junhyung, Kwon;Beomsu, Ha;Seok Haeng, Huh;Jee Hoon, Koo;Ho Jung, Sohn;Won-Tae, Kim
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.12 no.1
    • /
    • pp.9-16
    • /
    • 2023
  • Robots are expected to expand their scope of application to the military field and take on important missions such as surveillance and enemy detection in the coming future warfare. Swarm robots can perform tasks that are difficult or time-consuming for a single robot to be performed more efficiently due to the advantage of having multiple robots. Swarm robots require mutual recognition and collaboration. So they send and receive vast amounts of data, making it increasingly difficult to verify SW. Hardware-in-the-loop simulation used to increase the reliability of mission verification enables SW verification of complex swarm robots, but the amount of verification data exchanged between the HILS device and the simulator increases exponentially according to the number of systems to be verified. So communication overload may occur. In this paper, we propose a digital twin-based communication optimization technique to solve the communication overload problem that occurs in mission verification of swarm robots. Under the proposed Digital Twin based Multi HILS Framework, Network DT can efficiently allocate network resources to each robot according to the mission scenario through the Network Controller algorithm, and can satisfy all sensor generation rates required by individual robots participating in the group. In addition, as a result of an experiment on packet loss rate, it was possible to reduce the packet loss rate from 15.7% to 0.2%.

Effect of Consumer Confusion on Word of Mouth and Trust Through Anger: Focusing on The Moderation Effect of Consumer's Negative Affectivity and Intolerance of Uncertainty (소비자 혼란이 분노를 통해 구전, 신뢰에 미치는 영향: 소비자의 부정적 감정 성향과 불확실성 인내력 부족의 조절역할을 중심으로)

  • Moon, Sun-Jung;Kang, Bo-Hyeon;Lee, Soo-Hyung
    • Asia Marketing Journal
    • /
    • v.13 no.1
    • /
    • pp.113-141
    • /
    • 2011
  • Companies are competing each other, and as the competitions became higher, consumer's information processing for purchase became more complicated. Consumer confusion problem is getting more serious, but there are still not much considerations on this problem. The purpose of this study is to find out that the consumer confusion can causes consumer's negative emotion(anger). This research studied the mediation effect of negative emotion on the relationship between consumer confusion, which was classified into three categories, and two consequences, word-of-mouth and trust. And also it concentrates on moderating effects of negative affectivity and intolerance of uncertainty in the relationship between consumer confusion and negative emotion. For the empirical study, we carried out a survey targeting consumers who live in the Dae-gu metropolitan area. The specific results of this study are as follows. First, all sub-dimensions of the consumer confusion had a positive effect on anger. Second, anger had a positive effect on word of mouth and on the other hand, anger had a negative effect on trust. Third, negative affectivity had a moderating effects on the links between overload and ambiguity confusion with anger, and intolerance of uncertainty only had a moderating effects on the links between overload confusion and anger.

  • PDF

The Impact of the Risks and Benefits of Unmanned Store Services on Customer Satisfaction through the Theory of Planned Behavior (무인 점포 서비스의 위험과 혜택이 계획된 행동 이론을 통해 고객 만족에 미치는 영향)

  • Noh Hyeyoung;Lee Sinbok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.10 no.5
    • /
    • pp.631-643
    • /
    • 2024
  • With the rapid advancement of digital technology, unmanned store services are on the rise, yet studies investigating their impact on customer satisfaction are scarce. This study aims to explore how unmanned store services affect customer satisfaction, focusing on the factors of risk and benefit. The methodology involved an online survey conducted from December 20 to December 30, 2023, targeting 260 customers who had used unmanned store self-service at least once, with 252 responses ultimately analyzed. The results reveal that the risk and benefit factors of unmanned store self-services complexly and diversely influence subjective norms and perceived control. Firstly, personal information breaches positively affected subjective norms, while overload and uncertainty had negative impacts. Secondly, while convenience negatively influenced subjective norms, playfulness and usefulness had positive effects. However, personal breaches and overload did not affect perceived control, whereas uncertainty did negatively. The findings of this study provide significant insights into how successful implementation and management of unmanned store self-services can regulate social expectations and control perception of customers, thereby enhancing customer satisfaction.

Contents Delivery Service System in Internet-based P2P Computing (인터넷기반 P2P 컴퓨팅 환경에서의 콘텐츠 전송 서비스 시스템에 관한 연구)

  • Kim, Jin-Il
    • Journal of Internet Computing and Services
    • /
    • v.6 no.6
    • /
    • pp.1-12
    • /
    • 2005
  • The number of web contents is enormous in the billions and rapidly growing, Most contents are state, but an increasing number are generated dynamically, Therefore, Internet-based client/server architecture of Contents Delivery Service System suffers from frequent disconnections and security threats casused by dependency of the server or overload. Idle computing resources in Internet are used for sloving these issues, In this paper, We implement and design the Content Delivery Service System for cyber education system using idle Computing Power in P2P computing to share computing resources, We implement not only internet infrastructure but also satellite infrastructure system. and designed to transfer real-time or non real-time contents.

  • PDF

Differences in Eye Movement Pattern during the Classification between the Gifted and General Students in Elementary Schools (초등과학영재와 일반 아동의 분류 과정에서 나타나는 안구 운동 패턴의 차이)

  • Choi, Hyun-Dong;Shin, Won-Sub;Shin, Dong-Hoon
    • Journal of Korean Elementary Science Education
    • /
    • v.31 no.4
    • /
    • pp.501-512
    • /
    • 2012
  • The purpose of this study was to identify the differences in eye movement pattern shown in classification activities between the gifted and regular students in elementary schools. The subjects for the research consisted of five gifted students in the special education center for the gifted at Seoul National University of Education and five students at D regular elementary schools. SMI (Senso Motoric Instruments)' iView $X^{TM}$ RED 120 Hz was used in order to collect eye movement data. Results were as follows. There were difference patterns between the gifted and the regular student in question identification, attribute observation, and criteria generation process. Gifted students minimized unnecessary cognitive overload and took advantage of cognitive economic efficiency. Regular students have a lot of cognitive burden because they did not grasp the essential information.

Impact of Sink Node Location in Sensor Networks: Performance Evaluation (센서 네트워크에서 싱크 노드 위치가 성능에 미치는 영향 분석)

  • Choi, Dongmin;Kim, Seongyeol;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.977-987
    • /
    • 2014
  • Many of the recent performance evaluation of clustering schemes in wireless sensor networks considered one sink node operation and fixed sink node location without mentioning about any network application requirements. However, application environments have variable requirements about their networks. In addition, network performance is sufficiently influenced by different sink node location scenarios in multi-hop based network. We also know that sink location can influence to the sensor network performance evaluation because of changed multipath of sensor nodes and changed overload spots in multipath based wireless sensor network environment. Thus, the performance evaluation results are hard to trust because sensor network is easily changed their network connection through their routing algorithms. Therefore, we suggest that these schemes need to evaluate with different sink node location scenarios to show fair evaluation result. Under the results of that, network performance evaluation results are acknowledged by researchers. In this paper, we measured several clustering scheme's performance variations in accordance with various types of sink node location scenarios. As a result, in the case of the clustering scheme that did not consider various types of sink location scenarios, fair evaluation cannot be expected.

A Study on Technical Approach for Compliance Management Service (컴플라이언스 매니지먼트 서비스를 위한 기술적 접근에 관한 연구)

  • Lee, Jun-Ho;Oh, Hea-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.1
    • /
    • pp.460-465
    • /
    • 2014
  • The Financial Supervisory Institution constantly has tightened the regulation for secure electronic financial service. Information Security Consulting and Service companies are not enough to cover about 4,500 financial institutes required to comply with the regulation, and the Financial Supervisory Institution also suffers from work overload. The demand for real-time work of risk management is getting stronger. Compliance with the regulation has to be attempted with technical approach so that requirement, implementation, monitoring, and supervision are efficiently performed. And, articles have to be concluded with compliance management service. In this research used compliance management framework and IT GRC process model, have to be designed compliance management lifecycle and 34 index.

Application of Domain Knowledge in Transaction-based Recommender Systems through Word Embedding (트랜잭션 기반 추천 시스템에서 워드 임베딩을 통한 도메인 지식 반영)

  • Choi, Yeoungje;Moon, Hyun Sil;Cho, Yoonho
    • Knowledge Management Research
    • /
    • v.21 no.1
    • /
    • pp.117-136
    • /
    • 2020
  • In the studies for the recommender systems which solve the information overload problem of users, the use of transactional data has been continuously tried. Especially, because the firms can easily obtain transactional data along with the development of IoT technologies, transaction-based recommender systems are recently used in various areas. However, the use of transactional data has limitations that it is hard to reflect domain knowledge and they do not directly show user preferences for individual items. Therefore, in this study, we propose a method applying the word embedding in the transaction-based recommender system to reflect preference differences among users and domain knowledge. Our approach is based on SAR, which shows high performance in the recommender systems, and we improved its components by using FastText, one of the word embedding techniques. Experimental results show that the reflection of domain knowledge and preference difference has a significant effect on the performance of recommender systems. Therefore, we expect our study to contribute to the improvement of the transaction-based recommender systems and to suggest the expansion of data used in the recommender system.

Performance Evaluation of PDP System Using Realtime Network Monitoring (실시간 네트워크 모니터링을 적용한 PDP 시스템의 성능 평가)

  • Song, Eun-Ha;Jeong, Jae-Hong;Jeong, Young-Sik
    • The KIPS Transactions:PartA
    • /
    • v.11A no.3
    • /
    • pp.181-188
    • /
    • 2004
  • PDF(Parallel/Distributed Processing) is an internet-based parallel/distributed processing system that utilizes resources from hosts on the internet in idle state to perform large scale application through parallel processing, thus decreasing the total execution time. In this paper. do propose an adaptive method to be changed network environment at any time using realtime monitoring of host. It is found from experiments that parallel/distributed processing has better performance than its without monitoring as an adaptive strategy, which copy with task delay factor by overload and fault of network, be applicable to the cockpits of task allocation algorithm in PDP.