• Title/Summary/Keyword: internet control

Search Result 3,597, Processing Time 0.036 seconds

A Study on Development of Network Management Systems base on Component (컴포넌트 기반의 망관리 시스템 개발에 관한 연구)

  • Kim, Haeng-Kon;Kim, Ji-Young
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.937-950
    • /
    • 2004
  • With growing population of internet and web applications, distributed environment is considered to be the standard architecture of application. A network management systems(NMS) is necessary to control and monitor the complex network resources for providing and sharing the heft quality service. We recognize the NMS as a standard infrastructure for supporting efficient networking and a separate commercial applications. We believe every resource including software, hardware and environment for the network management should be separated from special protocols, vendors and applications. Therefore, We need a standard network management system that is efficient and consistent because of the heterogeous network features. In regards to software development, software reuse through assembling and extending the reusable elements such as patterns and components assures to realize the best productivity and quality The component based development(CBD) methodology that can assemble black box though well defined interfaces makes it possible to develop easer and quicker applications and is proved as the best software development solution involved in construction, selection and assembly of components. In this thesis, we describe the architecture for the network management and identify, define and design the components through analysis and design in the network management domain and Identified components mapped to the component architecture. We also specify the component development and design and implement the component for developing the network management. Implemented components apply to the component repository system that register, retrieve and understand the components. We analyze, design and implement the entire network management system based on configuration, connection, performance and fault management through the pre-developed components.

An Optimization on the Psychoacoustic Model for MPEG-2 AAC Encoder (MPEG-2 AAC Encoder의 심리음향 모델 최적화)

  • Park, Jong-Tae;Moon, Kyu-Sung;Rhee, Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.38 no.2
    • /
    • pp.33-41
    • /
    • 2001
  • Currently, the compression is one of the most important technology in multimedia society. Audio files arc rapidly propagated throughout internet Among them, the most famous one is MP-3(MPEC-1 Laver3) which can obtain CD tone from 128Kbps, but tone quality is abruptly down below 64Kbps. MPEC-II AAC(Advanccd Audio Coding) is not compatible with MPEG 1, but it has high compression of 1.4 times than MP 3, has max. 7.1 and 96KHz sampling rate. In this paper, we propose an algorithm that decreased the capacity of AAC encoding computation but increased the processing speed by optimizing psychoacoustic model which has enormous amount of computation in MPEG 2 AAC encoder. The optimized psychoacoustic model algorithm was implemented by C++ language. The experiment shows that the psychoacoustic model carries out FFT(Fast Fourier Transform) computation of 3048 point with 44.1 KHz sampling rate for SMR(Signal to Masking Ratio), and each entropy value is inputted to the subband filters for the control of encoder block. The proposed psychoacoustic model is operated with high speed because of optimization of unpredictable value. Also, when we transform unpredictable value into a tonality index, the speed of operation process is increased by a tonality index optimized in high frequency range.

  • PDF

A Method of Mining Visualization Rules from Open Online Text for Situation Aware Business Chart Recommendation (상황인식형 비즈니스 차트 추천기 개발을 위한 개방형 온라인 텍스트로부터의 시각화 규칙 추출 방법 연구)

  • Zhang, Qingxuan;Kwon, Ohbyung
    • The Journal of Society for e-Business Studies
    • /
    • v.25 no.1
    • /
    • pp.83-107
    • /
    • 2020
  • Selecting business charts based on the nature of the data and the purpose of the visualization is useful in business analysis. However, current visualization tools lack the ability to help choose the right business chart for the context. Also, soliciting expert help about visualization methods for every analysis is inefficient. Therefore, the purpose of this study is to propose an accessible method to improve business chart productivity by creating rules for selecting business charts from online published documents. To this end, Korean, English, and Chinese unstructured data describing business charts were collected from the Internet, and the relationships between the contexts and the business charts were calculated using TF-IDF. We also used a Galois lattice to create rules for business chart selection. In order to evaluate the adequacy of the rules generated by the proposed method, experiments were conducted on experimental and control groups. The results confirmed that meaningful rules were extracted by the proposed method. To the best of our knowledge, this is the first study to recommend customizing business charts through open unstructured data analysis and to propose a method that enables efficient selection of business charts for office workers without expert assistance. This method should be useful for staff training by recommending business charts based on the document that he/she is working on.

Hidden Markov Model for Gesture Recognition (제스처 인식을 위한 은닉 마르코프 모델)

  • Park, Hye-Sun;Kim, Eun-Yi;Kim, Hang-Joon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.1 s.307
    • /
    • pp.17-26
    • /
    • 2006
  • This paper proposes a novel hidden Markov model (HMM)-based gesture recognition method and applies it to an HCI to control a computer game. The novelty of the proposed method is two-fold: 1) the proposed method uses a continuous streaming of human motion as the input to the HMM instead of isolated data sequences or pre-segmented sequences of data and 2) the gesture segmentation and recognition are performed simultaneously. The proposed method consists of a single HMM composed of thirteen gesture-specific HMMs that independently recognize certain gestures. It takes a continuous stream of pose symbols as an input, where a pose is composed of coordinates that indicate the face, left hand, and right hand. Whenever a new input Pose arrives, the HMM continuously updates its state probabilities, then recognizes a gesture if the probability of a distinctive state exceeds a predefined threshold. To assess the validity of the proposed method, it was applied to a real game, Quake II, and the results demonstrated that the proposed HMM could provide very useful information to enhance the discrimination between different classes and reduce the computational cost.

An early warning and decision support system to reduce weather and climate risks in agricultural production

  • Nakagawa, Hiroshi;Ohno, Hiroyuki;Yoshida, Hiroe;Fushimi, Erina;Sasaki, Kaori;Maruyama, Atsushi;Nakano, Satoshi
    • Proceedings of the Korean Society of Crop Science Conference
    • /
    • 2017.06a
    • /
    • pp.303-303
    • /
    • 2017
  • Japanese agriculture has faced to several threats: aging and decrease of farmer population, global competition, and the risk of climate change as well as harsh and variable weather. On the other hands, the number of large scale farms is increasing, because farm lands have been being aggregated to fewer numbers of farms. Cost cutting, development of efficient ways to manage complicatedly scattered farm lands, maintaining yield and quality under variable weather conditions, are required to adapt to changing environments. Information and communications technology (ICT) would contribute to solve such problems and to create innovative technologies. Thus we have been developing an early warning and decision support system to reduce weather and climate risks for rice, wheat and soybean production in Japan. The concept and prototype of the system will be shown. The system consists of a weather data system (Agro-Meteorological Grid Square Data System, AMGSDS), decision support contents where information is automatically created by crop models and delivers information to users via internet. AMGSDS combines JMA's Automated Meteorological Data Acquisition System (AMeDAS) data, numerical weather forecast data and normal values, for all of Japan with about 1km Grid Square throughout years. Our climate-smart system provides information on the prediction of crop phenology, created with weather forecast data and crop phenology models, as an important function. The system also makes recommendations for crop management, such as nitrogen-topdressing, suitable harvest time, water control, pesticide spray. We are also developing methods to perform risk analysis on weather-related damage to crop production. For example, we have developed an algorism to determine the best transplanting date in rice under a given environment, using the results of multi-year simulation, in order to answer the question "when is the best transplanting date to minimize yield loss, to avoid low temperature damage and to avoid high temperature damage?".

  • PDF

A Study on the Possibility of Homegrown Terrorism in Korea Depending on Internalization and Strategy to Cope with the Terrorism (국제화에 따른 한국내 자생테러 발생 가능성과 대응전략)

  • Yu, Hyung-Chang
    • Korean Security Journal
    • /
    • no.31
    • /
    • pp.125-155
    • /
    • 2012
  • Terrorist organization has shown the trend of secret organization and it is harder to cope with terrorism because of uncertainty of terrorism. Homegrown terrorism is the one, whose preparation, execution and effect are restricted to domestic area. By the way, in the worldwide economic depression, violence and radical demonstration have shown the expansion trends as in Middle East, political revolution of Africa, anti-social resistance of Europe and Wall Street Occupation of USA. Homegrown terrorism is occurring in various countries such as UK and Spain as well as USA. Specialists warn homegrown terrorism in Korea. The purpose of this study was to prospect the possibility of homegrown terrorism that can be generated in the transfer to multi-culture society as various foreigners come to Korea rapidly and suggest the method to cope with the trend. The study analyzed environment and analysis of homegrown terrorism that Korea faces now. The methods to cope with homegrown terrorism are as follows. First, distribution of radical homegrown terrorism via internet should be prevented. Second, the connection between terrorist organization and homegrown terrorist should be prevented. Third, there should be a cooperation among government, residents and religious group. Fourth, there should be an open approach against multi-culture society. Fifth, there should be a systematic control for cause of new conflict. Finally, there should be a long-term approach to cause of new conflict. If we do not make an effort to prevent homegrown terrorism, terrorism environment may face new aspect and national and social cost for it will increase.

  • PDF

Design and Implementation of Bio-data Monitering System Based on ISO/IEEE 11073 DIM/REST for IoT Healthcare Service (IoT 헬스케어 서비스를 위한 ISO/IEEE 11073 DIM/REST 기반 생체정보 모니터링 시스템 설계 및 구현)

  • Choi, Ju-Hyun;Chun, Seung-Man;Jang, Dong-Hyun;Park, Jong-Tae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.52 no.3
    • /
    • pp.3-12
    • /
    • 2015
  • Recently, various studies have been attempted to provide a biological information monitoring service through integrating with the web service. The medical information transmission standard ISO/IEEE 11073 PHD defines the optimized exchange protocol ISO/IEEE 11073-20601 based on the No-IP to exchange the biometric information between the ISO/IEEE 11073 agent and the manager. It's system structure based on the No-IP using ISO/IEEE 11073-20601 is not suitable for providing a remote biological information monitoring services. That is because it is difficult to provide to control and manage the biological information measurement devices, which have installed IP protocol stack at the remote. Furthermore, ACSE and CMDISE in ISO/IEEE 11073-20601 are not suitable to provide U-healthcare services based on IoT because they are complicated and difficult to implement it caused by the structural complexity. In order to solve the problems, in this paper, we propose the biological information monitoring architecture based on ISO/IEEE 11073 DIM/REST of IoT environment to provide the biological information monitoring service based on IoT. To do this, we designed biological information monitoring system architecture based on IoT and the message exchange protocol of ISO/IEEE 11073 DIM/REST between the ISO/IEEE 11073 agent and the ISO/IEEE 11073 manager. In order to verify the realistic possibility of the proposed system architecture, we developed the service prototype.

Actual Condition of Teenagers' Computer Game Addiction and It's Influence on their Personality (청소년의 컴퓨터 게임 중독 실태와 인성에 미치는 영향)

  • Ahn, Seong-Hun;Jang, IL-Young
    • Journal of The Korean Association of Information Education
    • /
    • v.11 no.4
    • /
    • pp.447-459
    • /
    • 2007
  • Recently, the use of computer game by Korean teenagers is rapidly growing due to the expansion of the computer popularization and the development of game industry. Of all the teenagers, 82.4% have experience of playing computer game and statistics shows that 22.4% of them play everyday. There is an opinion that the computer game not only improves self confidence and concentration but also enhances internet use, foreign language usage and cognitive ability so that it accelerates learning efficacy and releases stress. On the other hand, there also exists a negative opinion on the symptoms of its addiction. Young(1996) warns that like other addictions, computer game addiction can provoke social problems such as loss of control, desire, marriage problem, schoolwork failure, financial deficiency and loss of employment. Therefore, this study has investigated how computer game addiction affects teenagers' personality. For this purpose, I have conducted the research on the reality of teenagers'computer game use, computer game addiction assessment, analysis on the difference between male and female, and on the relation between the level of computer game addiction and teenagers' personality. As a result, it is confirmed that the computer game addiction affects negatively to teenagers' personality such as stability, self-controlling, perceiving emotion, expressing emotion and controlling emotion.

  • PDF

Secure Query Processing against Encrypted XML Data Using Query-Aware Decryption (질의-인식 복호화를 사용한 암호화된 XML데이타에 대한 안전한 질의 처리)

  • Lee Jae-Gil;Whang Kyu-Young
    • Journal of KIISE:Databases
    • /
    • v.32 no.3
    • /
    • pp.243-253
    • /
    • 2005
  • Dissemination of XML data on the internet could breach the privacy of data providers unless access to the disseminated XML data is carefully controlled. Recently, the methods using encryption have been proposed for such access control. However, in these methods, the performance of processing queries has not been addressed. A query processor cannot identify the contents of encrypted XML data unless the data are decrypted. This limitation incurs overhead of decrypting the parts of the XML data that would not contribute to the query result. In this paper, we propose the notion of query-aware decryption for efficient processing of queries against encrypted XML data. Query-aware decryption allows us to decrypt only those parts that would contribute to the query result. For this purpose, we disseminate an encrypted XML index along with the encrypted XML data. This index, when decrypted, informs us where the query results are located in the encrypted XML data, thus preventing unnecessary decryption for other parts of the data. Since the size of this index is much smaller than that of the encrypted XML data, the cost of decrypting this index is negligible compared with that for unnecessary decryption of the data itself. The experimental results show that our method improves the performance of query processing by up to 6 times compared with those of existing methods. Finally, we formally prove that dissemination of the encrypted XML index does not compromise security.

TCP Performance Study in Vertical Handoff across Heterogeneous Wireless Networks (이질적 무선망 사이의 수직적 핸드오프에서의 TCP 성능 분석)

  • Pack Sangheon;Choi Yanghee
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.20-28
    • /
    • 2005
  • TCP(Transmission Control Protocol) is one of the most important Internet protocols, which is widely used in wireless networks as well as wired networks. However, when TCP is deployed for wireless networks, it takes severe performance degradation because TCP was designed for wired network. To overcome this drawback, a number of TCP variants have been proposed in the literature. However, most previous schemes did not consider TCP enhancement over heterogeneous networks. In heterogeneous networks, an mobile node (MN) may move from one access network to another(i.e., vertical handover). In the case of vertical handover, an MN experiences a TCP performance degradation caused by the packet loss and the sudden change of link characteristics between two different access networks. In this work, we investigate the TCP performance degradation occurred in vortical handover across heterogeneous networks. First, we have conducted the measurement study over GPRS-WLAN testbed. In the measurement study. we observed the TCP performance degradation in the case of handover from WLAN to GPRS. In order to study more different TCP behaviors during vertical handover, we performed comprehensive simulations using a network simulator 2(ns-2). Based on measurement and simulation results, we investigated how to improve TCP performance in vertical handover and we concluded that the existing mechanisms cannot be perfect solutions and new mechanisms are strongly required.