• Title/Summary/Keyword: search functions

Search Result 801, Processing Time 0.029 seconds

Changes in spatial organization of Korea by the construction of Seoul-Pusan railroad (京釜線 鐵道建設에 따른 韓半島 空間組織의 變化)

  • ;Joo, Kyung-Sik
    • Journal of the Korean Geographical Society
    • /
    • v.29 no.3
    • /
    • pp.297-317
    • /
    • 1994
  • This study demonstrates the changes in the spatial organization of Korea by the construction of Seoul-Pusan railroad. This Seoul-Pusan line, which is the most important one in Korea was constructed in 1905. The original plan of the line was selected to cross the main traditional roads to control the entire Korean peninsular and to mobilize the Korean commercial potentials. It was the line to exploit the staples and to expand the Japanese market in Korea. In accordance with the contracts between Japan and Korean government, Korean government had to supply the lands for railroad, office, and service facilities. That was one of the important reasons that Korean government had been broken down. The main findings of this study are as follows: 1. The Seoul-Pusan railroad line was constructed Japanese colonial policy which emphasized three main purposes; the first was to reorganize the economic space and to collapse the traditional Korean markets for Japanese ruling, and the second was to find out the military supply routes, and the third was to search for the transcontinental line for China and Siberia. As the results, the old Korean pedestrian routes, which were the Eastern, the mid, the westren, and the Samnam route lost their functions. 2. Japanese requested for Korean government usually ten times of wider space for the site of stations than the needed one. The land was expropriated, and constructed the new centers aparted from the original Korean towns. In this process Japanese got the most developmental and windfall profits. The newly constructed centers were for Japanese immigration and the town service facilities which would be used to control the Korean financial market. At last, they easily converted the Korean spatial economy into Japanese colonial one, which made to reinforce the sphere of Seoul-Pusan line. 3. Japanese planned the stations as the central points in Korea. So the railroad stations were located apart from the centers of towns, to avoid the Korean resistances, and to maximize their profits. The mean distance from staiton to 'the town center is about 1km while the Japanese case is 0.6km. 4. The pattern of present Korean railroads is not the 'X type'. Because the Honam line is not the trunk one. So, we could call the Korean railroad pattern as the 'Ip(Chinese character 入) type' . The operational effects of Seoul-Pusan line brought out the concentration of the national economy to this line as Japanese planned. And the polorization had occurred between this line and the other parts of Korea. For twenty years (1910-1930), the transported freights were increased about 5 times. In 1930, the total freight of Seoul-Pusan line became 2, 010, 444 metric tons. If we examine this process, the underconstructing Seoul-Pusan express electric railroad should avoid adjacent this line to reduce the regional and ecological imbalance. 5. The forms of centers on the Seoul-Pusan line were classified into six types in relation to station, town center, and built-up area; the compact (integrated) type, the elongated one, the splited (independent) one, the absorbed one, the consolidated one, and the declined one. All types of these towns might be developed in accordance with the centrality, railroad function, and the other transportational functions. 6. The Seoul-Pusan line plays the most important role among Korean railroads but the ratio of passenger and freight become lower because the effiects of other inaugurated railoads the different transportation modes such as trucks and cars would be got more merits in competition. 7. The results of cluster analyses on the cities of railroad stations showed the rudimentary urban systems in 1910 and 1930. In 1930, the cities were classified into three groups; the group of small cites, the intermediate (developing) city-group, and the special city-group. In 1930s the spatial organization and urban system of Korea were similar to the present ones. We call appreciate that these were the effects of the Seoul-Pusan line.

  • PDF

Construction and Application of Intelligent Decision Support System through Defense Ontology - Application example of Air Force Logistics Situation Management System (국방 온톨로지를 통한 지능형 의사결정지원시스템 구축 및 활용 - 공군 군수상황관리체계 적용 사례)

  • Jo, Wongi;Kim, Hak-Jin
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.2
    • /
    • pp.77-97
    • /
    • 2019
  • The large amount of data that emerges from the initial connection environment of the Fourth Industrial Revolution is a major factor that distinguishes the Fourth Industrial Revolution from the existing production environment. This environment has two-sided features that allow it to produce data while using it. And the data produced so produces another value. Due to the massive scale of data, future information systems need to process more data in terms of quantities than existing information systems. In addition, in terms of quality, only a large amount of data, Ability is required. In a small-scale information system, it is possible for a person to accurately understand the system and obtain the necessary information, but in a variety of complex systems where it is difficult to understand the system accurately, it becomes increasingly difficult to acquire the desired information. In other words, more accurate processing of large amounts of data has become a basic condition for future information systems. This problem related to the efficient performance of the information system can be solved by building a semantic web which enables various information processing by expressing the collected data as an ontology that can be understood by not only people but also computers. For example, as in most other organizations, IT has been introduced in the military, and most of the work has been done through information systems. Currently, most of the work is done through information systems. As existing systems contain increasingly large amounts of data, efforts are needed to make the system easier to use through its data utilization. An ontology-based system has a large data semantic network through connection with other systems, and has a wide range of databases that can be utilized, and has the advantage of searching more precisely and quickly through relationships between predefined concepts. In this paper, we propose a defense ontology as a method for effective data management and decision support. In order to judge the applicability and effectiveness of the actual system, we reconstructed the existing air force munitions situation management system as an ontology based system. It is a system constructed to strengthen management and control of logistics situation of commanders and practitioners by providing real - time information on maintenance and distribution situation as it becomes difficult to use complicated logistics information system with large amount of data. Although it is a method to take pre-specified necessary information from the existing logistics system and display it as a web page, it is also difficult to confirm this system except for a few specified items in advance, and it is also time-consuming to extend the additional function if necessary And it is a system composed of category type without search function. Therefore, it has a disadvantage that it can be easily utilized only when the system is well known as in the existing system. The ontology-based logistics situation management system is designed to provide the intuitive visualization of the complex information of the existing logistics information system through the ontology. In order to construct the logistics situation management system through the ontology, And the useful functions such as performance - based logistics support contract management and component dictionary are further identified and included in the ontology. In order to confirm whether the constructed ontology can be used for decision support, it is necessary to implement a meaningful analysis function such as calculation of the utilization rate of the aircraft, inquiry about performance-based military contract. Especially, in contrast to building ontology database in ontology study in the past, in this study, time series data which change value according to time such as the state of aircraft by date are constructed by ontology, and through the constructed ontology, It is confirmed that it is possible to calculate the utilization rate based on various criteria as well as the computable utilization rate. In addition, the data related to performance-based logistics contracts introduced as a new maintenance method of aircraft and other munitions can be inquired into various contents, and it is easy to calculate performance indexes used in performance-based logistics contract through reasoning and functions. Of course, we propose a new performance index that complements the limitations of the currently applied performance indicators, and calculate it through the ontology, confirming the possibility of using the constructed ontology. Finally, it is possible to calculate the failure rate or reliability of each component, including MTBF data of the selected fault-tolerant item based on the actual part consumption performance. The reliability of the mission and the reliability of the system are calculated. In order to confirm the usability of the constructed ontology-based logistics situation management system, the proposed system through the Technology Acceptance Model (TAM), which is a representative model for measuring the acceptability of the technology, is more useful and convenient than the existing system.

Comparison of Deep Learning Frameworks: About Theano, Tensorflow, and Cognitive Toolkit (딥러닝 프레임워크의 비교: 티아노, 텐서플로, CNTK를 중심으로)

  • Chung, Yeojin;Ahn, SungMahn;Yang, Jiheon;Lee, Jaejoon
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.1-17
    • /
    • 2017
  • The deep learning framework is software designed to help develop deep learning models. Some of its important functions include "automatic differentiation" and "utilization of GPU". The list of popular deep learning framework includes Caffe (BVLC) and Theano (University of Montreal). And recently, Microsoft's deep learning framework, Microsoft Cognitive Toolkit, was released as open-source license, following Google's Tensorflow a year earlier. The early deep learning frameworks have been developed mainly for research at universities. Beginning with the inception of Tensorflow, however, it seems that companies such as Microsoft and Facebook have started to join the competition of framework development. Given the trend, Google and other companies are expected to continue investing in the deep learning framework to bring forward the initiative in the artificial intelligence business. From this point of view, we think it is a good time to compare some of deep learning frameworks. So we compare three deep learning frameworks which can be used as a Python library. Those are Google's Tensorflow, Microsoft's CNTK, and Theano which is sort of a predecessor of the preceding two. The most common and important function of deep learning frameworks is the ability to perform automatic differentiation. Basically all the mathematical expressions of deep learning models can be represented as computational graphs, which consist of nodes and edges. Partial derivatives on each edge of a computational graph can then be obtained. With the partial derivatives, we can let software compute differentiation of any node with respect to any variable by utilizing chain rule of Calculus. First of all, the convenience of coding is in the order of CNTK, Tensorflow, and Theano. The criterion is simply based on the lengths of the codes and the learning curve and the ease of coding are not the main concern. According to the criteria, Theano was the most difficult to implement with, and CNTK and Tensorflow were somewhat easier. With Tensorflow, we need to define weight variables and biases explicitly. The reason that CNTK and Tensorflow are easier to implement with is that those frameworks provide us with more abstraction than Theano. We, however, need to mention that low-level coding is not always bad. It gives us flexibility of coding. With the low-level coding such as in Theano, we can implement and test any new deep learning models or any new search methods that we can think of. The assessment of the execution speed of each framework is that there is not meaningful difference. According to the experiment, execution speeds of Theano and Tensorflow are very similar, although the experiment was limited to a CNN model. In the case of CNTK, the experimental environment was not maintained as the same. The code written in CNTK has to be run in PC environment without GPU where codes execute as much as 50 times slower than with GPU. But we concluded that the difference of execution speed was within the range of variation caused by the different hardware setup. In this study, we compared three types of deep learning framework: Theano, Tensorflow, and CNTK. According to Wikipedia, there are 12 available deep learning frameworks. And 15 different attributes differentiate each framework. Some of the important attributes would include interface language (Python, C ++, Java, etc.) and the availability of libraries on various deep learning models such as CNN, RNN, DBN, and etc. And if a user implements a large scale deep learning model, it will also be important to support multiple GPU or multiple servers. Also, if you are learning the deep learning model, it would also be important if there are enough examples and references.

Why A Multimedia Approach to English Education\ulcorner

  • Keem, Sung-uk
    • Proceedings of the KSPS conference
    • /
    • 1997.07a
    • /
    • pp.176-178
    • /
    • 1997
  • To make a long story short I made up my mind to experiment with a multimedia approach to my classroom presentations two years ago because my ways of giving instructions bored the pants off me as well as my students. My favorite ways used to be sometimes referred to as classical or traditional ones, heavily dependent on the three elements: teacher's mouth, books, and chalk. Some call it the 'MBC method'. To top it off, I tried audio-visuals such as tape recorders, cassette players, VTR, pictures, and you name it, that could help improve my teaching method. And yet I have been unhappy about the results by a trial and error approach. I was determined to look for a better way that would ensure my satisfaction in the first place. What really turned me on was a multimedia CD ROM title, ELLIS (English Language Learning Instructional Systems) developed by Dr. Frank Otto. This is an integrated system of learning English based on advanced computer technology. Inspired by the utility and potential of such a multimedia system for regular classroom or lab instructions, I designed a simple but practical multimedia language learning laboratory in 1994 for the first time in Korea(perhaps for the first time in the world). It was high time that the conventional type of language laboratory(audio-passive) at Hahnnam be replaced because of wear and tear. Prior to this development, in 1991, I put a first CALL(Computer Assisted Language Learning) laboratory equipped with 35 personal computers(286), where students were encouraged to practise English typing, word processing and study English grammar, English vocabulary, and English composition. The first multimedia language learning laboratory was composed of 1) a multimedia personal computer(486DX2 then, now 586), 2) VGA multipliers that enable simultaneous viewing of the screen at control of the instructor, 3) an amplifIer, 4) loud speakers, 5)student monitors, 6) student tables to seat three students(a monitor for two students is more realistic, though), 7) student chairs, 8) an instructor table, and 9) cables. It was augmented later with an Internet hookup. The beauty of this type of multimedia language learning laboratory is the economy of furnishing and maintaining it. There is no need of darkening the facilities, which is a must when an LCD/beam projector is preferred in the laboratory. It is headset free, which proved to make students exasperated when worn more than- twenty minutes. In the previous semester I taught three different subjects: Freshman English Lab, English Phonetics, and Listening Comprehension Intermediate. I used CD ROM titles like ELLIS, Master Pronunciation, English Tripple Play Plus, English Arcade, Living Books, Q-Steps, English Discoveries, Compton's Encyclopedia. On the other hand, I managed to put all teaching materials into PowerPoint, where letters, photo, graphic, animation, audio, and video files are orderly stored in terms of slides. It takes time for me to prepare my teaching materials via PowerPoint, but it is a wonderful tool for the sake of presentations. And it is worth trying as long as I can entertain my students in such a way. Once everything is put into the computer, I feel relaxed and a bit excited watching my students enjoy my presentations. It appears to be great fun for students because they have never experienced this type of instruction. This is how I freed myself from having to manipulate a cassette tape player, VTR, and write on the board. The student monitors in front of them seem to help them concentrate on what they see, combined with what they hear. All I have to do is to simply click a mouse to give presentations and explanations, when necessary. I use a remote mouse, which prevents me from sitting at the instructor table. Instead, I can walk around in the room and enjoy freer interactions with students. Using this instrument, I can also have my students participate in the presentation. In particular, I invite my students to manipulate the computer using the remote mouse from the student's seat not from the instructor's seat. Every student appears to be fascinated with my multimedia approach to English teaching because of its unique nature as a new teaching tool as we face the 21st century. They all agree that the multimedia way is an interesting and fascinating way of learning to satisfy their needs. Above all, it helps lighten their drudgery in the classroom. They feel other subjects taught by other teachers should be treated in the same fashion. A multimedia approach to education is impossible without the advent of hi-tech computers, of which multi functions are integrated into a unified system, i.e., a personal computer. If you have computer-phobia, make quick friends with it; the sooner, the better. It can be a wonderful assistant to you. It is the Internet that I pay close attention to in conjunction with the multimedia approach to English education. Via e-mail system, I encourage my students to write to me in English. I encourage them to enjoy chatting with people all over the world. I also encourage them to visit the sites where they offer study courses in English conversation, vocabulary, idiomatic expressions, reading, and writing. I help them search any subject they want to via World Wide Web. Some day in the near future it will be the hub of learning for everybody. It will eventually free students from books, teachers, libraries, classrooms, and boredom. I will keep exploring better ways to give satisfying instructions to my students who deserve my entertainment.

  • PDF

A RURAL HEALTH SERVICE MODEL FOR KOREA BASED OH A PRIMARY CARE NURSING SERVICE SYSTEM

  • Hong, Yeo-Shin
    • Journal of Korean Academy of Nursing
    • /
    • v.11 no.2
    • /
    • pp.5-8
    • /
    • 1981
  • This study concerns itself with the development of a new model of comprehensive health service for rural communities of Korea. The study was conceived to resolve the problems of both underservice in rural communities and underutilization of valuable health manpower, namely the nurses, the disenchanted elite health personnel in Korea. On review of the current situation, the greatest deficiencies in the Korean health care system were found in the availability of primary care at the peripheries of md communities, in the dissemination of knowledge of disease prevention and health care, and in the induction of and guidance for active participation by the clientele in health maintenance at the personal, family and community level Abundant untapped health resources were identified that could be brough to bear upon the national effort to extend health services to every member of the Korean Population. Therefore, it was Postulated that the problem of underservice in rural communities of Korea can be structurcturally resolved by the effective mobilization and organization of untapped health resources, and that. a primary care Nursing Service System offers the best possibility for fulfillment of rural health service goals within the current health man-power situation. In order to identify appropriate strategies to combat the present difficulties in Korean rural health services and to utilize nurses and other health personnel in community-centered health programs, a search was made for examples of innovative service models throughout the world. An extensive literature survey and field visits to project sites both in Korea and in the United States were made. Experts in the field of world health, health service, planners, administrators, and medical and nursing practitioners in Korea, in the United States as well as visitors from other Asian countries were widely consulted. On the basis of information and inputs from these experts a new rural health service model has been constructed within the conceptual framework of community development, especially of the innovation diffusion Model. It is considered especially important that citizens in each community develop capacities for self-care with assistance and supports from available health professionals and participate in health service-related decisions that affect their own well-being. The proposed model is based upon the regionalization of health care planning utilizing a comprehensive Nursing Service System at the immediate delivery level The model features: (1) a health administration unit at each administrative level; (2) mechanisms for community participation; (3) a continuous source of primary health care at the local community level; (4) relative centralization of specialty care and provision of tertiary or super-specialty care only at major national metropolitan centers; and (5) a system for patient referral to the appropriate level of care. This model has been built around professional nurses as the key community health workers because their training is particularly suited and because large numbers of well-trained nurses are currently available and being trained. The special element in this model is a professional nurse-guided, self-care facilitating primary care Community Nursing Service System. This is supported by a Nursing Extension Service as a new training and support structure. (See attached diagrams). A broad spectrum of programs was proposed for the Community Nursing Service System. These were designed to establish a balance of activities between the clinic-centered individual care component and the field activity-centered educational and supportive component of health care services. Examples of possible program alternatives and proposed guidelines for health care in specific situations were presented, as well as the roles and functions of the key health personnel within the Community Nursing Service System. This Rural Health Service Model was proposed as a real alternative to the maldistributed, inequitable, uncoordinated solo-practice, physician-centered fee-for-service health care available to Koreans today.

  • PDF

Australian Case Study in Regulatory Techniques to the Security Industry Reform and Policy Implications (호주 민간경비산업 고품질 규제수단 검토 및 시사점)

  • Kim, Dae-Woon
    • Korean Security Journal
    • /
    • no.47
    • /
    • pp.7-36
    • /
    • 2016
  • The security providers industry, often referred to as an industry with unconfined growth ceiling, has entered a remarkable mass-growth phase since the 1980. In the modern era, private-sector security increasingly cover functions relating to general security awareness (including counter-terrorism) in partnership with State bodies, and the scale of operations continue to accelerate, relative to the expanding roles. In the era of pluralisation of policing, there has been widening efforts pursued to develop a range of regulatory strategies internationally in order to manage such growth and development. To date, in South Korea, a diverse set of industry review studies have been conducted. However, the analyses have been conventionally confined to North America, Britain, Germany and Japan, while developments in other world regions remain unassessed. This article is intended to inform the drivers and determinants of regulatory reforms in Australia, and examine the effectiveness of the main pillars of licensing innovations. Over the past decades, the Australian regime has undergone a wave of reforms in response to emerging issues, and in recognition of the industry as a 'public good' due to underpopulation density and the resulting security challenges. The focus of review in this study was on providing a detailed review of the regulatory approach taken by Australia that has expanded police-private security co-operation since the 1980s. The emphasis was on examining the core pillars of risk management strategies and oversight practices progressed to date and evaluating areas of possible improvement in regulation relative to South Korea. Overall, this study has identified three key features of Australian regime: (1) close checks on questionable close associates (including fingerprinting), (2) power of inspection and seizure without search warrant, (3) the 'three strikes' scheme. The rise of the private security presence in day-to-day policing operations means that industry warrant some intervening government-sponsored initiative. The overall lessons learnt from the Australian case was taken into account in determining the following checks and balances that would provide the ideal setting for the best-practice arrangement: (1) regulatory measure should be evaluated against a set of well-defined indicators, such as the merits of different enforcement tools for each given risk, (2) information about regulatory impacts should be analysed by a specialist research institute, (3) regulators should be innovative in applying a range of strategies available to them by employing a mixture of compliance promotional strategies, and adjust the mix as required.

  • PDF

Access Restriction by Packet Capturing during the Internet based Class (인터넷을 이용한 수업에서 패킷캡쳐를 통한 사이트 접속 제한)

  • Yi, Jungcheol;Lee, Yong-Jin
    • 대한공업교육학회지
    • /
    • v.32 no.1
    • /
    • pp.134-152
    • /
    • 2007
  • This study deals with the development of computer program which can restrict students to access to the unallowable web sites during the Internet based class. Our suggested program can find the student's access list to the unallowable sites, display it on the teacher's computer screen. Through the limitation of the student's access, teacher can enhance the efficiency of class and fulfill his educational purpose for the class. The use of our results leads to the effective and safe utilization of the Internet as the teaching tools in the class. Meanwhile, the typical method is to turn off the LAN (Local Area Network) power in order to limit the student's access to the unallowable web sites. Our program has been developed on the Linux operating systems in the small network environment. The program includes following five functions: the translation function to change the domain name into the IP(Internet Protocol) address, the search function to find the active students' computers, the packet snoop to capture the ongoing packets and investigate their contents, the comparison function to compare the captured packet contents with the predefined access restriction IP address list, and the restriction function to limit the network access when the destination IP address is equal to the IP address in the access restriction list. Our program can capture all passing packets through the computer laboratory in real time and exactly. In addition, it provides teacher's computer screen with the all relation information of students' access to the unallowable sites. Thus, teacher can limit the student's unallowable access immediately. The proposed program can be applied to the small network of the elementary, junior and senior high school. Our research results make a contribution toward the effective class management and the efficient computer laboratory management. The related researches provides teacher with the packet observation and the access limitation for only one host, but our suggested program provides teacher with those for all active hosts.

Imaging Neuroreceptors in the Living Human Brain

  • Wagner Jr Henry N.;Dannals Robert F.;Frost J. James;Wong Dean F.;Ravert Hayden T.;Wilson Alan A.;Links Jonathan M.;Burns H. Donald;Kuhar Michael J.;Snyder Solomon H.
    • The Korean Journal of Nuclear Medicine
    • /
    • v.18 no.2
    • /
    • pp.17-23
    • /
    • 1984
  • For nearly a century it has been known that chemical activity accompanies mental activity, but only recently has it been possible to begin to examine its exact nature. Positron-emitting radioactive tracers have made it possible to study the chemistry of the human mind in health and disease, using chiefly cyclotron-produced radionuclides, carbon-11, fluorine-18 and oxygen-15. It is now well established that measurable increases in regional cerebral blood flow, glucose and oxygen metabolism accompany the mental functions of perception, cognition, emotion and motion. On May 25, 1983 the first imaging of a neuroreceptor in the human brain was accomplished with carbon-11 methyl spiperone, a ligand that binds preferentially to dopamine-2 receptors, 80% of which are located in the caudate nucleus and putamen. Quantitative imaging of serotonin-2, opiate, benzodiazapine and muscarinic cholinergic receptors has subsequently been accomplished. In studies of normal men and women, it has been found that dopamine and serotonin receptor activity decreases dramatically with age, such a decrease being more pronounced in men than in women and greater in the case of dopamine receptors than serotonin-2 receptors. Preliminary studies in patients with neuropsychiatric disorders suggests that dopamine-2 receptor activity is diminished in the caudate nucleus of patients with Huntington's disease. Positron tomography permits quantitative assay of picomolar quantities of neuro-receptors within the living human brain. Studies of patients with Parkinson's disease, Alzheimer's disease, depression, anxiety, schizophrenia, acute and chronic pain states and drug addiction are now in progress. The growth of any scientific field is based on a paradigm or set of ideas that the community of scientists accepts. The unifying principle of nuclear medicine is the tracer principle applied to the study of human disease. Nineteen hundred and sixty-three was a landmark year in which technetium-99m and the Anger camera combined to move the field from its latent stage into a second stage characterized by exponential growth within the framework of the paradigm. The third stage, characterized by gradually declining growth, began in 1973. Faced with competing advances, such as computed tomography and ultrasonography, proponents and participants in the field of nuclear medicine began to search for greener pastures or to pursue narrow sub-specialties. Research became characterized by refinements of existing techniques. In 1983 nuclear medicine experienced what could be a profound change. A new paradigm was born when it was demonstrated that, despite their extremely low chemical concentrations, in the picomolar range, it was possible to image and quantify the distribution of receptors in the human body. Thus, nuclear medicine was able to move beyond physiology into biochemistry and pharmacology. Fundamental to the science of pharmacology is the concept that many drugs and endogenous substances, such as neurotransmitters, react with specific macromolecules that mediate their pharmacologic actions. Such receptors are usually identified in the study of excised tissues, cells or cell membranes, or in autoradiographic studies in animals. The first imaging and quantification of a neuroreceptor in a living human being was performed on May 25, 1983 and reported in the September 23, 1983 issue of SCIENCE. The study involved the development and use of carbon-11 N-methyl spiperone (NMSP), a drug with a high affinity for dopamine receptors. Since then, studies of dopamine and serotonin receptors have been carried out in over 100 normal persons or patients with various neuropsychiatric disorders. Exactly one year later, the first imaging of opitate receptors in a living human being was performed [1].

  • PDF

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

The Differentially Expressed Genes by Radiotherapy in the Patients with Uterine Cervix Cancer (자궁경부암 환자에서 방사선치료 시 발현되는 유전자의 규명)

  • Seo Eun Young;Cho Moon-June;Lee Jeung Hoon;Lee Young-Sook;Na Myung-Hoon;Lee Woong-Hee;Kim Jun-Sang;Kim Jae-Sung
    • Radiation Oncology Journal
    • /
    • v.19 no.4
    • /
    • pp.389-396
    • /
    • 2001
  • Purpose : To detect differentially expressed genes in the patients with uterine cervical cancer during the radiation therapy. Materials and Methods : In patients with biopsy proven uterine cervical cancer, we took tumor tissue just before radiation therapy and at 40 minutes after external irradiation of 1.8 Gy. Total RNAs isolated from non-irradiated and irradiated tumor tissue samples were analyzed using the differential-display reverse transcription-polymerase chain reaction (DDRT-PCR). Complementary DNA (cDNA) fragments corresponding to differentially expressed messenger RNAs(mRNAs) were eluted, and cloned. The differential expression of the corresponding mRNAs was confirmed by reverse northern blot. Differentially expressed cDNA bands were sequenced. Nucleotide sequence data were analyzed in the Gene Bank and EMBL databases via the BLAST network sewer to identify homologies to known genes or cDNA fragments. Expression pattern of down-regulated clone was examined using RT-PCR in S patients undergoing radiotherapy. Results : We identified 18 differentially expressed bands by DDRT-PCR, which were eluted and cloned. There were 10 up-regulated clones and 1 down-regulated clone in reverse northern blot. One cDNA fragment had homology to chemokine receptor CXCR4, four were identified as Human ESTs in the EMBL database in EST clones. Down-regulated CxCa-11 was also down regulated in all patients. Conclusion : Using the DDRT-PCR, we have identified 10 up-regulated and 1 down-regulated clone(s) in the patients with uterine cervical cancer during the radiation therapy. The clinical relevance and the functions of these genes will be further investigated.

  • PDF