• Title/Summary/Keyword: source of information

Search Result 7,320, Processing Time 0.039 seconds

Underdetermined Blind Source Separation from Time-delayed Mixtures Based on Prior Information Exploitation

  • Zhang, Liangjun;Yang, Jie;Guo, Zhiqiang;Zhou, Yanwei
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.5
    • /
    • pp.2179-2188
    • /
    • 2015
  • Recently, many researches have been done to solve the challenging problem of Blind Source Separation (BSS) problems in the underdetermined cases, and the “Two-step” method is widely used, which estimates the mixing matrix first and then extracts the sources. To estimate the mixing matrix, conventional algorithms such as Single-Source-Points (SSPs) detection only exploits the sparsity of original signals. This paper proposes a new underdetermined mixing matrix estimation method for time-delayed mixtures based on the receiver prior exploitation. The prior information is extracted from the specific structure of the complex-valued mixing matrix, which is used to derive a special criterion to determine the SSPs. Moreover, after selecting the SSPs, Agglomerative Hierarchical Clustering (AHC) is used to automaticly cluster, suppress, and estimate all the elements of mixing matrix. Finally, a convex-model based subspace method is applied for signal separation. Simulation results show that the proposed algorithm can estimate the mixing matrix and extract the original source signals with higher accuracy especially in low SNR environments, and does not need the number of sources before hand, which is more reliable in the real non-cooperative environment.

A Tool for Signature-Based Identification of Safe Open-Source Functions Toward Efficient Malware Analysis (악성코드의 효율적인 분석을 위한 안전한 오픈소스 함수에 대한 시그니처 기반 식별 도구)

  • Lee, Seoksu;Yang, Jonghwan;Jung, Woosik;Kim, Yeongcheol;Cho, Eun-Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.4
    • /
    • pp.721-729
    • /
    • 2017
  • In order to take rapid action against malware, efficiency in malware analysis is essential. For instance, it would be helpful to identify and eliminate open-source function bodies or other safe portions out of the target binary codes. In this paper, we propose an tool to create open source dynamic link library files in Windows environment, extract signature information by opensource and compiler version, and compare open source function information to find suspicious function. In addition, the tool can save the information used in the comparison to the DB and use it later, reducing the analysis time overhead.

Angle-Based Virtual Source Location Representation for Spatial Audio Coding

  • Beack, Seung-Kwon;Seo, Jeong-Il;Moon, Han-Gil;Kang, Kyeong-Ok;Hahn, Min-Soo
    • ETRI Journal
    • /
    • v.28 no.2
    • /
    • pp.219-222
    • /
    • 2006
  • Virtual source location information (VSLI) has been newly utilized as a spatial cue for compact representation of multichannel audio. This information is represented as the azimuth of the virtual source vector. The superiority of VSLI is confirmed by comparison of the spectral distances, average bit rates, and subjective assessment with a conventional cue.

  • PDF

A Post-Purchase Satisfaction of Skin Care Cosmetics Depending on a Pre-Purchase Utilization of Information Sources among Consumers in Their 20s (20대 소비자의 기초화장품 구매 전 이용한 정보원천 활용도에 따른 구매 후 만족도)

  • Lee, Da Young;Lee, Seung Sin;Lee, Young Hee
    • Human Ecology Research
    • /
    • v.55 no.6
    • /
    • pp.593-607
    • /
    • 2017
  • Cosmetics market information is important due to advances in information communication technology and the growth of cosmetics market. This study analyzed the relationship between the pre-purchase utilization of information (commercial, neutral, personal and experiential) and the post-purchase satisfaction of skin care cosmetics, categorized as functionality, safety, economic feasibility, information reliability, purchase convenience, condition of purchase place, packaging/design of product and service. This study analyzed reliability, frequency, differences, correlation and regression analysis using SPSS ver. 24.0. The study results are summarized as follows. First, gender was a significant variable in the level of information source utilization. Women used commercial, neutral, and experiential information sources more actively than men. However, women had lower post-purchase satisfaction that could be understood through expectation disconfirmation theory. Women have very high expectations that can lower post-purchase satisfaction. Second, information source utilization can improve post-purchase satisfaction for cosmetics. The consumer post-purchase satisfact the lowest in the commercial information source; however, consumers were satisfied when the commercial informationinformation sourceenon and regre. Third, the consumeried itnformation sourceenon and regression analysis ial, neutral,source and reflected the characteristics of experiential goods. Therefore, companies should provide accurate commercial, personal and experiential information to increase consumervide accurate commercial, per as well as conduct experiential marketing.

Study on Adolescents′ Clothing Behavior, Purchase Evaluative Criteria, and Information Source According to the use of Internet (청소년의 인터넷 사용특성에 따른 의복행동, 구매 평가기준, 정보원에 대한 연구)

  • Jang Nam-Kyung;Ko Eun-Joo
    • Journal of the Korean Society of Costume
    • /
    • v.54 no.7
    • /
    • pp.15-26
    • /
    • 2004
  • The internet is one of the modern facilities that has been diffused very rapidly in recent years and tremendously influenced on our life. Although the adolescents are major users of internet, the literature in clothing and textile area has not addressed the relationships between adolescents' internet use and clothing behavior, The purpose of this study was to examine the differences of adolescents clothing behavior. purchase evaluative criteria, and information source according to the use of internet. Descriptive statistics, t test, Analysis of Variance (ANOVA), and Duncan test were employed to analyze the data collected from the convenience sample of 572 middle and high school students in Gyeongnam, Korea. The use of internet was partially related to the adolescents' clothing behaviors. purchase evaluative criteria. and information source. Also, it was observed that the frequency and purpose of fashion website tended to be related more than the amount and purpose of internet did. Marketing implications from the results were suggested.

The Effect of Influencer Information Source, Message Sidedness, Consumer Regulatory Focus on E-WOM Intentions about the Cosmetics Advertisements of Instagram (인플루언서 정보원천, 메시지 측면성, 소비자 조절초점이 인스타그램 화장품광고 온라인 구전의도에 미치는 효과)

  • Lim, Se-Won;Han, Sang-In;Hwang, Sun-Jin
    • Journal of Fashion Business
    • /
    • v.25 no.5
    • /
    • pp.149-162
    • /
    • 2021
  • Nowadays, the cosmetic and fashion industries are paying attention to influencer marketing on Instagram. In this study, we determined whether electronic word of mouth (e-WOM) communications were affected by the following parameters: the influencer's information source, message sidedness, and consumer's regulatory focus. The experimental design of this study is a three-way mixed ANOVA, which comprises of 2 (influencer information source: expert vs general consumer) × 2 (message sidedness: two-sided message vs one-sided message) × 2 (consumer regulatory focus: promotion focus vs prevention focus) structure. The data for this research study was obtained by distributing a questionnaire to 410 subjects. The participants were aged between 20 and 39 years and lived in Seoul and Gyeonggi areas. In total, the data of 396 subjects was analyzed with the help of SPSS 25.0 statistical program: frequency analysis, reliability analysis, t-test, three-way ANOVA, and simple main effect analysis were performed. The analysis results were as follows: First, influencer information sources and consumer regulatory focus exhibited a significant interaction with consumers' e-WOM intentions. Second, message sidedness and consumer's regulatory focus exhibited a significant interaction with e-WOM intentions. Third, influencer information source and message sidedness exhibited a significant interaction with consumers' e-WOM intentions. Based on these findings, the type of influencer's information source and the consumer's regulatory focus was taken into consideration while marketing cosmetics on Instagram. Moreover, influencer marketing strategies must be used to evaluate message sidedness. This would help us gauge the consumer's attitude towards advertisements.

A Novel Redundant Data Storage Algorithm Based on Minimum Spanning Tree and Quasi-randomized Matrix

  • Wang, Jun;Yi, Qiong;Chen, Yunfei;Wang, Yue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.1
    • /
    • pp.227-247
    • /
    • 2018
  • For intermittently connected wireless sensor networks deployed in hash environments, sensor nodes may fail due to internal or external reasons at any time. In the process of data collection and recovery, we need to speed up as much as possible so that all the sensory data can be restored by accessing as few survivors as possible. In this paper a novel redundant data storage algorithm based on minimum spanning tree and quasi-randomized matrix-QRNCDS is proposed. QRNCDS disseminates k source data packets to n sensor nodes in the network (n>k) according to the minimum spanning tree traversal mechanism. Every node stores only one encoded data packet in its storage which is the XOR result of the received source data packets in accordance with the quasi-randomized matrix theory. The algorithm adopts the minimum spanning tree traversal rule to reduce the complexity of the traversal message of the source packets. In order to solve the problem that some source packets cannot be restored if the random matrix is not full column rank, the semi-randomized network coding method is used in QRNCDS. Each source node only needs to store its own source data packet, and the storage nodes choose to receive or not. In the decoding phase, Gaussian Elimination and Belief Propagation are combined to improve the probability and efficiency of data decoding. As a result, part of the source data can be recovered in the case of semi-random matrix without full column rank. The simulation results show that QRNCDS has lower energy consumption, higher data collection efficiency, higher decoding efficiency, smaller data storage redundancy and larger network fault tolerance.

Data Source Management using weight table in u-GIS DSMS

  • Kim, Sang-Ki;Baek, Sung-Ha;Lee, Dong-Wook;Chung, Warn-Il;Kim, Gyoung-Bae;Bae, Hae-Young
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.2
    • /
    • pp.27-33
    • /
    • 2009
  • The emergences of GeoSensor and researches about GIS have promoted many researches of u-GIS. The disaster application coupled in the u-GIS can apply to monitor accident area and to prevent spread of accident. The application needs the u-GIS DSMS technique to acquire, to process GeoSensor data and to integrate them with GIS data. The u-GIS DSMS must process big and large-volume data stream such as spatial data and multimedia data. Due to the feature of the data stream, in u-GIS DSMS, query processing can be delayed. Moreover, as increasing the input rate of data in the area generating events, the network traffic is increased. To solve this problem, in this paper we describe TRIGGER ACTION clause in CQ on the u-GIS DSMS environment and proposes data source management. Data source weight table controls GES information and incoming data rate. It controls incoming data rate as increasing weight at GES of disaster area. Consequently, it can contribute query processing rate and accuracy

  • PDF

An Efficient Repository Model for Online Software Education

  • Lee, Won Joo;Baek, Yuncheol;Yang, Byung Seok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.21 no.12
    • /
    • pp.219-226
    • /
    • 2016
  • In this paper, we propose an efficient repository model for online software education. The software education of app development consists of 7 stages: coding & debugging, submit, collaboration, review, validate, deployment, certification. Proposed repository model supports all 7 stages efficiently. In the coding & debugging stage, the students repeat coding and debugging of source. In the submit stage, the output of previous process such as source codes, project, and videos, are uploaded to repository server. In the collaboration stage, other students or experts can optimize or upgrade version of source code, project, and videos stored in the repository. In the review stage, mentors can review and send feedbacks to students. In the validate stage, the specialists validate the source code, project, and the videos. In the deployment stage, the verified source code, project, and videos are deployed. In the certification stage, the source code, project, and the videos are evaluated to issue the certificate.

Optimal Packet Scheduling Algorithms for Token-Bucket Based Rate Control

  • Mehta Neerav Bipin;Karandikar Abhay
    • Journal of Communications and Networks
    • /
    • v.7 no.1
    • /
    • pp.65-75
    • /
    • 2005
  • In this paper, we consider a scenario in which the source has been offered QoS guarantees subject to token-bucket regulation. The rate of the source should be controlled such that it conforms to the token-bucket regulation, and also the distortion obtained is the minimum. We have developed an optimal scheduling algorithm for offline (like pre-recorded video) sources with convex distortion function and which can not tolerate any delay. This optimal offline algorithm has been extended for the real-time online source by predicting the number of packets that the source may send in future. The performance of the online scheduler is not substantially degraded as compared to that of the optimal offline scheduler. A sub-optimal offline algorithm has also been developed to reduce the computational complexity and it is shown to perform very well. We later consider the case where the source can tolerate a fixed amount of delay and derive optimal offline algorithm for such traffic source.