• Title/Summary/Keyword: text-message

Search Result 298, Processing Time 0.026 seconds

AIS를 활용한 통합 자동안전정보 방송시스템 구축

  • Kim, Gwang-Il;Lee, Sang-Jae;Jeong, Jung-Sik;Park, Gye-Gak
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.11a
    • /
    • pp.91-93
    • /
    • 2011
  • 현재 VTS센터에서 사용되고 있는 항만자동안내방송시스템은 VHF음성통신을 기반으로 하고 있어 그 방송범위에 제약이 있다. 최근 AIS의 보급이 확대됨에 따라 AIS신호가 연안해역에서 약 100마일까지 송수신이 되고 있다. 이에 본 연구에서는 기존에 전국의 VTS에 설치되어 있는 VHF음성통신 항만자동안내방송시스템에 AIS TEXT MESSAGE기능을 통합 운영하여 연안해역까지 해상안전을 위한 자동안내방송을 확대하고자 함이 그 목적이다.

  • PDF

Cell Phone Addiction in Highschool Students and Its Predictors (고등학생의 휴대전화 중독과 예측 요인)

  • Koo, Hyun-Young
    • Child Health Nursing Research
    • /
    • v.16 no.3
    • /
    • pp.203-210
    • /
    • 2010
  • Purpose: This study was done to identify cell phone addiction in high school students and variables predicting this addiction. Methods: The participants were 469 adolescents from four high schools. Data were collected through self-report questionnaires, and analyzed using the SPSS program. Results: Of the high school students, 88.4% reported being average users, 7.5%, heavy users, and 4.1%, cell phone addicted. Cell phone addiction was significantly correlated with immediate self-control, self-efficacy, depression, and peer support. Predictors of cell phone addiction were the following: receiving text message on weekends, immediate self-control, main use (text message), minute per call on weekdays, listening to music, gender (female), monthly call charges, depression, person called (friends), and self-efficacy. These factors explained 39% of variance in cell phone addiction. Conclusion: The above findings indicate that cell phone addiction in high school students was influenced by gender, cell phone use, and psychological factors. Therefore the approach to effective cell phone addiction management for high school students is to consider these variables when developing programs for these students.

Comparison of following distance between young and old driver according to operation of navigation and sending text message during driving (운전 중 문자메시지 전송 및 내비게이션 조작에 따른 청.장년층 운전자의 차간거리 비교)

  • Yeon, Hong-Won;Lee, Ji-Na;Yun, Hui-Jeong;Kim, Hyeon-Ju;Lee, In-Hwa;Choe, Mi-Hyeon;Kim, Hyeong-Sik;Choe, Jin-Seung;Ji, Du-Hwan;Min, Byeong-Chan;Tak, Gye-Rae;Jeong, Sun-Cheol
    • Proceedings of the Korean Society for Emotion and Sensibility Conference
    • /
    • 2012.05a
    • /
    • pp.121-122
    • /
    • 2012
  • PDF

Factors influencing Cell Phone Addiction in Middle School Students by Gender (성별에 따른 중학생의 휴대전화 중독의 영향 요인)

  • Koo, Hyun Young
    • Korean Parent-Child Health Journal
    • /
    • v.15 no.2
    • /
    • pp.60-70
    • /
    • 2012
  • Purpose: This study was done to examine factors influencing cell phone addiction for middle school students by gender. Methods: The participants were 228 male students and 228 female students in two middle schools. Data were collected through self-report questionnaires, and analyzed using the SPSS/WIN 19.0 program. Results: Cell phone addictions of female students are higher than those of male students. Factors influencing cell phone addiction for male students were mimicry, sending text message on weekdays, immediate self-control, grade, syntony, and monthly call charge, explaining 42.2% of variance in cell phone addiction. Factors influencing cell phone addiction for female students were internet addiction, sending and receiving text message on weekends, immediate self-control, long-term self-control, use time, main use, syntony, and monthly call charge, explaining 46.8% of variance in cell phone addiction. Conclusion: The results indicated that cell phone addiction and its influencing factors differed by gender. Therefore the approach to effective cell phone addiction management program for middle school students should consider gender differences.

  • PDF

Improved Spam Filter via Handling of Text Embedded Image E-mail

  • Youn, Seongwook;Cho, Hyun-Chong
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.401-407
    • /
    • 2015
  • The increase of image spam, a kind of spam in which the text message is embedded into attached image to defeat spam filtering technique, is a major problem of the current e-mail system. For nearly a decade, content based filtering using text classification or machine learning has been a major trend of anti-spam filtering system. Recently, spammers try to defeat anti-spam filter by many techniques. Text embedding into attached image is one of them. We proposed an ontology spam filters. However, the proposed system handles only text e-mail and the percentage of attached images is increasing sharply. The contribution of the paper is that we add image e-mail handling capability into the anti-spam filtering system keeping the advantages of the previous text based spam e-mail filtering system. Also, the proposed system gives a low false negative value, which means that user's valuable e-mail is rarely regarded as a spam e-mail.

Smart Message Service Platform for Mobile Environment (모바일용 스마트 메시지 서비스 플랫폼)

  • Kim, Nam-Yun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.73-79
    • /
    • 2011
  • With increasing use of smartphone, users require a new message service to prevent security attack and provide integrated messages. Since smartphone uses data services such as 3G cell network and WiFi, it can provide reliable message transfer through various security policies. In addition, it can transfer various data collected using built-in camera and GPS. This paper proposes a smart message service platform which can provide security services such as authentication, confidentiality and integrity as well as transfer the integrated message including location, picture and text. To verity the functionality of the platform, this paper implements an iPhone app and message transfer server, and then shows the implementation results.

Traffic Signal Recognition System Based on Color and Time for Visually Impaired

  • P. Kamakshi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.4
    • /
    • pp.48-54
    • /
    • 2023
  • Nowadays, a blind man finds it very difficult to cross the roads. They should be very vigilant with every step they take. To resolve this problem, Convolutional Neural Networks(CNN) is a best method to analyse the data and automate the model without intervention of human being. In this work, a traffic signal recognition system is designed using CNN for the visually impaired. To provide a safe walking environment, a voice message is given according to light state and timer state at that instance. The developed model consists of two phases, in the first phase the CNN model is trained to classify different images captured from traffic signals. Common Objects in Context (COCO) labelled dataset is used, which includes images of different classes like traffic lights, bicycles, cars etc. The traffic light object will be detected using this labelled dataset with help of object detection model. The CNN model detects the color of the traffic light and timer displayed on the traffic image. In the second phase, from the detected color of the light and timer value a text message is generated and sent to the text-to-speech conversion model to make voice guidance for the blind person. The developed traffic light recognition model recognizes traffic light color and countdown timer displayed on the signal for safe signal crossing. The countdown timer displayed on the signal was not considered in existing models which is very useful. The proposed model has given accurate results in different scenarios when compared to other models.

Speech Recognition based Message Transmission System for the Hearing Impaired Persons (청각장애인을 위한 음성인식 기반 메시지 전송 시스템)

  • Kim, Sung-jin;Cho, Kyoung-woo;Oh, Chang-heon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.12
    • /
    • pp.1604-1610
    • /
    • 2018
  • The speech recognition service is used as an ancillary means of communication by converting and visualizing the speaker's voice into text to the hearing impaired persons. However, in open environments such as classrooms and conference rooms it is difficult to provide speech recognition service to many hearing impaired persons. For this, a method is needed to efficiently provide it according to the surrounding environment. In this paper, we propose a system that recognizes the speaker's voice and transmits the converted text to many hearing impaired persons as messages. The proposed system uses the MQTT protocol to deliver messages to many users at the same time. The end-to-end delay was measured to confirm the service delay of the proposed system according to the QoS level setting of the MQTT protocol. As a result of the measurement, the delay between the most reliable Qos level 2 and 0 is 111ms, confirming that it does not have a great influence on conversation recognition.

Using Highly Secure Data Encryption Method for Text File Cryptography

  • Abu-Faraj, Mua'ad M.;Alqadi, Ziad A.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.53-60
    • /
    • 2021
  • Many standard methods are used for secret text files and secrete short messages cryptography, these methods are efficient when the text to be encrypted is small, and the efficiency will rapidly decrease when increasing the text size, also these methods sometimes have a low level of security, this level will depend on the PK length and sometimes it may be hacked. In this paper, a new method will be introduced to improve the data protection level by using a changeable secrete speech file to generate PK. Highly Secure Data Encryption (HSDE) method will be implemented and tested for data quality levels to ensure that the HSDE destroys the data in the encryption phase, and recover the original data in the decryption phase. Some standard methods of data cryptography will be implemented; comparisons will be done to justify the enhancements provided by the proposed method.