한국정보컨버전스학회:학술대회논문집
The Korea Society of Infomation Convergence
- Annual
- /
- 2005-0674(pISSN)
Domain
- Economics/Management > Management Information/e-Business
2008.06a
-
G protein-coupled receptor(GPCR) family is a cell membrane protein, and plays an important role in a signaling mechanism which transmits external signals through cell membranes into cells. Now, it is estimated that there may be about 800-1000 GPCRs in a human genome. But, GPCRs each are known to have various complex control mechanisms and very unique signaling mechanisms. GPCRs are involved in maintaining homeostasis of various human systems including an endocrine system or a neural system and thus, disorders in activity control of GPCRs are thought to be the major source of cardiovascular disorders, metabolic disorders, degenerative disorders, carcinogenesis and the like. As more than 60% of currently marketed therapeutic agents target GPCRs, the GPCR field has been actively explored in the pharmaceutical industry. Structural features, and class and subfamily of GPCRs are well known by function, and accordingly, the most fundamental work in studies identifying the previous GPCRs is to classify the GPCRs with given protein sequences. Studies for classifying previously identified GPCRs more easily with mathematical models have been mainly going on. Considering that secondary sequences of proteins, namely, secondary binding structures of amino acids constituting proteins are closely related to functions, the present paper does not place the focus on primary sequences of proteins as previously practiced, but instead, proposes a method to transform primary sequences into secondary structures and compare the secondary structures, and then detect an unknown GPCR assumed to have a same function in databases of previously identified GPCRs.
-
Centrality has been actively studied in network analysis field. In this paper we show a calculation method of closeness centrality for WSN. Since nodes in a sensor network are very scarce in energy and computation capability the calculation of the closeness is done in two tiers by dividing network into clusters. In first step closeness centrality for cluster heads is calculated. In the second step closeness of member nodes of the chosen cluster is computed in respect to that cluster itself.
-
A radio-frequency identification(RFID) tag is a small, inexpensive microchip that emits an identifier in response to a query from a nearby reader. The price of these tags promises to drop to the range of $0.05 per unit in the next several years, offering a viable and powerful replacement for barcodes. The challenge in providing security for low-cost RFID tags is that they are computationally weak devices, unable to perform even basic symmetric-key cryptographic operations. Security researchers often therefore assume that good privacy protection in RFID tags is unattainable. In this paper, we explore a notion of minimalist cryptography suitable for RFID tags. We consider the type of security obtainable in RFID devices with a small amount of rewritable memory, but very limited computing capability. Our aim is to show that standard cryptography is not necessary as a starting point for improving security of very weak RFID devices. Our contribution is threefold: 1. We propose a new formal security model for authentication and privacy in RFID tags. This model takes into account the natural computational limitations and the likely attack scenarios for RFID tags in real-world settings. It represents a useful divergence from standard cryptographic security modeling, and thus a new view of practical formalization of minimal security requirements for low-cost RFID-tag security. 2. We describe protocol that provably achieves the properties of authentication and privacy in RFID tags in our proposed model, and in a good practical sense. Our proposed protocol involves no computationally intensive cryptographic operations, and relatively little storage. 3. Of particular practical interest, we describe some reduced-functionality variants of our protocol. We show, for instance, how static pseudonyms may considerably enhance security against eavesdropping in low-cost RFID tags. Our most basic static-pseudonym proposals require virtually no increase in existing RFID tag resources.
-
This paper reports on the ACQA(Animated agent for Conversational Question Answering) project conducted at LIMSI. The aim is to design an expressive animated conversational agent(ACA) for conducting research along two main lines: 1/ perceptual experiments(eg perception of expressivity and 3D movements in both audio and visual channels): 2/ design of human-computer interfaces requiring head models at different resolutions and the integration of the talking head in virtual scenes. The target application of this expressive ACA is a real-time question and answer speech based system developed at LIMSI(RITEL). The architecture of the system is based on distributed modules exchanging messages through a network protocol. The main components of the system are: RITEL a question and answer system searching raw text, which is able to produce a text(the answer) and attitudinal information; this attitudinal information is then processed for delivering expressive tags; the text is converted into phoneme, viseme, and prosodic descriptions. Audio speech is generated by the LIMSI selection-concatenation text-to-speech engine. Visual speech is using MPEG4 keypoint-based animation, and is rendered in real-time by Virtual Choreographer (VirChor), a GPU-based 3D engine. Finally, visual and audio speech is played in a 3D audio and visual scene. The project also puts a lot of effort for realistic visual and audio 3D rendering. A new model of phoneme-dependant human radiation patterns is included in the speech synthesis system, so that the ACA can move in the virtual scene with realistic 3D visual and audio rendering.
-
When performing a project, the most important thing is building a result with planned quality within development period. Particularly, if the project is delayed or has no good quality in the case of the mobile game development project which is sensitive to the release time and quality, it is immediately connected to the failure of the project. Extreme Programming is a methodology that divides the development cycle into smaller units for reducing the risk factor of the project in which the development period is important. In this paper, we suggest the Expanded Extreme Programming for mobile game development environment in which the development period and quality are important
-
The authors, Tom Karygiannis of NIST, and Bernard Eydt, Greg Barber, Lynn Bunn, and Ted Phillips of Booz Allen Hamilton, wish to thank Steven Fick, Rick Korchak, Kate Remley, Jeff Guerrieri, Dylan Williams, Karen Scarfone, and Tim Grance of NIST, and Kenneth Waldrop and Beth Mallory of Booz Allen Hamilton. These individuals reviewed drafts of this document and contributed to its technical content. The authors would also like to express their thanks to several experts for their critical review and feedback on drafts of the publication. These experts include V.C. Kumar of Texas Instruments; Simson Garfinkel of the Naval Postgraduate School; Peter Sand of the Department of Homeland Security; Erika McCallister of MITRE; and several professionals supporting Automatic Identification Technology(AIT) program offices within the Department of Defense(DoD), especially Nicholas Tsougas, Fred Naigle, Vince Pontani, Jere Engelman, and Kathleen Smith. During the public comment period we received helpful comments from the following Federal Government agencies: the US Departments of Defense, Health and Human Services, Homeland Security, Labor, and State; the Office of the Director of National Intelligence; the Office of Management and Budget; and the General Services Administration. We also received several helpful contributions from commercial industry, including comments from EPCglobal, VeriSign, and Priway. Finally, the authors wish to thank the following individuals for their comments and assistance: Brian Tiplady, Daniel Bailey, Paul Dodd, Craig K. Harmon, William MacGregor, Ted Winograd, Russell Lange, Perry F. Wilson, John Pescatore, Ronald Dugger, Stephan Engberg, Morten Borup Harning, Matt Sexton, Brian Cute, Asterios Tsibertzopoulos, Mike Francis, Joshua Slob in, Jack Harris, and Judith Myerson.
-
The current middleware, managing the bridges equipped whit sensor networks on real-time basis, merely processes the data collected from the sensor networks, In this study, we develop a very versatile middleware which mediates between sensor nodes and exclusive applications or web browsers. It collects and processes the data from the network. On database failures, it stores the data in a file and sends them to the database at a proper speed considering the rate of the database system when the database is restored. Lastly, in order to notice abnormality of the bridge to the operators when some problems occur in the bridge, we propose a mechanism for producing alarm signals.
-
Rieback, Melanie R.;Gaydadjiev, Georgi N.;Crispo, Bruno;Hofman, Rutger F.H.;Tanenbaum, Andrew S. 75
This paper presents the design, implementation, and evaluation of the RFID Guardian, the first-ever unified platform for RFID security and privacy administration. The RFID Guardian resembles an "RFID firewall", enabling individuals to monitor and control access to their RFID tags by combining a standard-issue RFID reader with unique RFID tag emulation capabilities. Our system provides a platform for coordinated usage of RFID security mechanisms, offering fine-grained control over RFID-based auditing, key management, access control, and authentication capabilities. We have prototyped the RFID Guardian using off-the-shelf components, and our experience has shown that active mobile devices are a valuable tool for managing the security of RFID tags in a variety of applications, including protecting low-cost tags that are unable to regulate their own usage. -
This study analyzed the status and causes for the dropouts of college based on the survey conducted among 14,210 freshmen attending D College, other than the supernumerary special selection, from 2001 through 2005. A significant difference was shown in all items of general characteristics. The dropout rate of women, generally selected and general high school graduated were higher than for men, specially selected and special high school graduated, respectively. The most dropouts were due to Not Return(40.16%), followed by Unenrolled(32.98%), Voluntary Leave(26.05%) and Expelled(0.81%) in order. In the distribution of the central tendency values measured from the entire subjects. the high school records and the days of absence showed a positive skewness. while the college records showed a negative skewness with the data mostly around a higher grade. The standard deviation indicating that the dropouts got the scores higher than those of the continuing students demonstrated that there was relatively insignificant difference in scores between two groups.
-
In this letter, a novel wavelet-based semi-fragile watermarking scheme is presented which exploiting the time-frequency feature of chaotic map. We also analyze the robustness to mild modification and fragility to malicious attack of our scheme. Its application includes tamper detection, image verification and copyright protection of multimedia content. Simulation results show the scheme can detect and localize malicious attacks with high peak signal-to-noise ratio(PSNR), while tolerating certain degree of JPEG compression and channel additive white Gaussian noise(AWGN)
-
Mineralogical studies of ore and alteration minerals have been conducted for the Hugo Dummett porphyry copper deposit. The Hugo Dummett porphyry copper gold deposit is located in the South Gobi region, Mongolia and currently being explored. This deposit divided into the Cu-rich Hugo Dummett South and the Cu-Au-rich Hugo Dummett North deposits. The Hugo Dummett deposits contain 1.08% copper(1.16 billion tonnes in total) and 0.23 g/t gold(Oyunchimeg et al., 2006). Copper-gold mineralization at these deposit are centered on a high-grade copper(typically>2.5%) and gold(0.5-2 g/t) zone of intense quartz stockwork veining. The high grade copper and gold zone is mainly within the Late Devonian quartz monzodiorite intrusions and augite basalt, also locally occurs in dacitic rocks. Intense quartz veining forms a lens up to 100 m wide hosted by augite basalt and partly by quartz monzodiorite. Although many explorations have been carried out, only a few scientific works were done in the Oyu Tolgoi mining area. Therefore the nature of copper-gold mineralization and orgin of the deposit is not fully understood. Copper-gold mineralization in the Hugo Dummett deposits occurs in dominantly quartz monzodiorite and minor augite basalt, dacitic rocks and locally biotite granodiorite. Chalcopyrite, pyrite, bornite, molybdenite, tennantite, tetrahedrite, enargite, sphalerite, chalcocite, covellite, eugenite, galena and gold occur as main ore minerals in the Hugo Dummett North and South deposits. These sulfides occur as: (1) a vague vein-like trail 1-3cm long and 2-3 mm wide, (2) minute, discontinuous cracks within quartz(micron scales), and (3) irregular blebs/spots(micron scales)and (4) disseminated within the sericite and plagioclase, commonly concentrated in the quartz. Sulfide minerals commonly display as a replacement, intergrown and minor exsolution texture in the both of the Hugo Dummet deposits.
-
In this thesis, we describe a statistical method for 3D object detection. In this method, we decompose the 3D geometry of each object into a small number of viewpoints. For each viewpoint, we construct a decision rule that determines if the object is present at that specific orientation. Each decision rule uses the statistics of both object appearance and "non-object" visual appearance. We represent each set of statistics using a product of histograms. Each histogram represents the joint statistics of a subset of wavelet coefficients and their position on the object. Our approach is to use many such histograms representing a wide variety of visual attributes. Using this method, we have developed the first algorithm that can reliably detect faces that vary from frontal view to full profile view and the first algorithm that can reliably detect cars over a wide range of viewpoints.
-
In this paper we suggest two novel methods for an implementation of the spot detection phase in the 2-DE gel image analysis program. The one is the adaptive thresholding method for eliminating noises and the other is the asymmetric diffusion model for spot matching. Remained noises after the preprocessing phase cause the over-segmentation problem by the next segmentation phase. To identify and exclude the over-segmented background regions, il we use a fixed thresholding method that is choosing an intensity value for the threshold, the spots that are invisible by one's human eyes but mean very small amount proteins which have important role in the biological samples could be eliminated. Accordingly we suggest the adaptive thresholding method which comes from an idea that is got on statistical analysis for the prominences of the peaks. There are the Gaussian model and the diffusion model for the spot shape model. The diffusion model is the closer to the real spot shapes than the Gaussian model, but spots have very various and irregular shapes and especially asymmetric formation in x-coordinate and y-coordinate. The reason for irregularity of spot shape is that spots could not be diffused perfectly across gel medium because of the characteristics of 2-DE process. Accordingly we suggest the asymmetric diffusion model for modeling spot shapes. In this paper we present a brief explanation ol the two methods and experimental results.
-
If the management through the center server is unnecessary and JXTA is connected to a network, a communication with any kind of devices or some device is possible. And features that a communication with heterogeneous P2P systems is possible have. The important module of the designed Data exchange system an interworking between the P2P system which it is made we used API and the each other different protocol the possible data for replacement Data exchange system were designed this kind of a feature was to the utmost utilized may account for the XML Parser Component(XPC) which we use it parses the or about a request and the generated request, and the structure of the XML Making Component(XMC) which we use in generating the inappropriate a request and response.
-
One field that the information society has recently taken much interest in and has continuously implemented is medical services. Health tourism services which emphasize today's patient-oriented management rather than the past hospital-oriented management are highly value-added. As interest in physical fitness increases in keeping with such trends of the society at large as the declining birth rate and increasing life expectancy, and the medical market is opened, the added value of medical services that attract and manage domestic and foreign patients from the global market and satisfy their diverse desires with domestic medical competitiveness such as excellent medical staff and technology is on the spotlight. Hereupon, this study intends to suggest the possibility of developing competitive domestic medical services into a highly value-added industry in keeping with changing environment.
-
The aim this master thesis is to find out if is possible to Integrate haptic hardware support in the source 3D game engine Crystal Space. Integrating haptic support would make it possible to get a haptic representation of 3D geometry in Crystal Space and therefore take advantage of all the benefits a 3D game engine provides, when building haptic applications, An implementation of the support should be as low-cost as Possible by taking advantage of available source haptic API alternatives. The thesis report presents an evaluation of available haptic APIs and comes up with a design and an implementation. The solution has been implemented as a Crystal Space plugin by using modified parts of the e-Touch open module API. The plugin makes it possible to utilize the Phantom haptic device to touch and feel the 3D environments in a Crystal Space application. Two demo applications have also been constructed to show the capabilities of the plugin.
-
A Mobile Ad hoc NETwork(MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies. In the highly dynamic environment of MANET, energy efficiency is an important performance measure since it directly affects the network lifetime. The failure of energy severely impacts a communications system in crucial communications environments, such as disasters salvage. In this study, we propose a new packet switching routing that can increase the durability of the energy resource and therefore, the lifetime of the mobile nodes and MANET. The performance of the packet switching routing on the node-disjoint multipath and that of AODV are compared by NS2 simulation. The simulation results indicate that this new switching routing can extend the lifetime of a MANET.
-
Recently in the Mongolian wireless marketplace, many E-commerce companies have been making considerable investments in the technological development of M-commerce, taking competitive advantage of new business possibilities offered by Internet-based wireless technologies. In the Mongolian wireless marketplace, this new mobile environment opens the door for new and exciting market opportunities in mobile services and applications. In the near future, these companies will be looking toward M-commerce services as a supplemental source of revenue in the mobile marketplace. This paper examines the roles of M-commerce in the consumers' in order to promote the consumers' loyalty in the booming M-commerce. This paper contains theory that focuses on the basic concepts of the M-commerce environment, its wireless network technologies, and its applications infrastructure. Upon searching for references to assist us in establishing a market hypothesis, we discovered that few comprehensive studies on consumer perspective and behavior related to M-commerce services actually exist in the literature. In the area of M-commerce, many companies neglect the consumer perspective, concentrating only on technological factors only when formulating their market strategies. And, due to technological blindness, many companies were not able to succeed in end-user E-commerce services. Given that fact, this paper formulates a consumer-centric research model. In order to prove the research model, we chose the survey method which allows for the collection of large amounts of data from a sizeable population in a highly economical way. Through the survey, this paper defines consumer's attitudes towards M-commerce services by identifying potential Business-to-Commerce(B2C) applications and its primary target groups in terms of gender and age, and by investigating whether consumers recognize the value proposition of M-commerce applications and services. As shown in the data analysis and results, this research concludes that M-commerce development in Mongolia is still at its infancy, and that the implementation of M-commerce depends not only on technological progress, but also on consumer attitudes and their willingness to adopt M-commerce services. As well, other complex cross-cultural factors-socially, economically, culturally, et cetera-enter strongly into the equation.
-
According to the degree how the information communication, technology and various basic given conditions are working, most of all enterprises in 21 century are running utilizing information technology. Mongolia is also driving forward for the 2010 year goal and the information technological environment is fast developing in Mongolia. By the tendency of fast moving development of information and technological change will make a road to be possible implementing the Home-Shopping in Mongolia. To meet the changeable tendency and countermeasures of Mongolian environment, e-Business policies are necessary. In this paper I like to point out why the Mongolian enterprises should have keen interest on e-Business and on the ground of the necessity on it. I like to suggest some models for Mongolia.
-
This thesis explores the problem of reconstructing a three-dimensional(3D) scene given a set of images or image sequences of the scene. It describes efficient methods for the 3D reconstruction of static and dynamic scenes from stereo images, stereo image sequences, and images captured from multiple viewpoints. Novel methods for image-based and volumetric modelling approaches to 3D reconstruction are presented, with an emphasis on the development of efficient algorithm which produce high quality and accurate reconstructions. For image-based 3D reconstruction a novel energy minimisation scheme, Iterated Dynamic Programming, is presented for the efficient computation of strong local minima of discontinuity preserving energyy functions. Coupled with a novel morphological decomposition method and subregioning schemes for the efficient computation of a narrowband matching cost volume. the minimisation framework is applied to solve problems in stereo matching, stereo-temporal reconstruction, motion estimation, 2D image registration and 3D image registration. This thesis establishes Iterated Dynamic Programming as an efficient and effective energy minimisation scheme suitable for computer vision problems which involve finding correspondences across images. For 3D reconstruction from multiple view images with arbitrary camera placement, a novel volumetric modelling technique, Embedded Voxel Colouring, is presented that efficiently embeds all reconstructions of a 3D scene into a single output in a single scan of the volumetric space under exact visibility. An adaptive thresholding framework is also introduced for the computation of the optimal set of thresholds to obtain high quality 3D reconstructions. This thesis establishes the Embedded Voxel Colouring framework as a fast, efficient and effective method for 3D reconstruction from multiple view images.
-
The pursuit of efficiency is taken for granted in today's public administration, and the limit of this study exists in the point that we should carefully deal with combining the redundancy scheme to the public administration. Accordingly, although this study should suggest the specific plans and backgrounds of the needs for the redundancy, it will only find out the applicability of the redundancy to the public administration for its purpose. Redundancy means the excess or superfluity in something, which means the surplusage status ranging from the wasteful and excessive supplies, insignificant additions, to the surplusage in a legal pleading. The emphasis of this study is placed on the changes in the rigidity in believing that the removal of the redundancy from the public administration is the best option in any case of the efficiency. In addition, the necessity of the overlapped organization should not be neglected by the concept of the efficiency. Indeed, it is necessary to correct the overlapped function of superfluity and ambiguity public administration, in order to remove the neglect conflicts between the organizations, to guarantee the inconsistency in the public administration and to ensure the efficiency in the public administration volunteering.
-
We describe our success in defeating the security of an RFID device known as a Digital Signature Transponder(DST). Manufactured by Texas Instruments, DST(and variant) devices help secure millions of SpeedPassTM payment transponders and automobile ignition keys.
-
Among human body parts, the human face has been studied the most actively for the interlace between humans and computers because face has statistic consistency in color, shape and texture. Those characteristics make computers detect and track human faces in images robustly and accurately. The human face consists of eyes, nose, mouth, eyebrows and other features, Detecting and tracking each feature have been researched. The open mouth is the largest in size and the easiest to detect among them, In this study, we present a system which can move mouse pointer using the position and state of the mouth.
-
Surveillance Cameras such as CCTV easily found in places requiring security and the prevention of crimes such as public institutions, banks, etc. play an important role as they prevent all sorts of crimes, and provide a decisive clue fix settling a criminal case. But, in case that a far-off person is photographed, an original image should be enlarged to identify the person. And as for the technique of enlarging an image, it is important to enlarge and restore it close to its original image rather than to merely magnify it. For the enlargement and restoration of an image, techniques called interpolation are used; as for interpolation methods known hitherto, however, the higher the magnifying power is, the more deteriorated the quality of an image becomes to the extent that the image cannot be identified. Therefore, in this paper, we are going to propose a new technique whereby the face outline in an image is vectorized and restored by means of FDP(Facial Definition Parameter) standardized by the MPEG-4 SNHC FBA group, and an image is restored to have better quality than images restored with the existing interpolation.
-
This work was supported by the MIC(Ministry of Information and Communication), Korea, under the ITRC(Information Technology Research Center) support program supervised by the IITA(Institute of Information Technology Assessment) and Yonsei University Institute of TMS Information Technology, a Brain Korea 21 program, Korea. CAD Tools were supported by IDEC.
-
The developments of digital and multimedia have been increasing the demand of humans desiring the acquisition of real and intuitive information and diversified expressions and the use of animation characters are continually increasing in mass media. With the development of graphic techniques, these expressions of animation characters have become enabled of real and smooth representations. Although, in general, even fine movements of the hair of characters can be expressed using diverse data input devices, the studies on the multimedia technologies for disabled persons are quite insufficient. In this paper, Directness it extracts the data which it move sign language and It propose the method which creates a realty 3D sign language gesture.
-
SNP(Single Nucleotide Polymorphism) refers to the difference in a base pair existed in DNAs of individuals. Each of it appears per 1,000 bases in human genome and it enables each gene to defer in junctions, interacts with each other to make different shapes of humans, and produces different disease sensitivities. In this paper, we propose a system to forecast lung cancer sensitivities using SNP data related with the lung cancer. A lung cancer sensitivity forecasting model is also constructed through analysis of genetic and non-genetic factors for squamous cell carcinomas, adeno carcinomas, and small cell carcinomas that may frequently appear in Korean. The proposed system with the model gives the probabilities of the onset of lung cancers in the experimental subjects.
-
The JXTA was made in order to solve the problem of being generated with the computer platform suggested with the P2P(Peer-to-peer) method in the distributed computing. JXTA makes a communication between the various network and the devices is connected to a network which possible. It was designed to the client having the minimum computing ability could attend in the peer-to-peer network. However, for smoothly applying JXTA in the wireless environment, there is a limit with the limited resource of the Mobile Device. By using the Relay of the JXTA based for the Mobile Device, this paper implemented the P2P service which is flexibly effective in the wireless network environment.
-
Sensor nodes have various energy and computational constraints because of their inexpensive nature and ad-hoc method of deployment. Considerable research has been focused at overcoming these deficiencies through faster media accessing, more energy efficient routing, localization algorithms and system design. Our research attempts to provide a method of improvement MAC performance in these issues. We show that traditional carrier-sense multiple access(CSMA) protocols like IEEE 802.11 do not handle the first constraint adequately, and do not take advantage of the second property, leading to degraded latency and throughput as the network scales in size, We present more efficient method of a medium access for real-time wireless sensor networks. Proposed MAC protocol is a randomized CSMA protocol, but unlike previous legacy protocols, does not use a time-varying contention window from which a node randomly picks a transmission slot. To reduce the latency for the delivery of event reports, it carefully decides a fixed-size contention window, non-uniform probability distribution of transmitting in each slot within the window. We show that it can offer up to several times latency reduction compared to legacy of IEEE 802.11 as the size of the sensor network scales up to 256 nodes using widely used simulator ns-2. We, finally show that proposed MAC scheme comes close to meeting bounds on the best latency achievable by a decentralized CSMA-based MAC protocol for real-time wireless sensor networks which is sensitive to latency.
-
Contents application from contents development of web technical base and with the operation different environment information of the educational resources integration the importance and necessity of the management central chain e-Learning system will be able to operate are raising its head with base. Is the actual condition which develops the development process where but, the education application currently is not standardized in base. Approaches with an educational domain from the present paper consequently, and defines MDA(Model Driven Architecture) coats e-Learning System. Also uses a studying contents standard metadata and about the contents storage space analyzes and plans the core property which uses MDA automatic tools leads and under developing boil e-Learning System will be able to provide the contents which does in actual professor own necessity.