• Title/Summary/Keyword: 그런지

Search Result 798, Processing Time 0.03 seconds

Rational Operation through International Case Studies on SO Operating Channel (직접사용채널의 해외사례 검토를 통한 합리적 운영 방안)

  • Kim, Hee-Kyung;Cha, Young-Ran
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.10
    • /
    • pp.93-107
    • /
    • 2011
  • SO and Satellite Broadcaster can operate SO Operating channel in Korea. However, the Broadcasting act does not specify the direction of what purpose the SO operating channel would be operated for. Accordingly, SO and Satellite Broadcaster do not operate SO operating channel or use it as profit channel when operating. In this respect, the cases of U.S. and Japan have been studied to determine how SO operating channel should be operated to make it desirable. In the U.S., it is being used in various ways such as profit channel, multi-access channel and access channel. In Japan, it is mainly focused on the role as local channel, being coordinated with local governments to form public opinion on local news and issues or to announce local events. In Korea, SO is operating local channel similar to the one in Japan rather than SO operating channel, while Satellite Broadcasting is operating SO operating channel mainly for its profits. As SO operating channel is operated on the basis of the broadcasters' expediency without clear stipulation in Korea, we will need to seek the plan to use it for public interests by discussing more the status and operation of SO operating channel.

Study on Difference in Perception of Shared Economy and Public Domain Works (공유 경제 및 공유저작물에 대한 인식 차이 연구)

  • Min, Jiae;Jeon, Seung Kyu
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.7
    • /
    • pp.532-540
    • /
    • 2016
  • With Recently in art and culture domains, there's rising controversy over shared economy and public domain works. The government is introducing institutional measures such as Gongumadang and KOGL(Korea Open Government License) program to expand the grounds for public domain works. In order to promote and facilitate the use of public domain works, it is imperative to understand how the providers who create and provide the public domain works, as well as the users, perceive shared economy and public domain works. However, preceding studies usually put emphasis on the meaning and significance of the shared economy and show limitation of not discussing providers' perception on shared economy and public domain works. Therefore, this study examines to see if there's a difference of perception between the consumers/users and the providers who owns the copyright of public domain work.

The Improvement Discussion of "Guns, Swords, Explosives, etc. Control Act" for the Promotion of Explosives Safety (화약류 안전관리 증진을 위한 "총포·도검·화약류 등 단속법"의 개선적 논의: 제·개정 연혁의 분석을 중심으로)

  • Lee, Sang Won;Kim, Jung Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.11
    • /
    • pp.396-403
    • /
    • 2013
  • Explosive substances requires much effort for safety management because of the basically risk. The risk of explosives is increasing actually explosives accidents and crimes have been occured repeatedly and explosives used IED(Improvised explosive device) or roadside bomb recently. South Korea's basic legislation on the management of explosives is "guns, swords, explosives control Act" was enacted in 1961 as many amendments have been made. However, the Act has increased complexity gradually because of the technical expertise of explosives such as the development of new techniques. This study examines the historical background of Korea's explosives management and considers enactment amendments and propose measures to improve of explosives management Act.

Detection and Blocking of a Face Area Using a Tracking Facility in Color Images (컬러 영상에서 추적 기능을 활용한 얼굴 영역 검출 및 차단)

  • Jang, Seok-Woo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.10
    • /
    • pp.454-460
    • /
    • 2020
  • In recent years, the rapid increases in video distribution and viewing over the Internet have increased the risk of personal information exposure. In this paper, a method is proposed to robustly identify areas in images where a person's privacy is compromised and simultaneously blocking the object area by blurring it while rapidly tracking it using a prediction algorithm. With this method, the target object area is accurately identified using artificial neural network-based learning. The detected object area is then tracked using a location prediction algorithm and is continuously blocked by blurring it. Experimental results show that the proposed method effectively blocks private areas in images by blurring them, while at the same time tracking the target objects about 2.5% more accurately than another existing method. The proposed blocking method is expected to be useful in many applications, such as protection of personal information, video security, object tracking, etc.

A Study on Virtual Fitting Model System for Internet Fashion Shopping Mall (인터넷 패션 쇼핑몰을 위한 가상 피팅 모델 시스템 연구)

  • Tak Myung-Ja;Kim Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.9
    • /
    • pp.1184-1195
    • /
    • 2006
  • The Internet has brought many changes in our daily lives. Now the recognition on the Internet fashion shopping matt has increased and it requires scientific and systematic research to understand the Internet fashion marketing system more correctly and to strengthen the marketing activity at the virtual space. A big shortcoming of an Internet fashion mall is that the consumers can't wear clothes themselves. Currently there is no system to cover the shortcoming, It would be nice if a 3D avata wears the clothes on behalf of a consumer after inputting the information of physical sizes of a consumer. The consumers can select many clothes, accessories and even the background. After establishing a complete virtual fashion shopping mall, the consumers who sue the Internet fashion shopping mall could wear the clothes at an online shop establishing an online shopping environment. It will be a sole way to ensure the trust of the consumers. This paper studies the read in reflection by PC camera and sample the edge detection. Virtual fitting system that wears virtual fitting model some clothes is establishment.

  • PDF

A New Bit-rate Converter for Considering Texture and Shape Information in MPEG4 (MPEG4에서의 텍스춰 및 모형정보를 고려한 새로운 비트율 변환기)

  • 이종배
    • Journal of Korea Multimedia Society
    • /
    • v.3 no.4
    • /
    • pp.333-338
    • /
    • 2000
  • MPEG2(or some situations, MPEG is mostly used to change the raw image into the compressed bitstreams for digital image processing. Also these bitsreams are stored in computer for several applications such as multimedia area. Transmission channels have various capacities according to the application area, and the bitstreams stored in computer should be converted in order not to exceed the capacities of a transmission channel. So the problem is how to convert compressed bitstreams of a given bit-rate into compressed bitstreams of other bit-rates. Such a specific transcoding problem in this paper is referred to as bit-rate conversion. Several researches have been done on bit-rate conversion for the bitstreams compressed by MPEG. But the existing schemes are not suitable fort MPEG4 applications because it needs to transmit shape information( which is not necessary for MPEG2) as well as texture information in MPEG4 system. So we propose a new bit-rate converter which considers both texture and shape information.

  • PDF

Modem Structure and PAPR Reduction Method for 4G Mobile Communication Service (4G 이동통신 서비스를 위한 모뎀 구조와 PAPR 감소기법)

  • Kim, Wan-Tae;Cho, Sung-Joon
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.2
    • /
    • pp.213-219
    • /
    • 2010
  • Recently, a multi-core system is studied for single terminal's operations on various service networks for mobile systems. Therefore, it is expected that mobile systems capable of supporting WCDMA, MC-CDMA, CDMA and WiBro would be developed. Mobile systems for supporting various service networks is able to be implemented on a single chipset via SoC(System one Chip) technology, thus a noble modem design proper for SoC technology is necessary. For high speed data transmission of 4G mobile communication services, OFDM scheme has to be applied. But, an OFDM signal consists of a number of independently modulated subcarriers, and superposition of these subcarriers cause a problem that can give a large PAPR. In this paper, a noble modem design for 4G mobile communication services and PAPR reduction method for solving the PAPR problem are proposed.

Stable and Easily Parallizable Cloth Animation Method (안정적이고 병렬화가 용이한 옷감 애니메이션 기법)

  • Kang Young-Min
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.5
    • /
    • pp.995-1001
    • /
    • 2005
  • Implicit Integration has become a standard approach to efficient cloth animation, and it guarantees the stability of the system so that large steps can be used. Therefore, it is regarded as the best method for the real-time or interactive animation of cloth. Since the implicit method was introduced for stable cloth animation, various cloth animation techniques based on the method have been proposed. It is now possible to generate the real-time animation of cloth model with thousands of mass-point in general PC environments. Although the implicit method guarantees the stability, the implementation of the implicit method is generally more difficult than that of the explicit method. Even worse, it is very difficult to parallelize the computation process of the implicit method. The cloth animation with implicit method can be formalized as a linear system solving. In this paper we propose an stable and efficient cloth animation techniques based on the implicit method. The proposed method can be easily parallelized. Self-collision is another important issue in cloth animation, we also propose an efficient self-collision avoidance techniques.

A Location Estimation Method Using TDOA Scheme in Vessel Environment (선박 환경에서 TDOA 기법에 의한 위치 추정 방법)

  • Kim, Beom-mu;Jeong, Min A;Lee, Seong Ro
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.8
    • /
    • pp.1934-1942
    • /
    • 2015
  • An estimation problem in the environment which GPS signals do not reach, should be solved by employing an indoor location estimation scheme. Location estimation schemes for indoor environments generally include the AOA, TOA, RSS, Fingerprint, and TDOA. For a ship environment where there exist many spaces enclosed by iron plates, the TDOA scheme is appropriate because location estimation is usually performed at a closed range. In this paper, we address the problem of estimating the location of a terminal under the ship environment. The problem of location estimation by using the TDOA is presented in detail, and then an algorithm for applying the estimation to the ship environment is proposed. Finally, the proposed algorithm of location estimation in a ship by the TDOA scheme is verified through simulations from three viewpoints.

Certified Key Management in Multi K-FIDO Device Environment (복수 K-FIDO 기기 환경에서의 인증키 관리)

  • Lee, Byoungcheon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.27 no.2
    • /
    • pp.293-303
    • /
    • 2017
  • FIDO(Fast IDentity Online) technology is expanding very rapidly which can replace traditional password-based authentication with biometrics technology[1,7]. FIDO provides convenient authentication with biometrics technology and secure key management with smart card technology, but it does not provide user identification, thus traditional user identification technology should be used before a FIDO device is registered to a FIDO server. K-FIDO[3] is an approach to implement FIDO and certificate-based authentication technology into a single device that user can utilize certificate-based authentication in initial registration of FIDO device to FIDO server. It is expected that very shortly users will own and use multiple K-FIDO devices. If we consider the traditional approach of copying single certificate to multiple devices or issuing independent certificate to each device, there will be many complex problems. In this paper we propose more secure and convenient key management technology in multiple K-FIDO device scenario using self-extended certification[4].