• Title/Summary/Keyword: 네트워크적 영역성

Search Result 628, Processing Time 0.026 seconds

멀티미디어 기술 기반 방송제작 체계

  • 김경수
    • Communications of the Korean Institute of Information Scientists and Engineers
    • /
    • v.20 no.5
    • /
    • pp.10-16
    • /
    • 2002
  • 디지털 기술의 급속한 발전에 의한 디지털 방송의 도입은 방송환경에 커다란 변혁을 초래하고 있다. 기술의 발전은 방송, 통신, 컴퓨터를 융합시킨 새로운 미디어 서비스를 등장시키고 있으며, 이러한 미디어의 융합은 지금까지 독자적인 영역에서 발전하여 오던 각각의 미디어들이 가지고 있는 한계성 또는 단점을 상호보완적으로 개선함으로써 서비스 능력을 대폭적으로 향상시키는 방향으로 전개되고 있다. 이와같은 디지털 시대의 대변혁은 멀티미디어 서비스를 그 중심축으로 하고 있으며, 이른바 방송통신 융합시대의 경쟁력 있는 서비스를 도입하기 위한 미디어간, 국가간의 경계영역을 초월한 글로벌 경쟁체제가 급속히 진전되어 가고 있다. 이와 같은 미디어의 융합 현상에 따라 제작 환경도 새로운 디지털 방송 서비스를 효율적으로 지원하도록 전환되어야 한다. 디지털 방송의 특징인 고품질 및 다채널 시대를 맞아 방송 콘텐츠의 재활용도를 높이는 것은 매우 중요하며, 데이터 방송, 인터넷 방송 등 다양한 기능의 서비스를 도입하기 위해선 제작 체계의 개선이 뒷받침되어야 한다. 따라서 본 논문에서는 새로운 제작 환경에 대해서 살펴보고자 한다. 특히, 컴퓨터 기반의 제작 환경 구축에 핵심 요소인 넌리니어 편집시스템과 방송 콘텐츠를 효율적으로 관리하고 재활용할 수 있는 디지털 아카이브에 대해 소개하고자 한다. 테이프 대신 하드디스크를 기록 매체로 하는 넌리니어(non-linear) 시스템의 등장에 따라 방송 프로그램 제작에 대한 새로운 개념의 정립이 필요하게 되었으며, 이를 근간으로 하는 새로운 프로그램 제작환경, 즉 네트워크에 의해 컴퓨터와 데이터베이스를 연결하여 제작으로부터 송출가지 통합관리가 가능한 새로운 방송 프로그램 제작환경, 이른바 멀티미디어 제작환경을 구축하는 것이 디지털 방송 시대의 방송 사업자에게 가장 중요한 과제중의 하나가 되었다. 멀티미디어 제작환경을 구축함으로써 영상, 음성 및 다양한 부가 데이터를 포함하는 멀티미디어 프로그램을 편리하게 제작할 수 있으며, 데이터베이스로부터 필요한 영상 이미지를 자유롭게 합성, 조작하는 등, 매우 다양하고 편리한 제작기법을 활용할 수 있다. 또한 멀티미디어를 응용한 제작 분야로서 컴퓨터 그래픽스 기술은 방송의 사전제작에 커다란 기여를 하고 있으며, 이미 선거방송을 비롯한 여러가지 프로그램은 가상스튜디오와 가상캐릭터 기술을 활용하여 제작하고 있다. 방송사업자는 이러한 멀티미디어 제작시스템을 근간으로 영상검색, 영상 합성, 스크립트 편집, 가상현실 응용 등 고도의 제작 기법을 활용함으로써 사용자 친화성, 다이나믹한 표현, 실시간, 대화성을 특징으로 하는 다양한 멀티미디어 서비스를 시청자에게 제공할 수 있을 것이다.

Blurred Image Enhancement Techniques Using Stack-Attention (Stack-Attention을 이용한 흐릿한 영상 강화 기법)

  • Park Chae Rim;Lee Kwang Ill;Cho Seok Je
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.2
    • /
    • pp.83-90
    • /
    • 2023
  • Blurred image is an important factor in lowering image recognition rates in Computer vision. This mainly occurs when the camera is unstablely out of focus or the object in the scene moves quickly during the exposure time. Blurred images greatly degrade visual quality, weakening visibility, and this phenomenon occurs frequently despite the continuous development digital camera technology. In this paper, it replace the modified building module based on the Deep multi-patch neural network designed with convolution neural networks to capture details of input images and Attention techniques to focus on objects in blurred images in many ways and strengthen the image. It measures and assigns each weight at different scales to differentiate the blurring of change and restores from rough to fine levels of the image to adjust both global and local region sequentially. Through this method, it show excellent results that recover degraded image quality, extract efficient object detection and features, and complement color constancy.

M2M Technology based Global Heathcare Platform (M2M 기반의 글로벌 헬스케어 시스템 플랫폼)

  • Jung, Sang-Joong;Chung, Wan-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.11
    • /
    • pp.2435-2441
    • /
    • 2010
  • A global healthcare system based on M2M technology is proposed to support a good mobility, flexibility and scalability to the patients in 6LoWPAN. Sensor nodes integrated with wearable sensors are linked to gateway with IEEE 802.15.4 protocol and 6LoWPAN protocol for data acquisition and transmission purpose via external network. In the server, heart rate variability signals are obtained by signal processing and used for time and frequency domain performance analysis to evaluate the patient's health status. Our approach for global healthcare system with non-invasive and continuous IP-based communication is managed to process large amount of biomedical signals in the large scale of service range accurately.

An Analysis of Industrial Security Curriculums in Colleges (국내 산업보안학과의 교과과정 분석: 교육 영역과 과목별 분류를 중심으로)

  • Jung, Jinhyo;Lee, Chang-Moo
    • The Journal of Society for e-Business Studies
    • /
    • v.24 no.2
    • /
    • pp.29-53
    • /
    • 2019
  • Of all the 55 security departments in colleges, the information security departments occupies the majority of 45. Though existing security focused too much on information security, a new research stream on industrial security from a perspective of convergence has emerged. Since the first department of industrial security was established in a college in 2014, the total of four departments have been established until 2018. A new discipline to solve the existing problems and an opportunity to cultivate industrial security professionals have been greatly appreciated; however, the definition of industrial security is not yet specific, and more discussions on education categories and subjects with a focus on the characteristics of convergence are needed. The demand for industrial security professionals has gradually increasing and the departments of industrial security have been established to meet the demand. It is necessary, in this circumstance, to find out how the industrial security departments are teaching students. To this end, the purpose of this article is to deliver an overview of the educational curriculums of the four industrial security departments. This study analyzed 127 subjects in the curriculums, categorized educational areas, and employed Social Network Analysis to understand the relationships between subjects of each departments.

Recent Ecological Asset Research Trends using Keyword Network Analysis (키워드 네트워크 분석을 활용한 생태자산 연구 경향 분석)

  • Kim, Byeori;Lee, Jae-Hyuck;Kwon, Hyuksoo
    • Journal of Environmental Impact Assessment
    • /
    • v.26 no.5
    • /
    • pp.303-314
    • /
    • 2017
  • The purpose of this study was to determine domestic and foreign ecological asset research trends. We aimed to understand ecological assets research directions and trends by comprehensively analyzing 12 keywords, including those similar to keywords for comparable assets, to identify related fields and regions. Extensive analysis of domestic and foreign studies was conducted through keyword network analysis of textural information. This approach is helpful for understanding the flow of information and identifying research directions. Foreign studies based on sustainability were connected with 'Economic assessment', 'Management' and 'Policy' areas. It was difficult to determine domestic research trends because there are fewer domestic studies than foreign. There were studies that sought to identify economic value of developing regions. This research can be used to guide the research direction for future ecosystem asset analysis in Korea.

CooRP: A Cooperative Routing Protocol in Mobile Ad-hoc Wireless Sensor Networks (CooRP: 모바일 Ad-hoc 무선 센서 네트워크에서 협력 라우팅 프로토콜)

  • An, Beong-Ku;Lee, Joo-Sang;Kim, Nam-Soo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.48 no.6
    • /
    • pp.25-34
    • /
    • 2011
  • In this paper, In this paper, we propose a Cooperative Routing Protocol (CooRP) for supporting network convergence and transmission services efficiently in mobile ad-hoc wireless sensor networks with Rayleigh fading environments. The main contributions and features of this paper are as follows. First, the routing routes are decided on route stability based on entropy concepts using mobility of nodes within the direction guided line region to increase the operational lifetime of routes as well as reduce control overhead for route construction. Second, a cooperative data transmission strategy based on the constructed stable routing route is used to increase packet delivery ratio with advanced SNR. Third, a theoretical analysis for cooperative data transmission of the proposed CooRP with outage probability is presented. The performance evaluation of the proposed CooRP is performed via simulation using OPNET and analysis. The results of performance evaluation show that the proposed CooRP by using stable routing routes and cooperative transmission can increase packet delivery ratio efficiently.

Time Synchronization Technique for GNSS Jamming Monitoring Network System (GNSS 재밍 신호 모니터링 네트워크 시스템을 위한 독립된 GNSS 수신기 간 시각 동기화 기법)

  • Jin, Gwon gyu;Song, Young jin;Won, Jong hoon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.20 no.3
    • /
    • pp.74-85
    • /
    • 2021
  • Global Navigation Satellite System (GNSS) receivers are intrinsically vulnerable to radio frequency jamming signals due to the fundamental property of radio navigation systems. A GNSS jamming monitoring system that is capable of jamming detection, classification and localization is essential for infrastructure for autonomous driving systems. For these 3 functionalities, a GNSS jamming monitoring network consisting of a multiple of low-cost GNSS receivers distributed in a certain area is needed, and the precise time synchronizaion between multiple independent GNSS receivers in the network is an essential element. This paper presents a precise time synchronization method based on the direct use of Time Difference of Arrival (TDOA) technique in signal domain. A block interpolation method is additionally incorporated into the method in order to maintain the precision of time synchronization even with the relatively low sampling rate of the received signals for computational efficiency. The feasibility of the proposed approach is verified in the numerical simualtions.

A Feasibility Study on Opportunistic Interference Alignment: Improved Energy Efficiency via Power Control (기회적 간섭 정렬의 실현 가능성 연구: 전력 제어를 통한 에너지 효율성 개선)

  • Shin, Won-Yong;Yoon, Jangho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1077-1083
    • /
    • 2015
  • In this paper, we introduce an energy-efficient opportunistic interference alignment (OIA) scheme that greatly improves the sum-rates in multi-cell uplink networks. Each user employs optimal transmit vector design and power control in the sense of minimizing the amount of generated interference to other-cell base stations while satisfying a required signal quality. As our main result, it is shown that owing to the reduced interference level, the proposed OIA schemes attains larger sum-rates than those of OIA with no power control for almost all signal-to-noise ratio regions. In addition, when both zero-forcing and minimum mean square error (MMSE) detectors are employed at the receiver along with the OIA scheme, it is shown that the OIA scheme with MMSE detection shows superior performance.

Geomulticast: Location based Multicast Routing Protocol using Route Stability in Mobile Ad-hoc Wireless Networks (지오멀티캐스트: 모바일 Ad-hoc 무선 네트워크에서 경로 안정성을 이용한 위치기반 멀티캐스트 라우팅 프로토콜)

  • Ha, Sue Hyung;Le, The Dung;An, Beongku
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.7
    • /
    • pp.191-201
    • /
    • 2013
  • In this paper, we propose a location based multicast routing protocol, called Geomulticast, in mobile ad-hoc wireless networks. The main features and contributions of the proposed geomulticast are as follows. First, support data transmission to only the specific mobile nodes within a target area. Second, establish stable routing route by using mobility information of nodes. Third, reduce control overhead, power for construction of routing route by using geomulticast guided line information. Fourth, present a theoretical model for establishing stable route. The performance evaluation of the proposed geomulticast is executed by using OPNET simulation and theoretical analysis, and the results of simulation and theoretical analysis have similar patterns. And we can see that data packets are efficiently transmitted to specific user groups within a specific area.

Design of a Strong Authentication Mechanism using Public-Key based on Kerberos (공개키를 이용한 커버로스 기반의 강력한 인증 메커니즘 설계)

  • 김은환;전문석
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.4
    • /
    • pp.67-76
    • /
    • 2002
  • Kerberos is designed to provide strong authentication between client and application servers which are working in distributed network environment by using symmetric-key cryptography, and supposed to trust other systems of the realm. In this paper, we design an efficient and strong authentication mechanism by introducing the public/private-key to Kerberos. In the mechanism to make a system more secure, the value of the session key is changed everytime using MAC(message authentication code) algorithm with the long-term key for user-authentication and a random number exchanged through the public key. Also, we employ a mutual authentication method, which is used on challenge-response mechanism based on digital signatures, to improve trust between realms, and present a way of reducing the number of keys by simplifying authentication steps.