• Title/Summary/Keyword: 디지털 미디어 시스템

Search Result 1,070, Processing Time 0.028 seconds

An Interdisciplinary Approach to the Human/Posthuman Discourses Emerging From Cybernetics and Artificial Intelligence Technology (4차 산업혁명 시대의 사이버네틱스와 휴먼·포스트휴먼에 관한 인문학적 지평 연구)

  • Kim, Dong-Yoon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.836-848
    • /
    • 2019
  • This paper aims at providing a critical view over the cybernetics theory especially of first generation on which the artificial intelligence heavily depends nowadays. There has been a commonly accepted thought that the conception of artificial intelligence could not has been possible without being influenced by N. Wiener's cybernetic feedback based information system. Despite the founder of contemporary cybernetics' ethical concerns in order to avoid an increasing entropy phenomena(social violence, economic misery, wars) produced through a negative dynamics of the western modernity regarded as the most advanced form of humanism. In this civilizationally changing atmosphere, the newly born cybernetic technology was thus firmly believed as an antidote to these vices deeply rooted in humanism itself. But cybernetics has been turned out to be a self-organizing, self-controlling mechanical system that entails the possibility of telegraphing human brain (which are transformed into patterns) through the uploading of human brain neurons digitalized by the artificial intelligence embedded into computing technology. On this background emerges posthuman (or posthumanism) movement of which concepts have been theorized mainly by its ardent apostles like N. K. Hayles, Neil Bedington, Laurent Alexandre, Donna J. Haraway. The converging of NBIC Technologies leading to the opening of a much more digitalizing society has served as a catalyst to promote the posthuman representations and different narratives especially in the contemporary visual arts as well as in the study of humanities including philosophy and fictional literature. Once Bruno Latour wrote "Modernity is often defined in terms of humanism, either as a way of saluting the birth of 'man' or as a way of announcing his death. But this habit is itself modern, because it remains asymmetrical. It overlooks the simultaneous birth of 'nonhumaniy' - things, or objects, or beasts, - and the equally strange beginning of a crossed-out God, relegated to the sidelines."4) These highly suggestive ideas enable us to better understand what kind of human beings would emerge following the dazzlingly accelerating advancement of artificial intelligence technology. We wonder whether or not this newly born humankind would become essentially Homo Artificialis as a neuronal man stripping off his biological apparatus. However due to this unprecedented situation humans should deal with enormous challenges involving ethical, metaphysical, existential implications on their life.

Analysis of Metadata Standards of Record Management for Metadata Interoperability From the viewpoint of the Task model and 5W1H (메타데이터 상호운용성을 위한 기록관리 메타데이터 표준 분석 5W1H와 태스크 모델의 관점에서)

  • Baek, Jae-Eun;Sugimoto, Shigeo
    • The Korean Journal of Archival Studies
    • /
    • no.32
    • /
    • pp.127-176
    • /
    • 2012
  • Metadata is well recognized as one of the foundational factors in archiving and long-term preservation of digital resources. There are several metadata standards for records management, archives and preservation, e.g. ISAD(G), EAD, AGRkMs, PREMIS, and OAIS. Consideration is important in selecting appropriate metadata standards in order to design metadata schema that meet the requirements of a particular archival system. Interoperability of metadata with other systems should be considered in schema design. In our previous research, we have presented a feature analysis of metadata standards by identifying the primary resource lifecycle stages where each standard is applied. We have clarified that any single metadata standard cannot cover the whole records lifecycle for archiving and preservation. Through this feature analysis, we analyzed the features of metadata in the whole records lifecycle, and we clarified the relationships between the metadata standards and the stages of the lifecycle. In the previous study, more detailed analysis was left for future study. This paper proposes to analyze the metadata schemas from the viewpoint of tasks performed in the lifecycle. Metadata schemas are primarily defined to describe properties of a resource in accordance with the purposes of description, e.g. finding aids, records management, preservation and so forth. In other words, the metadata standards are resource- and purpose-centric, and the resource lifecycle is not explicitly reflected in the standards. There are no systematic methods for mapping between different metadata standards in accordance with the lifecycle. This paper proposes a method for mapping between metadata standards based on the tasks contained in the resource lifecycle. We first propose a Task Model to clarify tasks applied to resources in each stage of the lifecycle. This model is created as a task-centric model to identify features of metadata standards and to create mappings among elements of those standards. It is important to categorize the elements in order to limit the semantic scope of mapping among elements and decrease the number of combinations of elements for mapping. This paper proposes to use 5W1H (Who, What, Why, When, Where, How) model to categorize the elements. 5W1H categories are generally used for describing events, e.g. news articles. As performing a task on a resource causes an event and metadata elements are used in the event, we consider that the 5W1H categories are adequate to categorize the elements. By using these categories, we determine the features of every element of metadata standards which are AGLS, AGRkMS, PREMIS, EAD, OAIS and an attribute set extracted from DPC decision flow. Then, we perform the element mapping between the standards, and find the relationships between the standards. In this study, we defined a set of terms for each of 5W1H categories, which typically appear in the definition of an element, and used those terms to categorize the elements. For example, if the definition of an element includes the terms such as person and organization that mean a subject which contribute to create, modify a resource the element is categorized into the Who category. A single element can be categorized into one or more 5W1H categories. Thus, we categorized every element of the metadata standards using the 5W1H model, and then, we carried out mapping among the elements in each category. We conclude that the Task Model provides a new viewpoint for metadata schemas and is useful to help us understand the features of metadata standards for records management and archives. The 5W1H model, which is defined based on the Task Model, provides us a core set of categories to semantically classify metadata elements from the viewpoint of an event caused by a task.

A Performance Comparison of the Mobile Agent Model with the Client-Server Model under Security Conditions (보안 서비스를 고려한 이동 에이전트 모델과 클라이언트-서버 모델의 성능 비교)

  • Han, Seung-Wan;Jeong, Ki-Moon;Park, Seung-Bae;Lim, Hyeong-Seok
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.3
    • /
    • pp.286-298
    • /
    • 2002
  • The Remote Procedure Call(RPC) has been traditionally used for Inter Process Communication(IPC) among precesses in distributed computing environment. As distributed applications have been complicated more and more, the Mobile Agent paradigm for IPC is emerged. Because there are some paradigms for IPC, researches to evaluate and compare the performance of each paradigm are issued recently. But the performance models used in the previous research did not reflect real distributed computing environment correctly, because they did not consider the evacuation elements for providing security services. Since real distributed environment is open, it is very vulnerable to a variety of attacks. In order to execute applications securely in distributed computing environment, security services which protect applications and information against the attacks must be considered. In this paper, we evaluate and compare the performance of the Remote Procedure Call with that of the Mobile Agent in IPC paradigms. We examine security services to execute applications securely, and propose new performance models considering those services. We design performance models, which describe information retrieval system through N database services, using Petri Net. We compare the performance of two paradigms by assigning numerical values to parameters and measuring the execution time of two paradigms. In this paper, the comparison of two performance models with security services for secure communication shows the results that the execution time of the Remote Procedure Call performance model is sharply increased because of many communications with the high cryptography mechanism between hosts, and that the execution time of the Mobile Agent model is gradually increased because the Mobile Agent paradigm can reduce the quantity of the communications between hosts.

A study of next generation OpenCable systems for Ultra-High Definition television broadcasting (초 고화질 텔레비전 방송을 위한 차세대 오픈 케이블 방식에 대한 연구)

  • Cho, Chang-Yeon;Heo, Jun;Kim, Joon-Tae
    • Journal of Broadcast Engineering
    • /
    • v.14 no.2
    • /
    • pp.228-237
    • /
    • 2009
  • This paper examines the potential of Ultra-High Definition TV (UD-TV) broadcasting transmission systems beyond HD-TV over cable channel. Firstly, we analyze the trend of TOV(Threshold of Visibility) by extending the OpenCable (J.83 Annex B) system 256QAM which is the standard of Korean and American cable television transmission to 1024QAM, and realize that the OpenCable 1024QAM has nearly 30% higher data rate than 256QAM at the expense of impractically higher TOV (Threshold of Visibility). To achieve practical TOV, we control code rates of inner convolutional coder and replace turbo coder in forward error correction (FEC) part, thereby analyzing the best performance of the OpenCable systems having conventional FEC. In that result, it is necessary to modify conventional FEC of the OpenCable system to achieve under 31.5dB TOV. Moreover we study the potential of UD-TV transmission via two or more TV channels, so called channel bonding, through the Shannon capacity in 6MHz channel and the relationship with next generation A/V codec technologies.

Hardware-Software Cosynthesis of Multitask Multicore SoC with Real-Time Constraints (실시간 제약조건을 갖는 다중태스크 다중코어 SoC의 하드웨어-소프트웨어 통합합성)

  • Lee Choon-Seung;Ha Soon-Hoi
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.33 no.9
    • /
    • pp.592-607
    • /
    • 2006
  • This paper proposes a technique to select processors and hardware IPs and to map the tasks into the selected processing elements, aming to achieve high performance with minimal system cost when multitask applications with real-time constraints are run on a multicore SoC. Such technique is called to 'Hardware-Software Cosynthesis Technique'. A cosynthesis technique was already presented in our early work [1] where we divide the complex cosynthesis problem into three subproblems and conquer each subproblem separately: selection of appropriate processing components, mapping and scheduling of function blocks to the selected processing component, and schedulability analysis. Despite good features, our previous technique has a serious limitation that a task monopolizes the entire system resource to get the minimum schedule length. But in general we may obtain higher performance in multitask multicore system if independent multiple tasks are running concurrently on different processor cores. In this paper, we present two mapping techniques, task mapping avoidance technique(TMA) and task mapping pinning technique(TMP), which are applicable for general cases with diverse operating policies in a multicore environment. We could obtain significant performance improvement for a multimedia real-time application, multi-channel Digital Video Recorder system and for randomly generated multitask graphs obtained from the related works.

An Analysis of Optimal Sequences for the Detection of Wake-up Signal in Disaster-preventing Broadcast (재난방송용 대기모드 해제신호 검출을 위한 최적 부호 성능 분석)

  • Park, Hae Yong;Jo, Bonggyun;Kim, Heung Mook;Han, Dong Seog
    • Journal of Broadcast Engineering
    • /
    • v.19 no.4
    • /
    • pp.491-501
    • /
    • 2014
  • Recently, the need for disaster-preventing broadcast has increased gradually to cope with natural disaster like earthquake and tsunami causing enormous losses of both life and property. In disaster-preventing broadcast system, the wake-up signal is used to alert user terminal and switch the current state of channel to the emergency channel, which is for the fast and efficient delivery of emergency information. In this paper, we propose the detection method of wake-up signal for disaster-preventing broadcast systems. The wake-up signals for disaster-preventing broadcast should have a good auto-correlation property in low power and narrow-band conditions that does not affect the existing digital television (DTV) system. The suitability of the m-sequence and complementary code (CC) is analyzed for wake-up signals according to signal to noise ratio. A wake-up signal is proposed by combining the direct sequence spread spectrum (DSSS) technique and pseudo noise (PN) sequences such as Barker and Walsh-Hadamard codes. By using the proposed method, a higher detecting performance can be achieved by the spreading gain compared to the single long m-sequence and the Golay code.

Image Restoration using GAN (적대적 생성신경망을 이용한 손상된 이미지의 복원)

  • Moon, ChanKyoo;Uh, YoungJung;Byun, Hyeran
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.503-510
    • /
    • 2018
  • Restoring of damaged images is a fundamental problem that was attempted before digital image processing technology appeared. Various algorithms for reconstructing damaged images have been introduced. However, the results show inferior restoration results compared with manual restoration. Recent developments of DNN (Deep Neural Network) have introduced various studies that apply it to image restoration. However, if the wide area is damaged, it can not be solved by a general interpolation method. In this case, it is necessary to reconstruct the damaged area through contextual information of surrounding images. In this paper, we propose an image restoration network using a generative adversarial network (GAN). The proposed system consists of image generation network and discriminator network. The proposed network is verified through experiments that it is possible to recover not only the natural image but also the texture of the original image through the inference of the damaged area in restoring various types of images.

A Review of Graphical Interface Design Methods through Collaborative Teamwork (공동협력 관계를 통한 GUI디자인 방법적 고찰)

  • 황지연;서정운
    • Archives of design research
    • /
    • v.11 no.2
    • /
    • pp.191-200
    • /
    • 1998
  • In the "digitalized" world of new media, visual designer are increasingly enlarging their roles in desighing interaction products. However, the concepts and their methods of the interaction design have not been well established in the design community yet. The reason is attributed to the fact that designing interaction products requires two way communication between the products and final users. whereas traditional graphic design counts only on one way communication. This study emphasizes GUI design should aim at improving the usability of products which helps users quickly learn about the products and easily use them. The usability of GUI design significantly improved by securing logical rationality helps designers communicate and collaborate with program engineers and other product developers. To explain how designers can effectively communicate with program engineers and other product participants in the design process, a model of design collaboration is provided in this study. Based on the model, the study deals with the principles and methods of visual interaction, the formulation of specification system, testing design usability, and design evaluation. The study concludes that GUI designers must ensure logical rationality and the cognitive approach of visual language. Because it improves the usability of products. It also becomes an objective tool for communicating and collaborationg with engineers and the other participants in the design process.

  • PDF

A Study of Spreading code for Watermarking of TxID of ATSC-DTV (ATSC-DTV의 송신기 식별을 위한 워터마킹용 확산코드에 관한 연구)

  • Cha Jae-Sang;Choi Seong-Jin;Lee Seon-Hee;Lee Kwang-Jik;Lee Yong-Tae;Park Goo-Man
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.100-106
    • /
    • 2006
  • In this paper, we proposed a TxID(Transmitter Identification) system using ZCD (Zero Correlation Duration) code as interference-cancelled spread codes for single frequency network of ATSC terrestrial DTV broadcasting. ZCD codes are simply implemented and have ZCD characteristics. Then, Proposal system can fundamentally solve interference problems caused by ICI(Inter Code Interference) and MPI(Multi-Path Interference) which happens in TxID system using spread coding method. Also, those can cancel truncated error which happens at watermarking for TxID since those can remove its period. In this paper, we identified the availability of TxID system applying interference-cancelled ZCD codes by analyzing DER (Detection Error Rate) which is simulated in various interference environments such as AWGN, ICI, and MPI.

Implementation of Encoder and Decoder for MPEG-7 BiM (MPEG-7 BiM 부호화기 및 복호화기의 구현)

  • Yeom, Ji-Hyeon;Kim, Min-Je;Lee, Han-Kyu;Kim, Hyeok-Man
    • Journal of Broadcast Engineering
    • /
    • v.12 no.2
    • /
    • pp.159-176
    • /
    • 2007
  • In the paper, we implemented a software system that encodes XML instance documents conforming to a schema document according to the MPEG-7 BiM compression method, and decodes the encoded documents vice versa. We designed software structures of BiM encoder and decoder as class hierarchies, and then implemented the structures. The implemented BiM encoder shows a compression ratio of 9.44% on the average. The BiM encoder is a general-purpose XML compressor that can encode any instance documents conforming to a schema document described in XML Schema language including the MPEG-7 schema. The BiM encoder thus can be used in many application fields including digital broadcasting environment, where encoding XML instance documents is needed.