• Title/Summary/Keyword: 사용자 편리성

Search Result 1,198, Processing Time 0.029 seconds

Design and Implementation of a Clip-Based Video Retrieval System Supporting Internet Services (인터넷 서비스를 지원하는 클립 기반 비디오 검색 시스템의 설계 및 구현)

  • 양명섭;이윤채
    • Journal of Internet Computing and Services
    • /
    • v.2 no.1
    • /
    • pp.49-61
    • /
    • 2001
  • Internet has been becoming widely popular and making rapid progress and network technologies is showing extension in data transmission speeds. Rapid and convenient multimedia services supplied with high quality and high speed are being needed, This paper treats of the design and implement method of clip-based video retrieval system on the world-wide-web environments. The implemented system consists of the content-based indexing system supporting convenient services for video contents providers and the web-based retrieval system in order to make it easy and various information retrieval for users on the world-wide-web. Three important methods were used in the content-based indexing system. Key frame extracting method by dividing video data, clip file creation method by clustering related information and video database build method by using clip unit, In web-based retrieval system, retrieval method by using a key word, two dimension browsing method of key frame and real-time display method of the clip were used. As a result. the proposed methodologies showed a usefulness of video content providing. and provided an easy method for searching intented video content.

  • PDF

Development of The Flexible User-Friendly Real-Time Machine Vision Inspection System (사용자 중심의 유연한 실시간 머신비전 검사시스템 개발)

  • Cho, In-Sung;Lee, Ji-Hong;Oh, Sang-Jin
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.3
    • /
    • pp.42-50
    • /
    • 2008
  • We developed a visual inspection system for detecting defective products. Most existing inspection systems are designed to be dedicated to one product, which makes operator spend extra money and time to adopt other products. In this work, we propose a flexible visual inspection system that can inspect various products without any additional major job at a low-cost. The developed system contained image processing algorithm libraries and user-friendly graphic interface for adaptable image-based inspection system. We can find a proper threshold value using the proposed algorithm which uses correlation coefficient between a non-defective product and existing sample images of defective product. And We tested the performance of the proposed algorithm using Otsu's method. The proposed system is applied to a automated inspection line for cellular phone.

Development of a Smart Lamp Control Emotion Service using a Biological Algorithm (바이오리듬 분석을 통한 스마트조명 감성제어 서비스 개발)

  • Park, Hyebin;Park, Shinwoo;Cho, Hana;Yoon, Yongik
    • KIISE Transactions on Computing Practices
    • /
    • v.22 no.12
    • /
    • pp.687-692
    • /
    • 2016
  • The advent of Internet of Things(IoT) has increased the need for development of smart life based on Information and Communication Technology(ICT). By using IoT technology, we are able to control connected appliances using smart devices, such as smart phone. To support the smart life, there is a need to utilize emotion information for human behavior, based on both biorhythm and environment information. Research towards this goal suggests a smart lamp control system that has an effect on the human emotion. According to the PSI theory, the control system calculates the biorhythm with an algorithm that uses the human biorhythm, weather factors and walking amounts. The smart lamp works with the recommended color lights that can control the feelings and emotions of the user. Here, we will show the effect of physical and mental stability, health care, and accident prevention.

Design and Implementation of a Low-level Storage Manager for Efficient Storage and Retrieval of Multimedia Data in NOD Services (NoD서비스용 멀티미디어 데이터의 효율적인 저장 및 검색을 위한 하부저장 관리자의 설계 및 구현)

  • Jin, Ki-Sung;Jung, Jae-Wuk;Chang, Jae-Woo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1033-1043
    • /
    • 2000
  • Recently as the user request on NoD (News-on-Demand) is largely increasing, there are a lot of researches to fulfill it. However, because of short life-cycle of new video data and periodical change of video data depending on anchor, it is difficult to apply the conventional video storage techniques to NOD applications directly. For this, we design and implement low-level storage manager for efficient storage and retrieval of multimedia data in NOD Services. Our low-level storage manager not only efficiently sotres video stream dat of new video itself, but also handles its index information. It provides an inverted file method for efficient text-based retrieval and an X-tree index structure for high-dimensional feature vectors. In addition, our low-level storage manager provides some application program interfaces (APIs) for storing video objects itself and index information extracted from hierarchial new video and some APIs for retrieving video objects easily by using cursors. Finally, we implement our low-level storage manager based on SHORE (Scalable Heterogeneous Object REpository) storage system by sunig a standard C++ language under UNIX operating system.

  • PDF

A Threshold Ring Group Signature for Ubiquitous Electronic Commerce (유비쿼터스 전자거래를 위한 쓰레시홀드 링 그룹 서명)

  • Sung, Soon-Hwa
    • The KIPS Transactions:PartD
    • /
    • v.14D no.4 s.114
    • /
    • pp.373-380
    • /
    • 2007
  • Ubiquitous electronic commerce can offer anytime, anywhere access to network and exchange convenient informations between individual and group, or between group and group. To use secure ubiquitous electronic commerce, it is essential for users to have digital signature with the properties of integrity and authentication. The digital signature for ubiquitous networks is required neither a trusted group manager, nor a setup procedure, nor a revocation procedure etc. because ubiquitous networks can construct or deconstruct groups anytime, anwhere as occasion demands. Therefore, this paper proposes a threshold ring signature as digital signature for secure ubiquitous electronic commerce using the ring signature without forgery (integrity) and the (n,t) ring signature solving the problem cannot prove the fact which a message is signed by other signer. Thus the proposed threshold ring signature is ubiquitous group signature for the next generation.

An Inference Verification Tool based on a Context Information Ontology (상황 정보 온톨로지 기반 추론 검증 도구)

  • Kim, Mok-Ryun;Park, Young-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.6
    • /
    • pp.488-501
    • /
    • 2009
  • In ubiquitous environments, invisible devices and software are connected to one another to provide convenient services to users. In order to provide such services, we must have mobile devices that connect users and services. But such services are usually limited to those served on a single mobile device. To resolve the resource limitation problem of mobile devices, a nearby resource sharing research has been studied. Also, not only the nearby resource share but also a resource recommendation through context-based resource reasoning has been studied such as an UMO Project. The UMO Project share and manage the various context information for the personalization resource recommendation and reason based on current context information. Also, should verify resource inference rules for reliable the resource recommendation. But, to create various context information requires huge cost and time in actuality. Thus, we propose a inference verification tool called USim to resolve problem. The proposed inference verification tool provides convenient graphic user interfaces and it easily creates context information. The USim exactly verifies new inference rules through dynamic changes of context information.

Mepelyzer : Malicious App Identification Mechanism based on Method & Permission Similarity Analysis of Server-Side Polymorphic Mobile Apps (Mepelyzer : 서버 기반 다형상 모바일 앱에 대한 메소드 및 퍼미션 유사도 기반 악성앱 판별)

  • Lee, Han Seong;Lee, Hyung-Woo
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.3
    • /
    • pp.49-61
    • /
    • 2017
  • Recently, convenience and usability are increasing with the development and deployment of various mobile applications on the Android platform. However, important information stored in the smartphone is leaked to the outside without knowing the user since the malicious mobile application is continuously increasing. A variety of mobile vaccines have been developed for the Android platform to detect malicious apps. Recently discovered server-based polymorphic(SSP) malicious mobile apps include obfuscation techniques. Therefore, it is not easy to detect existing mobile vaccines because some other form of malicious app is newly created by using SSP mechanism. In this paper, we analyze the correlation between the similarity of the method in the DEX file constituting the core malicious code and the permission similarity measure through APK de-compiling process for the SSP malicious app. According to the analysis results of DEX method similarity and permission similarity, we could extract the characteristics of SSP malicious apps and found the difference that can be distinguished from the normal app.

전자금융 침해사고 예방 및 대응 강화 방안

  • Lee, Jung-Ho
    • Review of KIISC
    • /
    • v.18 no.5
    • /
    • pp.1-20
    • /
    • 2008
  • 편리한 금융거래 수단으로써 인터넷뱅킹을 포함한 전자금융 서비스가 생활화 되었으며 그 중요성 또한 갈수록 증가하고 있다. 이에 대한 부작용으로서 사용자의 실수나 금융기관, 쇼핑몰, 포털 등의 해킹을 통한 전자금융 접근매체의 유출, 비정상적인 지불결제나 인터넷뱅킹 이체 사고 등 침해사고 또한 함께 증가하고 있다. 금융권은 금융감독원을 중심으로 전자금융 종합보안 대책 수립(2005년) 및 전자금융거래법 시행(2007년) 등을 통해 고객 PC의 해킹방지를 위한 다양한 보안프로그램 제공 의무화, 보안등급에 따른 이체한도 차등화, 금융권 통합 OTP 인증체계 구축 등 전자금융 침해사고 예방을 위한 적극적인 노력을 기울여오고 있으나, 최근 들어 피싱/파밍 등 신종 사이버사기 기법이나 해외의 전문 해커에 의해 개발된 고도의 지능화된 해킹툴이 사용되어 보안프로그램을 무력화시킨 후 고객정보를 유출해가거나 일반 포털사이트, 웹하드, 웹메일 등의 해킹을 통해 인터넷 사이트에 등록된 고객의 인터넷뱅킹 접근 매체를 유출하여 인터넷뱅킹 침해 사고를 일으키는 등의 신종 침해사고를 완벽히 차단하지는 못하고 있어, 더욱 강력한 전자금융 침해사고 예방 통제 방안의 수립과 함께 침해사고 발생 시 원인 파악 및 범인 검거를 위한 역추적 시스템의 구축 등 기존 보안체계를 대폭 강화할 필요성이 발생하고 있다. 본 연구에서는 시중 은행의 인터넷뱅킹 침해사고 발생 현황 조사를 중심으로 최근 발생한 전자금융 침해사고의 추이분석, 침해사고 주요 원인과 기존 대응 체계의 현황, 한계점 등을 파악하였다. 그리고 전자금융 침해사고의 효과적인 예방 및 대응 강화 방안으로서 사용자 관점에서 공인인증서를 중심으로 한 전자금융 접근매체의 관리 강화 방안을 제안하였으며, 전자금융 서비스를 제공하는 금융 기관 관점에서 효과적인 전자금융거래 로깅 및 역추적 시스템의 구축 및 전체 금융기관과 감독기관 간의 유기적인 공조를 기반으로 한 침해사고 공동 대응체계의 구축 및 운영을 위한 시스템의 구성 방법, 운영 프로세스, 관련 법률의 검토 및 대응 방법 등을 제안하였다.

A Study on the Distribution of Overload in Academic Affairs Management System Using Replication Server (데이터 복제 서버를 이용한 학사 관리 시스템의 부하 분산에 관한 연구)

  • Han, Gwang-Rok;Lee, Seung-Won
    • The KIPS Transactions:PartD
    • /
    • v.8D no.5
    • /
    • pp.605-612
    • /
    • 2001
  • In order to solve the overload of academic affairs management system, we propose a method builds a distributed Replication server and uses this server with the present centralized system. Normal query transactions which are not required for data modification are composed of almost all DML sentences. So we construct the distributed replication servers according to the data characteristics and make them perform the query transaction without modification. In this way, we can simultaneously distribute users and data, and cut down processing time for every transaction. Also Replication server has the advantages of implemental efficiency and economical because it uses resources of present centralized system without and additional configurations. Usually, to distribute the overload of server, they can use way, Client-side overload distribution that user program get present overload status then can choose a less overloaded server, and the other way, Server-side overload distribution that make use of Application Layer Scheduling Technique and IP Layer Scheduling Technique. Our Replication server can reduce the overload of centralized system by eliminating or complementing those defects of overload distribution, referred to in the forehead.

  • PDF

A Survey of applying Fully Homomorphic Encryption in the Cloud system (클라우드 컴퓨팅 환경에서의 개인정보보호를 위한 완전 동형 암호 적용 방안 고찰)

  • Kim, Sehwan;Yoon, Hyunsoo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.941-949
    • /
    • 2014
  • Demands for cloud computing service rapidly increased along with the expansion of supplying smart devices. Interest in cloud system has led to the question whether it is really safe. Due to the nature of cloud system, cloud service provider can get a user's private information and disclose it. There is a large range of opinion on this issue and recently many researchers are looking into fully homomorphic encryption as a solution for this problem. Fully homomorphic encryption can permit arbitrary computation on encrypted data. Many security threats will disappear by using fully homomorphic encryption, because fully homomorphic encryption keeps the confidentiality. In this paper, we research possible security threats in cloud computing service and study on the application method of fully homomorphic encryption for cloud computing system.