• Title/Summary/Keyword: 액세스 코드

Search Result 20, Processing Time 0.027 seconds

A Method to Express Audio Binary Files by Color QR Codes and Its Application (오디오 바이너리 파일을 컬러 QR코드로 표현하는 방법과 그 응용)

  • Lee, Choong Ho
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.19 no.2
    • /
    • pp.47-53
    • /
    • 2018
  • This paper proposes a method to express an MP3 audio file by a series of color QR codes which can be printed on the paper. Moreover, the method can compress the data considerably. Firstly, an MP3 file is divided into many small files which have maximum capacity of binary file of a QR code. Secondly, the multiple files are converted to multiple black-and-white QR codes. Lastly, every three QR codes are combined into color QR codes. When combining, each of three black-and-white QR codes are regarded as red, green, blue components respectively. In this method, the areas of a color QR code where two QR codes are overlapped are expressed by the colors Cyan, Magenta and Yellow. And the areas where three components are overlapped are expressed by white color. Contrarily, the areas that no components are overlapped are expressed by white color. Experimentation result shows that an MP3 file with 8.5MB the original MP3 files are compressed with the compression rate around 15.7. This method has the advantage that can be used in the environments that the internet access is impossible.

NACSIS, Bibliographic Control and Standardization (NACSIS, 서지 제어와 표준화)

  • Naito, Eisuke
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.24-39
    • /
    • 1990
  • Many factors play a role in designing the interface for bibliographic data entry system in response to the various needs. Among the major variables to be considered are planning, record format screen design, automatic generation of access points, error chocking, download from bibliographic databases, character codes, card catalog production, and use of authority data. This paper described with examples how these design considerations can be implemented in empirical system.

  • PDF

Interface Design for the Bibliographic Data Entry System (서지 데이터 입력 시스템의 인터페이스 설계에 관한 연구)

  • 최석두
    • Journal of the Korean Society for information Management
    • /
    • v.7 no.1
    • /
    • pp.40-58
    • /
    • 1990
  • Many factors playa role in designing the interface for bibliographic data entry system in response to the various needs. Among the major variables to be considered are planning, record format, screen design, automatic generation of access points, error checking, download from bibliographic databases, character codes, card catalog production, and use of authority data.This paper described with examples how these design considerations can be implemented in empirical system.

  • PDF

xDSL Evolution Strategy (xDSL 기술 발전전략)

  • Lee Jae-Jin;Kang Myung-Jin;Cha Young-Chul
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2003.08a
    • /
    • pp.117-119
    • /
    • 2003
  • xDSL은 국내에서 가장 보편적인 초고속 액세스기술로서 전송속도와 전송거리 측면에서 지속적인 발전을 거듭하고 있다. 그 발전방향은 크게 두 갈래로 나누어지는데 ADSL을 기반으로 한 차세대 ADSL과 VDSL이라는 새로운 기술이 그것이다. 현재 차세대 ADSL 분야에서는 ADSL2, ADSL2+ 및 ADSL2++ 등의 표준화가 활발히 진행되고 있으며, VDSL은 라인코드에 대한 열띤 경쟁이 벌어지고 있다. 본 고에서는 이와 같이 다양한 xDSL 기술에 대해 기술적 특성 및 표준화 동향을 알아보고 향후 전망 및 발전전략에 대해 살펴보았다. 국내의 경우 차세대 ADSL을 건너뛰고 이미 VDSL 서비스 단계에 진입했기 때문에 VDSL 기술에 대한 국내 기술기반을 조속히 확보해야 할 필요성이 매우 높다. 따라서 국제표준화 추세에 부합하는 신속한 VDSL 표준 마련이 필요하다.

  • PDF

Taming Vertex Data

  • Iain Cantlay
    • Digital Contents
    • /
    • no.11 s.126
    • /
    • pp.144-151
    • /
    • 2003
  • 문제점: 하위 수준 D3D 지원_ 버텍스 버퍼를 만들기 위해 코어 Direct3D(D3D)는 하위 수준의 메모리 관리만 지원한다. 버텍스 버퍼 데이터는 void* 포인터를 사용해 액세스 된다. 코어 D3D에서 하위 수준의 지원은 매우 적절하다. D3DX는 전체 메시 클래스로서 포함한 상위 수준도 지원한다. 이 상위 수준과 하위 수준 사이에는 아무 것도 없다. 하위 수준의 버텍스 버퍼(VB)를 사용하기 위해서는 먼저 버텍스데이터 구조를 만들고 크기에 맞는 VB를 만든 후 이를 데이터로 채우고(void* 포인터 배치) 마지막으로 필요한 버텍스 선언을 한다. 애플리케이션 코드는 D3D 없이도 스스로 일관성을 가져야 하며 몇몇 하위 수준 에러가 발생할 수도 있다. 기껏해야 에러는 실행하면서 D3D의 디버그 버전으로 잡아낼 수 있다. 최악의 경우, 애플리케이션 문제를 발생시킬 수 있는데 이럴 경우 종종 디버그가 어려울 수도 있다.

  • PDF

Ranging Performance Enhancement by Successive Interference Cancellation in Multiuser M-WiMAX System (다중 사용자 M-WiMAX 시스템에서 직렬 간섭 제거를 이용한 레인징 성능 향상 기법)

  • Kim, Jong-Hun;Chang, Kyung-Hi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12A
    • /
    • pp.998-1005
    • /
    • 2009
  • In the uplink of OFDMA (Orthogonal Frequency Division Multiple Access) based M-WiMAX(Mobile-Worldwide Interoperability for Microwave Access) system, linear phase shift is caused by signals transmitted from multiuser with different delay time and thus, MAI (Multiple Access Interference) occurs. MAI degrades the performance of ranging code detection and delay time estimation in the uplink. Therefore, in this paper, we propose ranging algorithm, applying SIC (Successive Interference Cancellation) to the conventional ranging algorithm, to minimize MAI and to improve ranging performance. The proposed ranging algorithm is verified through the Monte Carlo simulation, which shows the improved performance of ranging code detection and delay time estimation compared to the conventional algorithms. Through compared with random access of the 3GPP LTE, we can know limit of ranging performance.

Analysis on Spatial Sampling and Implementation for Primal Trees (Primal Tree의 공간 분할 샘플링 분석 및 구현)

  • Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.347-355
    • /
    • 2014
  • The general octree structure is common for various applications including computer graphics, geometry information analysis and query. Unfortunately, the general octree approach causes duplicated sample data and discrepancy between sampling and representation positions when applied to sample continuous spatial information, for example, signed distance fields. To address these issues, some researchers introduced the dual octree. In this paper, the weakness of the dual octree approach will be illustrated by focusing on the fact that the dual octree cannot access some specific continuous zones asymptotically. This paper shows that the primal tree presented by Lefebvre and Hoppe can solve all the problems above. Also, this paper presents a three-dimensional primal tree traversal algorithm based the Morton codes which will help to parallelize the primal tree method.

Privacy Amplification of Correlated Key Decryption over Public Channels (공개 채널을 통한 상관 키 분산 암호화의 프라이버시 증폭)

  • Lee, Sun-Yui;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.4
    • /
    • pp.73-78
    • /
    • 2018
  • In this paper, we consider a system where multiple sources are encrypted in separated nodes and sent through their respective public communication channels into a joint sink node. We are interested at the problem on protecting the security of an already existing system such above, which is found out to have correlated encryption keys. In particular, we focus on finding a solution without introducing additional secret keys and with minimal modification to minimize the cost and the risk of bringing down an already running system. We propose a solution under a security model where an eavesdropper obtains all ciphertexts, i.e., encrypted sources, by accessing available public communication channels. Our main technique is to use encoders of universal function to encode the ciphertexts before sending them to public communication channels.

Efficient Security Method Using Mobile Virtualization Technology And Trustzone of ARM (모바일 가상화 기술과 ARM의 Trustzone을 사용한 효율적인 보안 방법)

  • Choi, Hwi-Min;Jang, Chang-Bok;Kim, Joo-Man
    • Journal of Digital Convergence
    • /
    • v.12 no.10
    • /
    • pp.299-308
    • /
    • 2014
  • Today, a number of users using smartphone is very rapidly increasing by development of smartphone performance and providing various services. Also, they are using it for enjoying various services(cloud service, game, banking service, mobile office, etc.). today's mobile security solution is simply to detect malicious code or stay on the level of mobile device management. In particular, the services which use sensitive information, such as certificate, corporation document, personal credit card number, need the technology which are prevented from hacking and leaking it. Recently, interest of these mobile security problems are increasing, as the damage cases been occurred. To solve the problem, there is various security research such as mobile virtualization, ARM trustzone, GlobalPlatform for mobile device. Therefore, in this paper, I suggested efficient method that uses the mobile virtualization techniques of certification, security policy and access control, password/key management, safe storage, etc. and Trustzone of ARM for preventing information leakage and hacking.

Medical Information Dynamic Access System in Smart Mobile Environments (스마트 모바일 환경에서 의료정보 동적접근 시스템)

  • Jeong, Chang Won;Kim, Woo Hong;Yoon, Kwon Ha;Joo, Su Chong
    • Journal of Internet Computing and Services
    • /
    • v.16 no.1
    • /
    • pp.47-55
    • /
    • 2015
  • Recently, the environment of a hospital information system is a trend to combine various SMART technologies. Accordingly, various smart devices, such as a smart phone, Tablet PC is utilized in the medical information system. Also, these environments consist of various applications executing on heterogeneous sensors, devices, systems and networks. In these hospital information system environment, applying a security service by traditional access control method cause a problems. Most of the existing security system uses the access control list structure. It is only permitted access defined by an access control matrix such as client name, service object method name. The major problem with the static approach cannot quickly adapt to changed situations. Hence, we needs to new security mechanisms which provides more flexible and can be easily adapted to various environments with very different security requirements. In addition, for addressing the changing of service medical treatment of the patient, the researching is needed. In this paper, we suggest a dynamic approach to medical information systems in smart mobile environments. We focus on how to access medical information systems according to dynamic access control methods based on the existence of the hospital's information system environments. The physical environments consist of a mobile x-ray imaging devices, dedicated mobile/general smart devices, PACS, EMR server and authorization server. The software environment was developed based on the .Net Framework for synchronization and monitoring services based on mobile X-ray imaging equipment Windows7 OS. And dedicated a smart device application, we implemented a dynamic access services through JSP and Java SDK is based on the Android OS. PACS and mobile X-ray image devices in hospital, medical information between the dedicated smart devices are based on the DICOM medical image standard information. In addition, EMR information is based on H7. In order to providing dynamic access control service, we classify the context of the patients according to conditions of bio-information such as oxygen saturation, heart rate, BP and body temperature etc. It shows event trace diagrams which divided into two parts like general situation, emergency situation. And, we designed the dynamic approach of the medical care information by authentication method. The authentication Information are contained ID/PWD, the roles, position and working hours, emergency certification codes for emergency patients. General situations of dynamic access control method may have access to medical information by the value of the authentication information. In the case of an emergency, was to have access to medical information by an emergency code, without the authentication information. And, we constructed the medical information integration database scheme that is consist medical information, patient, medical staff and medical image information according to medical information standards.y Finally, we show the usefulness of the dynamic access application service based on the smart devices for execution results of the proposed system according to patient contexts such as general and emergency situation. Especially, the proposed systems are providing effective medical information services with smart devices in emergency situation by dynamic access control methods. As results, we expect the proposed systems to be useful for u-hospital information systems and services.