• Title/Summary/Keyword: 양방향 통신

Search Result 735, Processing Time 0.022 seconds

Video Highlight Prediction Using Multiple Time-Interval Information of Chat and Audio (채팅과 오디오의 다중 시구간 정보를 이용한 영상의 하이라이트 예측)

  • Kim, Eunyul;Lee, Gyemin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.553-563
    • /
    • 2019
  • As the number of videos uploaded on live streaming platforms rapidly increases, the demand for providing highlight videos is increasing to promote viewer experiences. In this paper, we present novel methods for predicting highlights using chat logs and audio data in videos. The proposed models employ bi-directional LSTMs to understand the contextual flow of a video. We also propose to use the features over various time-intervals to understand the mid-to-long term flows. The proposed Our methods are demonstrated on e-Sports and baseball videos collected from personal broadcasting platforms such as Twitch and Kakao TV. The results show that the information from multiple time-intervals is useful in predicting video highlights.

Implementation of Illegal Entry Detection System using Sensor Node and Image Processing (센서 노드와 영상처리 기법을 이용한 불법 침입 감지 시스템 구현)

  • Kim, Kyung-Jong;Jung, Se-Hoon;Sim, Chun-Bo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.741-744
    • /
    • 2009
  • In this paper, we design and implement an illegal entry detection system which efficiently can detect illegal intruders applying image processing technique on the perceived value of the infrared sensor and acquired image from two-way wireless camera(DRC) for prevention of damage caused by theft and the ratio of security in the security of the square such as livestock, agricultural products, and logistics warehouse. At first, the proposed system acquires the image from wireless camera when infrared sensor detect the location of illegal intruders. and then, the system process to determine movement by applying image process technique with acquired image. Finally, we send the detected and analyzed the results and the final image to security company and mobile device of owner.

  • PDF

Hash chain based Group Key Management Mechanism for Smart Grid Environments (스마트그리드 환경에 적용 가능한 해쉬체인 기반의 그룹키 관리 메커니즘)

  • Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.149-160
    • /
    • 2011
  • Smart Grid is the next-generation intelligent power grid that maximizes energy efficiency with the convergence of IT technologies and the existing power grid. It enables consumers to check power rates in real time for active power consumption. It also enables suppliers to measure their expected power generation load, which stabilizes the operation of the power system. However, there are high possibility that various kinds of security threats such as data exposure, data theft, and privacy invasion may occur in interactive communication with intelligent devices. Therefore, to establish a secure environment for responding to such security threat with the smart grid, the key management technique, which is the core of the development of a security mechanism, is required. Using a hash chain, this paper suggests a group key management mechanism that is efficiently applicable to the smart grid environment with its hierarchical structure, and analyzes the security and efficiency of the suggested group key management mechanism.

Analysis of Monopole Antenna Equipped with a Reflector for UWB Systems (UWB 시스템용 반사판을 갖는 모노폴 안테나 분석)

  • Kim, Yeong-Jin;Choi, Dong-You
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1261-1268
    • /
    • 2019
  • In this paper, we present the analysis of a novel monopole antenna with a reflector. The proposed monopole antenna is printed on a TRF-45 substrate, and the reflector, which is positioned near the base of the antenna, is printed on the FR-4 substrate. Positioning the reflector near the base of the antenna was found to suppress current radiation toward the back of the monopole antenna. Comparative analysis of the proposed monopole antenna and a conventional monopole antenna without a reflector revealed that the bandwidths of the antenna with and without a reflector were 2.65 GHz and 2.88 GHz, respectively. Additionally, the antenna without a reflector was observed to have a bi-directional radiation pattern in the E-plane, and an omni-directional radiation pattern in the H-plane. However, only the antenna with a reflector was found to suppress back radiation, and provide non-uniform directional radiation in the E-plane and H-plane.

Arrhythmia Classification using GAN-based Over-Sampling Method and Combination Model of CNN-BLSTM (GAN 오버샘플링 기법과 CNN-BLSTM 결합 모델을 이용한 부정맥 분류)

  • Cho, Ik-Sung;Kwon, Hyeog-Soong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.10
    • /
    • pp.1490-1499
    • /
    • 2022
  • Arrhythmia is a condition in which the heart has an irregular rhythm or abnormal heart rate, early diagnosis and management is very important because it can cause stroke, cardiac arrest, or even death. In this paper, we propose arrhythmia classification using hybrid combination model of CNN-BLSTM. For this purpose, the QRS features are detected from noise removed signal through pre-processing and a single bit segment was extracted. In this case, the GAN oversampling technique is applied to solve the data imbalance problem. It consisted of CNN layers to extract the patterns of the arrhythmia precisely, used them as the input of the BLSTM. The weights were learned through deep learning and the learning model was evaluated by the validation data. To evaluate the performance of the proposed method, classification accuracy, precision, recall, and F1-score were compared by using the MIT-BIH arrhythmia database. The achieved scores indicate 99.30%, 98.70%, 97.50%, 98.06% in terms of the accuracy, precision, recall, F1 score, respectively.

Control process design for linking energy storage device to ship power source (선박 전력원에 에너지 저장장치 연계를 위한 제어 프로세스 설계)

  • Oh, Ji-Hyun;Lee, Jong-Hak;Oh, Jin-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1603-1611
    • /
    • 2021
  • As IMO environmental regulations are tightened, the need to establish a system that can reduce emissions is increasing, and for this purpose, various power control management systems have been studied and implemented as a new energy management system for ships. In this study, we design a control process through modeling for Bi-Directional Converter (BDC) application with bi-directional power flow to link batteries, which are energy storage devices, to conventional generator power systems, and propose mechanisms for batteries optimized for varying loads. This work models MATLAB/Simulink as a BDC and simulates current control and state of charge (SOC) optimization at the time of charging and discharging batteries according to load scenarios. Through this, the battery, power, and load were interlocked so that the generator operated on board could be operated in the optimal operation range, and power control management was performed to enable the generator to operate in the high fuel efficiency range.

Intrusion Detection System Based on Sequential Model in SOME/IP (SOME/IP 에서의 시퀀셜 모델 기반 침입탐지 시스템)

  • Kang, Yeonjae;Pi, Daekwon;Kim, Haerin;Lee, Sangho;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.6
    • /
    • pp.1171-1181
    • /
    • 2022
  • Front Collision-Avoidance Assist (FCA) or Smart Cruise Control (SCC) is installed in a modern vehicle, and the amount of data exchange between ECUs increases rapidly. Therefore, Automotive Ethernet, especially SOME/IP, which supports wide bandwidth and two-way communication, is widely adopted to overcome the bandwidth limitation of traditional CAN communication. SOME/IP is a standard protocol compatible with various automobile operating systems, and improves connectivity between components in the vehicle. However, no encryption or authentication process is defined in the SOME/IP protocol itself. Therefore, there is a need for a security study on the SOME/IP protocol. This paper proposes a deep learning-based intrusion detection system in SOME/IP and performs six attacks to confirm the performance of the intrusion detection system.

Design of AC/DC Combined V2X System for Small Electric Vehicle (소형 전기차 적용을 위한 AC/DC 복합 V2X 시스템 설계)

  • Kim, Yeong-Jung;Chang, Young-Hag;Moon, Chae-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.4
    • /
    • pp.617-624
    • /
    • 2022
  • The small electric vehicles equipped with V2X(vehicle to everything) systems may provide more information and function to the existing navigation system of the vehicle. The key components of V2X technology include V2V (vehicle to vehicle), V2N(vehicle to network) and V2I (vehicle to infrastructure). This study is to design and implementation of VI type E-PTO which is interfaced with external equipments, the work designs the components of E-PTO such as DC/DC converter, DC/AC converter, battery bidirectional charging system etc. Also, it implements the devices and control systems for driving. The test results of VI type E-PTO components showed allowable 10% requirements of transient voltage variation rate and recovery time within 100ms for start/stop and normal operation.

Metaverse Platform to Improve Immersion of Online Video Conferencing System (온라인 화상 회의 시스템의 몰입 개선을 위한 메타버스 플랫폼)

  • Yoon, Dong-eon;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.35-37
    • /
    • 2022
  • Online video conferencing systems such as Zoom and Discord are mainly used for non-face-to-face work due to their good accessibility and lack restriction of space. However, most online video conferencing systems are difficult to interact in both directions, and problems such as difficulty in communication and lack of immersion are emerging in participants who use them. On the other hand, Metaverse, which has attracted attention with the development of spatial computing, enables smooth interaction like the real world in the three-dimensional virtual world by utilizing hearing, visual, and touch information. In this paper, we propose a method of utilizing the metaverse platform to improve the problem of lack of immersion in the existing online video conferencing system. Through the proposal method, platform users can share and check each other's work screens in a virtual space and exchange various data. In order to improve participants' of immersion, the environment and improvement plan of the metaverse platform were constructed and compared with the existing online video conferencing platform.

  • PDF

Comparative analysis of performance of BI-LSTM and GRU algorithm for predicting the number of Covid-19 confirmed cases (코로나 확진자 수 예측을 위한 BI-LSTM과 GRU 알고리즘의 성능 비교 분석)

  • Kim, Jae-Ho;Kim, Jang-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.2
    • /
    • pp.187-192
    • /
    • 2022
  • Even the announcing date for the staring date of "With Corona" has been decided, still many people have not completed vaccination, the most important condition for starting the With Corona, because of concerns for its side effects. In addition, although the economy may can be recovered by the With Corona, but the number of infected people may can be surged. In this paper, in order to awaken the people for the awareness of Corona 19 in advance of the With Corona, the Corona 19 is predicted through a non-linear probability process. Here, among the deep learning RNN, BI-LSTM, which is a bidirectional LSTM, and GRU, gates decreased than LSTM have been used. And this has been compared and analyzed through train set, test set, loss function, residual analysis, normal distribution, and autocorrelation, and compared and predicted for which has a better performance.