• Title/Summary/Keyword: 컴퓨터형 서비스

Search Result 734, Processing Time 0.032 seconds

A Research on The Real Time Video Traffic Transmission Mechanism in IP Based Mobile Networks (IP기반 이동네트워크에서 실시간 비디오 트래픽 전송 메카니즘에 관한 연구)

  • 강문식;이준호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8A
    • /
    • pp.879-888
    • /
    • 2004
  • In this paper, we propose a real time QoS(Quality of Service) guaranteed transmission mechanism for MPEG video traffic at the congested node in IP based networks. Recent spread of the Internet has increased the demands of a real time multimedia service of the quality, Because the type of Internet services can, however, offer the best effort delivery strategies, it is difficult to treat all the types of traffic with differential COS (Class of Service). Most of all, the hierarchical coding method of MPEG data utilizes the reference frame for the motion prediction. The loss of the reference frames makes QoS of the video traffic degraded because the reference frame bit error causes the consecutive packet loss. Therefore we have studied the real time QoS guaranteed mechanism for video traffic by analyzing the previous methods. Computer simulation results show that the proposed scheme has better performance than the previous one.

A Cultural Approach to the Digital transition (지상파 TV의 디지털 전환에 대한 문화적 인식과 접근)

  • Kim, Pyung-Ho
    • Korean journal of communication and information
    • /
    • v.21
    • /
    • pp.63-86
    • /
    • 2003
  • Digital TV is expected to usher in a new era of TV. Thanks to digital and network technologies, TV will no more be a dumb terminal as it is today. It will incorprate the computer and thus become an intelligent device which serves not only high quality broadcast programming, but a variety of information services much like the current networked-computer. However, the real world picture of digital TV is clearly different from such a rosy vision. Albeit too early to tell, the cases in Europe and the US attest that the digital transition suffers a setback in terms of technology, policy, business, marketing, and the users. As such, the digital transition is generally problematized in terms of policy, business model, marketing strategy, and so on. Comparatively speaking, the issues of technology, policy, business and marketing are not so complicated than that of digital TV users because of the cultural issues involved in the adoption of digital TV. In other words, the technological transition to digital TV is far easier than its cultural transition. The cultural transition demands policy makers and industries of different approaches to successfully facilitating the digital transition.

  • PDF

Smart IoT Home Data Analysis and Device Control Algorithm Using Deep Learning (딥 러닝 기반 스마트 IoT 홈 데이터 분석 및 기기 제어 알고리즘)

  • Lee, Sang-Hyeong;Lee, Hae-Yeoun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.4
    • /
    • pp.103-110
    • /
    • 2018
  • Services that enhance user convenience by using various IoT devices are increasing with the development of Internet of Things(IoT) technology. Also, since the price of IoT sensors has become cheaper, companies providing services by collecting and utilizing data from various sensors are increasing. The smart IoT home system is a representative use case that improves the user convenience by using IoT devices. To improve user convenience of Smart IoT home system, this paper proposes a method for the control of related devices based on data analysis. Internal environment measurement data collected from IoT sensors, device control data collected from device control actuators, and user judgment data are learned to predict the current home state and control devices. Especially, differently from previous approaches, it uses deep neural network to analyze the data to determine the inner state of the home and provide information for maintaining the optimal inner environment. In the experiment, we compared the results of the long-term measured data with the inferred data and analyzed the discrimination performance of the proposed method.

Implementation of U-Kiosk based on PANDA and VNC (PANDA$^{1)}$와 VNC에 기반한 U-Kiosk 구현)

  • Seok, Hyun-Chul;Park, Ki-Woong;Lim, Sang-Seok;Park, Kyu-Ho
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10a
    • /
    • pp.238-243
    • /
    • 2006
  • 휴대용 단말기의 보급과 인터넷 및 무선 네트워크의 발달로 사용자들이 사용하는 개별 장치들이 보편화되어 있으며, 이들을 서로 유기적으로 엮은 서비스가 등장하고 있다. 본 논문에서는 이러한 서비스의 한 종류로 U-Kiosk의 개념을 소개한다. U-Kiosk는 Kiosk 단말장치나 공용 PC를 사용자 개인의 PC처럼 사용할 수 있도록 하여 이들의 리소스를 직접 제어할 수 있는 기능을 제공한다. 이것을 실현하기 위한 방안으로 본 논문에서는 공용 PC에서 개인 PC의 바탕화면 설정을 포함해 모든 자원을 직접 사용할 수 있도록 하는 부분을 구현하고 설명을 하였으며, 인증 과정에서 사용자의 개입을 최소한으로 줄이는 방법에 대해서 소개한다. 이를 위하여 초소형 보안 단말기인 PANDA를 사용하였으며, Zigbee 통신을 사용하여 사용자의 위치정보를 파악하여 자동으로 인증을 하도록 하는 Transient Authentication의 개념을 도입하였다. 두 컴퓨터 간의 원격 접속을 위해서는 VNC를 이용하여 구현하였으며, 사용자가 공용 PC로부터 일정 거리 안에 있을 경우, 자동으로 원격 접속이 이루어지고, 공용 PC로부터 멀어질 경우 자동으로 접속이 종료되도록 구현하였다. 이를 기반으로 제안하는 U-Kiosk의 개념에 맞는 테스트 베드를 구축 하였다. 이는 UFC Project$^{2)}$의 일부로서 차후 완벽한 인증 인프라를 구축하여 보다 안정적이고 사용하기 편리한 U-Kiosk의 구현에 초석이 될 것이다.

  • PDF

Communication Service Architecture for CORBA -Based Multimedia Multicast Application (CORBA 기반의 멀티미디어 멀티캐스트 애플리케이션을 위한 통신 서비스 아키텍쳐)

  • Ma, Yeong-Sik;Gang, U-Sik;An, Sun-Sin
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.5 no.6
    • /
    • pp.771-781
    • /
    • 1999
  • 오늘날의 컴퓨팅 환경은 통신 네트워크의 복잡성과 다양한 멀티미디어 서비스 처리를 위해 객체지향 기술을 분산 시스템에 도입하고 통신망을 소프트웨어 계층적 모델로 구조화한 개방형 정보 통신망 구조 연구가 활발히 진행되고 있다. 본 논문은 분산환경에서 멀티미디어 스트림 데이타를 전송하기 위한 아키텍쳐에 관한 모델의 설계 및 구현에 관한 것으로 분산 환경에서 멀티미디어 스트림 데이타를 효율적으로 전송할 수 있는 구조를 제시하고 있다. 설계한 구조는 Point-to-Point와 멀티캐스트를 지원하며 컴퓨터 통신망에서 멀티캐스트 연결을 효율적으로 관리하고 추후 기능 확장 및 기능 변경이 용이하도록 모듈화하고 유연성을 가지는 연결 관리 구조를 설계하고 구현하였다. 신호기능은 CORBA(Common Object Request Broker Architecture)의 ORB를 이용하여 실현하였으며, 데이타 전송 기능은 TCP/IP연결을 이용하였다. 이렇게 신호처리 부분과 데이타 전송 부분을 독립적으로 만들어서 하부망 기술에 독립적인 연결 관리 구조를 채택하고 있으므로 향후 다른 환경에서도 신호처리 부분을 그대로 적용할 수 있다. 분산 객체 개념을 적용하여 연결 관리 기능을 분산 객체화 하였으며 각 분산 객체간 인터페이스를 OMG(Object Management Group) IDL(Interface Definition Language)로 정의함으로써 유연성을 갖도록 하였다.AbstractThis paper proposes communication service architecture to support dynamic communication configuration and multiple connection management which are required to handle a variety of multimedia multicast application. Our communication service architecture was designed to fulfil the objectives as the following:- To build a common networking system for various multimedia multicast services- To build a platform for rapid service development and provisioning- To provide service networking independent on transport network technologiesWe implemented communication service architecture based on Common Object Request Broker Architecture (CORBA) for multimedia multicast applications. Our communication service architecture is distributed and object-oriented for extensibility and easy modification. The interfaces between the distributed objects are specified in (Object Management Group) OMGs Interface Definition Language.

Mutual Authentication Method for Hash Chain Based Sensors in IoT Environment (IoT 환경에서 해시 체인 기반 센서 상호 인증 기법)

  • Lee, Kwang-Hyoung;Lee, Jae-Seung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.303-309
    • /
    • 2018
  • Internet of Things technology is an intelligent service that connects all objects to the Internet and interacts with them. It is a technology that can be used in various fields, such as device management, process management, monitoring of restricted areas for industrial systems, as well as for navigation in military theaters of operation. However, because all devices are connected to the Internet, various attacks using security vulnerabilities can cause a variety of damage, such as economic loss, personal information leaks, and risks to life from vulnerability attacks against medical services or for military purposes. Therefore, in this paper, a mutual authentication method and a key-generation and update system are applied by applying S/Key technology based on a hash chain in the communications process. A mutual authentication method is studied, which can cope with various security threats. The proposed protocol can be applied to inter-peer security communications, and we confirm it is robust against replay attacks and man-in-the-middle attacks, providing data integrity against well-known attacks in the IoT environment.

Analysis on Service Robot Market based on Intelligent Speaker (지능형 스피커 중심의 서비스 로봇 시장 분석)

  • Lee, Seong-Hoon;Lee, Dong-Woo
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.5
    • /
    • pp.34-39
    • /
    • 2019
  • One of the words frequently mentioned in our society today is the smart machine. Smart machines are machines that contain smart or intelligent functions. These smart machines have recently been applied in our home environment. These are phenomena that occur as a result of smart home. In a smart home environment, smart speakers have moved away from traditional music playback functions and are now increasingly serving as interfaces to control devices, the various components of a smart home. In this study, the technology trends of domestic and foreign smart speaker market are examined, problems of current products are analyzed, and necessary core technologies are described. In the domestic smart speaker market, SKT and KT are leading the related industries, while major IT companies such as Amazon, Google and Apple are focusing on launching related products and technology development.

A Data Analysis and Visualization of AI Ethics -Focusing on the interactive AI service 'Lee Luda'- (인공지능 윤리 인식에 대한 데이터 분석 및 시각화 연구 -대화형 인공지능 서비스 '이루다'를 중심으로-)

  • Lee, Su-Ryeon;Choi, Eun-Jung
    • Journal of Digital Convergence
    • /
    • v.20 no.2
    • /
    • pp.269-275
    • /
    • 2022
  • As artificial intelligence services targeting humans increase, social demands are increasing that artificial intelligence should also be made on an ethical basis. Following this trend, the government and businesses are preparing policies and norms related to artificial intelligence ethics. In order to establish reasonable policies and norms, the first step is to understand the public's perceptions. In this paper, social data and news comments were collected and analyzed to understand the public's perception related to artificial intelligence and ethics. Interest analysis, emotional analysis, and discourse analysis were performed and visualized on the collected datasets. As a result of the analysis, interest in "artificial intelligence ethics" and "artificial intelligence" favorability showed an inversely proportional correlation. As a result of discourse analysis, the biggest issue was "personal information leakage," and it also showed a discourse on contamination and deflection of learning data and whether computer-made artificial intelligence should be given a legal personality. This study can be used as data to grasp the public's perception when preparing artificial intelligence ethical norms and policies.

Designing an Agricultural Data Sharing Platform for Digital Agriculture Data Utilization and Service Delivery (디지털 농업 데이터 활용 및 서비스 제공을 위한 농산업 데이터 공유 플랫폼 설계)

  • Seung-Jae Kim;Meong-Hun Lee;Jin-Gwang Koh
    • The Journal of Bigdata
    • /
    • v.8 no.1
    • /
    • pp.1-10
    • /
    • 2023
  • This paper presents the design process of an agricultural data sharing platform intended to address major challenges faced by the domestic agricultural industry. The platform was designed with a user interface that prioritizes user requirements for ease of use and offers various analysis techniques to provide growth prediction for field environment, growth, management, and control data. Additionally, the platform supports File to DB and DB to DB linkage methods to ensure seamless linkage between the platform and farmhouses. The UI design process utilized HTML/CSS-based languages, JavaScript, and React to provide a comprehensive user experience from platform login to data upload, analysis, and detailed inquiry visualization. The study is expected to contribute to the development of Korean smart farm models and provide reliable data sets to agricultural industry sites and researchers.

A study on the DoA Estimation Prformance of Interference Signal in W-CDMA using 3D Adaptive Array Antenna (W-CDMA에서 3차원 적응 배열 안테나를 이용한 방해 신호의 도래각 추정 성능에 관한 연구)

  • Lim, Seung-Gag;Kang, Dae-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.1
    • /
    • pp.11-17
    • /
    • 2009
  • This paper deals with the estimation performance DoA (Direction of Arrival) using the 3D adaptive array antenna in W-CDMA signal. For this, we proposed the 5 types of 3D array antenna, and appied for the MUSIC in order to the estimation of DoA algorithm for that antenna, commonly, then the DoA estimation error was used for the estimation performance. In the mobile communication and radio positioning service, performing the spatial filtering after the DoA estimation in array antenna, the quality of receiving signal can improve by the nulling or minimization of interfering signal which is from the undesired direction and the forming of beam which is from the desired direction. The result of DoA estimation and the DoA estimation error by varying the signal to noise ration and the number of interfering signal and power of each type antenna was calculated by computer simulation. As a result of simulation, the other propose antenna has good performance excluding the stack 3D antenna in DoA estimation and the Curved-B type antenna has more superior performance when increasing the number of interfering signal and power in the DoA estimation error.

  • PDF