• Title/Summary/Keyword: 컴퓨터 융합

Search Result 2,369, Processing Time 0.03 seconds

Music Source Signature Indexing Method for Quick Search (빠른 검색을 위한 음원 시그니처 인덱싱 방법)

  • Kim, Sang-Kyun;Lee, Kyoung-Sik
    • Journal of Broadcast Engineering
    • /
    • v.26 no.3
    • /
    • pp.321-326
    • /
    • 2021
  • Blockchain is increasing in value as a platform for safe transmission of capital transactions or secure data. In addition, blockchain has the potential as a new platform that can safely store large amounts of data such as videos, music, and photos, and safely manage transaction details and service usage specifications. Since it is not possible to store large-capacity media data in a block, research on the performance of storing sound source information in a block and retrieving the stored sound source data by using the distributed storage system (IPFS) and the hash information of the sound source signature data was conducted. In this paper, we propose a sound source signature indexing method using a bloom filter that can improve the search speed suggested by previous studies. As a result of the experiment, it was confirmed that improved search performance (O(1)) than the existing search performance (O(n)) can be achieved.

Research on Competitiveness of Information and Telecommunication Industry Using Standard Patent: Focusing on trend and network analysis (표준특허를 활용한 정보통신산업 분야 경쟁력 분석: 트랜드 및 네트워크 분석을 중심으로)

  • Jeong, Myoung Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.534-541
    • /
    • 2021
  • This study aims to establish an efficient future technology development strategy in the information and telecommunications industry by grasping related technology trends and fusion complexity through an analysis based on standard patents. Analyzing 1,983 patents related to the information and telecommunications industry identified the trends in major patent applicants and detailed technologies in the world. In addition, technology trends were investigated through keyword analysis to examine the degree of complexity in information and communications technology, confirming the direction of research in information technology. Electronic component and wireless communications fields have relatively few standard patents, but they are highly convergent with other industrial technologies. Computer information processes and communication and broadcasting technologies are highly related to each other, so they can be used as standard fusion technologies in standard patents. In addition, standardization activities in optical and image/sound devices are found to be high.

Analysis on Iterated Prisoner's Dilemma Game using Binary Particle Swarm Optimization (이진 입자 군집 최적화를 이용한 반복 죄수 딜레마 게임 분석)

  • Lee, Sangwook
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.278-286
    • /
    • 2020
  • The prisoner's dilemma game which is a representative example of game theory is being studied with interest by many economists, social scientists, and computer scientists. In recent years, many researches on computational approaches that apply evolutionary computation techniques such as genetic algorithms and particle swarm optimization have been actively conducted to analyze prisoner dilemma games. In this study, we intend to evolve a strategy for a iterated prisoner dilemma game participating two or more players using three different binary particle swarm optimization techniques. As a result of experimenting by applying three kinds of binary particle swarm optimization to the iterated prisoner's dilemma game, it was confirmed that mutual cooperation can be established even among selfish participants to maximize their own gains. However, it was also confirmed that the more participants, the more difficult to establish a mutual cooperation relationship.

The Improvement of Information Protection Service Cost Model in Public Institution (공공기관 정보보호서비스 대가 모델의 개선 방안)

  • Oh, Sangik;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.7
    • /
    • pp.123-131
    • /
    • 2019
  • In this paper, related studies were investigated by dividing them into cost-benefit analysis, security continuity services, and SW-centric calculations. The case analysis was conducted on A institutions in the United States, Japan and South Korea. Based on this, an improvement model was prepared through comparison with the current system. The SCS(Security Continuity Service) performance evaluation system-based information protection service cost calculation model is proposed. This method applies a service level agreement(SLA) and NIST Cybersecurity framework that are highly effective through cost-effectiveness analysis and calculates consideration based on characteristics, performance criteria, and weights by information protection service. This model can be used as a tool to objectively calculate the cost of information protection services at public institutions. It is also expected that this system can be established by strengthening the current recommended statutory level to the enforceability level, improving the evaluation system of state agencies and public institutions, introducing a verification system of information protection services by national certification bodies, and expanding its scope to all systems.

Development of SW education class plan using artificial intelligence education platform : focusing on upper grade of elementary school (인공지능(AI) 교육 플랫폼을 활용한 SW교육 수업안 개발 : 초등학교 고학년을 중심으로)

  • Son, Won-Seong
    • Journal of The Korean Association of Information Education
    • /
    • v.24 no.5
    • /
    • pp.453-462
    • /
    • 2020
  • With the development of artificial intelligence, a lot of platforms have emerged that enable anyone to easily access and learn about artificial intelligence or create artificial intelligence models. Therefore, in this study, we analyzed various artificial intelligence education platforms and developed and proposed a SW education class plan using a framework-based artificial intelligence education platform for activating artificial intelligence based SW education. The artificial intelligence-based SW education framework aims to cultivate artificial intelligence literacy on the basis of computational thinking. In addition, a learner-centered project class was formed to include elements that could be fused with real life contexts or other subjects. Using this, with the theme of creating an artificial intelligence program to help separate garbage collection, a six-hour project-based class was developed and proposed using practical arts, social studies, and creative experiential activities. This project class was organized using a platform that is not difficult, such as AI Oceans and Entry.

Blockchain Based Data-Preserving AI Learning Environment Model for Cyber Security System (AI 사이버보안 체계를 위한 블록체인 기반의 Data-Preserving AI 학습환경 모델)

  • Kim, Inkyung;Park, Namje
    • The Journal of Korean Institute of Information Technology
    • /
    • v.17 no.12
    • /
    • pp.125-134
    • /
    • 2019
  • As the limitations of the passive recognition domain, which is not guaranteed transparency of the operation process, AI technology has a vulnerability that depends on the data. Human error is inherent because raw data for artificial intelligence learning must be processed and inspected manually to secure data quality for the advancement of AI learning. In this study, we examine the necessity of learning data management before machine learning by analyzing inaccurate cases of AI learning data and cyber security attack method through the approach from cyber security perspective. In order to verify the learning data integrity, this paper presents the direction of data-preserving artificial intelligence system, a blockchain-based learning data environment model. The proposed method is expected to prevent the threats such as cyber attack and data corruption in providing and using data in the open network for data processing and raw data collection.

Reversible Data Hiding Technique using Encryption Technique and Spatial Encryption Technique (암호화 기법 및 공간적인 암호화 기법을 사용한 가역 데이터 은닉기법)

  • Jung, Soo-Mok
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.632-639
    • /
    • 2021
  • In this paper, we proposed a reversible data hiding technique that greatly enhances the security of confidential data by encrypting confidential data and then spatially encrypting the encrypted confidential data and hiding it in the cover image. When a result image is generated by hiding the encrypted confidential data in the cover image using a spatial encryption technique, the quality of the result image is very good, and the original cover image and the result image cannot be visually distinguished. Since the encrypted confidential data is spatially encrypted and concealed, it is not possible to know where the encrypted confidential data is concealed in the result image, and the encrypted confidential data cannot be extracted from the result image. Even if the encrypted confidential data is extracted, the original confidential data is not known because the confidential data is encrypted. Therefore, if confidential data is concealed in images using the proposed technique, the security of confidential data is greatly improved. The proposed technique can be effectively used in medical and military applications.

Development of Augmented Reality Based Electronic Circuit Education System (증강현실 기반 전자회로 교육 시스템 개발)

  • Oh, DoBong;Shim, SeungHwan;Choi, HanGo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.9 no.12
    • /
    • pp.333-338
    • /
    • 2020
  • This paper proposes an augmented reality-based electronic circuit education system as a way for electronic circuit education, which is the basis of ICT convergence technology field. It consists of a hardware module that can identify the actual circuit and a mobile educational content that can check the current flow, input, output, and measured value by applying augmented reality technology. An experiment was conducted on image recognition, which is the main performance, for the purpose of stable operation of the system, and as the experimental method the recognition rate was measured by changing the distance between the hardware module and the mobile device to a certain interval. As a result of the experiment, the recognition rate was 100 percent at a distance of 25[Cm] or higher, and it was confirmed that the recognition rate decreased by 12% at a distance below 25[Cm], which can be said to be the effect of an error that results in image loss taken due to close distance. In the future, we plan to apply the education system presented in this paper to classes, which increases the efficiency of classes and improve students' interest and understanding of the subject.

Puzzle Rule Algorithm of Euler Square Game (오일러 방진 게임 퍼즐 규칙 알고리즘)

  • Lee, Sang-Un
    • Journal of Industrial Convergence
    • /
    • v.19 no.4
    • /
    • pp.23-28
    • /
    • 2021
  • This paper finds the regular pattern of n = [3, ∞] for Euler square game related with n = 6(6×6=36) thirty-six officer problem that is still unsolved problem. The solution of this problem is exists for n = [3, 10] without n = 6. Also, previous researchers finds the random assigned solution for specific number using computer programming. Therefore, the solution of n = [11, ∞] Euler squares are unsolved problem because of anything but easy. This paper attempts to find generalized patterns for domains that have been extended to n = [3, ∞], while existing studies have been limited to n = [3, 10]. This paper classify the n = [3, ∞] into n = odd, 4k even, 4k+2 even of three classes. Then we find the simple regular pattern solution for n = odd and 4k even(n/2 = even). But we can't find the regular pattern for 4k+2 even(n/2 = odd).

A Study on Search Query Topics and Types using Topic Modeling and Principal Components Analysis (토픽모델링 및 주성분 분석 기반 검색 질의 유형 분류 연구)

  • Kang, Hyun-Ah;Lim, Heui-Seok
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.6
    • /
    • pp.223-234
    • /
    • 2021
  • Recent advances in the 4th Industrial Revolution have accelerated the change of the shopping behavior from offline to online. Search queries show customers' information needs most intensively in online shopping. However, there are not many search query research in the field of search, and most of the prior research in the field of search query research has been studied on a limited topic and data-based basis based on researchers' qualitative judgment. To this end, this study defines the type of search query with data-based quantitative methodology by applying machine learning to search research query field to define the 15 topics of search query by conducting topic modeling based on search query and clicked document information. Furthermore, we present a new classification system of new search query types representing searching behavior characteristics by extracting key variables through principal component analysis and analyzing. The results of this study are expected to contribute to the establishment of effective search services and the development of search systems.