• Title/Summary/Keyword: 통신패턴 분석

Search Result 835, Processing Time 0.028 seconds

A Pattern on Keyword of the Android through Utilizing Big Data Analysis (빅 데이터 분석을 활용한 스마트폰 플랫폼 키워드에 대한 패턴)

  • Jin, Chan-Yong;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.129-130
    • /
    • 2016
  • 빅 데이터 분석은 기존 데이터베이스 관리 도구로부터 데이터를 수집, 저장, 관리, 분석할 수 있는 역량을 말한다. 대부분의 빅 데이터 분석 기술 방법들은 기존 통계학과 전산학에서 사용되던 데이터 마이닝, 기계 학습, 자연 언어 처리, 패턴 인식 등이 해당된다. 최근 스마트 기기의 발달과 정보통신기술의 발전은 트위터, 페이스북, 인스타그램 등의 소셜 네트워크상에서 유통되는 정보량이 폭발적 증가하고 있다. 이러한 변화는 데이터화가 가속화되고 있는 현대사회에서 데이터의 가치는 점점 높아질 것으로 예상되며, 데이터로부터 가치 있는 정보와 통찰력을 효과적으로 이끌어내는 기업이 경쟁력 확보를 위한 핵심가치가 되었다. 본 연구에서는 다음 커뮤니케이션의 빅 데이터 분석도구인 소셜 매트릭스를 활용하여 키워드 분석을 통해 스마트폰 플랫폼 키워드 의미를 분석하고자 한다.

  • PDF

Fabrication of shoes for analyzing human gait pattern using strain sensors (스트레인센서를 이용한 걸음걸이 패턴 분석 신발제작)

  • Kim, Eung-Soo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.9
    • /
    • pp.1407-1412
    • /
    • 2013
  • The human gait pattern analysis shoes have been developed for our healthy lfe, which is largely dependent on a posture and a skeletal structure affected by daily lifestyle and gait pattern. There are generally 3 types of human gait, such as normal gait, intoeing gait, and outtoeing gait. We have analyzed one's gait pattern through walking put on the developed shoes.

Performance Evaluation of OFDM Systems Dependent upon Pilot Patterns (파일럿 패턴에 따른 OFDM 시스템의 성능 분석)

  • Choi, Seung-Kuk
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.2
    • /
    • pp.273-279
    • /
    • 2007
  • I evaluate the BER performance of OFDM systems in frequency selective Doppler time variant fading channels, considering the pilot patterns for channel estimation. The performance of the systems is degraded due to channel estimation error. For the reduction of performance degradation in acceptable level, the optimum distance of pilot symbols in pilot pattern is 5 subcarriers in frequency domain and 6 OFDM block in time domain.

Diffusion Patterns of Telecommunications Services with Network Evolution (네트워크 진화에 따른 통신서비스 확산 패턴의 변화)

  • Kim Moon-Soo;Kim Ho
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.93-102
    • /
    • 2006
  • Traditionally, diffusion of telecommunications services has been considerably affected by presence of critical mass and network externalities, and thus shown the so-called late take-off phenomenon. However, as telecommunications network evolves from circuit switching to packet switching, enabling diverse new services such as Internet access, Internet banking and web hosting, it seems this traditional diffusion patterns are changing. By comparing diffusion of the packet-based services with those of circuit-based services and durable goods, we have found the late take-off phenomenon is not involved in diffusion of newly introduced the packet-based services. Moreover, we concluded diffusion of the packet-based services is much faster than that of durable goods, thus showing early take-off phenomenon. Based on this empirical result, we suggest Telcos and ISPs should pay as much attention to the growth state as the introduction stage in order for their packet-based services to be successful in the markets.

  • PDF

A Method of Comparing Risk Similarities Based on Multimodal Data (멀티모달 데이터 기반 위험 발생 유사성 비교 방법)

  • Kwon, Eun-Jung;Shin, WonJae;Lee, Yong-Tae;Lee, Kyu-Chul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.510-512
    • /
    • 2019
  • Recently, there have been growing requirements in the public safety sector to ensure safety through detection of hazardous situations or preemptive predictions. It is noteworthy that various sensor data can be analyzed and utilized as a result of mobile device's dissemination, and many advantages can be used in terms of safety and security. An effective modeling technique is needed to combine sensor data generated by smart-phones and wearable devices to analyze users' moving patterns and behavioral patterns, and to ensure public safety by fusing location-based crime risk data provided.

  • PDF

Pattern Classification of HDD (Hard Disk Drive) Defect Distribution Using Rectangular Coordinates (직교좌표를 이용한 HIDD (Hard Disk Drive) 결함분포의 패턴 분류)

  • Moon, Un-Chul;Kim, Hyeong-Seok;Kang, Kyung-Hoon
    • Journal of The Institute of Information and Telecommunication Facilities Engineering
    • /
    • v.2 no.1
    • /
    • pp.71-77
    • /
    • 2003
  • 본 논문에서는 불량 하드디스크 드라이브의 수리판정 자동화를 위해 필요한 하드디스크 드라이브(Hard Disk Drive, HDD) 결함의 분포패턴의 분류에 관한 연구 결과를 소개한다. HDD 제조공정에서는 테스트 진행 중 검출된 결함에 관한 정보를 HDD 내부에 기록한다. 불량으로 판별된 HDD는 내부에 기록된 결함의 분포론 관찰한 후, 불량의 종류 및 그에 따른 처리방안을 결정한다. 본 논문에서는 효율적인 결함분포 패턴의 특징추출을 위해, 하드디스크의 물리적 특성에 대한 분석을 바탕으로 극좌표 (Polar Coordinates) 방식으로 표현된 결함 위치 데이터를 직교좌표(Cartesian Coordinates)로 변환한다. 그리고 디스크 상의 두 동심원 사이의 공간을 정해진 회전각별로 등분한 후, 나누어진 구간별로 결함 발생빈도 히스토그램 (Histogram) 분석을 수행하여 결함분포의 패턴을 분류하는 알고리즘을 제시한다. 설계된 알고리즘은 실제 HDD 제조공정에서 발생한 불량 HDD Set을 대상으로 적용한 결과, 그 효용성이 검증되었다.

  • PDF

Trends in the Brain Decoding Technology (브레인 디코딩 기술 동향)

  • Kim, S.
    • Electronics and Telecommunications Trends
    • /
    • v.32 no.4
    • /
    • pp.31-39
    • /
    • 2017
  • 뇌에 관한 연구는 상당히 오랫동안 이루어져 왔음에도, 뇌는 여전히 미지의 세계로 남아 있다. 미국에서 2013년 Brain Initiative를 발표한 이후 뇌를 이해하기 위한 연구가 활발히 이루어져 왔다. 최근에는 인간의 생각을 뇌의 활성 패턴 분석을 통해 읽어 내려고 시도하였으며, 심지어는 잠자는 동안 꾸는 꿈을 뇌 활성 패턴 측정을 통해 읽어 내려는 시도도 이루어졌다. 본고에서는 브레인 디코딩을 위해 어떤 기술들이 필요하며, 현재 어떤 연구들이 이루어져 왔는지에 대하여 살펴보고, 향후 브레인 디코딩 기술이 어떻게 발전할 것인지 전망해 본다.

Implementation of Crime Pattern Analysis Algorithm using Big Data (빅 데이터를 이용한 범죄패턴 분석 알고리즘의 구현)

  • Cha, Gyeong Hyeon;Kim, Kyung Ho;Hwang, Yu Min;Lee, Dong Chang;Kim, Sang Ji;Kim, Jin Young
    • Journal of Satellite, Information and Communications
    • /
    • v.9 no.4
    • /
    • pp.57-62
    • /
    • 2014
  • In this paper, we proposed and implemented a crime pattern analysis algorithm using big data. The proposed algorithm uses crime-related big data collected and published in the supreme prosecutors' office. The algorithm analyzed crime patterns in Seoul city from 2011 to 2013 using the spatial statistics analysis like the standard deviational ellipse and spatial density analysis. Using crime frequency, We calculated the crime probability and danger factors of crime areas, time, date, and places. Through a result we analyzed spatial statistics. As the result of the proposed algorithm, we could grasp differences in crime patterns of Seoul city, and we calculated degree of risk through analysis of crime pattern and danger factor.

Pattern Spectrum Component Function and Warning Traffic Sign Recognition (패턴 스펙트럼 성분 함수와 주의 교통 표지 인식)

  • 김회진;장강의;최태영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.3
    • /
    • pp.401-409
    • /
    • 1997
  • In this paper, a pattern spectrum component function is introduced for an oriented shape analysis and its properties are discussed. It can represent directional information of shape more precisely than the conventional oriented pattern spectrum. An adaptive distance function between two pattern spectrum component functions is presented to recognize different shapes in noise. As a practical application, the pattern spectrum component function is applied to warning traffic sign recognitions utilizing the adaptive distance functions. Favorable results are obtained compared to the oriented pattern spectrum.

  • PDF

User typing pattern recognizing technology (사용자 타이핑 패턴 인식 기법)

  • Yu, Gyeong-tak;Choi, Jaehyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.141-142
    • /
    • 2014
  • Recently, personal information issue has been increased. When personal information is taken, it is very important to prevent secondary damage. In this paper, I suggest new logging system using typing pattern that each user has different. So even if someone knows my password and tries to log in to my account, this system rejects it because the intruder has different typing pattern from mine. To justify my research, I develop algorithm extracting personal typing pattern and finding pattern to synchronize with the original user's pattern.

  • PDF