• Title/Summary/Keyword: Advanced Information

Search Result 9,013, Processing Time 0.032 seconds

A Modeling of Information Process Concept for Analyzing Information Effect in Combat Simulation (전투 시뮬레이션에서 정보효과 분석을 위한 정보처리 개념 모델링)

  • Noh, Hyunil;Lee, Youngwoo;Lee, Taesik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.19 no.6
    • /
    • pp.730-743
    • /
    • 2016
  • Network-Centric Warfare is a forthcoming military revolution paradigm for maximizing combat effectiveness in terms of information superiority. However, quantitative assessment of information effect is a challenging issue. Among the many approaches, war-game is a well known method to evaluate combat effectiveness. However, previous researches and current models have a limited function or logic to simulate information process, which is core concept of NCW. So this research suggests a concept of simulation modeling method to describe the information process as defining of combat information process based on probability decision model. In addition, we suggest a simple scenario to represent proposed concept modelling method. This results can be used in designing war-game analysis model for enhanced information effectiveness.

Detection for Operation Chain: Histogram Equalization and Dither-like Operation

  • Chen, Zhipeng;Zhao, Yao;Ni, Rongrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3751-3770
    • /
    • 2015
  • Many sorts of image processing software facilitate image editing and also generate a great number of doctored images. Forensic technology emerges to detect the unintentional or malicious image operations. Most of forensic methods focus on the detection of single operations. However, a series of operations may be used to sequentially manipulate an image, which makes the operation detection problem complex. Forensic investigators always want to know as much exhaustive information about a suspicious image's entire processing history as possible. The detection of the operation chain, consisting of a series of operations, is a significant and challenging problem in the research field of forensics. In this paper, based on the histogram distribution uniformity of a manipulated image, we propose an operation chain detection scheme to identify histogram equalization (HE) followed by the dither-like operation (DLO). Two histogram features and a local spatial feature are utilized to further determine which DLO may have been applied. Both theoretical analysis and experimental results verify the effectiveness of our proposed scheme for both global and local scenarios.

Segmentation of Chinese Long Sentence Using Support Vector Machine (SVM 모델을 이용한 중국어 장문 분할)

  • Jin, Mei-Xun;Kim, Mi-Young;Kim, Dong-Il;Lee, Jong-Hyeok
    • Annual Conference on Human and Language Technology
    • /
    • 2003.10d
    • /
    • pp.261-266
    • /
    • 2003
  • 문장이 길면 구문분석의 정확률이 크게 낮아진다. 따라서 장문을 분할하여 분석하면 구문분석의 복잡도를 크게 줄일 수 있어 정확률 향상에 크게 기여할 수 있다. 특히, 중국어는 고립어로서, 교착어나 융합어와 비교할 때 자연어처리에 도움을 줄 수 있는 굴절이나 어미정보가 없어 구문분석에 어려움이 더욱 많다. 반면, 중국어 문자에서는 쉼표를 비교적 많이 사용하고 있고 또한 쉼표의 쓰임이 정확하므로 구문 분석에 도움을 줄 수 있다. 본 논문에서는 쉼표가 많이 쓰이고 있는 중국어 문장에서 해당 쉼표위치 문장 분할가능여부를 Support Vector Machine을 이용 판단하여 정확률 88.61%의 높은 분할 성능을 보였다.

  • PDF

Eliciting and Analyzing Requirements for Smart Environment for Future-Oriented Learning and Coaching (스마트 배움터 시스템 설계에 관한 연구)

  • Lee, Jungwoo;Lee, Hyejung;Kim, Min Sun
    • Knowledge Management Research
    • /
    • v.14 no.1
    • /
    • pp.121-132
    • /
    • 2013
  • In education, innovative ways of teaching and learning are always under development and keep being proposed with advanced concepts since the ancient times. Student-centered learning, problem-based learning and cooperative learning have been three major trends under development in secondary education research and practice more than a decade or so. Combined with advanced information and communication technologies, these trends will greatly transform the way we teach and learn in classroom environment and may change the classroom environment itself, into a more interactive and self-centered coaching type environment. In this study, a smart environment that utilizes advanced information technology devices and network is conceptualized, accommodating requirements contained and proposed in the recent trendy pedagogies. Pedagogical cases discussed in these trends are analyzed in detail, producing requirements for such a learning and coaching environment. These requirements are modeled using unified modeling language, leading to a proposal of a basic architecture for an information system supporting this environment.

  • PDF

RK- Methods for Robot Application problems

  • Senthilkumar, Sukumar;Lee, Malrey;Kwon, Tae-Kyu
    • International journal of advanced smart convergence
    • /
    • v.2 no.1
    • /
    • pp.18-20
    • /
    • 2013
  • The significance, is to introduce a novel way to employ the improved Runge-Kutta fifth order five stage method, here after called as Modified IRK(5,5) method, for system of second order robot arm problem and variations in angles at the joints in which parameters governing with two degrees of freedom which requires lesser number of function evaluations per time step as compared to the existing ones, in order to save time and spaceAn ultimate aim of this present paper is to solve application problem such as robot arm and initial value problems by applying Runge-Kutta fifth order five stage numerical techniques. The calculated output for robot arm coincides with exact solution which is found to be better, suitable and feasible for solving real time problems.

A new precharging method without side effects for liquid crystal displays with insufficient charging time

  • Lee, Seung-Hyuck;Kim, Jongbin;Lee, Seung-Woo
    • Journal of Information Display
    • /
    • v.13 no.3
    • /
    • pp.125-130
    • /
    • 2012
  • In this paper, a new precharging method without any side effects is proposed to overcome image degradation caused by insufficient charging times. This work explains why the precharging method can compensate for short charging times. However, side effects of the precharging method in the form of horizontal line artifacts are addressed, wherein line artifact-compensating precharging (LCP) is presented to mitigate the side effects. Behavioral modeling is employed to investigate the side effects by estimating transient responses of a liquid crystal display. The LCP proves that it can dramatically reduce line artifacts caused by precharging because the brightness difference of adjacent pixels does not exceed 1.0.

The Device Allocation Method for Energy Efficiency in Advanced Metering Infrastructures (첨단 검침 인프라에서 에너지 효율을 위한 기기 할당 방안)

  • Jung, Sungmin
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.16 no.1
    • /
    • pp.33-39
    • /
    • 2020
  • A smart grid is a next-generation power grid that can improve energy efficiency by applying information and communication technology to the general power grid. The smart grid makes it possible to exchange information about electricity production and consumption between electricity providers and consumers in real-time. Advanced metering infrastructure (AMI) is the core technology of the smart grid. The AMI provides two-way communication by installing a modem in an existing digital meter and typically include smart meters, data collection units, and meter data management systems. Because the AMI requires data collection units to control multiple smart meters, it is essential to ensure network availability under heavy network loads. If the load on the work done by the data collection unit is high, it is necessary to allocation new data collection units to ensure availability and improve energy efficiency. In this paper, we discuss the allocation scheme of data collection units for the energy efficiency of the AMI.

New Security Layer for OverLay Networks

  • Imai, Hideki;Shin, Seong-Han;Kobara, Kazukuni
    • Journal of Communications and Networks
    • /
    • v.11 no.3
    • /
    • pp.211-228
    • /
    • 2009
  • After clarifying the underlying problems in a secure network storage, we introduce two important requirements, leakageresilience and availability in higher levels respectively, for data keys that are used to protect remotely-stored data. As a main contribution of this paper, we give a new security layer for overlay networks by proposing a leakage-resilient authentication and data management system. In this system, we specifically propose a single mode and a cluster mode where the latter provides a higher level of both leakage-resilience and availability for the data key.

Comparison and Analysis of LTE-Advanced and IEEE802.16m Based on Data Transmission Speed Theory and Measurement (데이터 전송속도 이론 및 측정 기반의 LTE-Advanced와 IEEE802.16m의 비교 분석)

  • Yoo, Hwang-Jun;Ka, Min-Kyoung;Kim, Bong-Hyun;Cho, Dong-Uk;Kim, Jong-Ouk
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12a
    • /
    • pp.231-234
    • /
    • 2011
  • 현재 상용화 중인 4세대 이동통신의 사용자가 급증하고 있다. 현재 4세대 이동통신 국내 가입자는 천만 명이 넘어섰으며, 4세대 이동통신에 어느 기술이 사용이 되고 데이터 전송속도가 얼마나 빠른지 알고 사용하는 사람은 많지 않다. 따라서 본 논문에서는 4세대 이동통신에 사용되고 있는 3GPP계열의 LTE-Advanced와 와이맥스 계열의 IEEE802.16m의 데이터 전송속도 기반의 이론적인 속도값과 현재 상용화된 4세대 이동통신의 데이터 전송속도의 실제 측정값을 비교, 분석하여 상호간의 특징적 차이를 분석하는 연구를 수행하였다.

  • PDF

Configuration of a UxNB Security Testbed for 5G-Advanced (5G-Advanced를 위한 UxNB 보안 테스트베드 구성)

  • Seungchan Woo;Jong-Hyouk Lee
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2024.05a
    • /
    • pp.389-391
    • /
    • 2024
  • UxNB(Radio Access Node on-board UAV)는 3GPP(3rd Generation Partnership Project)에서 표준화된 기술 용어로서 사용자 단말에 대한 연결성을 제공하는 무선 액세스 노드로 UAV(Unmanned Aerial Vehicle)를 통해 공중에서 이동성을 가지는 기지국을 의미한다. 이는 드론 기지국, 공중 기지국, 플라잉 기지국 등으로 다양하게 언급된다. UxNB는 5G-Advanced 및 6G 환경에서의 초연결성 및 초저지연 요구사항을 충족하기 위한 필수적인 기술이므로 6G 보안 내재화를 위해 UxNB에 관한 보안 연구가 필요한 실정이다. 본 논문은 UxNB 보안에 대해 효율적으로 연구를 수행할 수 있는 UxNB 보안 테스트베드에 대해 설명하며 확장 방안에 관해 제시한다.

  • PDF