• Title/Summary/Keyword: Digital techniques

Search Result 2,242, Processing Time 0.031 seconds

A Study on Environmental research Trends by Information and Communications Technologies using Text-mining Technology (텍스트 마이닝 기법을 이용한 환경 분야의 ICT 활용 연구 동향 분석)

  • Park, Boyoung;Oh, Kwan-Young;Lee, Jung-Ho;Yoon, Jung-Ho;Lee, Seung Kuk;Lee, Moung-Jin
    • Korean Journal of Remote Sensing
    • /
    • v.33 no.2
    • /
    • pp.189-199
    • /
    • 2017
  • Thisstudy quantitatively analyzed the research trendsin the use ofICT ofthe environmental field using the text mining technique. To that end, the study collected 359 papers published in the past two decades(1996-2015)from the National Digital Science Library (NDSL) using 38 environment-related keywords and 16 ICT-related keywords. It processed the natural languages of the environment and ICT fields in the papers and reorganized the classification system into the unit of corpus. It conducted the text mining analysis techniques of frequency analysis, keyword analysis and the association rule analysis of keywords, based on the above-mentioned keywords of the classification system. As a result, the frequency of the keywords of 'general environment' and 'climate' accounted for 77 % of the total proportion and the keywords of 'public convergence service' and 'industrial convergence service' in the ICT field took up approximately 30 % of the total proportion. According to the time series analysis, the researches using ICT in the environmental field rapidly increased over the past 5 years (2011-2015) and the number of such researches more than doubled compared to the past (1996-2010). Based on the environmental field with generated association rules among the keywords, it was identified that the keyword 'general environment' was using 16 ICT-based technologies and 'climate' was using 14 ICT-based technologies.

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.

Artificial Intelligence Algorithms, Model-Based Social Data Collection and Content Exploration (소셜데이터 분석 및 인공지능 알고리즘 기반 범죄 수사 기법 연구)

  • An, Dong-Uk;Leem, Choon Seong
    • The Journal of Bigdata
    • /
    • v.4 no.2
    • /
    • pp.23-34
    • /
    • 2019
  • Recently, the crime that utilizes the digital platform is continuously increasing. About 140,000 cases occurred in 2015 and about 150,000 cases occurred in 2016. Therefore, it is considered that there is a limit handling those online crimes by old-fashioned investigation techniques. Investigators' manual online search and cognitive investigation methods those are broadly used today are not enough to proactively cope with rapid changing civil crimes. In addition, the characteristics of the content that is posted to unspecified users of social media makes investigations more difficult. This study suggests the site-based collection and the Open API among the content web collection methods considering the characteristics of the online media where the infringement crimes occur. Since illegal content is published and deleted quickly, and new words and alterations are generated quickly and variously, it is difficult to recognize them quickly by dictionary-based morphological analysis registered manually. In order to solve this problem, we propose a tokenizing method in the existing dictionary-based morphological analysis through WPM (Word Piece Model), which is a data preprocessing method for quick recognizing and responding to illegal contents posting online infringement crimes. In the analysis of data, the optimal precision is verified through the Vote-based ensemble method by utilizing a classification learning model based on supervised learning for the investigation of illegal contents. This study utilizes a sorting algorithm model centering on illegal multilevel business cases to proactively recognize crimes invading the public economy, and presents an empirical study to effectively deal with social data collection and content investigation.

  • PDF

The analysis of demand and supply in contents for platform differentiation (플랫폼 차별화를 위한 콘텐츠 수요와 공급량 분석)

  • Park, Sang-Eun;Choi, Seong-Jhin;Lee, Young-Ju
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.783-795
    • /
    • 2009
  • We analyze the demand and supply in contents for platform differentiation in this paper. The contents provided by new platforms such DMB, IPTV which are introduced by the digital techniques and broadband network are almost same, so it is definitely necessary to differentiate the broadcasting contents for the development of telecommunication industry. To forecast the contents demand needed for each media, we assume 3 scenarios such as maximum, medium and minimum demand for contents considering deregulation of media policy. Also, we include the expected number of channels according to the changeover of policies as a variable for scenario. To predict the supply of contents of each media, we analyze 3 scenarios according to operating rates of production facilities as 100%, 70%, 50% and first-run ratio/rerun ratio of both terrestrial broadcastings and major program providers. The result shows that in case of scenario A, new contents for 453,484 hours are required every year and maximum contents that can be produced in present production facilities are just for 72,852 hours even in condition of 100% operating rate. This means that the unbalance of demand and supply of contents is extremely big and implies that the policies of focusing only on the development of platform and network industry are inadequate. It is time to foster contents business for differentiation of multiplatforms.

Investigation on Digital Terrain Model (수치지형모형(數値地形模型)에 관한 연구(硏究))

  • Lee, Suk Chan;Cho, Kyu Jon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.2 no.1
    • /
    • pp.93-104
    • /
    • 1982
  • DTM data evaluation regards accuracy and efficiency as its most important parameters, and these two elements are sensitively influenced by the sampling technique employed and its procedure. This study attempts to improve sampling techniques and evaluate the accuracy of DTM based on earth volume calculation, using aerial photography and field survey information as basic DTM data, and a regular grid and progressive sampling method for sampling process. Especially, the progressive sampling has employed different combinations of threshold and sampling criteria, that is, parameters influential on efficiency and accuracy, for the purpose of numerical tests intended to permit comparative analysis. The tests have resulted in the findings that in progressive sampling its grid density fits in well with given terrain characteristics in proportion to their variability. and that threshold and accuracy contain close mutual relations in which an increased threshold bringing more efficency but less accuracy. It follows, therefore. that a threshold, when appropriately determined, can be of very efficient use for considerably broad applications, and particularly, will play a significant role in its application to such general civil engineering as earth volume calculation.

  • PDF

Development of User Music Recognition System For Online Music Management Service (온라인 음악 관리 서비스를 위한 사용자 음원 인식 시스템 개발)

  • Sung, Bo-Kyung;Ko, Il-Ju
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.91-99
    • /
    • 2010
  • Recently, recognizing user resource for personalized service has been needed in digital content service fields. Especially, to analyze user taste, recommend music and service music related information need recognition of user music file in case of online music service. Music related information service is offered through recognizing user music based on tag information. Recognition error has grown by weak points like changing and removing of tag information. Techniques of content based user music recognition with music signal itself are researched for solving upper problems. In this paper, we propose user music recognition on the internet by extracted feature from music signal. Features are extracted after suitable preprocessing for structure of content based user music recognition. Recognizing on music server consist of feature form are progressed with extracted feature. Through this, user music can be recognized independently of tag data. 600 music was collected and converted to each 5 music qualities for proving of proposed recognition. Converted 3000 experiment music on this method is used for recognition experiment on music server including 300,000 music. Average of recognition ratio was 85%. Weak points of tag based music recognition were overcome through proposed content based music recognition. Recognition performance of proposed method show a possibility that can be adapt to online music service in practice.

An Extraction Method of Number Plates for Various Vehicles Using Digital Signal Analysis Processing Techniques (디지털 신호 분석 기법을 이용한 다양한 번호판 추출 방법)

  • Yang, Sun-Ok;Jun, Young-Min;Jung, Ji-Sang;Ryu, Sang-Hwan
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.3
    • /
    • pp.12-19
    • /
    • 2008
  • Detection of a number plate consists of three stages; division of a number plate, extraction of each character from the plate, recognition of the characters. Among of these three states, division stage of a number plate is the most important part and also the most time-consuming state. This paper suggests an effective region extraction method of a number plate for various images obtained from unmanned inspection systems of illegal parking violation, especially when we have to consider the diverse surrounding environments of roads. Our approaching method detects each region by investigating the characteristics in changes of brightness and intensity between the background part and character part, and the characteristics on character parts such as the sizes, heights, widths, and distance in between two characters. The method also divides a number plate into different types of the plate. This research can solve the number plate region detection failure problems caused by plate edge damages not only for Korean domestic number plates but also for new European style number plates. The method also reduces the time consumption by processing the detection in real-time, therefore, it can be used as a practical solution.

Analyzation and Improvements of the Revised 2015 Education Curriculum for Information Science of Highschool: Focusing on Information Ethics and Multimedia (고등학교 정보과학의 2015 개정 교육과정에 대한 분석 및 개선 방안: 정보윤리와 멀티미디어를 중심으로)

  • Jeong, Seungdo;Cho, Jungwon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.208-214
    • /
    • 2016
  • With the rising interest in intelligence information technology built on artificial intelligence and big data technologies, all countries in the world including advanced countries such as the United States, the United Kingdom, Japan and so on, have launched national investment programs in preparation for the fourth industrial revolution centered on the software industry. Our country belatedly recognized the importance of software and initiated the 2015 revised educational curriculum for elementary and secondary informatics subjects. This paper thoroughly analyzes the new educational curriculum for information science in high schools and, then, suggests improvements in the areas of information ethics and multimedia. The analysis of the information science curriculum is applied to over twenty science high schools and schools for gifted children, which are expected to play a leading role in scientific research in our country. In the future artificial intelligence era, in which our dependence on information technology will be further increased, information ethics education for talented students who will play the leading role in making and utilizing artificial intelligence systems should be strongly emphasized, and the focus of their education should be different from that of the existing system. Also, it is necessary that multimedia education centered on digital principles and compression techniques for images, sound, videos, etc., which are commonly used in real life, should be included in the 2015 revised educational curriculum. In this way, the goal of the 2015 revised educational curriculum can be achieved, which is to encourage innovation and the efficient resolution of problems in real life and diverse academic fields based on the fundamental concepts, principles and technology of computer science.

Security Analysis and Improvement of an Anonymous Asymmetric Fingerprinting Scheme with Trusted Third Party (익명적 비대칭 핑거프린팅 기법의 보안 취약성 분석 및 개선 방안)

  • Kwon, Sae-Ran
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.36 no.5
    • /
    • pp.396-403
    • /
    • 2009
  • An anonymous asymmetric fingerprinting protocol combined with watermarking techniques, is one of the copyright protection technologies keeping both right of a seller and that of a buyer, where a seller and an anonymous buyer perform such a protocol that employs various cryptographic tools in order that the seller does not know the exact watermarked copy that the buyer receives, while inserting an invisible non-removable fingerprint i.e., each different unique watermark, into each copy of the digital content to be sold. In such a protocol innocent buyers are kept anonymous during transactions, however, the unlawful reseller is unambiguously identified with a real identity as a copyright violator. In 2007, Yong and Lee proposed an anonymous asymmetric fingerprinting scheme with trusted third party. In this paper we point out the weakness of their scheme such as: the buyer with intention can remove the fingerprint in the watermarked content, because he/she can decrypt the encrypted fingerprint with a symmetric key using man-in-the-middle-attack; a real identity of a buyer can be revealed to the seller through the identification process even though he/she is honest. Furthermore, we propose an improved secure and efficient anonymous asymmetric fingerprinting scheme which enables to reduce the number of communication between the participants.

A Study on the Attenuation of Surface Acoustic Waves by Optical Measurement Method (광학적 측정방법에 의한 표면 탄성파의 감쇠에 관한 연구)

  • You, I.H.;Kim, D.I.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.14 no.4
    • /
    • pp.237-243
    • /
    • 1995
  • We have studied methods of detecting attenuation of solid materials such as silicon wafer and piezoelectric $LiTaO_3$ by means of optical probing techniques. We have performed measurements of surface acoustic waves(SAW) generated from 90 degree wedge type transducer and also from inter-digital transducers(IDT). SAW of 20.0 MHz was generated on a silicon wafer from the 90 degree wedge type transducer and those of 20.8 and 14.5 MHz are generated on a $LiTaO_3$ from the IDT. Then any surface-corrugation resulted from the above SAW was investigated by He-Ne laser beams. We projected laser beams, which were modulated by an optical chopper, on the SAW of the same frequency and then measured the scattered beam by the lock-in amplifier. We modulated and synchronized both SAW and the incident laser beam as well as the phase sensitive detector(PSD) to the same frequency in order to simplify our measurement system. We obtained the attenuation coefficients of SAW to be $0.62{\sim}0.75dB/mm$(from IDT1, 20.8 MHz), and $0.60{\sim}0.72dB/mm$(from IDT2, 14.5 MHz), $0.83{\sim}1.28dB/mm$(from the wedge type), respectively.

  • PDF