• Title/Summary/Keyword: Information and communication Technology

Search Result 11,726, Processing Time 0.043 seconds

Multidemia Communications System on the Ingernet

  • Kim, Hyun-Joon;Lee, Huen-Joo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 1998.06b
    • /
    • pp.85-91
    • /
    • 1998
  • Many of the newest network suers are gaining their fist network experience as users of the Internet. Because of the universal nature of this exciting new experience, millions of new users are driving the demand for increasingly multimedia oriented applications, especially in communication area. Since the communication via the Internet can use various media forms including audio, video and graphics, it can e very efficient communication system on the Internet, which allows Internet users to communicate, collaborate, and associate with others. Webber provides various communication services, like ACS(Audio Conference System), VCS(Video Conference System) and Virtual Space, in an integrated environment. Webber consists of Service-PUBs(Processing Unit Plug-in), which process each service, and Framework, which manages these PUPs. PUP is so highly independent of each other that it's easy to add, maintain, delete services and also optimally configure the system to user's terminal performance or network status.

  • PDF

Efficient Dummy Generation for Protecting Location Privacy (개인의 위치를 보호하기 위한 효율적인 더미 생성)

  • Cai, Tian-Yuan;Song, Doo-Hee;Youn, Ji-Hye;Lee, Won-Gyu;Kim, Yong-Kab;Park, Kwang-Jin
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.6
    • /
    • pp.526-533
    • /
    • 2016
  • The researches protecting user's location in location-based services(LBS) have received much attention. Especially k-anonymity is the most popular privacy preservation method. k-anonymization means that it selects k-1 other dummies or clients to make the cloaking region. This reduced the probability of the query issuer's location being exposed to untrusted parties to 1/k. But query's location may expose to adversary when k-1 dummies are concentrated in query's location or there is dummy in where query can not exist. Therefore, we proposed the dummy system model and algorithm taking the real environment into account to protect user's location privacy. And we proved the efficiency of our method in terms of experiment result.

Digital Forensics of Microsoft Office 2007-2013 Documents to Prevent Covert Communication

  • Fu, Zhangjie;Sun, Xingming;Xi, Jie
    • Journal of Communications and Networks
    • /
    • v.17 no.5
    • /
    • pp.525-533
    • /
    • 2015
  • MS Office suit software is the most widely used electronic documents by a large number of users in the world, which has absolute predominance in office software market. MS Office 2007-2013 documents, which use new office open extensible markup language (OOXML) format, could be illegally used as cover mediums to transmit secret information by offenders, because they do not easily arouse others suspicion. This paper proposes nine forensic methods and an integrated forensic tool for OOXML format documents on the basis of researching the potential information hiding methods. The proposed forensic methods and tool cover three categories; document structure, document content, and document format. The aim is to prevent covert communication and provide security detection technology for electronic documents downloaded by users. The proposed methods can prevent the damage of secret information embedded by offenders. Extensive experiments based on real data set demonstrate the effectiveness of the proposed methods.

A Study on the Development of Government Emergency Preparedness Policy Priority Elicitation (정부 비상대비정책 우선순위 도출에 관한 연구)

  • Choi, Won Sang;Shin, Jin
    • Convergence Security Journal
    • /
    • v.20 no.2
    • /
    • pp.91-99
    • /
    • 2020
  • The purpose of this study is to present the application of Information and Communication Technology(ICT) during the 4th Industrial Revolution for the efficient implementation of government emergency preparedness policies. Brainstorming by experts categorized the government's emergency preparedness policies into 4 types and 12 detailed tasks. Classification results were used by AHP(Analytic Hierarchy Process) to analyze relative importance and priorities. The AHP survey found that strengthening crisis management responsiveness was the most important detailed task. Artificial Intelligence(AI), Internet of Things(IoT), Unmanned Autonomy System, Virtual Reality(VR), and Augmented Reality(AR) were presented as major information and communication technology(ICT) for the efficient execution of detailed tasks.

Beam Pattern Analysis of LED Reflector Design and Simplification of the Functional Design (조명용 LED 반사컵의 설계변수 의존도 분석 및 기능성 설계의 단순화 기법)

  • Yim, Hae-Dong;Lee, Dong-Jin;Kim, Yang Gyeom;O, Beom-Hoan
    • Korean Journal of Optics and Photonics
    • /
    • v.23 no.5
    • /
    • pp.222-226
    • /
    • 2012
  • The design methods of the reflecting cup employed in an LED lamp are presented. The beam patterns of an LED lamp can be adjusted by functional segmentation of the reflector height. Thus, the reflecting angle of slope was designed according to the height. The analysis of the designed reflecting cup shows that precise adjustable beam patterns can be achieved.

An analysis of tribological properties of the metal interlayered DLC films prepared by PECVD method (PECVD로 증착된 금속층을 포함하는 DLC 박막의 기계적 특성 분석)

  • Jeon, Young-Sook;Choi, Won-Seok;Park, Yong-Seob;Hong, Byung-You
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.07b
    • /
    • pp.951-954
    • /
    • 2004
  • 본 논문에서는 DLC(Diamond-like Carbon) 박막과 기판 사이에 금속층을 포함하는 DLC 박막의 기계적 특성을 분석하였다. 금속층은 sputtering법을 사용하고, DLC 박막은 PECVD법을 사용하여 각각 중착하였다. 티타늄(Ti), 니켄(Ni), 크롬(Cr)을 각 중간 금속층으로 사용한 후 DLC 박막과 실리콘(Si) 기판 간의 기계적 특성을 분석하였다. 각 막의 두께는 FE-SEM으로 확인하였고, DLC 박막의 구조 평가는 Raman spectrometer를 사용하여 분석하였으며, 각 금속층과 DLC 박막의 표면 상태는 AFM을 이용하여 확인하였다. XRD 분석을 통하여 박막의 격자분석을 하였고, SIMS(secondary ion mass spectrometry) 분석을 통하여 DLC 박막의 depth Profile을 확인하였다.

  • PDF

Peak-to-Average Power Ratio Reduction Using N-tuple Selective Mapping Method for MC-CDMA

  • Ali, Sajjad;Chen, Zhe;Yin, Fuliang
    • ETRI Journal
    • /
    • v.37 no.2
    • /
    • pp.338-347
    • /
    • 2015
  • The multi-carrier transmission signal in Multi-Carrier Code Division Multiple Access (MC-CDMA) has a high peak-to-average power ratio (PAPR), which results in nonlinear distortion and deteriorative system performance. An n-tuple selective mapping method is proposed to reduce the PAPR, in this paper. This method generates $2^n$ sequences of an original data sequence by adding n-tuple of n PAPR control bits to it followed by an interleaver and error-control code (ECC) to reduce its PAPR. The convolutional, Golay, and Hamming codes are used as ECCs in the proposed scheme. The proposed method uses different numbers of the n PAPR control bits to accomplish a noteworthy PAPR reduction and also avoids the need for a side-information transmission. The simulation results authenticate the effectiveness of the proposed method.

CASA-based Front-end Using Two-channel Speech for the Performance Improvement of Speech Recognition in Noisy Environments (잡음환경에서의 음성인식 성능 향상을 위한 이중채널 음성의 CASA 기반 전처리 방법)

  • Park, Ji-Hun;Yoon, Jae-Sam;Kim, Hong-Kook
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.289-290
    • /
    • 2007
  • In order to improve the performance of a speech recognition system in the presence of noise, we propose a noise robust front-end using two-channel speech signals by separating speech from noise based on the computational auditory scene analysis (CASA). The main cues for the separation are interaural time difference (ITD) and interaural level difference (ILD) between two-channel signal. As a result, we can extract 39 cepstral coefficients are extracted from separated speech components. It is shown from speech recognition experiments that proposed front-end has outperforms the ETSI front-end with single-channel speech.

  • PDF

Adaptive Situation of the wireless communication technology for the Medical Science Environment (무선정보통신기술의 의료과학 환경 적용현황 분석)

  • Hwang, Jin-Ok;Lee, Do-Yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2100-2106
    • /
    • 2015
  • Recently, we are increasing an interest of the health care from the developing elderly society. The need for the safety standardization is the High-tech industry that the technology of Medical science based on advanced nations with the wireless communication technology. It is urgent matter the chronic disease that is growing the total costs is everyday increased. We consider the standardization of the monitoring the medical examination based on the medical science environment with wireless communication technology. In addition, we make the environment of the powerful nation based on medical / patient care technology for the supporting of the high quality service. In this paper, we focus on description of the relationship that convergence of the medical / patient care science is need the component based on wireless communication technology.

Wireless Channel Identification Algorithm Based on Feature Extraction and BP Neural Network

  • Li, Dengao;Wu, Gang;Zhao, Jumin;Niu, Wenhui;Liu, Qi
    • Journal of Information Processing Systems
    • /
    • v.13 no.1
    • /
    • pp.141-151
    • /
    • 2017
  • Effective identification of wireless channel in different scenarios or regions can solve the problems of multipath interference in process of wireless communication. In this paper, different characteristics of wireless channel are extracted based on the arrival time and received signal strength, such as the number of multipath, time delay and delay spread, to establish the feature vector set of wireless channel which is used to train backpropagation (BP) neural network to identify different wireless channels. Experimental results show that the proposed algorithm can accurately identify different wireless channels, and the accuracy can reach 97.59%.