• Title/Summary/Keyword: Information code

Search Result 6,050, Processing Time 0.041 seconds

A Multimedia Presentation Authoring System based on Conceptual Temporal Relations (개념적 시간관계 기반의 멀티미디어 프레젠테이션 저작 시스템)

  • 노승진;장진희;성미영
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.266-277
    • /
    • 2003
  • Every conceptual temporal rat relationship can be described using one of seven relations (before, meets, overlaps, during, starts, finishes, and equals ). The conceptual representation provides an efficient means for our multimedia authoring system to automatically fill in the necessary timing details. We developed a multimedia Presentation authoring system that supports a mechanism for conceptually representing the temporal relations of different media. Among the many editors that make up our system, the temporal relation editor provides users with an intuitive mechanism for representing the conceptual flow of a presentation by simple and direct graphical manipulations. Our system is based on the SMIL(Synchronized Multimedia Integration Language). The conceptual temporal relation editor and other editors of our system exchange their information in real-time and automatically generate SMIL codes through the SMIL Object Manager. Our system uses TRN(Temporal Relation Network) as its internal multimedia presentation representation. The TRN corresponds exactly to the structure seen in the graphical representation of the presentation. A parallel relationship found in a TRN can be collapsed into a single synchronization block. This facilitates the determination of the playing time of each component and can be the basic unit for reusability of already prepared blocks of presentation code.

Development of EUC-KR based Locale and Application Program Supporting North Korean Collating Sequence (북한 한글 순서를 지원하는 EUC-KR 기반의 로캘과 응용 프로그램 개발)

  • Jung Il-dong;Lee Jung-hwa;Kim Yong-ho;Kim Kyongsok
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.875-884
    • /
    • 2004
  • UCS (=ISO/IEC 10646, =Unicode) will be used widely as globalization. If UCS is used for official purpose in Koreas, UCS solves a Problem in different hangeul code between South and North Korea. But, UCS is not a solution for problems in unequal order with the same character. IS0/1EC 146sl : 2000 (International String Ordering), which is a international standard for string ordering, defines a framework sorting all char-acter strings consisting multi-national scripts. Because the Common Template Table in ISO/IEC 14651 defines orders of characters, we can change orders of characters without changes of characters sequences in programs. Therefore, we can solve a ordering problem without unifying order of hangeul in South and North Korea. Functions related ISO/IEC 14651 are contained by system librarys in unix-based operating system such as Linux, Solaris and FreeBSD. We implement EUC-KR-based North Korean locale, which includes North Korean hangeul order, in Linux in order to use North Korean locale in South Korea. And we develop a program ordering strings with South and North Korean hangout order.

Deisgn of adaptive array antenna for tracking the source of maximum power and its application to CDMA mobile communication (최대 고유치 문제의 해를 이용한 적응 안테나 어레이와 CDMA 이동통신에의 응용)

  • 오정호;윤동운;최승원
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2594-2603
    • /
    • 1997
  • A novel method of adaptive beam forming is presented in this paper. The proposed technique provides for a suboptimal beam pattern that increases the Signal to Noise/Interference Ratio (SNR/SIR), thus, eventually increases the capacity of the communication channel, under an assumption that the desired signal is dominant compared to each component of interferences at the receiver, which is precoditionally achieved in Code Division Multiple Access (CDMA) mobile communications by the chip correlator. The main advantages of the new technique are:(1)The procedure requires neither reference signals nor training period, (2)The signal interchoerency does not affect the performance or complexity of the entire procedure, (3)The number of antennas does not have to be greater than that of the signals of distinct arrival angles, (4)The entire procedure is iterative such that a new suboptimal beam pattern be generated upon the arrival of each new data of which the arrival angle keeps changing due tot he mobility of the signal source, (5)The total amount of computation is tremendously reduced compared to that of most conventional beam forming techniques such that the suboptimal beam pattern be produced at vevery snapshot on a real-time basis. The total computational load for generating a new set of weitht including the update of an N-by-N(N is the number of antenna elements) autocovariance matrix is $0(3N^2 + 12N)$. It can further be reduced down to O(11N) by approximating the matrix with the instantaneous signal vector.

  • PDF

THE ROLE OF SATELLITE REMOTE SENSING TO DETECT AND ASSESS THE DAMAGE OF TSUNAMI DISASTER

  • Siripong, Absornsuda
    • Proceedings of the KSRS Conference
    • /
    • v.2
    • /
    • pp.827-830
    • /
    • 2006
  • The tsunami from the megathrust earthquake magnitude 9.3 on 26 December 2004 is the largest tsunami the world has known in over forty years. This tsunami destructively attacked 13 countries around Indian Ocean with at least 230,000 fatalities, displaced people 2,089,883 and 1.5 million people who lost their livelihoods. The ratio of women and children killed to men is 3 to 1. The total damage costs US$ 10.73 billion and rebuilding costs US$ 10.375 billion. The tsunami's death toll could have been drastically reduced, if the warning was disseminated quickly and effectively to the coastal dwellers along the Indian Ocean rim. With a warning system in Indian Ocean similar to that operating in the Pacific Ocean since 1965, it would have been possible to warn, evacuate and save countless lives. The best tribute we can pay to all who perished or suffered in this disaster is to heed its powerful lessons. UNESCO/IOC have put their tremendous effort on better disaster preparedness, functional early warning systems and realistic arrangements to cope with tsunami disaster. They organized ICG/IOTWS (Indian Ocean Tsunami Warning System) and the third of this meeting is held in Bali, Indonesia during $31^{st}$ July to $4^{th}$ August 2006. A US$ 53 million interim warning system using tidal gauges and undersea sensors is nearing completion in the Indian Ocean with the assistance from IOC. The tsunami warning depends strictly on an early detection of a tsunami (wave) perturbation in the ocean itself. It does not and cannot depend on seismological information alone. In the case of 26 December 2004 tsunami when the NOAA/PMEL DART (Deep-ocean Assessment and Reporting of Tsunami) system has not been deployed, the initialized input of sea surface perturbation for the MOST (Method Of Splitting Tsunami) model was from the tsunamigenic-earthquake source model. It is the first time that the satellite altimeters can detect the signal of tsunami wave in the Bay of Bengal and was used to validate the output from the MOST model in the deep ocean. In the case of Thailand, the inundation part of the MOST model was run from Sumatra 2004 for inundation mapping purposes. The medium and high resolution satellite data were used to assess the degree of the damage from Indian Ocean tsunami of 2004 with NDVI classification at 6 provinces on the Andaman seacoast of Thailand. With the tide-gauge station data, run-up surveys, bathymetry and coastal topography data and land-use classification from satellite imageries, we can use these information for coastal zone management on evacuation plan and construction code.

  • PDF

Pattern Generation for Coding Error Detection in VHDL Behavioral-Level Designs (VHDL 행위-레벨 설계의 코딩오류 검출을 위한 패턴 생성)

  • Kim, Jong-Hyeon;Park, Seung-Gyu;Seo, Yeong-Ho;Kim, Dong-Uk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.185-197
    • /
    • 2001
  • Recently, the design method by VHDL coding and synthesis has been used widely. As the integration ratio increases, the amount design by VHDL at a time also increases so many coding errors occur in a design. Thus, lots of time and effort is dissipated to detect those coding errors. This paper proposed a method to verify the coding errors in VHDL behavioral-level designs. As the methodology, we chose the method to detect the coding error by applying the generated set of verifying patterns and comparing the responses from the error-free case(gold unit) and the real design. Thus, we proposed an algorithm to generate the verifying pattern set for the coding errors. Verifying pattern generation is peformed for each code and the coding errors are classified as two kind: condition errors and assignment errors. To generate the patterns, VHDL design is first converted into the corresponding CDFG(Control & Data Flow Graph) and the necessary information is extracted by searching the paths in CDFG. Path searching method consists of forward searching and backward searching from the site where it is assumed that coding error occurred. The proposed algorithm was implemented with C-language. We have applied the proposed algorithm to several example VHDL behavioral-level designs. From the results, all the patterns for all the considered coding errors in each design could be generated and all the coding errors were detectable. For the time to generate the verifying patterns, all the considered designed took less than 1 [sec] of CPU time in Pentium-II 400MHz environments. Consequently, the verification method proposed in this paper is expected to reduce the time and effort to verify the VHDL behavioral-level designs very much.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

Bit-Rate Control Using Histogram Based Rate-Distortion Characteristics (히스토그램 기반의 비트율-왜곡 특성을 이용한 비트율 제어)

  • 홍성훈;유상조;박수열;김성대
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1742-1754
    • /
    • 1999
  • In this paper, we propose a rate control scheme, using histogram based rate-distortion (R-D) estimation, which produces a consistent picture quality between consecutive frames. The histogram based R-D estimation used in our rate control scheme offers a closed-form mathematical model that enable us to predict the bits and the distortion generated from an encoded frame at a given quantization parameter (QP) and vice versa. The most attractive feature of the R-D estimation is low complexity of computing the R-D data because its major operation is just to obtain a histogram or weighted histogram of DCT coefficients from an input picture. Furthermore, it is accurate enough to be applied to the practical video coding. Therefore, the proposed rate control scheme using this R-D estimation model is appropriate for the applications requiring low delay and low complexity, and controls the output bit-rate ad quality accurately. Our rate control scheme ensures that the video buffer do not underflow and overflow by satisfying the buffer constraint and, additionally, prevents quality difference between consecutive frames from exceeding certain level by adopting the distortion constraint. In addition, a consistent considering the maximum tolerance BER of the voice service. Also in Rician fading channel of K=6 and K=10, considering CLP=$10^{-3}$ as a criterion, it is observed that the performance improment of about 3.5 dB and 1.5 dB is obtained, respectively, in terms of $E_b$/$N_o$ by employing the concatenated FEC code with pilot symbols.

  • PDF

Design and Performance Analysis of the Efficient Equalization Method for OFDM system using QAM in multipath fading channel (다중경로 페이딩 채널에서 QAM을 사용하는 OFDM시스템의 효율적인 등화기법 설계 및 성능분석)

  • 남성식;백인기;조성호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.6B
    • /
    • pp.1082-1091
    • /
    • 2000
  • In this paper, the efficient equalization method for OFDM(Orthogonal Frequency Division Multiflexing) System using the QAM(Quadrature Amplitude Modulation) in multipath fading channel is proposed in order to faster and more efficiently equalize the received signals that are sent over real channel. In generally, the one-tap linear equalizers have been used in the frequency-domain as the existing equalization method for OFDM system. In this technique, if characteristics of the channel are changed fast, the one-tap linear equalizers cannot compensate for the distortion due to time variant multipath channels. Therefore, in this paper, we use one-tap non-linear equalizers instead of using one-tap linear equalizers in the frequency-domain, and also use the linear equalizer in the time-domain to compensate the rapid performance reduction at the low SNR(Signal-to-Noise Ratio) that is the disadvantage of the non-linear equalizer. In the frequency-domain, when QAM signals, consisting of in-phase components and quadrature (out-phase) components, are sent over the complex channel, the only in-phase and quadrature components of signals distorted by the multipath fading are changed the same as signals distorted by the noise. So the cross components are canceled in the frequency-domain equalizer. The time-domain equalizer and the adaptive algorithm that has lower-error probability and fast convergence speed are applied to compensate for the error that is caused by canceling the cross components in the frequency-domain equalizer. In the time-domain, To compensate for the performance of frequency-domain equalizer the time-domain equalizes the distorted signals at a frame by using the Gold-code as a training sequence in the receiver after the Gold-codes are inserted into the guard signal in the transmitter. By using the proposed equalization method, we can achieve faster and more efficient equalization method that has the reduced computational complexity and improved performance.

  • PDF

A Study on the Development of the Export Factoring in UK and US (영미 수출팩토링 제도에 관한 연구 - 한국에의 시사점을 중심으로-)

  • Lee, Oun-Yeong
    • International Commerce and Information Review
    • /
    • v.14 no.1
    • /
    • pp.345-366
    • /
    • 2012
  • The country using factoring actively today is England. The history of factoring could throw back to the Middle Ages, but modern factoring was developed in colonial age of the United States and it was known throughout England in 1960s. At the beginning, it performed mercantile agent who works in local area in order to get rid of uncertainty and inconvenience of a distant trade, but it was getting developed into a today's factoring system which focusing more on financial function. The factoring is called 'account receivable financing' in the United States and it is started out as sales agent and getting developed to 'del credere agent' who guarantee the payment. The activities of factors have been expanded to not only consignment sale and payment guarantees but also advance financing service. However, at the end of the 19th century, the direct sales(direct marketing) was expanded by the development of telecommunication and transportation technology, and then the marketing service by factor was degraded, but the collection of payment and advance finance had been maintained until now and developed into today's factoring system. Especially, the establishment of Uniform Commercial Code in 1931 had formed the basis for activating factoring in the United States through preparing a legal basis of factoring. Due to changes of international trade environment, most of commercial bank in Korea have to deal with export factoring as a trade finance service and it is desirable to specialize as a financing for small and medium company.

  • PDF

IoT Open-Source and AI based Automatic Door Lock Access Control Solution

  • Yoon, Sung Hoon;Lee, Kil Soo;Cha, Jae Sang;Mariappan, Vinayagam;Young, Ko Eun;Woo, Deok Gun;Kim, Jeong Uk
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.12 no.2
    • /
    • pp.8-14
    • /
    • 2020
  • Recently, there was an increasing demand for an integrated access control system which is capable of user recognition, door control, and facility operations control for smart buildings automation. The market available door lock access control solutions need to be improved from the current level security of door locks operations where security is compromised when a password or digital keys are exposed to the strangers. At present, the access control system solution providers focusing on developing an automatic access control system using (RF) based technologies like bluetooth, WiFi, etc. All the existing automatic door access control technologies required an additional hardware interface and always vulnerable security threads. This paper proposes the user identification and authentication solution for automatic door lock control operations using camera based visible light communication (VLC) technology. This proposed approach use the cameras installed in building facility, user smart devices and IoT open source controller based LED light sensors installed in buildings infrastructure. The building facility installed IoT LED light sensors transmit the authorized user and facility information color grid code and the smart device camera decode the user informations and verify with stored user information then indicate the authentication status to the user and send authentication acknowledgement to facility door lock integrated camera to control the door lock operations. The camera based VLC receiver uses the artificial intelligence (AI) methods to decode VLC data to improve the VLC performance. This paper implements the testbed model using IoT open-source based LED light sensor with CCTV camera and user smartphone devices. The experiment results are verified with custom made convolutional neural network (CNN) based AI techniques for VLC deciding method on smart devices and PC based CCTV monitoring solutions. The archived experiment results confirm that proposed door access control solution is effective and robust for automatic door access control.