• Title/Summary/Keyword: Information weakness

Search Result 789, Processing Time 0.029 seconds

Video Adaptation Model for User-Centric Contents Delivery in Mobile Computing (모바일 환경에서 맞춤형 콘텐츠 전달을 위한 비디오 적응성 모델)

  • Kim, Svetlana;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.389-394
    • /
    • 2009
  • Lately the usage of multimedia equipment with small LCD displays is rapidly increasing. Although many people use devices like this, videos intended for TV or HDTV are sent to these mobile devices. Therefore cases where it is hard for the user to view the desired scenes are growing more frequent. Currently, most services simply reduce the size of the content to fit the screen when they offer it for mobile devices. However, especially with sports broadcasts, there are many areas that cannot be seen very well because it was simply reduced in size. We therefore consider this weakness and are researching how to let the user choose an area of interest and then sending it to the user in a way that fits the device. In this paper, we address the problem of video delivery and personalization. For the delivered video content, we suggest the UP-SAM User Personalized Context-Aware Service Adaptation Middleware) model that uses the video content description and MPEG-21 multimedia framework.

Design and Implementation of File protection system based on Windows 2000 system (Windows 2000기반의 파일 보호 시스템 설계 및 구현)

  • Lee, Nam-Hun;Yu, Sin-Geun;Sim, Yeong-Cheol
    • The KIPS Transactions:PartC
    • /
    • v.8C no.6
    • /
    • pp.741-756
    • /
    • 2001
  • With the development of computer systems, there has been a sharp increase in the threats on these systems including attacks by malicious programs such as virus, vandal, etc. Currently virus vaccines are widely used to thwart these threats, but they have many weaknesses. They cannot guard against unknown threats and sometimes, they also cannot detect the existence of malicious programs before these malicious programs make any destructive results. For lack of an efficient security model, the existing security programs have the problem that they raise many false-positive alarms in spite of normal action. So it becomes very important to develop the improved security program that can make up for the weakness of the existing computer security program and can detect many threats of malicious programs as early as possible. In this paper we describe the design of an improved security model and the implementation of a security program that can filter and handle the threats on computer systems at the kernel level in real time.

  • PDF

Agent Based Process Management Environment (에이전트 기반의 프로세스 관리 환경에 관한 연구)

  • Kim, Jeong-Ah;Choi, Seung-Young;Choi, Sung-Woon
    • The KIPS Transactions:PartD
    • /
    • v.13D no.5 s.108
    • /
    • pp.691-698
    • /
    • 2006
  • The companies need the enterprise-wide support environment to build the competency to gather VOM(Voice of Market) in the process of preparing and implementing the strategy and to help establishing and managing the business process in order to secure the continuous competitive edge The enterprise-wide support environment to establish, operate, improve and evaluate the business process must be carried out. In this paper we define the method to define process and business rule in order to enable accurate execution of the process. Furthermore, collection and refection of accurate data concerning the competency of individuals, the subjects of the process execution, allows prevention of weakness of the process execution result and is the basis for identifying the areas of improvement. Therefore, high visibility can be attained through the work knowledge and processes presented in rules, and it can help firmly establish the process centered work culture (or system) in the organization by process improvement strictly based on data.

The Distinctive Feature of Acupuncture Treatment in ZhangJinYoPian(藏珍要編) (19세기 조선 침구서 장진요편의 침법 연구)

  • Oh, Jun-Ho
    • Korean Journal of Acupuncture
    • /
    • v.27 no.1
    • /
    • pp.159-168
    • /
    • 2010
  • Objective: ZhangJinYoPian(藏珍要編, ZJYP) is a book witten by Song-WooGe in the late 19th century. While Korea has lost this book to tell us Korea traditional acupuncture treatment in the late 19th century, This book appeared as a manuscript in Japan. There is no reaserch or study carried out for this book. Furthermore, a few people know existence of this book. So I analyzed acupuncture treatment of the ZJYP and sort out the distinctive feature of it. Method: For that, I studied bibliographic information of this book and classified contents of it into three parts - medical thought, needle manipulation and acupoint selection to consider it's caracteristics. Results and Conclusions: 1. The author of ZJYP thought that weakness of good power in the body and strongness of evil power out of the body cause a disease. so Doctor should examine quality of both to care patient's pain. 2. The author of ZJYP thought that needle manipulation is one of the most important thing. Doctors can use needle manipulation to control patient condition. Especially, he suggested cooling and heating manipulation except reinforcement and reduction. 3. He stressed viscera and bowels. he located viscera and bowels theory in front of the book to explain relationship of these. It shows us that ZJYP maintained academic characteristics of acupuncture in Chosun-Korea. 4. While He minimized the number of acupoints used in treatment, he multiplied its combination. He selected one or two acupoints from each meridian pathway. It include Eight Confluent points(八脈交會穴). But these points were used in different ways to control the viscera and bowels, not to care the eight extra meridians.

Analysis of the Current Status of Internet Fashion Shopping Malls and Proposal of a Cyber Fitting System as an Improvement

  • Tak, Myung-Ja;Kim, Chee-Yong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.12
    • /
    • pp.1809-1818
    • /
    • 2009
  • In order to correctly understand the Internet fashion shopping mall, which is expected to continuously grow up, and to strengthen marketing activities in cyber space, a more scientific and systematic research is necessary. Most of the early researches of the Internet fashion shopping mall were focused on technical parts so they studied the environmental and physical characteristics of the Internet fashion shopping mall, but recently, the Internet fashion shopping mall is activated and accordingly, the interest in Internet shopping users is going up. Under this circumstance, the research to understand the characteristics of Internet shopping consumers becomes necessary. Therefore, the research was conducted by a survey, focusing on college students who use Internet a lot. The survey covered the experience and the type of using the Internet fashion shopping mall, the extent of satisfaction, strengths, and weaknesses of the Internet fashion shopping mall, the use of a cyber fitting system, and the possibility of the development of the Internet fashion shopping mall having a cyber fitting system. As a result of the study, it was found that: most of the students used the Internet fashion shopping mall; they used a fashion-specialized mall most; they pointed out economy of time as the biggest strength of using the Internet fashion shopping mall; they thought the biggest weakness of the Internet fashion shopping mall is that they can not try on clothes so they can not check whether clothes go well with them or not; and regarding the intention to use a cyber fitting system if available and the possibility of the development of the Internet fashion shopping mall, they replied that they would use it and the malls with the system would be developed. Based on the results, this study proposes a cyber fitting system as an improvement of the Internet fashion shopping mall.

  • PDF

Outlier Reduction using C-SCGP for Target Localization based on RSS/AOA in Wireless Sensor Networks (무선 센서 네트워크에서 C-SCGP를 이용한 RSS/AOA 이상치 제거 기반 표적 위치추정 기법)

  • Kang, SeYoung;Lee, Jaehoon;Song, JongIn;Chung, Wonzoo
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.31-37
    • /
    • 2021
  • In this paper, we propose an outlier detection algorithm called C-SCGP to prevent the degradation of localization performance based on RSS (Received Signal Strength) and AOA (Angle of Arrival) in the presence of outliers in wireless sensor networks. Since the accuracy of target estimation can significantly deteriorate due to various cause of outliers such as malfunction of sensor, jamming, and severe noise, it is important to detect and filter out all outliers. The single cluster graph partitioning (SCGP) algorithm has been widely used to remove such outliers. The proposed continuous-SCGP (C-SCGP) algorithm overcomes the weakness of the SCGP that requires the threshold and computing probability of outliers, which are impratical in many applications. The results of numerical simulations show that the performance of C-SCGP without setting threshold and probability computation is the same performance of SCGP.

Data modeling and algorithms design for implementing Competency-based Learning Outcomes Assessment System (역량기반 학습성과 평가 시스템 구현을 위한 데이터 모델링 및 알고리즘 설계)

  • Chung, Hyun-Sook;Kim, Jung-Min
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.11
    • /
    • pp.335-344
    • /
    • 2021
  • The purpose of this paper is the development of course data models and learning achievement computation algorithms for enabling the course-embedded assessment(CEA), which is essential of competency-based education in higher education. The previous works related CEA have weakness in the development of the systematic solution for CEA computation. In this paper, we propose data models and algorithms to implement competency-based assessment system. Our data models are composed of a layered architecture of learning outcomes, learning modules and activities, and an associative matrix of learning outcomes and activities. The proposed methods can be applied to the development of the course-embedded assessment system as core modules. We evaluated the effectiveness of our proposed models through applying the models to a practical course, Java Programing. From the result of the experiments we found that our models can be used in the assessment system as a core module.

BAG3 mutation in a patient with atypical phenotypes of myofibrillar myopathy and Charcot-Marie-Tooth disease

  • Kim, Seung Ju;Nam, Soo Hyun;Kanwal, Sumaira;Nam, Da Eun;Yoo, Da Hye;Chae, Jong?Hee;Suh, Yeon?Lim;Chung, Ki Wha;Choi, Byung?Ok
    • Genes and Genomics
    • /
    • v.40 no.12
    • /
    • pp.1269-1277
    • /
    • 2018
  • Bcl2-associated athanogene 3 (BAG3) mutations have been reported to cause the myofibrillar myopathy (MFM) which shows progressive limb muscle weakness, respiratory failure, and cardiomyopathy. Myopathy patients with BAG3 mutation are very rare. We described a patient showing atypical phenotypes. We aimed to find the genetic cause of Korean patients with sensory motor polyneuropathy, myopathy and rigid spine. We performed whole exome sequencing (WES) with 423 patients with sensory motor polyneuropathy. We found BAG3 mutation in one patient with neuropathy, myopathy and rigid spine syndrome, and performed electrophysiological study, whole body MRI and muscle biopsy on the patient. A de novo heterozygous p.Pro209Leu (c.626C>T) mutation in BAG3 was identified in a female myopathy. She first noticed a gait disturbance and spinal rigidity at the age of 11, and serum creatine kinase levels were elevated ninefolds than normal. She showed an axonal sensory-motor polyneuropathy like Charcot-Marie-Tooth disease (CMT), myopathy, rigid spine and respiratory dysfunction; however, she did not show any cardiomyopathy, which is a common symptom in BAG3 mutation. Lower limb MRI and whole spine MRI showed bilateral symmetric fatty atrophy of muscles at the lower limb and paraspinal muscles. When we track traceable MRI 1 year later, the muscle damage progressed slowly. As far as our knowledge, this is the first Korean patient with BAG3 mutation. We described a BAG3 mutation patient with atypical phenotype of CMT and myopathy, and those are expected to broaden the clinical spectrum of the disease and help to diagnose it.

Research on the Action Strategies of Plant Facility Industries for Global Shale Gas Development. -A Case of Casting Valve Industry- (글로벌 셰일가스 개발에 따른 플랜트 설비 산업계의 대응 전략 연구 -주조 밸브 산업 중심으로-)

  • Kim, Cheol;Leem, Choon Seong
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.389-397
    • /
    • 2018
  • Recently, Global Shale gas development has expanded, increasing shale gas production has transformed the energy market.As a result of the reduction of energy facilities, in order to overcome the management deterioration of domestic casting valve industry and enter the enlarged shale gas plant, tried to confirm the SWOT factor through the second questionnaire based on the questionnaire survey of related industry experts and previous studies. As a strength-strategy, presented three factors besides collaboration with domestic companies, suggested four factors including product development specialized in shale gas plant as a weakness complement. Thesis offer to scholarly-Practical implications, Internal-external environmental factors, strategization for entering New energy market. thesis offer to scholarly, Practical implications, environmental factors, strategization for entering New energy market. After, analyze a important of research strategy, would like to study the impact on the company according to the ranking of importance.

Changes in the Industrial Structure caused by the IoT and AI (사물인터넷과 AI가 가져올 산업구조의 변화)

  • Kim, Jang-Hwan
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.93-99
    • /
    • 2017
  • Recently IoT(Internet of Things) service industry has grown very rapidly. In this paper, we investigated the changes in IoT service industry as well as new direction of human life in future global society. Under these changing market conditions, competition has been also changed into global and ecological competition. But compared to the platform initiatives and ecological strategies of global companies, Korean companies' vision of building ecosystems is still unclear. In addition, there is a need of internetworking between mobile and IoT services. IoT security Protocol has weakness of leaking out information from Gateway which connected wire and wireless communication. As such, we investigate the structure of IoT and AI service ecosystem in order to gain strategic implications and insights for the security industry in this paper.