• Title/Summary/Keyword: Space information network

Search Result 1,264, Processing Time 0.026 seconds

Diary Application Design Based Augmented Reality Using Tree(metaphor) (나무를 메타포로 하는 증강현실 기반 일상다이어리 어플리케이션 기획 및 설계)

  • Kim, Yoo-bin;Roh, Jong-hee;Lee, Ye-Won;Lee, Hyo-Jeong;Park, Jung Kyu;Park, Su e
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.201-204
    • /
    • 2017
  • People live in their everyday life busy with studies, part-time jobs, and searching for an ideal job. In their busy routine, they try to find time for themselves and expose their emotions through diverse social network services(SNS). We made a service that we can plant a virtual tree in places we daily visit and go by. You can keep note on the virtual tree and look through the past records. It is a reality based mobile application service that can be used like a diary.In this project we chose the tree as the metaphor and tried to express time passing in a specific place. As our memory is a part of our daily life, we emphasized the meaning of space important.

  • PDF

Smartwork Wired Wireless System Security Design (스마트워크의 유·무선시스템 보안설계)

  • Cheon, Jae-Hong;Park, Dea-woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.10a
    • /
    • pp.346-348
    • /
    • 2017
  • The speed of technology development is increasing, and high-performance digital devices are spreading. Smart walks that can work effectively anytime and anywhere by being restricted from space and time in wired digital devices such as PC, System security design is needed to secure integrity and availability against various security threats such as physical threats such as lost, stolen and damaged terminals, technical threats such as theft, denial of service, and unauthorized access, compared with the wired environment. In this paper, we analyze smart work network system, wired / wireless link system, and digital smart device. We study security design method for smart work wired system and future wireless system which are used in present work. This study will be used as basic data for building a secure smart work.

  • PDF

Detecting Malicious Scripts in Web Contents through Remote Code Verification (원격코드검증을 통한 웹컨텐츠의 악성스크립트 탐지)

  • Choi, Jae-Yeong;Kim, Sung-Ki;Lee, Hyuk-Jun;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.47-54
    • /
    • 2012
  • Sharing cross-site resources has been adopted by many recent websites in the forms of service-mashup and social network services. In this change, exploitation of the new vulnerabilities increases, which includes inserting malicious codes into the interaction points between clients and services instead of attacking the websites directly. In this paper, we present a system model to identify malicious script codes in the web contents by means of a remote verification while the web contents downloaded from multiple trusted origins are executed in a client's browser space. Our system classifies verification items according to the origin of request based on the information on the service code implementation and stores the verification results into three databases composed of white, gray, and black lists. Through the experimental evaluations, we have confirmed that our system provides clients with increased security by effectively detecting malicious scripts in the mashup web environment.

An Improved Split Algorithm for Indexing of Moving Object Trajectories (이동 객체 궤적의 색인을 위한 개선된 분할 알고리즘)

  • Jeon, Hyun-Jun;Park, Ju-Hyun;Park, Hee-Suk;Cho, Woo-Hyun
    • The KIPS Transactions:PartD
    • /
    • v.16D no.2
    • /
    • pp.161-168
    • /
    • 2009
  • Recently, use of various position base servicesthat collect position information for moving object and utilize in real life is increasing by the development of wireless network technology. Accordingly, new index structures are required to efficiently retrieve the consecutive positions of moving objects. This paper addresses an improved trajectory split algorithm for the purpose of efficiently supporting spatio-temporal range queries using index structures that use Minimum Bounding Rectangles(MBR) as trajectory approximations. We consider volume of Extended Minimum Bounding Rectangles (EMBR) to be determined by average size of range queries. Also, Use a priority queue to speed up our process. This algorithm gives in general sub-optimal solutions with respect to search space. Our improved trajectory split algorithm is going to derive minimizing volume of EMBRs better than previously proposed split algorithm.

Analysis and Suggestions of Digital Heritage Policy

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.71-78
    • /
    • 2019
  • In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.

SMIL Authoring System for Multi-media synchronization and representation (멀티미디어 동기화 및 표현을 위한 SMIL 저작 시스템)

  • Ham, Jong-Wan;Jin, Du-Seok;Choi, Bong-Kyu;Cao, Ke-Rang;Park, Man-Seob;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.653-656
    • /
    • 2009
  • Currently with development of development and the hardware of the superhigh speed network about increase is spreading out at the rapid pace the many multimedia contents quite from internet. The production environment is growing about the multimedia contents because of such as circumstance, as well as multimedia contents will increase. However, Numerous voice, the picture, with text etc. the time of the same multimedia contents and problem of spatial synchronization occur, started. W3C(World Wide Web Consortium) solves like this problem point presented the method for. Does so, SMIL(Synchronized Multimedia Integration Language) where puts a base in XML(Extensible Markup Language) will be able to compose the expression of the multimedia contents which is various standard was proposed. SMIL the individual multimedia object of chain with time will be able to integrate with the multimedia presentation which is synchronized spatial in order. In this paper a variety of multimedia content and synchronization of the time and space, to be represented by integrating the design and implementation of SMIL authoring system.

  • PDF

Group-based speaker embeddings for text-independent speaker verification (문장 독립 화자 검증을 위한 그룹기반 화자 임베딩)

  • Jung, Youngmoon;Eom, Youngsik;Lee, Yeonghyeon;Kim, Hoirin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.496-502
    • /
    • 2021
  • Recently, deep speaker embedding approach has been widely used in text-independent speaker verification, which shows better performance than the traditional i-vector approach. In this work, to improve the deep speaker embedding approach, we propose a novel method called group-based speaker embedding which incorporates group information. We cluster all speakers of the training data into a predefined number of groups in an unsupervised manner, so that a fixed-length group embedding represents the corresponding group. A Group Decision Network (GDN) produces a group weight, and an aggregated group embedding is generated from the weighted sum of the group embeddings and the group weights. Finally, we generate a group-based embedding by adding the aggregated group embedding to the deep speaker embedding. In this way, a speaker embedding can reduce the search space of the speaker identity by incorporating group information, and thereby can flexibly represent a significant number of speakers. We conducted experiments using the VoxCeleb1 database to show that our proposed approach can improve the previous approaches.

The System for 3D Image Obtain and Provide corresponding to User's Viewpoint (사용자 시점에 대응 3차원 영상 획득 및 제공 시스템)

  • Lee, Seung-Jae;Jeon, Yeong-Mi;Kim, Nam-Woo;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.835-837
    • /
    • 2016
  • In this research, Detect viewpoint of the user in other to obtain the coordinates and provided obtain a corresponding stereo images of different positions, Provide a system which can be observed remotely break the spatial limits. For system configuration Designed with a physical action such as left and right movement and rotation of the head is the largest factor in human viewpoint change. Therefore, this system is calculated to analyze user viewpoint, Control system for providing three-dimensional images obtained, It is implemented in network communication for data transmission, As the user observed the object in the same space even though free to observe a target at a remote location, Obtaining a stereo image that corresponds to the viewpoint providing a three-dimensional image, We implemented a system that provides the same visual effect and directly observed.

  • PDF

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

A Study of Patch Antenna for 6GHz (6GHz 대역용 패치 안테나 연구)

  • Yong-Wook, Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1063-1068
    • /
    • 2022
  • The modern society has become entry into the information age after the spread of Internet. In the information age, internet was developed from the wired access to the wireless Internet access. When a surge in demand for wireless Internet access, performance and speed of 2.4 and 5GHz band for Wi-Fi which leads to saturation of the communication was significantly fall. Accordingly, the communication of the 6GHz band for Wi-Fi 6E came to be interested. In this paper, we studied the design and fabrication of microstrip patch antenna to be used in wireless communication systems operating at around 6GHz band. To obtain antenna parameters such as patch size, inter patch space, antenna was simulated by HFSS(High Frequency Structure Simulator). From these parameters, slot microstrip patch antenna is fabricated using FR-4 of dielectric constant 4.4. The characteristics of fabricated patch type microstrip antenna were analyzed by network analyzer.