• Title/Summary/Keyword: Space information network

Search Result 1,270, Processing Time 0.032 seconds

Analysis and Suggestions of Digital Heritage Policy

  • Lee, Jongwook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.24 no.10
    • /
    • pp.71-78
    • /
    • 2019
  • In this paper, we divided domestic and foreign digital cultural activation policies into four types. We also described projects of each policy and analyzed the limitations of the policy. Finally, we suggested solutions to overcome these limitations. Changes in daily life caused by the recent development of 5G network technology, augmented reality, and virtual reality technology have brought many changes in the way of preservation and utilization of cultural heritage. In particular, digital technology is used for digitization of cultural heritage, storing, and managing digital data, digitally restoring cultural heritage, and enabling time, space, multi-sensory experiences. For this purpose, new policies was required to utilize this. This study divides domestic and international digital heritage policies into digital infrastructure construction, sharing and communication platform construction, public relations, and demonstration contents production support policies. This study is meaningful in classifying the fields of digital heritage policy and introducing digital heritage policy trends. It is also meaningful to suggest ways to improve digital heritage policies through analysis of domestic and foreign cases.

SMIL Authoring System for Multi-media synchronization and representation (멀티미디어 동기화 및 표현을 위한 SMIL 저작 시스템)

  • Ham, Jong-Wan;Jin, Du-Seok;Choi, Bong-Kyu;Cao, Ke-Rang;Park, Man-Seob;Jung, Hoe-Kyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.653-656
    • /
    • 2009
  • Currently with development of development and the hardware of the superhigh speed network about increase is spreading out at the rapid pace the many multimedia contents quite from internet. The production environment is growing about the multimedia contents because of such as circumstance, as well as multimedia contents will increase. However, Numerous voice, the picture, with text etc. the time of the same multimedia contents and problem of spatial synchronization occur, started. W3C(World Wide Web Consortium) solves like this problem point presented the method for. Does so, SMIL(Synchronized Multimedia Integration Language) where puts a base in XML(Extensible Markup Language) will be able to compose the expression of the multimedia contents which is various standard was proposed. SMIL the individual multimedia object of chain with time will be able to integrate with the multimedia presentation which is synchronized spatial in order. In this paper a variety of multimedia content and synchronization of the time and space, to be represented by integrating the design and implementation of SMIL authoring system.

  • PDF

Group-based speaker embeddings for text-independent speaker verification (문장 독립 화자 검증을 위한 그룹기반 화자 임베딩)

  • Jung, Youngmoon;Eom, Youngsik;Lee, Yeonghyeon;Kim, Hoirin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.40 no.5
    • /
    • pp.496-502
    • /
    • 2021
  • Recently, deep speaker embedding approach has been widely used in text-independent speaker verification, which shows better performance than the traditional i-vector approach. In this work, to improve the deep speaker embedding approach, we propose a novel method called group-based speaker embedding which incorporates group information. We cluster all speakers of the training data into a predefined number of groups in an unsupervised manner, so that a fixed-length group embedding represents the corresponding group. A Group Decision Network (GDN) produces a group weight, and an aggregated group embedding is generated from the weighted sum of the group embeddings and the group weights. Finally, we generate a group-based embedding by adding the aggregated group embedding to the deep speaker embedding. In this way, a speaker embedding can reduce the search space of the speaker identity by incorporating group information, and thereby can flexibly represent a significant number of speakers. We conducted experiments using the VoxCeleb1 database to show that our proposed approach can improve the previous approaches.

The System for 3D Image Obtain and Provide corresponding to User's Viewpoint (사용자 시점에 대응 3차원 영상 획득 및 제공 시스템)

  • Lee, Seung-Jae;Jeon, Yeong-Mi;Kim, Nam-Woo;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.835-837
    • /
    • 2016
  • In this research, Detect viewpoint of the user in other to obtain the coordinates and provided obtain a corresponding stereo images of different positions, Provide a system which can be observed remotely break the spatial limits. For system configuration Designed with a physical action such as left and right movement and rotation of the head is the largest factor in human viewpoint change. Therefore, this system is calculated to analyze user viewpoint, Control system for providing three-dimensional images obtained, It is implemented in network communication for data transmission, As the user observed the object in the same space even though free to observe a target at a remote location, Obtaining a stereo image that corresponds to the viewpoint providing a three-dimensional image, We implemented a system that provides the same visual effect and directly observed.

  • PDF

A Defense Mechanism Against Attacks on Files by Hiding Files (파일 은닉을 통한 파일 대상 공격 방어 기법)

  • Choi, Jione;Lee, Junghee;Lee, Gyuho;Yu, Jaegwan;Park, Aran
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2022
  • Deception technology is an extended concept of honeypot, which detects, prevents or delays attacks by deceiving adversaries. It has been applied to various system components such as network ports, services, processes, system calls and database management systems. We can apply the same concept to attacks on files. A representative example of a file attack is ransomware. Ransomware is a type of malware that encrypts user files and ask for ransom to recover those files. Another example is the wiper attack, which erases all or target files of a system. In this paper we propose a defense mechanism against these kinds of attacks by hiding files. Compared to backup or virtualization techniques, the proposed method incurs less space and performance overheads.

A Study of Patch Antenna for 6GHz (6GHz 대역용 패치 안테나 연구)

  • Yong-Wook, Park
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.6
    • /
    • pp.1063-1068
    • /
    • 2022
  • The modern society has become entry into the information age after the spread of Internet. In the information age, internet was developed from the wired access to the wireless Internet access. When a surge in demand for wireless Internet access, performance and speed of 2.4 and 5GHz band for Wi-Fi which leads to saturation of the communication was significantly fall. Accordingly, the communication of the 6GHz band for Wi-Fi 6E came to be interested. In this paper, we studied the design and fabrication of microstrip patch antenna to be used in wireless communication systems operating at around 6GHz band. To obtain antenna parameters such as patch size, inter patch space, antenna was simulated by HFSS(High Frequency Structure Simulator). From these parameters, slot microstrip patch antenna is fabricated using FR-4 of dielectric constant 4.4. The characteristics of fabricated patch type microstrip antenna were analyzed by network analyzer.

Efficient Visual Place Recognition by Adaptive CNN Landmark Matching

  • Chen, Yutian;Gan, Wenyan;Zhu, Yi;Tian, Hui;Wang, Cong;Ma, Wenfeng;Li, Yunbo;Wang, Dong;He, Jixian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.11
    • /
    • pp.4084-4104
    • /
    • 2021
  • Visual place recognition (VPR) is a fundamental yet challenging task of mobile robot navigation and localization. The existing VPR methods are usually based on some pairwise similarity of image descriptors, so they are sensitive to visual appearance change and also computationally expensive. This paper proposes a simple yet effective four-step method that achieves adaptive convolutional neural network (CNN) landmark matching for VPR. First, based on the features extracted from existing CNN models, the regions with higher significance scores are selected as landmarks. Then, according to the coordinate positions of potential landmarks, landmark matching is improved by removing mismatched landmark pairs. Finally, considering the significance scores obtained in the first step, robust image retrieval is performed based on adaptive landmark matching, and it gives more weight to the landmark matching pairs with higher significance scores. To verify the efficiency and robustness of the proposed method, evaluations are conducted on standard benchmark datasets. The experimental results indicate that the proposed method reduces the feature representation space of place images by more than 75% with negligible loss in recognition precision. Also, it achieves a fast matching speed in similarity calculation, satisfying the real-time requirement.

Patent Keyword Analysis using Gamma Regression Model and Visualization

  • Jun, Sunghae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.8
    • /
    • pp.143-149
    • /
    • 2022
  • Since patent documents contain detailed results of research and development technologies, many studies on various patent analysis methods for effective technology analysis have been conducted. In particular, research on quantitative patent analysis by statistics and machine learning algorithms has been actively conducted recently. The most used patent data in quantitative patent analysis is technology keywords. Most of the existing methods for analyzing the keyword data were models based on the Gaussian probability distribution with random variable on real space from negative infinity to positive infinity. In this paper, we propose a model using gamma probability distribution to analyze the frequency data of patent keywords that can theoretically have values from zero to positive infinity. In addition, in order to determine the regression equation of the gamma-based regression model, two-mode network is constructed to visualize the technological association between keywords. Practical patent data is collected and analyzed for performance evaluation between the proposed method and the existing Gaussian-based analysis models.

Design of Interactive Operations using Prefetching in VoD System (VoD 시스템에서 선반입 기법을 이용한 대화식 동작의 설계)

  • Kim, Soon-Cheol
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.15 no.2
    • /
    • pp.31-39
    • /
    • 2010
  • VoD(Video-on-Demand) servers have to provide timely processing guarantees for continuous media and reduce the storage and bandwidth requirements for continuous media. The compression techniques make the bit rates of compressed video data significantly variable from frame to frame. A VoD system should be able to provide the client with interactive operations such as fast forward and fast rewind in addition to normal playback of movie. However, interactive operations require additional resources such as storage space, disk bandwidth, memory and network bandwidth. In a stored video application such as VoD system, it is possible that a priori disk access patterns can be used to reserve the system resources in advance. In addition, clients of VoD server spend most of their time in playback mode and the period of time spent in interactive mode is relatively small. In this paper, I present the new buffer management scheme that provides efficient support for interactive operations in a VoD server using variable bit rate continuous media. Simulation results show that our strategy achieves 34% increase of the number of accepted clients over the LRU strategy.

Correlation Analysis between BLE-based RSSI and SoC Internal or Local Temperature (BLE 기반 RSSI와 SoC 내부 또는 국부 온도의 상관관계)

  • Kim, Seong-Chang;Lee, Min-Jeong;Oh, Sung-Bhin;Kim, Jun-Su;Kim, Jin-Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.05a
    • /
    • pp.89-91
    • /
    • 2022
  • Wireless sensor networks(WSN), which are mainly used for indoor positioning, rely on the accuracy of RSSI. This RSSI is sensitive to several factors that cause interference, and there are foreign studies showing that temperature has a large effect on RSSI in indoor/outdoor environment among several factors. The temperature of the indoor space is uneven due to heat sources or air cooling systems indoors, and temperature changes frequently occur at certain locations. In particular, in case of an indoor fire, the accurate positioning system is required to guide an evacuation route, but a high temperature is locally formed due to a fire around the receiver, so the RSSI value could be influenced. In this paper, the effect on RSSI is studied by analyzing the correlation between SoC internal/local temperature and RSSI.

  • PDF