• Title/Summary/Keyword: User Application Information

Search Result 2,389, Processing Time 0.031 seconds

Development of a Data Integration Tool for Hydraulic Conductivity Map and Its Application (수리전도도맵 작성을 위한 자료병합 툴 개발과 적용)

  • Ryu, Dong-Woo;Park, Eui-Seup;Kenichi, Ando;Kim, Hyung-Mok
    • Tunnel and Underground Space
    • /
    • v.17 no.6
    • /
    • pp.493-502
    • /
    • 2007
  • Measurements of hydraulic conductivity are point or interval values, and are highly limited in their number. Meanwhile, results of geophysical prospecting can provide the information of spatial variation of geology, and abundant in number. In this study, it was aimed to develop a data integration tool for constructing a hydraulic conductivity map by integrating geophysical data and hydraulic conductivity measurements. The developed code employed a geostatistical optimization method, simulated annealing (SA), and consists of 4 distinct computation modules by which from exploratory data analysis to postprocessing of the simulation were processed. All these modules are equipped with Graphical User Interface (GUI). Validation of the developed code was evaluated in-situ in characterizing hydraulic characteristics of highly permeable fractured zone.

Network human-robot interface at service level

  • Nguyen, To Dong;Oh, Sang-Rok;You, Bum-Jae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1938-1943
    • /
    • 2005
  • Network human-robot interface is an important research topic. In home application, users access the robotic system directly via voice, gestures or through the network. Users explore a system by using the services provided by this system and to some extend users are enable to participate in a service as partners. A service may be provided by a robot, a group of robots or robots and other network connected systems (distributed sensors, information systems, etc). All these services are done in the network environment, where uncertainty such as the unstable network connection, the availability of the partners in a service, exists. Moreover, these services are controlled by several users, accessing at different time by different methods. Our research aimed at solving this problem to provide a high available level, flexible coordination system. In this paper, a multi-agent framework is proposed. This framework is validated by using our new concept of slave agents, a responsive multi-agent environment, a virtual directory facilitator (VDF), and a task allocation system using contract net protocol. Our system uses a mixed model between distributed and centralized model. It uses a centralized agent management system (AMS) to control the overall system. However, the partners and users may be distributed agents connected to the center through agent communication or centralized at the AMS container using the slave agents to represent the physical agents. The system is able to determine the task allocation for a group of robot working as a team to provide a service. A number of experiments have been conducted successfully in our lab environment using Issac robot, a PDA for user agent and a wireless network system, operated under our multi agent framework control. The experiments show that this framework works well and provides some advantages to existing systems.

  • PDF

A Study on Media Security in Ubiquitous Network System (유비쿼터스 네트워크 시스템에서의 미디어 보안에 관한 연구)

  • Ju, Min-Seong;Ahn, Seong-Soo;Woo, Young-Hwan;Kim, Yong-Tae;Kim, Tai-Hoon;Park, Gil-Cheol;Kim, Seok-Soo
    • Convergence Security Journal
    • /
    • v.7 no.1
    • /
    • pp.29-34
    • /
    • 2007
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a technique which supports copyright protection to track redistributers of electronic information using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before re-contributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction.

  • PDF

Fuzzy-based Dynamic Packet Scheduling Algorithm for Multimedia Cognitive Radios (멀티미디어 무선인지 시스템을 위한 퍼지 기반의 동적 패킷 스케줄링 알고리즘)

  • Tung, Nguyen Thanh;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.3
    • /
    • pp.1-7
    • /
    • 2012
  • Cognitive radio, a new paradigm for wireless communication, is being recently expected to support various types of multimedia traffics. To guarantee Quality of Service (QoS) from SUs, a static packet priority policy can be considered. However, this approach can easily satisfy Quality of Service of high priority application while that of lower priority applications is being degraded. In the paper, we propose a fuzzy-based dynamic packet scheduling algorithm to support multimedia traffics in which the dynamic packet scheduler modifies priorities of packets according to Fuzzy-rules with the information of priority and delay deadline of each packet, and determines which packet would be transmitted through the channel of the primary user in the next time slot in order to reduce packet loss rate. Our simulation result shows that packet loss rate can be improved through the proposed scheme when overall traffic load is not heavy.

Voice and Video Call Continuity for Enterprise Users (기업형 사용자들을 위한 음성/영상 서비스 이동성 제공 방안)

  • Jung, Chang-Yong;Kim, Hyeon-Soo;Moon, Jeong-Hyeon;Kim, Hee-Dong
    • 한국정보통신설비학회:학술대회논문집
    • /
    • 2009.08a
    • /
    • pp.99-103
    • /
    • 2009
  • Recently, as wired and wireless communication services have rapidly developed and multimodal mobile devices which have various characteristics have widely spread, the need for new convergence services increases. The growing population of VoIP technologies and the high communication expense yield that the market of IP based telephony such as WiFi phone and IP phone is substituted for one of the conventional PSTN telephony. With the help of this trend, the wireline network operators desire to find a market in mobile networks. Therefore, they focus on Fixed Mobile Convergence (FMC) service as one of the key factors to accomplish this goal. FMC services are able to provide the mobility of voice services between circuit switched and packet switched networks. IP Multimedia Subsystem (IMS) based Voice Call Continuity (VCC) is one of the schemes to embody FMC services. As Application Server (AS) which has this VCC function provides seamless handover of services between heterogeneous networks, FMC subscribers can communicate seamlessly with others m WiFi domain and COMA domain using WiFi-COMA dual phone. Most of enterprises have already introduced IP network infrastructure and IP-PBX (Private Branch eXchange) for telephony. However, the problems of high communication cost and work inefficiency due to frequent outside jobs or business trips have remained. In order to solve these problems, demands for enterprise FMC services increase. In this paper, we introduce a new IP-PBX based VCC model that can provide seamless handover of voice services between WiFi and COMA networks for enterprise users and we investigate some interworking and security issues between Soft Switch (SSW) and IMS, or between IMSs. In addition, we introduce a new service that can provide the continuity of voice sessions as well as video sessions using Multimedia Session Continuity (MMSC) technology which has evolved from VCC. This service is expected to be one of the next-generation personalized services based on user's context.

  • PDF

Design and Implementation of Web-based Automatic Study Evaluation System (웹 기반 학습평가 자동화 시스템의 설계 및 구현)

  • Jeong, Yong-Gi;Choe, Eun-Man
    • The KIPS Transactions:PartD
    • /
    • v.9D no.2
    • /
    • pp.289-296
    • /
    • 2002
  • The web, which is most actively used in the internet environment, is changing educational system. Students usually prefer the interactive and multimedia learning aids based on web applications and web media to static web pages. The former is known to enhance the effectiveness of learning. This paper proposes a study system which involves effective adaptation to the various changing factors of learners' progress and the corresponding automated evaluation system. Conventional evaluation utilizes normalized method, where the learning objectives generally set by the instructors or educational operators/administrators are usually pursued rather than the interest of the individual learners, which is not ideal for the computer-based learning. Web-based project-oriented learning system provokes the mutual participations among the users, operators, and administrators in understanding the jobs to be performed and the effort to enhance the progressive developments of knowledge and application capabilities. In this Paper, an automated evaluation system is implemented, where the instructors and web-operators/administrators work as hosts for education. The learners take advantage of user-oriented comparative learning and pattern design. The design and implementation of the project-oriented evaluation methods performed in the internet/intranet environments are discussed.

A Study on the Distribute Authentication Method Scheme through Authentication and Right Mechanism Trend of the Ubiquitous Environment (유비쿼터스 환경의 인증 및 권한 메커니즘 동향을 통한 분산 인증기법 방안 연구)

  • Oh, Dong-Yeol;Sung, Kyung-Sang;Kim, Bae-Hyun;Oh, Hae-Seok
    • Convergence Security Journal
    • /
    • v.8 no.1
    • /
    • pp.35-42
    • /
    • 2008
  • While an information system and administration for an application that a user contacts with raise a head by an important problem, a system approach and methodology for administration are mentioned. Authentication technology of various configuration is used, but non-efficiency by complicated authentication administration and operation inappropriate use are for a successful expansion of various and new business of wire/wireless environment. In addition, under the mobile computer environment with different authentic method each other, it is difficult at all to expect flexible and continuous service. Under the ubiquitous computing environment, It is very important thing plan to research and develop compatibility and the side of variance authentication plan that preservation characteristics are helped. Hereby, This paper look around an requirement items and authority mechanism for the administration and the operation mechanism of the distributed authentication considering expansion possibility of the ubiquitous computing environment not only fixed computing environment but also mobile computing. In future, we expect it by can guide positive participation about distributed authentication technique of the genuine ubiquitous environment.

  • PDF

Authentication Algorithm using Random Graphic Code (무작위적인 그래픽 코드를 이용한 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.12
    • /
    • pp.63-69
    • /
    • 2019
  • Using a smartphone allows quick and easy authentication and payment. However, smartphone security threats are evolving into a variety of new hacking technologies, and are changing to attacks specific to the mobile environment. Therefore, there is a demand for an authentication method suitable for a mobile environment. In order to solve security weaknesses in knowledge-based authentication, many companies provide two-step authentication services such as OTP(One Time Password) to provide authentication services such as finance, games, and login. Although OTP service is easy to use, it is easy to duplicate random number table and has a disadvantage that can be reused because it is used as valid value within time limit. In this paper, we propose a mechanism that enables users to quickly and easily authenticate with high security using the authentication method that recognizes special characters through smartphone's dedicated application.

Detection of Colluded Multimedia Fingerprint by Neural Network (신경회로망에 의한 공모된 멀티미디어 핑거프린트의 검출)

  • Noh Jin-Soo;Rhee Kang-Hyeon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.43 no.4 s.310
    • /
    • pp.80-87
    • /
    • 2006
  • Recently, the distribution and using of the digital multimedia contents are easy by developing the internet application program and related technology. However, the digital signal is easily duplicated and the duplicates have the same quality compare with original digital signal. To solve this problem, there is the multimedia fingerprint which is studied for the protection of copyright. Fingerprinting scheme is a techniques which supports copyright protection to track redistributors of electronic inform on using cryptographic techniques. Only regular user can know the inserted fingerprint data in fingerprinting schemes differ from a symmetric/asymmetric scheme and the scheme guarantee an anonymous before recontributed data. In this paper, we present a new scheme which is the detection of colluded multimedia fingerprint by neural network. This proposed scheme is consists of the anti-collusion code generation and the neural network for the error correction. Anti-collusion code based on BIBD(Balanced Incomplete Block Design) was made 100% collusion code detection rate about the average linear collusion attack, and the hopfield neural network using (n,k)code designing for the error bits correction confirmed that can correct error within 2bits.

Virtual Reality and 3D Printing for Craniopagus Surgery

  • Kim, Gayoung;Shim, Eungjune;Mohammed, Hussein;Kim, Youngjun;Kim, Yong Oock
    • Journal of International Society for Simulation Surgery
    • /
    • v.4 no.1
    • /
    • pp.9-12
    • /
    • 2017
  • Purpose Surgery for separating craniopagus twins involves many critical issues owing to complex anatomical features. We demonstrate a 3D printed model and virtual reality (VR) technologies that could provide valuable benefits for surgical planning and simulation, which would improve the visualization and perception during craniopagus surgery. Material & Methods We printed a 3D model extracted from CT images of craniopagus patients using segmentation software developed in-house. Then, we imported the 3D model to create the VR environment using 3D simulation software (Unity, Unity Technologies, CA). We utilized the HTC Vive (HTC & Valve Corp) head-mount-display for the VR simulation. Results We obtained the 3D printed model of craniopagus patients and imported the model to a VR environment. Manipulating the model in VR was possible, and the 3D model in the VR environment enhanced the application of user-friendly 3D modeling in surgery for craniopagus twins. Conclusion The use of the 3D printed model and VR has helped understand complicated anatomical structures of craniopagus patients and has made communicating with other medical surgeons in the field much easier. Further, interacting with the 3D model is possible in VR, which enhances the understanding of the craniopagus surgery as well as the success rate of separation surgery while providing useful information on diagnosing and surgery planning.