• Title/Summary/Keyword: User data

Search Result 8,933, Processing Time 0.038 seconds

Correlation between Head Movement Data and Virtual Reality Content Immersion (헤드 무브먼트 데이터와 가상현실 콘텐츠 몰입도 상관관계)

  • Kim, Jungho;Yoo, Taekyung
    • Journal of Broadcast Engineering
    • /
    • v.26 no.5
    • /
    • pp.500-507
    • /
    • 2021
  • The virtual reality industry has an opportunity to take another leap forward with the surge in demand for non-face-to-face content and interest in the metaverse after Covid-19. Therefore, in order to popularize virtual reality content along with this trend, high-quality content production and storytelling research suitable for the characteristics of virtual reality should be continuously conducted. In order for content to which virtual reality characteristics are applied to be effectively produced through user feedback, a quantitative index that can evaluate the content is needed. In this study, the process of viewing virtual reality contents was analyzed and head movement was set as a quantitative indicator. Afterwards, the experimenter watched five animations and analyzed the correlation between recorded head movement information and immersion. As a result of the analysis, high immersion was shown when the head movement speed was relatively slow, and it was found that the head movement speed can be used significantly as an index indicating the degree of content immersion. The result derived in this way can be used as a quantitative indicator that can verify the validity of the storytelling method applied after the prototype is produced when the creator creates virtual reality content. This method can improve the quality of content by quickly identifying the problems of the proposed storytelling method and suggesting a better method. This study aims to contribute to the production of high-quality virtual reality content and the popularization of virtual reality content as a basic research to analyze immersion based on the quantitative indicator of head movement speed.

A Fuzzy-AHP-based Movie Recommendation System with the Bidirectional Recurrent Neural Network Language Model (양방향 순환 신경망 언어 모델을 이용한 Fuzzy-AHP 기반 영화 추천 시스템)

  • Oh, Jae-Taek;Lee, Sang-Yong
    • Journal of Digital Convergence
    • /
    • v.18 no.12
    • /
    • pp.525-531
    • /
    • 2020
  • In today's IT environment where various pieces of information are distributed in large volumes, recommendation systems are in the spotlight capable of figuring out users' needs fast and helping them with their decisions. The current recommendation systems, however, have a couple of problems including that user preference may not be reflected on the systems right away according to their changing tastes or interests and that items with no relations to users' preference may be recommended, being induced by advertising. In an effort to solve these problems, this study set out to propose a Fuzzy-AHP-based movie recommendation system by applying the BRNN(Bidirectional Recurrent Neural Network) language model. Applied to this system was Fuzzy-AHP to reflect users' tastes or interests in clear and objective ways. In addition, the BRNN language model was adopted to analyze movie-related data collected in real time and predict movies preferred by users. The system was assessed for its performance with grid searches to examine the fitness of the learning model for the entire size of word sets. The results show that the learning model of the system recorded a mean cross-validation index of 97.9% according to the entire size of word sets, thus proving its fitness. The model recorded a RMSE of 0.66 and 0.805 against the movie ratings on Naver and LSTM model language model, respectively, demonstrating the system's superior performance in predicting movie ratings.

A study on the digitalization of 3D Pen (3D펜의 디지털화에 대한 연구)

  • Kim, Jong-Young;Jeon, Byung-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.6
    • /
    • pp.583-590
    • /
    • 2021
  • This paper is a study on the digitization of an analog 3D pen. The term digital implies features such as homeostasis, transformability, combinability, reproducibility, and convenience of storage. One device that produces a combination of these digital characteristics is a 3D printer, but its industrial use is limited due to low productivity and limitations with materials and physical characteristics. In particular, improvements are required to use 3D printers, such as better user accessibility owing to expertise and skills in modeling software and printers. Complementing this fact is the 3D pen, which is excellent in portability and ease of use, but has a limitation in that it cannot be digitized. Therefore, in order to secure a digitalization capability and ease of use, and to secure the safety of printing materials that pose controversial hazards during the printing process, research problems and alternatives have been derived by combining food, and digitization was demonstrated with a newly developed 3D pen. In order to digitize the 3D pen, a sensor in a structured device detects the motion of an analog 3D pen, and this motion is converted into 3D data (X-Y-Z coordinate values) through a spatial analysis algorithm. To prove this method, the similarity was confirmed by visualization using MeshLab version 1.3.4. It is expected that this food pen can be used in youth education and senior healthcare programs in the future.

A Study on the Operation Status and Improvements of the Libraries' Instagram (도서관의 인스타그램(Instagram) 운영 현황과 개선방안에 관한 연구)

  • Kim, Young-ju;Kim, Hee-sook;Jung, Jin-il;Kwon, Sun-young;Jeong, Yoo Kyung
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.2
    • /
    • pp.401-428
    • /
    • 2021
  • Recently, libraries are trying to communicate with users using various social media. Among them, Instagram is the most used SNS by users recently. Therefore, in this study, in order to effectively operate the library Instagram, we looked at how Instagram in the library is operated, what posts and contents people are interested in, and how the library can utilize it. By analyzing the Instagram operation status of Instagram, we tried to suggest improvement plans and activation plans. For this purpose, theoretical background research on SNS and Instagram, analysis of prior research, and related data were collected and analyzed. Next, for 82 domestic library accounts opened on Instagram, the library type, region, and Instagram account number of posts, 'followers', 'follows', images, etc. were collected, and the Text, hashtags, upload date, number of 'likes' and comments were analyzed. As a result of the study, it was found that increasing followers, uploading user-customized posts, formalizing account profiles, using library-specific hashtags, and communication with users are necessary to activate library Instagram.

Protecting Fingerprint Data for Remote Applications (원격응용에 적합한 지문 정보 보호)

  • Moon, Dae-Sung;Jung, Seung-Hwan;Kim, Tae-Hae;Lee, Han-Sung;Yang, Jong-Won;Choi, Eun-Wha;Seo, Chang-Ho;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.63-71
    • /
    • 2006
  • In this paper, we propose a secure solution for user authentication by using fingerprint verification on the sensor-client-server model, even with the client that is not necessarily trusted by the sensor holder or the server. To protect possible attacks launched at the untrusted client, our solution makes the fingerprint sensor validate the result computed by the client for the feature extraction. However, the validation should be simple so that the resource-constrained fingerprint sensor can validate it in real-time. To solve this problem, we separate the feature extraction into binarization and minutiae extraction, and assign the time-consuming binarization to the client. After receiving the result of binarization from the client, the sensor conducts a simple validation to check the result, performs the minutiae extraction with the received binary image from the client, and then sends the extracted minutiae to the server. Based on the experimental results, the proposed solution for fingerprint verification can be performed on the sensor-client-server model securely and in real-time with the aid of an untrusted client.

A Study on the policy counterplan of Cross Border Financial Information Transfer according to FTA (FTA 체결에 따른 금융정보 국외이전에 대한 정책적 대응방향 연구)

  • Lee, Jung-Hun;Park, Seok-Hoon;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.3
    • /
    • pp.117-130
    • /
    • 2011
  • In a situation where worldwide free trade between countries has expanded recently, our country is being rapidly pushed FTA agreements with the financial developed countries such as United States, EU. According to the agreement, the user information of foreign financial companies in Korea is expected to be transfered overseas. In this paper, we need to define the scope and the definition about the transfer of information and analyze the relating domestic and foreign laws preparing for Cross Border Financial Information Transfer. Also, we review the expected issues about the transfer of information divided into institutional and technical sectors and arc presented the policy implication such as differentiation of regulatory information, enactment and amendment of Personal Information Protection Law(Draft) and related regulations, ensuring the safety of financial companies, raise the standard guidelines of the transfer of information. We refers to the needs for policy formulation to differentiate our privacy information from financial information to protect the privacy of users. The proposed countermeasures in this paper is expected to be helpful the measures to prepare for other institutions such as banks and supervisory authorities prepare for the future Cross Border Financial Information Transfer according to PTA.

Rule-base Expert System for Privacy Violation Certainty Estimation (개인정보유출 확신도 도출을 위한 전문가시스템개발)

  • Kim, Jin-Hyung;Lee, Alexander;Kim, Hyung-Jong;Hwang, Jun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.125-135
    • /
    • 2009
  • Logs from various security system can reveal the attack trials for accessing private data without authorization. The logs can be a kind of confidence deriving factors that a certain IP address is involved in the trial. This paper presents a rule-based expert system for derivation of privacy violation confidence using various security systems. Generally, security manager analyzes and synthesizes the log information from various security systems about a certain IP address to find the relevance with privacy violation cases. The security managers' knowledge handling various log information can be transformed into rules for automation of the log analysis and synthesis. Especially, the coverage of log analysis for personal information leakage is not too broad when we compare with the analysis of various intrusion trials. Thus, the number of rules that we should author is relatively small. In this paper, we have derived correlation among logs from IDS, Firewall and Webserver in the view point of privacy protection and implemented a rule-based expert system based on the derived correlation. Consequently, we defined a method for calculating the score which represents the relevance between IP address and privacy violation. The UI(User Interface) expert system has a capability of managing the rule set such as insertion, deletion and update.

Research on the Current Situation of ICT Using and Learning among the Elderly in Urban China (중국 도시 노인의 ICT 이용 및 학습실태에 관한 연구)

  • Li, Yue-Yi;Pan, Young-Hwan
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.6
    • /
    • pp.17-25
    • /
    • 2021
  • Population aging is an inevitable problem in our society nowadays, and the current aging trend in Asia is prominent and the number of elderly people is huge, among which the World Health Organization predicts that by 2050, 35% of China's population will be over 60 years old, making it the most serious aging country in the world. According to actual reports and surveys, there is a clear digital divide between a large proportion of the elderly and ICT technology, which has had a negative impact on the quality of life and mentality of the elderly living in cities due to the rapid development of technology and the dramatic changes that have occurred in urban life in recent years. The author chose Chinese urban elderly as the main research topic, the research method through the collation of existing literature and information combined with the actual data research, narrative collation of the current situation of ICT use among the Chinese urban elderly and the causes of the difficulties, summarize the ability of the Chinese urban elderly as the representative of the elderly users to master and learn ICT. The study concluded that the needs of the elderly for ICT are multi-layered and there is a gradation in the ability of the elderly users to master various ICT services, so that the elderly can better use and enjoy ICT services and provide teaching and services in a hierarchical and targeted manner can be the next research direction.

A Study on a Non-Voice Section Detection Model among Speech Signals using CNN Algorithm (CNN(Convolutional Neural Network) 알고리즘을 활용한 음성신호 중 비음성 구간 탐지 모델 연구)

  • Lee, Hoo-Young
    • Journal of Convergence for Information Technology
    • /
    • v.11 no.6
    • /
    • pp.33-39
    • /
    • 2021
  • Speech recognition technology is being combined with deep learning and is developing at a rapid pace. In particular, voice recognition services are connected to various devices such as artificial intelligence speakers, vehicle voice recognition, and smartphones, and voice recognition technology is being used in various places, not in specific areas of the industry. In this situation, research to meet high expectations for the technology is also being actively conducted. Among them, in the field of natural language processing (NLP), there is a need for research in the field of removing ambient noise or unnecessary voice signals that have a great influence on the speech recognition recognition rate. Many domestic and foreign companies are already using the latest AI technology for such research. Among them, research using a convolutional neural network algorithm (CNN) is being actively conducted. The purpose of this study is to determine the non-voice section from the user's speech section through the convolutional neural network. It collects the voice files (wav) of 5 speakers to generate learning data, and utilizes the convolutional neural network to determine the speech section and the non-voice section. A classification model for discriminating speech sections was created. Afterwards, an experiment was conducted to detect the non-speech section through the generated model, and as a result, an accuracy of 94% was obtained.

Analysis of Behavior Characteristics According to The Foundations Fixing Conditions of Storage Racks (적재설비 기초 고정조건에 따른 거동특성 분석)

  • Park, Chae-Rin;Heo, Gwang-Hee;Kim, Chung-Gil;Park, Jin-Yong;Ko, Byeong-Chan
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.25 no.3
    • /
    • pp.68-76
    • /
    • 2021
  • Storage racks have suffered huge losses due to earthquakes, but related research and regulations are relatively insufficient non-structural elements compared to the structural elements. In this study, we tried to experimentally analyze the behavioral characteristics of storage racks due to external force according to the fixing conditions of the column-foundations connection of storage racks. In general, the column-foundations connection of storage racks is installed according to the user's convenience without installation standards and regulations. For this reason, this study conducted a behavior analysis test on four full-scale storage racks with the condition of column-foundations connection of four typical storage racks. The behavior characteristics analysis test was performed by two-direction of the shake table with El-Centro seismic wave. To confirm the behavior characteristics according to the magnitude of the seismic load, 50% ~ 150% of the seismic waves were increased by 50% for each test. In addition, a resonance search test was conducted to confirm the natural frequency of each storage racks foundations fixing condition. Among the data obtained through the test, the displacement of the top layer and the permanent displacement after the test were compared for each condition to analyze the behavior characteristics of the column-foundations fixed conditions of the storage racks. As a result, the change of natural frequency was small in storage racks due to the change of the conditions of the foundations, and the behavior characteristics were changed due to the difference of the restoring force due to the change of the storage racks foundations condition rather than the influence of the natural frequency of the input load.