• Title/Summary/Keyword: full-information

Search Result 3,671, Processing Time 0.028 seconds

An Efficient 4K and 8K UHD Transmission Scheme on Convergence Networks with Broadcasting and LTE by using Coordinated Multi-Point Transmission System

  • Ryu, Youngsu;Park, Kyungwon;Wee, Jungwook;Kwon, Kiwon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.8
    • /
    • pp.4092-4104
    • /
    • 2017
  • In this paper, an efficient 4K and 8K UHD(Ultra High Definition) transmission scheme is proposed on the convergence networks with broadcasting and LTE(Long Term Evolution) by using CoMP(Coordinated Multi-Point). A video data is compressed and divided into BL(Base Layer), E(Enhanced layer)1, E2 and E3 by scalable HEVC(High Efficiency Video Coding). The divided layers can be combined by the scalable HEVC such as mobile HD, full HD, 4K and 8K UHD(Ultra High Definition). The divided layers are transmitted through the convergence networks with DVB-T2(Digital Video Broadcasting-$2^{nd}$ Generation Terrestrial) broadcasting system and LTE CoMP. This scheme transmits mobile HD and full HD layers through DVB-T2 broadcasting system by using M-PLP(Multiple-physical Layer Pipes), and adaptively transmits 4K or 8K UHD layer through LTE CoMP with MMT(MPEG Media Transport) server. An adaptive transmitting and receiving scheme in the LTE CoMP system provides 4K or 8K UHD layer to a user according to the user status. The proposed scheme is verified by showing the system-level simulation results which is better BER(bit-error-rate) performance than the conventional scheme. The results show that the proposed scheme provides the stable video contents to the user especially at the cell edge.

Step-by-step Approach for Effective Korean Unknown Word Recognition (한국어 미등록어 인식을 위한 단계별 접근방법)

  • Park, So-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.369-372
    • /
    • 2009
  • Recently, newspapers as well as web documents include many newly coined words such as "mid"(meaning "American drama" since "mi" means "America" in Korean and "d" refers to the "d" of drama) and "anseup"(meaning "pathetic" since "an" and "seup" literally mean eyeballs and moist respectively). However, these words cause a Korean analyzing system's performance to decrease. In order to recognize these unknown word automatically, this paper propose a step-by-step approach consisting of an unknown noun recognition phase based on full text analysis, an unknown verb recognition phase based on web document frequency, and an unknown noun recognition phase based on web document frequency. The proposed approach includes the phase based on full text analysis to recognize accurately the unknown words occurred once and again in a document. Also, the proposed approach includes two phases based on web document frequency to recognize broadly the unknown words occurred once in the document. Besides, the proposed model divides between an unknown noun recognition phase and an unknown verb recognition phase to recognize various unknown words. Experimental results shows that the proposed approach improves precision 1.01% and recall 8.50% as compared with a previous approach.

  • PDF

Design of Enterprise System Platform based on Spring Data JPA in Spring Framework Environment (스프링 프레임워크 환경에서 스프링 데이터 JPA기반의 엔터프라이즈 시스템 플랫폼의 설계)

  • Yoo, Jung-Sang;Lee, Myeong-Ho
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.12
    • /
    • pp.39-46
    • /
    • 2019
  • The competition for standardization in the enterprise environment starts with the data tier of the back-end and the standard enterprise middle tier is being stabilized by standardization as it is accepted as the Spring Framework. In addition, with the advent of new devices in an increasingly rapid cycle, securing compatibility with web and mobile services has become an important competitive advantage for web service companies. However, companies are unable to secure competent technical personnel appropriate for the rapidly changing environment of the information generation, and the curriculum of educational universities does not reflect the demand of new competency-oriented curriculum. Therefore, in this study, in order to acquire competency-oriented skills required for such an enterprise system platform environment and to develop a curriculum, the system using Spring Data JPA in the Spring Framework environment was implemented through documenting for each analysis and design step. It aims to provide a reference model for the full stack competency-based curriculum and capstone design curriculum that can be applied immediately in the enterprise environment.

New Obligations of Health Insurance Review and Assessment Service: Taking Full-fledged Action Against the COVID-19 Pandemic

  • Yoo, Seung Mi;Chung, Seol Hee;Jang, Won Mo;Kim, Kyoung Chang;Lee, Jin Yong;Kim, Sun Min
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.1
    • /
    • pp.17-21
    • /
    • 2021
  • In 2020, the coronavirus disease 2019 (COVID-19) pandemic has caused unprecedented disruptions to global health systems. The Korea has taken full-fledged actions against this novel infectious disease, swiftly implementing a testing-tracing-treatment strategy. New obligations have therefore been given to the Health Insurance Review and Assessment Service (HIRA) to devote the utmost effort towards tackling this global health crisis. Thanks to the universal national health insurance and state-of-the-art information communications technology (ICT) of the Korea, HIRA has conducted far-reaching countermeasures to detect and treat cases early, prevent the spread of COVID-19, respond quickly to surging demand for the healthcare services, and translate evidence into policy. Three main factors have enabled HIRA to undertake pandemic control preemptively and systematically: nationwide data aggregated from all healthcare providers and patients, pre-existing ICT network systems, and real-time data exchanges. HIRA has maximized the use of data and pre-existing network systems to conduct rapid and responsive measures in a centralized way, both of which have been the most critical tactics and strategies used by the Korean healthcare system. In the face of new obligations, our promise is to strive for a more responsive and resilient health system during this prolonged crisis.

A Combined Greedy Neighbor Generation Method of Local Search for the Traveling Salesman Problem

  • Yongho Kim;Junha Hwang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.4
    • /
    • pp.1-8
    • /
    • 2024
  • The traveling salesman problem(TSP) is one of the well known combinatorial optimization problems. Local search has been used as a method to solve TSP. Greedy Random Insertion(GRI) is known as an effective neighbor generation method for local search. GRI selects some cities from the current solution randomly and inserts them one by one into the best position of the current partial solution considering only one city at a time. We first propose another greedy neighbor generation method which is named Full Greedy Insertion(FGI). FGI determines insertion location one by one like GRI, but considers all remaining cities at once. And then we propose a method to combine GRI with FGI, in which GRI or FGI is randomly selected and executed at each iteration in simulated annealing. According to the experimental results, FGI alone does not necessarily perform very well. However, we confirmed that the combined method outperforms the existing local search methods including GRI.

Implementation of Education Network using Switching System, Wired System and Radio Communication System (교환시스템과 유${\cdot}$무선통신 시스템을 이용한 교육용 통신망 구현)

  • Park, Jin-Taek;Gahng, Hae-Dong;Park, Young-Goo;Hong, Jin-Keun
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.37 no.4
    • /
    • pp.1-10
    • /
    • 2000
  • In this paper, an educational-purposed tree-type telecommunication network using the switching system, and the wired and radio transmission systems which are applied is implemented. Also, the proper training method for the network such as the digital full electronic switching training, the networking experiment, the optical transmission experiment, is developed to robust the adaptation ability to the actual various environment of telecommunication network of the trainers. The technical information such as the technical manuals, the user manuals and the maintenance skill reports are collected and database using Oracle DB system for the effective educational use.

  • PDF

Study on the construction of digital library (디지탈도서관의 구축을 위한 연구)

  • Seo, Whee
    • Journal of Korean Library and Information Science Society
    • /
    • v.25
    • /
    • pp.529-567
    • /
    • 1996
  • This paper surveyed the theoretical backgrounds of digital library. Its definition and function and case studies, and basic skills for system construction of digital library were suggested. The differences between the traditional library and the digital library were compared. And the conditions that should be take into consideration of digital library construction were suggested. Suggestions are summarized as follows : 1. For the construction of digital library, library collection should be digitalized by using CD-ROM and commercial online services. 2. The digitalization of library collection should be planned by subject sharing between the libraries. For the control of this cooperation, the orgnization to propel the digitalization should be established. And it is necessary to enact the standards for the digital library. 3. The connection between MARC formatted bibliographic database and full-text should be studied. 4. All the types of information about texts, pictures, sounds and if films should be also digitalized. 5. To satisfy the needs of many users, we have to establish the various users's interface which is fitted for several kinds of users. 6. When a digital library was constructed, the copyright and resources sharing must be guranteed depending on the cost of database's usage. 7. Because the digitalization of library will be related to the various kinds of libraries, the interface for resources sharing will be constantly concerned. 8. The sharing of information resources between the libraries will be enacted on the Internet. And we must be interested in various internet tools such as telecommunication softwares, media convert programs, etc. 9. By training staffs continously, all libraries must be ready to come the library in the future.

  • PDF

The Approach Method for the Performance Comparison of Magnetic Resonance Imager (자기공명영상장치의 성능비교를 위한 접근방법)

  • Yi, Y.;Ju, H.Y.;Kim, I.Y.;Lee, M.W.;Ahn, C.B.;Oh, C.H.;Lee, H.K.
    • Proceedings of the KOSOMBE Conference
    • /
    • v.1997 no.05
    • /
    • pp.75-78
    • /
    • 1997
  • In the accessment of the performance of a magnetic resonance imaging unit, there are many parameters to be measured. Such measured parameters are not often meaning by itself. Namely, it need to be compared with some standard. Since there is no gold standard MRI, only can be compared with a worldly renowned product. In this report, we attempted to compare a few MRI parameters for the accessment of the performance of 1 Tesla MRI unit which is domestically developed. Though we did not measure all the parameters related to hardware aspects and software aspects for the full comparison, there few parameters may elucidate some important aspects of MRI unit.

  • PDF

A design of session management for video conference services (개방형 통신망에서 화상 회의 서비스 세션 관리 설계)

  • 신영석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.11
    • /
    • pp.2498-2511
    • /
    • 1997
  • Due to the recent advances in computer technologies and high-speed networks, telecommunication services and provision of multimedia services will be considered a new software architecture adapting networking infrastructure on information networking architecture. In this paper, the video conference services has been selected as a target service example because it is expected to become one of the most important services on the full service network. In fact, it can be viewed as the basis for providing telecommunication services such as video telephony and video conferencing. This paepr presents the prototyping of TINA(Telecommunication Information Networking Architecture) based desktop video conference system using the concepts of session management. The prototyping of deskop video conference system aims at assessing TINA concepts and refinement of the mapping between session graph and connection graph, and provides support of open service platform towards distribution and objected-orientation.

  • PDF

Ciphertext policy attribute-based encryption supporting unbounded attribute space from R-LWE

  • Chen, Zehong;Zhang, Peng;Zhang, Fangguo;Huang, Jiwu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2292-2309
    • /
    • 2017
  • Ciphertext policy attribute-based encryption (CP-ABE) is a useful cryptographic technology for guaranteeing data confidentiality but also fine-grained access control. Typically, CP-ABE can be divided into two classes: small universe with polynomial attribute space and large universe with unbounded attribute space. Since the learning with errors over rings (R-LWE) assumption has characteristics of simple algebraic structure and simple calculations, based on R-LWE, we propose a small universe CP-ABE scheme to improve the efficiency of the scheme proposed by Zhang et al. (AsiaCCS 2012). On this basis, to achieve unbounded attribute space and improve the expression of attribute, we propose a large universe CP-ABE scheme with the help of a full-rank differences function. In this scheme, all polynomials in the R-LWE can be used as values of an attribute, and these values do not need to be enumerated at the setup phase. Different trapdoors are used to generate secret keys in the key generation and the security proof. Both proposed schemes are selectively secure in the standard model under R-LWE. Comparison with other schemes demonstrates that our schemes are simpler and more efficient. R-LWE can obtain greater efficiency, and unbounded attribute space means more flexibility, so our research is suitable in practices.