• Title/Summary/Keyword: full-information

Search Result 3,671, Processing Time 0.031 seconds

A Study on the Electronic Access and Use of Thesis Information (학위논문정보의 전자적 접근 및 이용에 관한 연구)

  • Kim, Ja-Young
    • Knowledge Management Research
    • /
    • v.1 no.1
    • /
    • pp.109-126
    • /
    • 2000
  • Thesis is very valuable primary and secondary infomation resource in that it contains systematic research methods, comprehensive and detailed data, and creative research results in specific areas. But thesis has been neglected in many libraries and information centers due to the problems of accessibility and obtainabiliy problems as one of a Grey Literature. As information technology and networks have been developing rapidly, the digitalization of thesis full-text and the possibility of online access arc also increasing. In this study, value and the characteristics of thesis is firstly reviewed. Secondly, by analyzing the current digitalization state of some domestic and foreign universities and institutions, some principles for the effective electronic transmission and effective management of thesis are suggested as one of knowledge management. Furthermore useful information is suggested for the users in terms of the online access and obtainability.

  • PDF

Transmit Antenna Selection for Multi-user MIMO Precoding Systems with Limited Feedback

  • Mohaisen, Manar
    • Journal of information and communication convergence engineering
    • /
    • v.9 no.2
    • /
    • pp.193-196
    • /
    • 2011
  • Transmit antenna selection techniques are prominent since they exploit the spatial selectivity at the transmitter side. In the literature, antenna selection techniques assume full knowledge of the channel state information (CSI). In this paper, we consider that the CSI is not perfectly known at the transmitter; however, a quantized version of the channel coefficients is fed back by the users. We employ the non-uniform Lloyd-Max quantization algorithm which takes into consideration the distribution of the channel coefficients. Simulation results show that the degradation in the BER of the system with imperfect CSI at the transmitter is tolerable, especially when the transmit diversity order is high.

Training for Huge Data set with On Line Pruning Regression by LS-SVM

  • Kim, Dae-Hak;Shim, Joo-Yong;Oh, Kwang-Sik
    • Proceedings of the Korean Statistical Society Conference
    • /
    • 2003.10a
    • /
    • pp.137-141
    • /
    • 2003
  • LS-SVM(least squares support vector machine) is a widely applicable and useful machine learning technique for classification and regression analysis. LS-SVM can be a good substitute for statistical method but computational difficulties are still remained to operate the inversion of matrix of huge data set. In modern information society, we can easily get huge data sets by on line or batch mode. For these kind of huge data sets, we suggest an on line pruning regression method by LS-SVM. With relatively small number of pruned support vectors, we can have almost same performance as regression with full data set.

  • PDF

Provably-Secure Public Auditing with Deduplication

  • Kim, Dongmin;Jeong, Ik Rae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2219-2236
    • /
    • 2017
  • With cloud storage services, users can handle an enormous amount of data in an efficient manner. However, due to the widespread popularization of cloud storage, users have raised concerns about the integrity of outsourced data, since they no longer possess the data locally. To address these concerns, many auditing schemes have been proposed that allow users to check the integrity of their outsourced data without retrieving it in full. Yuan and Yu proposed a public auditing scheme with a deduplication property where the cloud server does not store the duplicated data between users. In this paper, we analyze the weakness of the Yuan and Yu's scheme as well as present modifications which could improve the security of the scheme. We also define two types of adversaries and prove that our proposed scheme is secure against these adversaries under formal security models.

A Study on the Improvement for An Illegality Detective Agency and Messenger Office (불법 흥신소 및 심부름센터 개선방안에 관한 연구)

  • Kim, Il Gon;Jung, Kwi Young
    • Convergence Security Journal
    • /
    • v.14 no.6_2
    • /
    • pp.53-62
    • /
    • 2014
  • This study is aimed what improvement for an illegality detective aagency and messenger office. First, administrators or managers who are involved with personal information protection should make a full-fledged effort to gather information. Second, counseling or related programs should be provided for small and mid-sized security firms to guarantee thorough personal information protection. Third, Korea Security Association should improve the educational system related to personal information protection to resolve problems with this education currently provided for managers and employees of these companies.

Physical Layer Security in Underlay CCRNs with Fixed Transmit Power

  • Wang, Songqing;Xu, Xiaoming;Yang, Weiwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.260-279
    • /
    • 2015
  • In this paper, we investigate physical layer security for multiple decode-and-forward (DF) relaying underlay cognitive radio networks (CRNs) with fixed transmit power at the secondary network against passive eavesdropping attacks. We propose a simple relay selection scheme to improve wireless transmission security based on the instantaneous channel information of all legitimate users and the statistical information about the eavesdropper channels. The closed-form expressions of the probability of non-zero secrecy capacity and the secrecy outage probability (SOP) are derived over independent and non-identically distributed Rayleigh fading environments. Furthermore, we conduct the asymptotic analysis to evaluate the secrecy diversity order performance and prove that full diversity is achieved by using the proposed relay selection. Finally, numerical results are presented to verify the theoretical analysis and depict that primary interference constrain has a significant impact on the secure performance and a proper transmit power for the second transmitters is preferred to be energy-efficient and improve the secure performance.

MPEG-1 Video Scene Change Detection Using Horizontal and Vertical Blocks (수평과 수직 블록을 이용한 MPEG-1 비디오 장면전환 검출)

  • Lee, Min-Seop;An, Byeong-Cheol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.2S
    • /
    • pp.629-637
    • /
    • 2000
  • The content-based information retrieval for a multimedia database uses feature information extracted from the compressed videos. This paper presents an effective method to detect scene changes from compressed videos. Scene changes are detected with DC values of DCT coefficients in MPEG-1 encoded video sequences. Instead of decoding full frames. partial macroblocks of each frame, horizontal and vertical macroblocks, are decoded to detect scene changes. This method detects abrupt scene changes by decoding minimal number of blocks and saves a lot of computation time. The performance of the proposed algorithm is analyzed based on the precision and the recall. The experimental results show the effectiveness in computation time and detection rate to detect scene changes of various MPEG-1 video streams.

  • PDF

A Novel Multiple Kernel Sparse Representation based Classification for Face Recognition

  • Zheng, Hao;Ye, Qiaolin;Jin, Zhong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1463-1480
    • /
    • 2014
  • It is well known that sparse code is effective for feature extraction of face recognition, especially sparse mode can be learned in the kernel space, and obtain better performance. Some recent algorithms made use of single kernel in the sparse mode, but this didn't make full use of the kernel information. The key issue is how to select the suitable kernel weights, and combine the selected kernels. In this paper, we propose a novel multiple kernel sparse representation based classification for face recognition (MKSRC), which performs sparse code and dictionary learning in the multiple kernel space. Initially, several possible kernels are combined and the sparse coefficient is computed, then the kernel weights can be obtained by the sparse coefficient. Finally convergence makes the kernel weights optimal. The experiments results show that our algorithm outperforms other state-of-the-art algorithms and demonstrate the promising performance of the proposed algorithms.

Generation Method of a High Resolution Image from a Single Low Resolution Image (한 장의 저해상도 영상으로부터 고해상도 영상의 생성방법)

  • Kim, Eung-Kyeu;Lee, Do-Kyeom
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.490-494
    • /
    • 2007
  • 본 논문에서는, 한 장의 저해상도 영상으로부터 고해상도 영상을 생성하는 새로운 방법을 제안한다. 제안하는 방법은 고해상도 영상과 저해상도 영상의 관계를 나타내는 선형연립방정식을 푸는 원리에 기초한다. 하지만 이러한 방정식은 일의적으로 정해지지 않기 때문에 고해상도 영상을 나타내기 위챈 사용된 미지수를 축소하기 위한 이산코사인변환(DCT)의 에너지 집중특성을 이용하였다. 또한 그 구현방법으로 저해상도 영상을 일련의 작은 블록으로 나누어 각 블록영상에 적용하는 블록분할법(block division method)과 전체프레임 영상에 직접 적용하는 전 프레임법(full frame method)을 사용하였다. 최종적으로 본 제안방법의 유효성을 확인하기 위해 시뮬레이션 실험영상에 적용한 결과 양호한 결과를 나타냈다.

  • PDF

Quality Metric Modeling with Full Video Scalbility (비디오 스케일러빌리티를 고려한 영상 품질 메트릭 모델링)

  • Suh, Dong-Jun;Kim, Cheon-Seog;Bae, Tae-Meon;Ro, Yong-Man
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2006.11a
    • /
    • pp.81-84
    • /
    • 2006
  • 다양한 멀티미디어 사용 환경 조건에 적합한 컨텐츠를 제공하기 위해서는 다양한 소비 환경을 반영할 수 있는 스케일러블 비디오의 제공이 필요하다. 이러한 스케일러블 비디오의 경우, 다양한 조합의 프레임 율, SNR, 공간해상도를 가지는 비디오가 가능하므로 사용자에 게 최적의 품질을 제공하는 조합을 결정해야 할 필요가 있다. 따라서 본 논문에서는 프레임율, SNR, 공간해상도 그리고 영상의 모션 속도에 따라 변동할 수 있는 영상 품질을 나타낼 수 있는 새로운 영상 품질 메트릭을 주관적 평가를 통하여 제안한다. 제안한 품질 메트릭은 주관적 품질평가 선호도와의 상관계수(correlation coefficient)가 PSNR과 주관적 품질평가 점수와의 상관계수 평균값에 비해 높은 값을 보였다. 본 논문에서 제안한 품질 메트릭은 다양한 조합의 부호화 조건에 따른 품질측정이 가능하여 제한적인 멀티미디어 소비환경에서 최적의 부호화 조건을 결정할 수 있다.

  • PDF