• Title/Summary/Keyword: mobile environments

Search Result 1,888, Processing Time 0.028 seconds

Transcoding Path Creation Model for the UTR under Considering of Source QoS and Destination QoS (소스 QoS와 목적 QoS를 고려한 단위 변환기의 변환 경로 생성 모델)

  • DongYeop, Ryu;SungMi, Chon;YoungHwan, Lim
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.2
    • /
    • pp.278-287
    • /
    • 2007
  • Even though a variety of types of multimedia data are being used on the basis of user characteristics and demands, all devices do not always support playing all multimedia data. Accordingly, a multimedia transcoder is used to create media suitable for each environments. This is due to the dissimilarity between the source QoS and the target QoS. Therefore, we need to consider adapting the two dissimilar QoS. Therefore in this paper, we create a suitable application-specific transcoding path with unit transcoders before performing the media transcoding in consideration of source QoS and target QoS. and the created transcoding path performs the transcoding. Here, creating a UTR(Unit Transcoder) conversion path that considers the transcoding possibility and the minimum of the UTR will allow the playback of various multimedia data with convenience. and The consideration of QoS allows users to use the multimedia easily.

  • PDF

A Study on the Next Generation Identification System of Mobile-Based using Anonymous Authentication Scheme (익명 인증기법을 이용한 모바일 기반 차세대 본인확인수단에 관한 연구)

  • Park, Jeong Hyo;Jung, Yong Hoon;Jun, Moon Seog
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.12
    • /
    • pp.511-516
    • /
    • 2013
  • The cases of identification forgery and counterfeiting are increasing under the current identification system, which was established based on social conditions and administrative environments over 20 years ago. This leads to an increase of various criminal acts including illegal loan using fake ID and a number of damages caused out of good intentions that result in interference with the operations of public organizations. In addition, according to the advancement of information society, privacy protection has emerged as an important issue. However, ID card exposes individuals' personal information, such as names, resident registration numbers, photos, addresses and fingerprints, and thus the incidents associated with illegal use of personal information are increasing continuously. Accordingly, this study aimed at examining the issues of ID card forgery/counterfeiting and privacy protection and at proposing a next-generation identification system to supplement such weaknesses. The top priority has been set as prevention of forgery/counterfeiting and privacy protection in order to ensure the most important function of national identification system, which is user identification.

A Study on Error Resilience of Header Parameters considering the activity of macroblock (매크로블록의 활동성을 고려한 헤더정보의 오류 복원에 관한 연구)

  • Kim, Jong-Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.5
    • /
    • pp.837-842
    • /
    • 2008
  • Any errors that are generated in the channels and networks distort the video quality and are propagated in both the spatial and temporal domains. In particular, header errors ran result in serious visual degradation of the output video encoding/decoding schemes that can make an error resilient compressed bit-stream in error prone environments, such as mobile networks. In this paper, we proposes an header error resilience method that consider the activity of macroblock in video bitstream syntex. The extract of header error repaetedly embeds the header parameters into the least significant bits(LSB) of the quantized DCT coefficients prior to VLC. Experimental results show that the proposed error resilience method restores good image quality despite the detected error on header parameters.

Study on driver's distraction research trend and deep learning based behavior recognition model

  • Han, Sangkon;Choi, Jung-In
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.11
    • /
    • pp.173-182
    • /
    • 2021
  • In this paper, we analyzed driver's and passenger's motions that cause driver's distraction, and recognized 10 driver's behaviors related to mobile phones. First, distraction-inducing behaviors were classified into environments and factors, and related recent papers were analyzed. Based on the analyzed papers, 10 driver's behaviors related to cell phones, which are the main causes of distraction, were recognized. The experiment was conducted based on about 100,000 image data. Features were extracted through SURF and tested with three models (CNN, ResNet-101, and improved ResNet-101). The improved ResNet-101 model reduced training and validation errors by 8.2 times and 44.6 times compared to CNN, and the average precision and f1-score were maintained at a high level of 0.98. In addition, using CAM (class activation maps), it was reviewed whether the deep learning model used the cell phone object and location as the decisive cause when judging the driver's distraction behavior.

A Study on Malware Identification System Using Static Analysis Based Machine Learning Technique (정적 분석 기반 기계학습 기법을 활용한 악성코드 식별 시스템 연구)

  • Kim, Su-jeong;Ha, Ji-hee;Oh, Soo-hyun;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.775-784
    • /
    • 2019
  • Malware infringement attacks are continuously increasing in various environments such as mobile, IOT, windows and mac due to the emergence of new and variant malware, and signature-based countermeasures have limitations in detection of malware. In addition, analytical performance is deteriorating due to obfuscation, packing, and anti-VM technique. In this paper, we propose a system that can detect malware based on machine learning by using similarity hashing-based pattern detection technique and static analysis after file classification according to packing. This enables more efficient detection because it utilizes both pattern-based detection, which is well-known malware detection, and machine learning-based detection technology, which is advantageous for detecting new and variant malware. The results of this study were obtained by detecting accuracy of 95.79% or more for benign sample files and malware sample files provided by the AI-based malware detection track of the Information Security R&D Data Challenge 2018 competition. In the future, it is expected that it will be possible to build a system that improves detection performance by applying a feature vector and a detection method to the characteristics of a packed file.

A Study on Internet Technology Perspective Applicable in Industrial Environments (산업환경에서 적용 가능한 사물인터넷 기술 전망에 한 연구)

  • Hong, Sunghyuck
    • Journal of Industrial Convergence
    • /
    • v.17 no.2
    • /
    • pp.21-27
    • /
    • 2019
  • The Internet of things is the infrastructure that can communicate with each other by exchanging information by installing antennas that can communicate with all things in the world. The reason why the Internet of Things is the core of the Fourth Industrial Revolution is that data is collected through the Internet to be. Technology of things Internet and Trend of Things Internet IoT (Internet of Things) is a concept that enables internet connection and communication between devices equipped with various sensors. It is the core IT trend of lot, technology such as big data, mobile, cloud And to provide information for the development of the industrial environment through research on the importance of the Internet of things, the core of the Fourth Industrial Revolution and the processing and analysis techniques of Big Data. By providing various security measures and future technologies, This study was conducted to contribute to management.

Development of Reinforcement Learning-based Obstacle Avoidance toward Autonomous Mobile Robots for an Industrial Environment (산업용 자율 주행 로봇에서의 격자 지도를 사용한 강화학습 기반 회피 경로 생성기 개발)

  • Yang, Jeong-Yean
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.72-79
    • /
    • 2019
  • Autonomous locomotion has two essential functionalities: mapping builds and updates maps by uncertain position information and measured sensor inputs, and localization is to find the positional information with the inaccurate map and the sensor information. In addition, obstacle detection, avoidance, and path designs are necessarily required for autonomous locomotion by combining the probabilistic methods based on uncertain locations. The sensory inputs, which are measured by a metric-based scanner, have difficulties of distinguishing moving obstacles like humans from static objects like walls in given environments. This paper proposes the low resolution grid map combined with reinforcement learning, which is compared with the conventional recognition method for detecting static and moving objects to generate obstacle avoiding path. Finally, the proposed method is verified with experimental results.

Signal Enhancement of a Variable Rate Vocoder with a Hybrid domain SNR Estimator

  • Park, Hyung Woo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.962-977
    • /
    • 2019
  • The human voice is a convenient method of information transfer between different objects such as between men, men and machine, between machines. The development of information and communication technology, the voice has been able to transfer farther than before. The way to communicate, it is to convert the voice to another form, transmit it, and then reconvert it back to sound. In such a communication process, a vocoder is a method of converting and re-converting a voice and sound. The CELP (Code-Excited Linear Prediction) type vocoder, one of the voice codecs, is adapted as a standard codec since it provides high quality sound even though its transmission speed is relatively low. The EVRC (Enhanced Variable Rate CODEC) and QCELP (Qualcomm Code-Excited Linear Prediction), variable bit rate vocoders, are used for mobile phones in 3G environment. For the real-time implementation of a vocoder, the reduction of sound quality is a typical problem. To improve the sound quality, that is important to know the size and shape of noise. In the existing sound quality improvement method, the voice activated is detected or used, or statistical methods are used by the large mount of data. However, there is a disadvantage in that no noise can be detected, when there is a continuous signal or when a change in noise is large.This paper focused on finding a better way to decrease the reduction of sound quality in lower bit transmission environments. Based on simulation results, this study proposed a preprocessor application that estimates the SNR (Signal to Noise Ratio) using the spectral SNR estimation method. The SNR estimation method adopted the IMBE (Improved Multi-Band Excitation) instead of using the SNR, which is a continuous speech signal. Finally, this application improves the quality of the vocoder by enhancing sound quality adaptively.

The Study on Countermeasures Against the Infringement of Rights of the Transmission and Reproduce on the Han Wave Contents in the China Market (중국 시장 내 한류 방송 콘텐츠의 전송권 및 복제권 침해 대응 연구)

  • Lee, Jae-Ho;Kim, Hee-Kyung
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.6
    • /
    • pp.33-46
    • /
    • 2019
  • The purpose of this study is to analyze how China, which is the largest consumption area of Hallyu broadcasting contents but the most illegal copy market infringe the rights of domestic broadcasters and what of the policy of regulatory authority in this illegal market. To this end, this study investigate the most common types of paths and methods of copyright infringement in the Internet and mobile multi-platform environments, and investigated how broadcasters responded to them with in-depth interviews. As a result of research, the most frequent type of infringement of rights of reproduction were to use links with web and apps and TV pads. In this regard, it was not easy to solve the problem of illegal copy in China in the way that domestic companies responded to individually, and it was very rare that the lawsuit was filed. In the future, the government will need to provide side support for Korean Wave broadcasting contents through steady monitoring as well as market research for eradication of illegal copy.

Web Assembly System Architecture Model (웹 어셈블리 시스템 아키텍처 모델)

  • Park, Jin-Tae;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.23 no.4
    • /
    • pp.328-332
    • /
    • 2019
  • Advances in web technology have enabled technical convergence in various system environments to be carried out through the web interface. The Web can be categorized from the Web 1.0 to the 4.0, depending on its role, it has the characteristics of connects information, connects people, connects knowledge, and connects intelligence. In addition, various technological needs occurred through the mobile app during the 4th Industrial Revolution, and functions such as 3D, virtual reality, augmented reality, video/audio processing were enabled on the web, which was a simple means of providing information. Technical standards have been studied to support these period needs. In this paper, I would like to mention one of the Web assembly. We will explore ways to link and fuse Web assembly with existing web systems (or platforms) and analyze their technical implications through a variety of examples. In addition, we will conduct a study on the architecture that can fuse the existing javascript with the web assembly, and discuss the future direction of the study.