• Title/Summary/Keyword: smart TV

Search Result 454, Processing Time 0.046 seconds

Location tracking method for ubiHome exploiting ubiTrack (ubiHome을 위한 ubiTrack 기반 위치 추적 방법)

  • Jung, Woo-Jin;Yoon, Hyo-Seok;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.647-652
    • /
    • 2006
  • 본 논문에서는 스마트 홈을 위한 실내 위치 추적 방법을 제안한다. 스마트 홈 환경에서 개인의 상황에 맞는 서비스를 제공하기 위해서 위치는 중요한 정보 중의 하나이며 최근에는 위치 정보를 확장하여 거주자의 행동 정보를 활용하여 거주자의 행동에 따른 서비스를 제공하는 것이 이슈가 되고 있다. 이를 위해서 제안된 적외선 기반 실내 위치 추적 시스템인 ubiTrack은 스마트 홈 내의 거주자로부터 거주자의 행동을 추론하기 위한 여러 컨텍스트 정보를 추출할 수 있다. 제안된 방법은 발신기, 수신기, 그리고 클라이언트 부분으로 나뉜다. 발신기는 천장에 부착되어 있는 적외선 발신기로부터 각각의 아이디를 가진 적외선 신호를 발생한다. 두 개의 적외선 수신 센서로 구성된 수신기는 발신기에서 발신된 아이디를 수신하여 클라언트 부분으로 보낸다. 클라이언트는 이 개별 아이디를 실제 위치정보로 전환하고 이를 활용하여 거주자의 방위와 속력 정보를 추출한다. 추출된 속력 및 방위 정보를 활용하여 거주자의 간단한 행동 정보를 추론할 수 있다. ubiTrack에서 추출된 이러한 정보는 거주자의 최종 행동 정보, 즉 거주자가 TV를 보려는지, 전등을 사용하려는지 등의 정보를 추론하는데 사용될 수 있다. 제안된 방법은 스마트 홈 테스트 베드인 ubiHome에 적용이 되었으며 몇 가지 실험을 통하여 거주자의 행동을 통하여 스마트 홈 환경에서 거주자의 행동을 통한 서비스 제공이 가능함을 보였다.

  • PDF

ECC-based IPTV Service Key Establishment Protocol With User Attribute (사용자 속성을 이용한 ECC 기반의 IPTV 서비스 키 설립 프로토콜)

  • Jeong, Yoon-Su;Shin, Seung-Soo
    • Journal of Digital Convergence
    • /
    • v.10 no.3
    • /
    • pp.105-111
    • /
    • 2012
  • Internet Protocol Television (IPTV) through broadband cable network is a subscriber-based system which consists of software and set-top box. However, a weakness for the current IPTV system is the lack of security between users and CAS. This paper proposes a user authentication protocol at STB, which limits the service by the user-valued attribute to prevent illegal IPTV users. User attribute values change the order with bit form according to the certain rule, and apply to one-way hash function and Diffie-Hellman's elliptic curve key-exchange algorithm. The proposed protocol is able to improve on user authentication and computation. Also, each user generates an authentication message by smart card and receives various services based on the user-valued attribute.

Authentication Technology Analysis and Service Model Proposal in Smart Home (스마트홈의 인증 기술 분석 및 서비스 모델제안)

  • Kang, Won Min;Moon, Seo Yeon;Lee, Jae Dong;Park, Jong Hyuk
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.04a
    • /
    • pp.238-241
    • /
    • 2017
  • 최근 스마트폰 및 스마트 디바이스 및 가전제품의 폭발적인 보급으로 현대인의 삶이 편리하게 바뀌고 있다. 스마트폰을 기점으로 다양한 형태의 테블릿, 스마트 TV, 스마트 냉장고, 에어컨 등 새로운 기기의 출연으로 가정에서의 삶이 변화되고 있으며 이러한 디바이스를 이용해 새로운 스마트 홈 서비스를 제공하고 하고 있다. 하지만, 이러한 서비스는 스마트 홈 보안이 적용되지 않기 때문에 개인정보의 유출이나 가전제품 해킹으로 인한 금전적 손실 등의 피해를 입을 수 있다. 따라서 주변 환경이 스마트 홈에 적용될 경우 스마트 디바이스와 같이 보안에 대한 고려가 필요하다. 스마트 홈에서 발생할 수 있는 보안 요구사항에 대해 살펴보고 보안 요구사항 중 인증에 초점을 맞추어 연구동향을 분석하고 고찰한다.

Sensor placement for structural health monitoring of Canton Tower

  • Yi, Ting-Hua;Li, Hong-Nan;Gu, Ming
    • Smart Structures and Systems
    • /
    • v.10 no.4_5
    • /
    • pp.313-329
    • /
    • 2012
  • A challenging issue in design and implementation of an effective structural health monitoring (SHM) system is to determine where a number of sensors are properly installed. In this paper, research on the optimal sensor placement (OSP) is carried out on the Canton Tower (formerly named Guangzhou New Television Tower) of 610 m high. To avoid the intensive computationally-demanding problem caused by tens of thousands of degrees of freedom (DOFs) involved in the dynamic analysis, the three dimension finite element (FE) model of the Canton Tower is first simplified to a system with less DOFs. Considering that the sensors can be physically arranged only in the translational DOFs of the structure, but not in the rotational DOFs, a new method of taking the horizontal DOF as the master DOF and rotational DOF as the slave DOF, and reducing the slave DOF by model reduction is proposed. The reduced model is obtained by IIRS method and compared with the models reduced by Guyan, Kuhar, and IRS methods. Finally, the OSP of the Canton Tower is obtained by a kind of dual-structure coding based generalized genetic algorithm (GGA).

The Implementation of Broadcasting Scalable Application on Multimedia mobile device using SADL (멀티미디어 모바일 단말기기를 이용한 방송통신용 스케일러블 애플리케이션 구현)

  • Kim, Sang-Hyun;Lim, Tae-Beom;Kim, Kyung-Won;Lee, Seok-Pil
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2011.07a
    • /
    • pp.556-559
    • /
    • 2011
  • 최근 디지털 방송 서비스가 본격화가 이루어짐에 따라 디지털 콘텐츠는 기하급수적으로 늘어나고 있다. 또한 방송통신 융합 환경은 기존 셋탑 박스와 같은 방송 전용 단말기와 PC, 노트북, PDA와 같은 인터넷 단말기기, 그리고 모바일 폰과 같은 통신기기 사이의 벽을 허물고 있다. IPTV, SmartTV 시대의 도래로 방송통신 제공자의 양방향성 콘텐츠의 제공 및 상호연동 서비스의 제공은 중요한 이슈가 되었다. 이에 따라 다양한 단말기를 이용해 N-Screen이 가능하도록 방송통신 융합 서비스를 제공하고, 이를 위한 여러 콘텐츠 제작이 활발히 일어나고 있다. 이에 본 논문은 양방향성과 상호운용성을 높이기 위한 하나의 방법으로, 방송통신 융합서비스를 인터넷에 의한 전송과 방송 셋탑에 의한 전송에 있어서 상호 동일한 콘텐츠의 통일성을 유지하여 관리가 쉽도록 하는 Scalable Application Framework를 이용하였고 이를 실제 멀티미디어 모바일 단말기기에 적용하고 구현하였다. 이를 통해 앞으로 스마트 방송 시대에 대비할 수 있는 시스템의 대안을 제안하고자 한다. MPEG-21의 DID를 기초로 하여 SADL(Scalable Application Description Language)를 정의하고 이를 이용한 다양한 프레임워크 모델 중 일부인 멀티미디어 모바일 단말기기에 적용하여 이를 활용하는 방안에 대해 논의한다.

  • PDF

System identification of a super high-rise building via a stochastic subspace approach

  • Faravelli, Lucia;Ubertini, Filippo;Fuggini, Clemente
    • Smart Structures and Systems
    • /
    • v.7 no.2
    • /
    • pp.133-152
    • /
    • 2011
  • System identification is a fundamental step towards the application of structural health monitoring and damage detection techniques. On this respect, the development of evolved identification strategies is a priority for obtaining reliable and repeatable baseline modal parameters of an undamaged structure to be adopted as references for future structural health assessments. The paper presents the identification of the modal parameters of the Guangzhou New Television Tower, China, using a data-driven stochastic subspace identification (SSI-data) approach complemented with an appropriate automatic mode selection strategy which proved to be successful in previous literature studies. This well-known approach is based on a clustering technique which is adopted to discriminate structural modes from spurious noise ones. The method is applied to the acceleration measurements made available within the task I of the ANCRiSST benchmark problem, which cover 24 hours of continuous monitoring of the structural response under ambient excitation. These records are then subdivided into a convenient number of data sets and the variability of modal parameter estimates with ambient temperature and mean wind velocity are pointed out. Both 10 minutes and 1 hour long records are considered for this purpose. A comparison with finite element model predictions is finally carried out, using the structural matrices provided within the benchmark, in order to check that all the structural modes contained in the considered frequency interval are effectively identified via SSI-data.

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.

Future Directions on the Next Generation of Digital Signage (차세대 디지털 사이니지의 발전방향)

  • Kim, Chang-Hoon;Park, Kwang-Seuk
    • Journal of the Korean Academic Society of Industrial Cluster
    • /
    • v.4 no.1
    • /
    • pp.51-61
    • /
    • 2010
  • Digital Signage is outdoor media to provide each content and message through digital displays instead that posters and signs are displayed on public facilities. Recently, digital signage have been popular to deliver variety information and advertising on the rapid development of intelligent digital imaging devices based LCD, LED. Continuously digital signage demand and market are growing because digital signage feature is able to capable of interactive communication. Digital signage is expected that digital advertising market is continue rising in spite of global economic downturn at various research institutions, and it is expected to replace traditional media advertising in a new way with the coming digital signage at convergence media side.

  • PDF

Understanding Watching Patterns of Live TV Programs on Mobile Devices: A Content Centric Perspective

  • Li, Yuheng;Zhao, Qianchuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3635-3654
    • /
    • 2015
  • With the rapid development of smart devices and mobile Internet, the video application plays an increasingly important role on mobile devices. Understanding user behavior patterns is critical for optimized operation of mobile live streaming systems. On the other hand, volume based billing models on cloud services make it easier for video service providers to scale their services as well as to reduce the waste from oversized service capacities. In this paper, the watching behaviors of a commercial mobile live streaming system are studied in a content-centric manner. Our analysis captures the intrinsic correlation existing between popularity and watching intensity of programs due to the synchronized watching behaviors with program schedule. The watching pattern is further used to estimate traffic volume generated by the program, which is useful on data volume capacity reservation and billing strategy selection in cloud services. The traffic range of programs is estimated based on a naive popularity prediction. In cross validation, the traffic ranges of around 94% of programs are successfully estimated. In high popularity programs (>20000 viewers), the overestimated traffic is less than 15% of real happened traffic when using upper bound to estimate program traffic.

Setting of the Operating Conditions of Stereo CCTV Cameras by Weather Condition

  • Moon, Kwang;Pyeon, Mu Wook;Lee, Soo Bong;Lee, Do Rim
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.32 no.6
    • /
    • pp.591-597
    • /
    • 2014
  • A wide variety of image application methods, such as aerial image, terrestrial image, terrestrial laser, and stereo image point are currently under investigation to develop three-dimensional 3D geospatial information. In this study, matching points, which are needed to build a 3D model, were examined under diverse weather conditions by analyzing the stereo images recorded by closed circuit television (CCTV) cameras installed in the U-City. The tests on illuminance and precipitation conditions showed that the changes in the number of matching points were very sensitively correlated with the changes in the illuminance levels. Based on the performances of the CCTV cameras used in the test, this study was able to identify the optimal values of the shutter speed and iris. As a result, compared to an automatic control mode, improved matching points may be obtained for images filmed using the data obtained through this test in relation to different weather and illuminance conditions.