Earticle

현재 위치 Home

International Journal of Internet, Broadcasting and Communication

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    국제인공지능학회(구 한국인터넷방송통신학회) [The International Association for Artificial Intelligence]
  • pISSN
    2288-4920
  • eISSN
    2288-4939
  • 간기
    계간
  • 수록기간
    2009 ~ 2025
  • 주제분류
    공학 > 전자/정보통신공학
  • 십진분류
    KDC 326 DDC 380
Vol.8 No.4 (9건)
No
1

This paper considers WiMedia UWB network based wireless ship area network (WSAN) so as to support high-quality multimedia video data services and important shipboard control data. In this paper, prioritized contention access (PCA) and distributed reservation protocol (DRP) based on WiMedia UWB (ECMA- 368) MAC protocols are combined and proposed to support mixed high-quality video traffic and shipboard control data traffic applying varying DRP and PCA data periods according to channel condition and link parameter ptimization. It is shown that the proposed dynmaic channel allocation of WiMedia UWB MAC protocol can provide reliable mixed video and shipboard control data traffic as well.

2

Due to open source policy, Android systems are exposed to a variety of security problems. In particular, app reuse attacks are detrimental threat to the Android system security. This is because attacker can create core malign components and quickly generate a bunch of malicious apps by reusing these components. Hence, it is very imperative to discern whether Android apps contain reused components. To meet this need, we propose an Android app reuse analysis technique based on the Sequential Hypothesis Testing. This technique quickly makes a decision with a few number of samples whether a set of Android apps is made through app reuse. We performed experimental study with 6 malicious app groups, 1 google and 1 third-party app group such that each group consists of 100 Android apps. Experimental results demonstrate that our proposed analysis technique efficiently judges Android app groups with reused components.

3

There are many free applications that need users to sign up before they can use the applications nowadays. It is difficult to choose a suitable password for your account. If the password is too complicated, then it is hard to remember it. However, it is easy to be intruded by other users if we use a very simple password. Therefore, biometric-based approach is one of the solutions to solve the issue. The biometric-based approach includes keystroke dynamics on keyboard, mice, or mobile devices, gait analysis and many more. The approach can integrate with any appropriate machine learning algorithm to learn a user typing behavior for authentication system. Preprocessing phase is one the important role to increase the performance of the algorithm. In this paper, we have proposed ensemble-by-session (EBS) method which to operate the preprocessing phase before the training phase. EBS distributes the dataset into multiple sub-datasets based on the session. In other words, we split the dataset into session by session instead of assemble them all into one dataset. If a session is considered as one day, then the sub-dataset has all the information on the particular day. Each sub- dataset will have different information for different day. The sub-datasets are then trained by a machine learning algorithm. From the experimental result, we have shown the improvement of the performance for each base algorithm after the preprocessing phase.

4

Recently, mobile traffic has increased tremendously due to the deployment of smart devices such as smartphones and smart tablets. Android is the world’s most powerful mobile platform in smartphone. The Android operating system provide seamless access to many applications and access to the Internet. It would involve network packet sharing communicated over the network. Network packet contains a lot of useful information about network activity that can be used as a description of the general network behaviours. To study what is the behaviours of the network packet, an effective tools such as network packet analyzers software used by network administrators to capture and analyze the network information. In this research, more understanding about network information in live network packet captured from Android smartphone is the target and identify the best network analyzer software.

5

A Study on Smart Tourism Based on Face Recognition Using Smartphone

Ki-Hwan Ryu, Myoung-Su Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.4 2016.11 pp.39-47

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

This study is a smart tourism research based on face recognition applied system that manages individual information of foreign tourists to smartphone. It is a way to authenticate by using face recognition, which is biometric information, as a technology applied to identification inquiry, immigration control, etc. and it is designed so that tourism companies can provide customized service to customers by applying algorism to smartphone. The smart tourism system based on face recognition is a system that prepares the reception service by sending the information to smartphone of tourist service company guide in real time after taking faces of foreign tourists who enter Korea for the first time with glasses attached to the camera. The smart tourism based on face recognition is personal information recognition technology, speech recognition technology, sensing technology, artificial intelligence personal information recognition technology, etc. Especially, artificial intelligence personal information recognition technology is a system that enables the tourism service company to implement the self-promotion function to commemorate the visit of foreign tourists and that enables tourists to participate in events and experience them directly. Since the application of smart tourism based on face recognition can utilize unique facial data and image features, it can be beneficially utilized for service companies that require accurate user authentication and service companies that prioritize security. However, in terms of sharing information by government organizations and private companies, preemptive measures such as the introduction of security systems should be taken.

6

Noise and vibration pollution is emerging to people in high speed trains. And it is difficult to realization of eco-friendly railway system at noise problem. The railway internal noise is 73dB on average and over 80dB in the loudest section. In order to reduce noise, there are passive methods that are far from noise sources and theother active noise reducion method. In this paper, we propose a method of reduce noise by measure and estimate the noise condition of train environment using Bone-Conduction device. We use an anti- phase waveform for canceling of noise characteristic. With this new system, the noise from surrounding environments can be reduced.

7

Smart AGV system using the 2D spatial map

Junghwan Ko, Jong-Yong Lee

국제인공지능학회(구 한국인터넷방송통신학회) International Journal of Internet, Broadcasting and Communication Vol.8 No.4 2016.11 pp.54-57

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, the method for an effective and intelligent route decision of the automatic ground vehicle (AGV) using a 2D spatial map of the stereo camera system is proposed. The depth information and disparity map are detected in the inputting images of a parallel stereo camera. The distance between the automatic moving robot and the obstacle detected and the 2D spatial map obtained from the location coordinates, and then the relative distance between the obstacle and the other objects obtained from them. The AGV moves automatically by effective and intelligent route decision using the obtained 2D spatial map. From some experiments on robot driving with 480 frames of the stereo images, it is analyzed that error ratio between the calculated and measured values of the distance between the objects is found to be very low value of 1.57% on average, respectably.

8

Shipping related services is attracting attention as a UAV (Unmanned Aerial Vehicle) application with the recent economy has been generally accepted drones. UAV of the existing military-driven logistics delivery, aerial photography, wireless Internet connection, broadcasting, disaster research, digital maps, transportation, advertising, meteorological, border surveillance, agricultural use, such as hobbies range of uses from up military are diverse and growing. The advantage of delivery drones seems to be an important feature of delivery of the goods, including labor-saving, long-distance transportation in cold weather. UAV is demanded by competitive performance development for commercialization. Privacy issues that may arise during the drone operation, ensuring marketability issues, control system, regulations, operational standards and specifications, etc. should be addressed. Development direction of Korea UAV based in current technology, regulation, and growth potential presented by deriving from the idea of 'GIF 2016 Gang-won Hackathon.

9

Nominal compounds of ‘N1 + N2’ in Korean can be classified into the following three major categories: co-compound, sub-compound, and fusion. Among these three major categories, insertion of /t/ in the compounding process and subsequent tensification are found only in sub-compounds. This peculiar phenomenon of /t/-insertion which causes, in turn, tensification in sub-compounds has been long controversial because linguists have not been able to expect in which phonological environment of sub-compounding insertion of /t/ takes place. In this paper, I explore a phonological rule which makes it possible to expect the phonological environments of sub-compounding that allow insertion of /t/ and automatic tensification of the subsequent consonant in the onset of N2. In this process, I show that semantic feature(s) between two combined roots should be considered as one of the important structural descriptions in phonology.

 
페이지 저장