• Title/Summary/Keyword: 동작 추적

Search Result 477, Processing Time 0.024 seconds

A Bursty Traffics Friendly MAC Protocol in Wireless Sensor Networks (무선센서 네트워크에서 버스티 트래픽에 적합한 MAC 프로토콜)

  • Lee, Jin-young;Kim, Seong-cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.5
    • /
    • pp.772-778
    • /
    • 2018
  • Due to the recent advances in computing, communication and micro-electromechanical technology, Wireless Sensor Networks (WSNs) applications have been extended from military to many commercial areas such as object tracking, wire detection, and vehicular sensor networks. In some applications bursty data from many sensor nodes may be generated and the generated data from the monitoring area may be sent in a limited time to the final destination, sink node. In this paper, we present a BTF-MAC protocol adequate for WSNs applications in which bursty data packets are required to be transmitted in a limited time. The BTF-MAC is a synchronous duty-cycle MAC protocol and uses a slot-reserved and operational period extension mechanism adapted to the traffics. Our numerical analysis and simulation results show that BTF-MAC outperforms other related protocols such as DW-MAC and SR-MAC in terms of energy consumption and transmission delay.

Real-time Interactive Performing Arts using Particle System (파티클 시스템을 이용한 실시간 인터랙티브 퍼포먼스 :Rhythmic Gesture(마리오네트의 꿈)사례를 중심으로)

  • Yoo, Mi-Ohk;Park, Kyoung-Ju
    • The Journal of the Korea Contents Association
    • /
    • v.10 no.9
    • /
    • pp.117-125
    • /
    • 2010
  • Development of digital media and computer graphics related research had changed the overall stream of cultural art and our daily life, as well as its development also had an effect on a fresh and exciting area of cultural arts such as the new media art, interactive art and real-time performing. In this paper, we used emotional expression techniques that they lead audiences on the process of natural communication by combining the particle system of computer graphics with performance based screen art. In this paper, we used emotional expression techniques that they lead audiences on the process of natural communication by combining the particle system of computer graphics with performance based screen art. Namely, by capturing the creation and location speed of particle which is synchronized between the sound, behavior and particles, performance based screen art as the form of the experimental structure in which is combined with scientific technology and art is therefore proposed.

A Study of Automatic Fire Detection Installation based CAN Comunnication (CAN 통신기반 자동화재탐지설비에 관한 연구)

  • Kim, Young-Dong;Oh, Guem-Kon;Kang, Won-Chan
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.20 no.2
    • /
    • pp.50-59
    • /
    • 2006
  • In this paper, We are going to propose the fire protection system using CAN(Controller Area Network). The larger, higher and deeper buildings an, the more dangerous people are when fire happens. We should be aware of the problems of prior fire protection system. Therefore, we construct the embedded system based on CAN communication that is capable of N to N communication, and build independent fire protection system. If the fire is occurred on the building, the problem is that how fast we can detect the fire and put it on by using available system, this is major factor that reduces damage of our wealth. Therefore in this studies, We would like to design more stable system than current system. This system is based on CAN communication which is available N to N communication constructs and designed to compensate for each fault, so that our aim is to reduce the wires of system, cost of installation and to suppose future type fire protection system.

Automatic Detection of Dissimilar Regions through Multiple Feature Analysis (다중의 특징 분석을 통한 비 유사 영역의 자동적인 검출)

  • Jang, Seok-Woo;Jung, Myunghee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.2
    • /
    • pp.160-166
    • /
    • 2020
  • As mobile-based hardware technology develops, many kinds of applications are also being developed. In addition, there is an increasing demand to automatically check that the interface of these applications works correctly. In this paper, we describe a method for accurately detecting faulty images from applications by comparing major characteristics from input color images. For this purpose, our method first extracts major characteristics of the input image, then calculates the differences in the extracted major features, and decides if the test image is a normal image or a faulty image dissimilar to the reference image. Experiment results show that the suggested approach robustly determines similar and dissimilar images by comparing major characteristics from input color images. The suggested method is expected to be useful in many real application areas related to computer vision, like video indexing, object detection and tracking, image surveillance, and so on.

An Efficient k-D tree Traversal Algorithm for Ray Tracing on a GPU (GPU상에서 동작하는 Ray Tracing을 위한 효과적인 k-D tree 탐색 알고리즘)

  • Kang, Yoon-Sig;Park, Woo-Chan;Seo, Choong-Won;Yang, Sung-Bong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.3
    • /
    • pp.133-140
    • /
    • 2008
  • This paper proposes an effective k-D tree traversal algorithm for ray tracing on a GPU. The previous k-D tree traverse algorithm based on GPU uses bottom-up searching from a leaf to the root after failing to find the ray intersected primitive in the leaf node. During the bottom-up search the algorithm decides the current node is visited or not from the parent node. In such a way, we need to visit the parent node which was already visited and the duplicated bounding box intersection tests. The new k-D tree traverse algorithm reduces the brother and parent duplicated visit by using an efficient method which decides whether the brother node is already visited or not during the bottom-up search. Also the algorithm take place bounding box intersection tests only for the nodes which is not yet done. As a result our experiment shows the new algorithm is about 30% faster than the previous.

Capture of Foot Motion for Real-time Virtual Wearing by Stereo Cameras (스테레오 카메라로부터 실시간 가상 착용을 위한 발동작 검출)

  • Jung, Da-Un;Yun, Yong-In;Choi, Jong-Soo
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.11
    • /
    • pp.1575-1591
    • /
    • 2008
  • In this paper, we propose a new method detecting foot motion capture in order to overlap in realtime foot's 3D virtual model from stereo cameras. In order to overlap foot's virtual model at the same position of the foot, a process of the foot's joint detection to regularly track the foot's joint motion is necessary, and accurate register both foot's virtual model and user's foot in complicated motion is most important problem in this technology. In this paper, we propose a dynamic registration using two types of marker groups. A plane information of the ground handles the relationship between foot's virtual model and user's foot and obtains foot's pose and location. Foot's rotation is predicted by two attached marker groups according to instep of center framework. Consequently, we had implemented our proposed system and estimated the accuracy of the proposed method using various experiments.

  • PDF

Improved RFID Authentication Protocol using Hash Lock (해쉬락을 이용한 개선된 RFID 인증 프로토콜)

  • Bae Woo-Sik;Jang Gun-Oh;Han Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.635-641
    • /
    • 2006
  • On the wireless-communication between Electronic Tag of RFID system and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash-lock related algorithm. This paper has presented the comparison and analysis of the established hash-lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real-time and every session. The algorithm suggested is able to make RFID wireless authentication system offer a several of usefulness and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses just the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' action with time based.

  • PDF

Design of Clustering based Smart Platform for 3D Position (클러스터링 기반의 3D 위치표시용 스마트 플랫폼설계)

  • Kang, Min-Goo
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.1
    • /
    • pp.56-61
    • /
    • 2015
  • In this paper, the 3D positioning of IoT sensors with the Unity engine of android platform based home-hub was proposde for IoT(Internet of Things) users. Especially, the monitoring of IoT sensor and battery status was designed with the clustering of IoT sensor's position. The 3D positioning of RSSI(received signal strength indicator) and angle for new IoT sensor according to clustering method was described with the cooperation of beacon and received arrival signal time. This unity engine based smart hub platform can monitor the working situation of IoT sensors, and apply 3D video with texture for the life-cycling of many IoT sensors simultaneously. rs was described with RSSI(received signal strength indicator) and received angle.

Flight Safety Operation for the 1st Flight Test of Naro(KSLV-I) (나로호(KSLV-I) 1차 비행시험 비행안전 운영)

  • Ko, Jeong-Hwan;Choi, Kyu-Sung;Sim, Hyung-Seok;Roh, Woong-Rae;Park, Jeong-Joo;Cho, Gwang-Rae
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.38 no.3
    • /
    • pp.280-287
    • /
    • 2010
  • The first Korean satellite launch vehicle, KSLV-I(Korea Space Launch Vehicle-I), was launched for its first flight test on Aug. 25, 2009 from Naro Space Center located in south Jolla province. Because launch vehicles usually fly long range with large amount of propellants aboard, preparation of countermeasures against potential malfunctions during flight is essential in launch operation. In this paper, the flight safety operation, prepared to guarantee flight safety during launch operation of KSLV-I, is presented. Prior to flight test, flight safety analysis is performed to estimate associated risk levels quantitatively, and during flight, flight safety systems are operated to cope with any risky situations. Real-time flight monitoring including computation of instantaneous impact point using tracking data is executed normally and the flight test is completed without activation of flight termination system.

Pseudonym Management in Autonomous Driving Environment (자율주행환경에서 가명성 관리)

  • Hong, Jin Keun
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.10
    • /
    • pp.29-35
    • /
    • 2017
  • In this paper, we describe certificate policy and characteristics in cooperation condition with Cooperative intelligent transport system and autonomous driving vehicle. Among the authentication functions of the vehicle, there is a pseudonym authentication function. This pseudonymity is provided for the purpose of protecting the privacy of information that identifies the vehicle driver, passenger or vehicle. Therefore, the purpose of the pseudonym certificate is to be used for reporting on BSM authentication or misbehavior. However, this pseudonym certificate is used in the OBE of the vehicle and does not have a cryptographic key. In this paper, we consider a method for managing a pseudonym authentication function, which is a key feature of the pseudonym certificate, such as location privacy protection, pseudonym function, disposition of linkage value or CRL, request shuffling processing by registry, butterfly key processing, The authentication policy and its characteristics are examined in detail. In connection with the management of pseudonymes of the vehicle, the attacker must record the BSM transmission and trace the driver or vehicle. In this respect, the results of this study are contributing.