• Title/Summary/Keyword: 사물인식

Search Result 602, Processing Time 0.021 seconds

Processing of Various RFID Reader Devices for ALE Middleware (ALE 미들웨어를 위한 다양한 RFID 리더 처리 방법)

  • Noh, Young-Sik;Byun, Yung-Cheol;Lee, Dong-Cheol
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.4
    • /
    • pp.55-64
    • /
    • 2009
  • For realizing ubiquitous computing, many research activities are geared towards various areas including embedded computing, RFID, USN, home networking, context-awareness, and etc. By using the ability of RFID technology to recognize a number of objects simultaneously, more convenient ubiquitous application services are effectively provided. In this case, RFID middleware playing a role as a bridge between RFID reader devices and application services is required as well. In this paper, we propose a method of handling a number of types of RFID reader devices in ALE middleware of EPCglobal. For this, the information of connection and data protocol for a reader device is stored in a database as ontology meta-data, and used to interpret the data read by a reader device. By adding ontology data into a database, even though an RFID device newly emerges, ALE middleware can not only handle the device, but also be effectively extended through reusing ontology data, without any changes in the middleware.

Mid to Long Term R&D Direction of UAV for Disaster & Public Safety (재난치안용 무인기 중장기 연구개발 방향)

  • Kim, Joune Ho
    • Journal of Aerospace System Engineering
    • /
    • v.14 no.5
    • /
    • pp.83-90
    • /
    • 2020
  • Disasters are causing significant damage to the lives and property of our society and are recognized as social problems that need to be solved nationally and globally. The 4th industrial revolution technologies affecting society as a whole such as the Internet of Things(IoT), Artificial Intelligence(AI), Drones(Unmanned Aerial Vehicles), and Big Data are continuously absorbed into the disaster and safety industries as scientific and technological tools for solving social problems. Very soon, twenty-nine domestic UAV-related organizations/companies will complete the construction of a multicopter type small UAV integrated system ('17~'20) that can be operated at disaster and security sites. The current work considers and proposes the mid-to-long term R&D direction of disaster UAV as a strategic asset of the national disaster response system. First, the trends of disaster and safety industry and policy are analyzed. Subsequently, the development status and future plans of small UAV, securing shortage technology, and strengthening competitiveness are analyzed. Finally, step-by-step R&D direction of disaster UAV in terms of development strategy, specialized mission, platform, communication, and control and operation is proposed.

An Analysis of Information Security Curriculum in Elementary School practical arts, Secondary School Informatics Teaching and Suggestions for Improvement

  • Kim, Choungbae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.10
    • /
    • pp.69-75
    • /
    • 2020
  • Although various information and communication technologies occupy a place in daily life in the face of the fourth industrial revolution, the contents related to information security in elementary and secondary education courses are mainly related to personal information protection, and the contents and countermeasures of rapidly changing security threats are low in textbooks, and they are far behind the changes. To improve this, this paper suggests that education contents related to information security are included in elementary school real and middle school information textbooks, educational contents related to wireless network and PC security are included to cope with rapidly changing security threats that may arise from the age of the Internet of Things, non-face-to-face classes, and case-based information ethics education can be organized to eradicate curiosity about hacking. Through this paper, we will help prevent information security accidents by establishing basic security measures on our own and strengthening security awareness in the information age.

Design of Edutainment Contents Using Motion Recognition for Enhancing Sociability and Visual Perception of Children (유아의 시지각 및 사회성 향상을 위한 동작 인식 기반 에듀테인먼트 콘텐츠 개발)

  • Park, Yoon;Yang, Janghoon
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.7
    • /
    • pp.170-180
    • /
    • 2015
  • With progress in emerging new media technology and associated device, there is growing interest in a new type of contents in the filed of children education. In this research, we developed a edutainment content for enhancing sociability and visual perception of children exploiting kinect. Recreating what is visually perceived with physical movement is adopted to develop visual perception. It is also designed such that one's sociability can be enhanced through experiencing natural physical contact and collaboration while interacting with the developed content. The prototype of the content was created through development of character to boost interest, a short animation for storytelling, and interactive programming. In the second pilot test which was done with the content improved through the first pilot test, it was observed that children easily played with it and actively participated in experiencing it. From this observation, it is expected that the developed content may work as a promising edutainment content which fosters children to enhance visual perception and sociability through natural interaction.

Designing an App Inventor Curriculum for Computational Thinking based Non-majors Software Education (컴퓨팅 사고 기반의 비전공자 소프트웨어 교육을 위한 앱 인벤터 교육과정 설계)

  • Ku, Jin-Hee
    • Journal of Convergence for Information Technology
    • /
    • v.7 no.1
    • /
    • pp.61-66
    • /
    • 2017
  • As the fourth industrial revolution becomes more popular and advanced services such as artificial intelligence and Internet of Things technology are widely commercialized, awareness of the importance of software is spreading. Recently, software education has been taught not only in elementary school and college but also in college. Also, there is a growing interest in computational thinking needed to solve problems through computing methodology and model. The purpose of this study is to design an app inventor course for non-majors software education based on computational thinking. As a result of the study, six detailed competencies of computational thinking were derived, and six detailed competencies were mapped to the app inventor learning elements. In addition, based on the computational thinking modeling, I designed an app inventor class for students who participated in IT curriculum of university liberal arts curriculum.

The Developing Method of Map Outline Using Caricature Generation Algorism (캐리커처 생성 알고리즘을 이용한 지도 외형선 생성 방법)

  • Kim, Sung-Kon
    • Archives of design research
    • /
    • v.20 no.3 s.71
    • /
    • pp.345-354
    • /
    • 2007
  • Sometimes characterized graphic map rather than realistic graphic map can help users to understand information more easily. This paper tried to reveal the relation between the methodology to create outline on the map using caricature automatic algorism and level of human cognition. Caricature algorism such as exaggeration transformation algorism, joint transformation algorism and simplification algorism were used to create outline on the map. In order to apply exaggeration transformation algorism and joint transformation algorism, the method to create average form of the object were developed. We survey how users recognize the similarity of the characterized map with the real map when realistic map is simplified by certain value of simplification rate and transformed into certain value of exaggeration rate or joint transformation rate. We also survey how users recognize the similarity differently according to the scale of the map. As a result of this study, the method to calculate the optimal data is developed for users to recognize caricatured map effectively by shifting scale. This data can be used as basic data, when map developers create outline of map with programming code on computer

  • PDF

Trend analysis and shapes of the visual expressions of the sounds (음의 시각화와 그 표현의 경향)

  • 김민호;정성환;강민수
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.101-110
    • /
    • 2003
  • People are surrounded with numerous sounds. The sound is generated from nature and people. For example, the sound enables people or animal responsive to instinctive action. Music or fine arts are presented differently by its distinctive medium. On the other hand, those art forms are similar in a way that people uses right side of brain and intuitions for creative effects. Conjunctions between sounds and visual arts have been progressed to data. From art forms in subjective views to art forms using high technology such as the computer, experiments for sounds visualization are practiced constantly. For that reason, intrinsic attributes of sounds in design area and distinctive qualities are discussed in this study. With respect to existing category of studies and consideration of the tendency in recent researches, the object is to propose direction for the study in regards to methodology of design, which is reconstructing visualized expression.

  • PDF

SNS disclosure of personal information in M2M environment threats and countermeasures (M2M 환경에서의 SNS 개인정보 유출 위협 및 대응방안)

  • Go, Jun-Young;Lee, Keun-Ho
    • Journal of the Korea Convergence Society
    • /
    • v.5 no.1
    • /
    • pp.29-34
    • /
    • 2014
  • It appeared with the development of IT skills to help the social network SNS(Social Network Service) on the online form. Many people around the world and in the business environment changes is the emergence of social networks are bringing. And the rapid development of the idea, but are insignificant for the security threats that are used by many people in many companies, and social network services. In addition, although it is true that this connection is increased from the number of mobile machines to the development of M2M, that is not recognized for that vulnerability. To evaluate and identify vulnerabilities against security threats and countermeasures for the SNS access the social network on the M2M After looking for privacy and in the present.

Active Object Tracking System for Intelligent Video Surveillance (지능형 비디오 감시를 위한 능동적 객체 추적 시스템)

  • Park, Ho-Sik
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.2
    • /
    • pp.82-85
    • /
    • 2014
  • It is helpful to use Intelligent Video Surveillance to replace and supplement the demerit which can possibly occur due to the mistake that can be made by human management. To accomplish this, it is essential that the system should digitalize image information from surveillance camera so that the system, itself, can be able to locate a object and to analyze the pattern of the object. Also, it is imperative that the system should have ability to operate a alarm and a entrance blocking system and to notify a situation to a security manager. Zooming a small object form a screen, however, requires a exact zooming ratio of the object and a shift of centric coordinate. In this paper, It is able to locate and observe closely a object from flexible background, regardless of the distance, by calculating a zooming ratio according to object moment, pan coordinate, and tilt coordinate.

Reader Emulation System for Accessing Sensor Device Through EPCglobal Reader Protocol (EPCglobal 리더 프로토콜을 통한 센서장치 접근을 위한 리더 에뮬레이션 시스템)

  • Choi, Seung-Hyuk;Kim, Tae-Yong;Kwon, Oh-Heum;Song, Ha-Joo
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.8
    • /
    • pp.842-852
    • /
    • 2010
  • RFID applications use tags to identify objects, but recent applications tend to include diverse sensor devices such as light, temperature, and humidity sensors as well. RFID tag information is usually processed via the event driven model. However sensor devices are usually accessed via the functional call model. Therefore application developers have to deal with mixed data access models and device dependent interface functions. In this paper, we propose a sensor reader emulator that provides a consistent access interface to sensor devices regardless of the types of devices. SRE provides a more efficient way of developing RFID applications by providing a single application programmer's view to RFID tags and sensor devices. In applications where tags are fixed to a place, SRE can replace expensive sensor tags and sensor readers with inexpensive sensor devices reducing the total cost while providing the same functionality.