• Title/Summary/Keyword: 사용자 지정

Search Result 511, Processing Time 0.027 seconds

The input device system with hand motion using hand tracking technique of CamShift algorithm (CamShift 알고리즘의 Hand Tracking 기법을 응용한 Hand Motion 입력 장치 시스템)

  • Jeon, Yu-Na;Kim, Soo-Ji;Lee, Chang-Hoon;Kim, Hyeong-Ryul;Lee, Sung-Koo
    • Journal of Digital Contents Society
    • /
    • v.16 no.1
    • /
    • pp.157-164
    • /
    • 2015
  • The existing input device is limited to keyboard and mouse. However, recently new type of input device has been developed in response to requests from users. To reflect this trend we propose the new type of input device that gives instruction as analyzing the hand motion of image without special device. After binarizing the skin color area using Cam-Shift method and tracking, it recognizes the hand motion by inputting the finger areas and the angles from the palm center point, which are separated through labeling, into four cardinal directions and counting them. In cases when specific background was not set and without gloves, the recognition rate remained approximately at 75 percent. However, when specific background was set and the person wore red gloves, the recognition rate increased to 90.2 percent due to reduction in noise.

MPEG-4 Based Multimedia Synchronization Model and Application (MPEG-4 기반의 멀티미디어 동기화 모델과 응용)

  • Sung, Seung-Kyu;Lee, Myeong-Won
    • The KIPS Transactions:PartD
    • /
    • v.11D no.5
    • /
    • pp.1159-1166
    • /
    • 2004
  • This paper describes a multimedia synchronization model based on the MPEG-4(Moving Picture Expert Group) system. It defines and modifies new nodes for representing temporal relationships between media objects in the BIFS(Binary Format for Scene) of MPEG-4 system which Integrates, manages and transfers multimedia objects such as audio, video, image, etc. The relationships are represented by using a multimedia temporal model during the start, play and delay time interval. In addition, we illustrate a multimedia authoring system that includes the Interface used for defining the temporal relationships. Differently from several contentional tools generally appropriate for professional users who can edit the BIFS nodes of themselves, the system provides end-users with the function that can define the temporal relationships of multimedia objects directly in the interface.

Occlusion Processing in Simulation using Improved Object Contour Extraction Algorithm by Neighboring edge Search and MER (이웃 에지 탐색에 의한 개선된 객체 윤곽선 추출 알고리즘과 MER을 이용한 모의훈련에서의 폐색처리)

  • Cha, Jeong-Hee;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.2
    • /
    • pp.206-211
    • /
    • 2008
  • Trainee can enhance his perception of and interaction with the real world by displayed virtual objects in simulation using image processing technology. Therefore, it is essential for realistic simulation to determine the occlusion areas of the virtual object produces after registering real image and virtual object exactly. In this paper, we proposed the new method to solve occlusions which happens during virtual target moves according to the simulated route on real image using improved object contour extraction by neighboring edge search and picking algorithm. After we acquire the detailed contour of complex objects by proposed contour extraction algorithm, we extract the three dimensional information of the position happening occlusion by using MER for performance improvement. In the experiment, we compared proposed method with existed method and preyed the effectiveness in the environment which a partial occlusions happens.

Smooth 핸드오프를 이용한 Mobile IP의 성능 분석

  • 차재정;김두용;최덕규
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2000.04a
    • /
    • pp.23-24
    • /
    • 2000
  • 최근 개인 이동 통신 단말기의 수요와 인터넷 사용자의 증가와 함께, 유선 통신 서비스에서부터 개인 휴대 통신 서비스에 이르기까지 다양한 통신 서비스가 제공되기 시작하면서 이러한 서비스가 결합된 mobile IP의 관심이 높아지고 있다. 기존의 IP에서는 노드가 계속해서 접속을 유지하기 위해서는 접속되는 위치가 반드시 고정적으로 지정되는 것이 필요하며 노드의 위치가 바뀌면 기존의 IP 주소는 사용할 수 없다. 그러나 mobile IP는 인터넷상의 임의의 다른 위치에 접속해 노드가 IP 주소를 바꾸지 않고 인터넷을 사용할 수 있도록 한다. 이동(mobile) 노드가 새로운 셀 지역으로 이동하면, 그 셀에 해당하는 외부(foreign) 에이전트로부터 임시 주소(care-of address)를 할당받아 홈 네트워크에 위치한 홈 에이전트에 등록하고, 홈 에이전트는 송신 노드가 이동노드로 전송한 패킷을 새롭게 등록된 임시 주소로 터널링을 통해 전달한다. 이러한 기본적인 mobile IP 방법은 모든 패킷이 홈 에이전트를 통해 이동 노드로 전송되므로 최적화된 라우팅 방법을 제공하지 못한다. 그러므로 이러한 mobile IP의 단점을 보완한 route optimization mobile IP가 제안되고 있다. Route optimization mobile IP는 이동 노드의 현재 위치와 관련된 정보를 갖는 바인딩을 저장하여 송신 노드가 패킷을 이동 노드의 홈 에이전트를 거치지 않고 이동 노드로 직접 전송하는 기능을 제공한다. 또한 이동 노드가 다른 셀 지역으로 핸드오프가 이루어질 경우, 핸드오프 발생전의 바인딩 정보를 이용하여 송신 노드가 전송한 패킷은 이전 셀 지역에 있는 에이전트가 새로운 셀 지역에 있는 이동 노드로 패킷을 재전송하여 전달하는 smooth 핸드오프 기능을 제공한다. 이전 셀 지역에 속한 외부 에이전트가 바인딩을 갱신하기 전에 송신 노드로부터 이동노드로 전달된 패킷이 있을 경우는 패킷을 저장하여 이후에 이동 노드의 위치 정보에 관한 바인딩 정보가 갱신되면 이러한 바인딩 정보에 따라 패킷을 재전송하는 버퍼기능도 제공한다. route optimization mobile IP는 기본적인 mobile IP에서의 복잡한 라우팅 문제를 해결하고, 핸드오프에서의 패킷 손실률을 최소화 한다.본 논문에서는 컴퓨터 시뮬레이션을 통해 smooth 핸드오프를 이용한 mobile IP의 성능을 분석한다. 일반적으로 데이터 트래픽 특성, 노드의 이동성, 바인딩 갱신시간, 버퍼관리 방법 등은 핸드오프 동안 mobile IP의 성능에 많은 영향을 미친다. 따라서 시뮬레이션 모델을 이용하여 다양한 트래픽 환경에서 위에 언급된 성능 파라미터들의 영향을 분석한다. 마지막으로 시뮬레이션 결과를 이용하여 mobile IP의 성능을 개선시키기 위한 방법을 제시한다.

  • PDF

A Scheme for User Authentication using Pupil (눈동자를 이용한 사용자 인증기법)

  • Lee, Jae-Wook;Kang, Bo-Seon;Lee, Keun-Ho
    • Journal of Digital Convergence
    • /
    • v.14 no.9
    • /
    • pp.325-329
    • /
    • 2016
  • Facial authentication has the limelight because it has less resistance and it is hard to falsify among various biometric identification. The algorithm of facial authentication can bring about huge difference in accuracy and speed by the algorithm construction. Along with face-extracted data by tracing and extracting pupil, the thesis studied algorithm which extracts data to improve error rate and to accurately authenticate face. It detects face by cascade, selects as significant area, divides the facial area into 4 equal parts to save the coordinate of object. Also, to detect pupil from the eye, the binarization is conducted and it detects pupil by Hough conversion. The core coordinate of detected pupil is saved and calculated to conduct facial authentication through data matching. The thesis studied optimized facial authentication algorithm which accurately calculates facial data with pupil trace.

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

A Study on Necessity of System for mediating transactions of a mobile gift certificate (모바일 상품권 거래 중개 시스템의 필요성에 관한 연구)

  • Bae, Yu-Mi;Jung, Sung-Jae;Lee, Kwang-Yong;Jang, Rae-Young;Lee, Jae-Ung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.185-188
    • /
    • 2016
  • The percentage share of mobile gift card certificate in the gift card market has increased significantly each year. But from a consumer perspective mobile gift card certificate has several problems. Specifying unfair terms in Fair Trade Commission has improved slightly, but the problem is not replaced with the equivalent authority that issued the vouchers can not be solved. The exchange between users the most realistic way to solve this problem is to create an environment as possible. In conclusion, The deal will be possible to build a mobile gift card certificate brokerage trading in a convenient and reliable P2P-based. If the System for mediating transactions of a mobile gift certificate has created a healthy retail environment, such as the expansion of the voucher market, reduce social costs may be creating.

  • PDF

Secure Sharing and Recovering Scheme of e-Business Data Based on Weight Table (가중치 테이블 기반 안전한 e-비즈니스 데이터 분할 복원 방식)

  • Song, You-Jin;Kim, Jin-Seog
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.27-36
    • /
    • 2009
  • The leaking of personal information is mostly occurred by internal users. The confidential information such as credit card number can be disclosed or modified by system manager easily. The secure storaging and managing scheme for sensitive data of individual and enterprise is required for distributed data management. The manager owning private data is needed to have a weight which is a right to disclose a private data. For deciding a weight, it is required that system is able to designate the level of user's right. In this paper, we propose the new algorithm named digit-independent algorithm. And we propose a new data management scheme of gathering and processing the data based on digit-independent algorithm. Our sharing and recovering scheme have the efficient computation operation for managing a large quantity of data using weight table. The proposed scheme is able to use for secure e-business data management and storage in ubiquitous computing environment.

An Adaptive ROI Mask Generation for ROI coding of JPEG2000 (JPEG200의 관심영역 부호화를 위한 적응적인 관심영역 마스크 생성 방법)

  • Kang, Ki-Jun;Seo, Yeong-Geon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.5
    • /
    • pp.39-47
    • /
    • 2007
  • In this thesis, a method of generating an adaptable Region-Of-Interest(ROI) Mask for the Region-Of-Interest coding is suggested. In the method, an ROI Mask is generated using the information of the ROI designated by a user. In the existed method of ROI coding, after scanning all the pixels in order and discriminating an ROI, an ROI Mask is generated. But, in our method, after scanning a part of pixels based on the shape pattern of an ROI and discriminating a ROI by one code block unit, an ROI Mask is generated. Moreover, from the method, a pattern number, threshold of a ROI and background threshold parameter are provided. According to the result of its comparing test with the existed methods to show the usability, it is proved that our method is superior in speed to the existed ones.

  • PDF

Controlling of Dam Gates with Outflow Control by Dynamic Fuzzy Inference (동적 퍼지 추론에 의한 방류량 조절 가능 댐 수문 제어)

  • Woo, Young-Woon;Lee, Soo-Jong;Kim, Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.75-82
    • /
    • 2008
  • Control of dam gates is a complex, nonlinear, and non-stationary control process and is significantly affected by hydrological conditions which are not predictable beforehand. In this paper, we proposed control methods based on a fuzzy inference method for the operation of dam gates. The proposed methods are not only suitable for controlling gates but also able to maintain target water level in order to prepare a draught, and able to control the amount of the outfow from a reservoir in order to prevent floods in lower areas of a river. In the proposed methods, we used the dynamic fuzzy inference method that membership functions can be varied by changing environment conditions for keeping up the target water level instead of conventional static fuzzy inference methods, and used additional fuzzy rules and membership functions for restricting the amount of the outflow. Simulation results demonstrated that the proposed methods produce an efficient solution for both of maintaining target water level defined beforehand and controlling the amount of the outflow.

  • PDF