• Title/Summary/Keyword: 요소그룹

Search Result 841, Processing Time 0.023 seconds

A Study on Hand-signal Recognition System in 3-dimensional Space (3차원 공간상의 수신호 인식 시스템에 대한 연구)

  • 장효영;김대진;김정배;변증남
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.103-114
    • /
    • 2004
  • This paper deals with a system that is capable of recognizing hand-signals in 3-dimensional space. The system uses 2 color cameras as input devices. Vision-based gesture recognition system is known to be user-friendly because of its contact-free characteristic. But as with other applications using a camera as an input device, there are difficulties under complex background and varying illumination. In order to detect hand region robustly from a input image under various conditions without any special gloves or markers, the paper uses previous position information and adaptive hand color model. The paper defines a hand-signal as a combination of two basic elements such as 'hand pose' and 'hand trajectory'. As an extensive classification method for hand pose, the paper proposes 2-stage classification method by using 'small group concept'. Also, the paper suggests a complementary feature selection method from images from two color cameras. We verified our method with a hand-signal application to our driving simulator.

Research on Possibilies of Social Network Services through IPTV (IPTV를 통한 SNS 가능성에 관한 연구)

  • Kim, Hyun-Suk;Kim, So-Hyun
    • Journal of the HCI Society of Korea
    • /
    • v.4 no.1
    • /
    • pp.11-15
    • /
    • 2009
  • Social Network Service has been extremely popular these days and providing diverse features and functions to users. Social networking and interest sharing in between users are key factors of SNS and this circles back to draw more users to the service. Web is the first media to provide SNS and mobile is the next. The service based on mobile environmental uniqueness such as Location-based-service(LBS) is the key success factors to convert users to web SNS to mobile SNS. TV has also been a possible SSN market to draw users to share interests and participation. However TV has been always community electronics in family members and personalization to provide SNS has been barrier to overcome. In this study, we explorer ideas of key factors of personalization in TV environment and conducted a field study to define characteristics of TV personalization in terms of depth, method, style and structure. Research finds out that there are significant differences in these categories.

  • PDF

A Study on Secure and Efficient Wireless Network Management Scheme based Multi users for Ubiquitous Environment (유비쿼터스 환경을 위한 다중 사용자 기반의 안전하고 효율적인 무선 네트워크 관리 기법 제안)

  • Seo Dae-Hee;Lee Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.13C no.1 s.104
    • /
    • pp.1-10
    • /
    • 2006
  • Ubiquitous computing, a new type of network environment has been generating much interest recently and has been actively studied. In ubiquitous computing, the sensor network which consists of low electric power ad-hoc network-based sensors and sensor nodes, is particularly the most important factor The sensor network serves as the mediator between ubiquitous computing and the actual environment. Related studies are focused on network . management through lightweight hardware using RFID. However, to apply these to actual environment, more practical scenarios as well as more secured studies equipped with secures and efficiency features are needed. Therefore, this study aims to build a wireless network based on PTD for multi users, which provides the largest utility in individual networks, and propose an appropriate management method. The proposed method is designed to enhance security and efficiency related to various services required in wireless networks, based on the reliable peripheral devices for users or pm. using pm, which has been applied to electronic commerce transactions in existing papers, this study also proposed an appropriate management method that is suitable for a dynamic environment and setting a temporary group to provide various services.

A Building Method of Infrastructure Efficiency under Ad Hoc-based on Network Infrastructure for Medical Information System (Ad Hoc 기반 의료정보시스템의 네트워크 보안 효율성구조 Infrastructure 설계방법)

  • Noh, Si-Choon;Yoo, Seung-Jae
    • Convergence Security Journal
    • /
    • v.11 no.3
    • /
    • pp.91-98
    • /
    • 2011
  • Medical information system based on ad hoc network designed for general information systems and information networks have different security requirements. Malicious code infiltration and security features are performed on same medical information network architecture along the route. Security domain of medical information systems is the ground of penetration and defense performed over the network architecture and it is also the traffic handling areas separated by a concept of differentiated group. Ad hoc-based medical information systems in the network security domain, set some standards about what should be the methodology of this study. In this paper, medical information system network configuration, the determining factor based on the security domain, the structure selection criteria and blocking positionings are presented according to the traffic route configuration. If you apply this methodology designed to increase security, efficiency can be possible. Health information systems in accordance with the security domain areas requires differentiated protection needs of the security mechanism that is proposed by this study.

A Designing Method of Intranet Security Architecture Model for Network Security Efficiency (보안 효율성 제고를 위한 인트라넷 네트워크 아키텍쳐 모델)

  • Noh, Si-Choon
    • Convergence Security Journal
    • /
    • v.10 no.1
    • /
    • pp.9-17
    • /
    • 2010
  • Internet network routing system is used to prevent spread and distribution of malicious data traffic. The penetration of malicious code and the function of security blocking are performed on the same course of traffic pathway. The security architecture is the concept to distinguish the architecture from the group handling with the traffic on the structure of network which is performed with the function of penetration and security. The security architecture could be different from the criterion of its realm and function, which requires the development and the application of security mechanism for every architecture. For the establishment of security architecture it is needed to show what criterion of net work should be set up. This study is based on analysis of diagnostic weakness structure in the network security architecture and research the criterion for topology factor, security architecture structure map selection, and blocking location and disinfection net. It is shown to increase the effective rate blocking the virus with the proposed method in this paper rather than the traditional network architecture.

A New Evaluation Method for Interfacial Properties of Composites using the Gradual Multi-Fiber Fragmentation Test (단계적 다섬유 Fragmentation 시험법을 이용한 복합재료의 계면적 특성에 대한 새로운 평가방법)

  • ;;Koichi Goda
    • Composites Research
    • /
    • v.12 no.2
    • /
    • pp.10-25
    • /
    • 1999
  • A new evaluation method for the interfacial properties of fibrous composites based on a fragmentation technique is proposed by using the gradual multi-fiber composite, in which the inter-fiber spacing is gradually changed. The results showed that as the inter-fiber distance increased, the aspect ratio of broken fibers decreased while the interfacial shear strength between the fiber and matrix increased. When the reciprocal of the inter-fiber destance was taken for the above relations, both the aspect ratio and interfacial shear strength showed a saturated value. This means that the gradual multi-fiber composite indicates an upper bound in aspect ratio and an upper bound in interfacial shear strength. It was concluded that this fragmentation test could be a new method for composite evaluation, since reducing a difference between these two bounds is effective for composite strengthening. In addition an elastoplastic finite element analysis was carried out to relate the above results with fiber stress a distribution around fiber breaks. It was proved that the bound obtained in the gradual multi-fiber composite test is closely related to stress concentrations caused by a group of multi-fiber breaks.

  • PDF

Psycho-Social Issues of Returning Veterans with Post Traumatic Stress Disorder (외상 후 스트레스 장애를 가진 퇴역 군인의 심리사회적 문제)

  • Jeon, Mookyong
    • Journal of Digital Convergence
    • /
    • v.14 no.7
    • /
    • pp.475-484
    • /
    • 2016
  • The purpose of this article is to investigate how returning veterans with Post Traumatic Stress Disorder (PTSD) develop psycho-social issues and describe how helping professionals can assist them with re-adapting to the community. Based on a literature review, the author explores the causes of psycho-social issues of returning veterans with PTSD, reviews various ways of helping, and proposes critical factors that helping professionals should be aware of when intervening in psycho-social issues of returning veterans with PTSD. It is found that psycho-social issues of returning veterans with PTSD are closely related to their distrust and aversion to authorities. Group therapy can be used as a viable intervention for alleviating PTSD symptoms and derived psycho-social issues in terms that veterans with PTSD tend to more open with other group members who can share and understand unique experiences.

Decision Analysis System for Job Guidance using Rough Set (러프집합을 통한 취업의사결정 분석시스템)

  • Lee, Heui-Tae;Park, In-Kyoo
    • Journal of Digital Convergence
    • /
    • v.11 no.10
    • /
    • pp.387-394
    • /
    • 2013
  • Data mining is the process of discovering hidden, non-trivial patterns in large amounts of data records in order to be used very effectively for analysis and forecasting. Because hundreds of variables give rise to a high level of redundancy and dimensionality with time complexity, they are more likely to have spurious relationships, and even the weakest relationships will be highly significant by any statistical test. Hence cluster analysis is a main task of data mining and is the task of grouping a set of objects in such a way that objects in the same group are more similar to each other than to those in other groups. In this paper system implementation is of great significance, which defines a new definition based on information-theoretic entropy and analyse the analogue behaviors of objects at hand so as to address the measurement of uncertainties in the classification of categorical data. The sources were taken from a survey aimed to identify of job guidance from students in high school pyeongtaek. we show how variable precision information-entropy based rough set can be used to group student in each section. It is proved that the proposed method has the more exact classification than the conventional in attributes more than 10 and that is more effective in job guidance for students.

On The Size of The Subgroup Generated by Linear Factors (선형 요소에 의해 생성된 부분그룹의 크기에 관한 연구)

  • Cheng, Qi;Hwang, Sun-Tae
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.6
    • /
    • pp.27-33
    • /
    • 2008
  • Given a polynomial ${\hbar}(x){\in}F_q[x]$ of degree h, it is an important problem to determine the size of multiplicative subgroup of $\(F_q[x]/({\hbar(x))\)*$ generated by $x-s_1,\;x-s_2,\;{\cdots},\;x-s_n$, where $\{s_1,\;s_2,\;{\cdots},\;s_n\}{\sebseteq}F_q$, and for all ${\hbar}(x){\neq}0$. So far the best known asymptotic lower bound is $(rh)^{O(1)}\(2er+O(\frac{1}{r})\)^h$, where $r=\frac{n}{h}$ and e(=2.718...) is the base of natural logarithm. In this paper, we exploit the coding theory connection of this problem and prove a better lower bound $(rh)^{O(1)}\(2er+{\frac{e}{2}}{\log}r-{\frac{e}{2}}{\log}{\frac{e}{2}}+O{(\frac{{\log}^2r}{r})}\)^h$, where log stands for natural logarithm We also discuss about the limitation of this approach.

Analysis of Argumentation in the Inquiry Discourse among Pre-service Science Teachers (탐구 토론에서 예비과학교사들의 논증 분석)

  • Lee, Bong-Woo;Lim, Myung-Sun
    • Journal of The Korean Association For Science Education
    • /
    • v.30 no.6
    • /
    • pp.739-751
    • /
    • 2010
  • The research reported in this study focused on an analysis of argumentation in the inquiry discourse among pre-service science teachers. For about 3 months, 7 groups of 24 pre-service science teachers participated in an open-ended inquiry and performed 10 inquiry discourses. All discourses were collected by video-recording and transcribed. To analyze features of argumentation discourse, analytic tools derived from Toulmin's argument pattern and cognitive argumentation scheme were applied to discussion transcripts. The results were as follows: First, the order of frequency in the analysis of 'meaning unit' was 'claim-warrant-data-rebuttal-backing.' Second, the order of frequency in the analysis of 'dialogue unit' was 'CW-CD-CDW-CWR-CR'. Third, more rebuttals were found than other discussions. Fourth, the second argumentative discussion showed a higher level than the first.