• Title/Summary/Keyword: 원 웨어

Search Result 1,017, Processing Time 0.027 seconds

A study on the effect of introducing EBS AR production system on content (EBS AR 실감영상 제작 시스템 도입이 콘텐츠에 끼친 영향에 대한 연구)

  • Kim, Ho-sik;Kwon, Soon-chul;Lee, Seung-hyun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.711-719
    • /
    • 2021
  • EBS has been producing numerous educational contents with traditional virtual studio production systems since the early 2000s and applied AR video production system in October 2020, twenty-years after. Although the basic concept of synthesizing graphic elements and actual image in real time by tracking camera movement and lens information is similar to the previous one but the newly applied AR video production system contains some of advanced technologies that are improved over the previous ones. Marker tracking technology that enables camera movement free and position tracking has been applied that can track the location stably, and the operating software has been applied with Unreal Engine, one of the representative graphic engines used in computer game production, therefore the system's rendering burden has been reduced, enabling high-quality and real-time graphic effects. This system is installed on a crane camera that is mainly used in a crane shot at the live broadcasting studio and applied for live broadcasting programs for children and some of the videos such as program introductions and quiz events that used to be expressed in 2D graphics were converted to 3D AR videos which has been enhanced. This paper covers the effect of introduction and application of the AR video production system on EBS content production and the future development direction and possibility.

Research on Financial Distress Prediction Model of Chinese Cultural Industry Enterprises Based on Machine Learning and Traditional Statistical (전통적인 통계와 기계학습 기반 중국 문화산업 기업의 재무적 곤경 예측모형 연구)

  • Yuan, Tao;Wang, Kun;Luan, Xi;Bae, Ki-Hyung
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.2
    • /
    • pp.545-558
    • /
    • 2022
  • The purpose of this study is to explore a prediction model for accurately predicting Financial Difficulties of Chinese Cultural Industry Enterprises through Traditional Statistics and Machine Learning. To construct the prediction model, the data of 128 listed Cultural Industry Enterprises in China are used. On the basis of data groups composed of 25 explanatory variables, prediction models using Traditional Statistical such as Discriminant Analysis and logistic as well as Machine Learning such as SVM, Decision Tree and Random Forest were constructed, and Python software was used to evaluate the performance of each model. The results show that the Random Forest model has the best prediction performance, with an accuracy of 95%. The SVM model was followed with 93% accuracy. The Decision Tree model was followed with 92% accuracy.The Discriminant Analysis model was followed with 89% accuracy. The model with the lowest prediction effect was the Logistic model with an accuracy of 88%. This shows that Machine Learning model can achieve better prediction effect than Traditional Statistical model when predicting financial distress of Chinese cultural industry enterprises.

A Study on the Influence of Augmented Reality Experience in Mobile Applications on Product Purchase (모바일 어플리케이션의 증강현실 이용경험이 제품구매에 미치는 영향 연구)

  • Kim, Minjung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.6
    • /
    • pp.971-978
    • /
    • 2022
  • As a marketing method in a non-face-to-face society, the purpose of this study is to test how AR experience affects purchase intention in the process of consumers recognizing product information to purchase products and to secure the basis for the effectiveness of developing and introducing augmented reality functions in future product brand applications. Literary research methods and empirical research methods were used to verify the research purpose, and to measure this, an application of domestic tableware brand 'Odense', which implements augmented reality functions, was produced and used as an experimental tool. Also, a direct causal relationship was attempted by constituting a questionnaire by deriving a measurement scale for perceived usefulness, perceived ease, perceived pleasure, and purchase, which are factors of technology acceptance theory (TAM), and empirical analysis was conducted using the SPSS 25.0 statistical package to achieve the purpose of the study. As a result of the study, significant results were derived from all factors in the effect of perceived usefulness, ease, and pleasure on purchase intention, and several significant differences were found among factors according to gender, age, and internet shopping usage time in general characteristics. In conclusion, the user experience of the medium in which the augmented reality function is introduced in the information recognition stage of the product has a positive effect on purchase compared to the user experience of existing applications.

Reliability Analysis of Finger Joint Range of Motion Measurements in Wearable Soft Sensor Gloves (웨어러블 소프트 센서 장갑의 손가락 관절 관절가동범위 측정에 대한 신뢰도 분석)

  • Eun-Kyung Kim;Jin-Hong Kim;Yu-Ri Kim;Ye-Ji Hong;Gang-Pyo Lee;Eun-Hye Jeon;Joon-bum Bae;Su-in Kim;Sang-Yi Lee
    • PNF and Movement
    • /
    • v.21 no.2
    • /
    • pp.171-183
    • /
    • 2023
  • Purpose: The purpose of this study was to compare universal goniometry (UG), which is commonly used in clinical practice to measure the range of motion (ROM) of finger joints with a wearable soft sensor glove, and to analyze the reliability to determine its usefulness. Methods: Ten healthy adults (6 males, 4 females) participated in this study. The metacarpophalangeal joint (MCP), interphalangeal joint (IP), and proximal interphalangeal joint (PIP) of both hands were measured using UG and Mollisen HAND soft sensor gloves during active flexion, according to the American Society for Hand Therapists' measurement criteria. Measurements were taken in triplicate and averaged. The mean and standard deviation of the two methods were calculated, and the 95% limits of agreement (LOA) of the measurements were calculated using the intraclass correlation coefficient (ICC) and Bland-Altman plot to examine the reliability and discrepancies between the measurements. Results: The results of the mean values of the flexion angles for the active range of motion (AROM) of the finger joints showed large angular differences in the finger joints, except for the MCP of the thumb. In the inter-rater reliability analysis according to the measurement method, the ICC (2, 1) value showed a low level close to 0, and the mean difference by the Bland-Altman plot showed a value greater than 0, showing a pattern of discrepancy. The 95% LOA had a wide range of differences. Conclusion: This study is a preliminary study investigating the usefulness of the soft sensor glove, and the reliability analysis showed a low level of reliability and inconsistency. However, if future studies can overcome the limitations of this study and the technical problems of the soft sensor glove in the development stage, it is suggested that the measurement instrument can show more accurate measurement and higher reliability when measuring ROM with UG.

Reliability Management - From the Perspective of Quality Management Engineer Test (신뢰성관리 - 품질경영기사 시험의 측면에서)

  • Jaiwook Baik
    • Industry Promotion Research
    • /
    • v.8 no.2
    • /
    • pp.37-43
    • /
    • 2023
  • Sampling In this study, we examined the problems and their improvement plans associated with the reliability management sector in quality management engineer test conducted in Korea. First of all, there seems to be a problem in that the terminology is not unified and some techniques essential for reliability analysis are not included. We also looked at quality and reliability tests performed in foreign countries (especially USA) that Koreans often acquire. In particular, it can be seen that the CRE test almost overlaps with the contents of the reliability management engineer test in Korea. However, while the USA is an open book test, Korea is not, so the problem is that there are too many formulas to memorize on the part of the test takers. In addition, the analysis of the data is done manually without using computer software. If the test were an open book test like the CRE test in USA, it will be a test that can go beyond fragmentary knowledge and check whether test takers have the essential elements in reliability management. Lastly, if we adopt re-certification system through education and work within a certain period of time, as in USA, it will be a qualification test suitable for modern people living in a flood of information.

Automatic 3D data extraction method of fashion image with mannequin using watershed and U-net (워터쉐드와 U-net을 이용한 마네킹 패션 이미지의 자동 3D 데이터 추출 방법)

  • Youngmin Park
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.3
    • /
    • pp.825-834
    • /
    • 2023
  • The demands of people who purchase fashion products on Internet shopping are gradually increasing, and attempts are being made to provide user-friendly images with 3D contents and web 3D software instead of pictures and videos of products provided. As a reason for this issue, which has emerged as the most important aspect in the fashion web shopping industry, complaints that the product is different when the product is received and the image at the time of purchase has been heightened. As a way to solve this problem, various image processing technologies have been introduced, but there is a limit to the quality of 2D images. In this study, we proposed an automatic conversion technology that converts 2D images into 3D and grafts them to web 3D technology that allows customers to identify products in various locations and reduces the cost and calculation time required for conversion. We developed a system that shoots a mannequin by placing it on a rotating turntable using only 8 cameras. In order to extract only the clothing part from the image taken by this system, markers are removed using U-net, and an algorithm that extracts only the clothing area by identifying the color feature information of the background area and mannequin area is proposed. Using this algorithm, the time taken to extract only the clothes area after taking an image is 2.25 seconds per image, and it takes a total of 144 seconds (2 minutes and 4 seconds) when taking 64 images of one piece of clothing. It can extract 3D objects with very good performance compared to the system.

A Study on the evaluation technique rubric suitable for the characteristics of digital design subject (디지털 디자인 과목의 특성에 적합한 평가기법 루브릭에 관한 연구)

  • Cho, Hyun Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.9 no.6
    • /
    • pp.525-530
    • /
    • 2023
  • Digital drawing subjects require the subdivision of evaluation elements and the graduality of evaluation according to the recent movement of the innovative curriculum. The purpose of this paper is to present the criteria for evaluating the drawing and to propose it as a rubric evaluation. In the text, criteria for beginner evaluation were technical skills such as the accuracy and consistency of the line, the ratio and balance of the picture, and the ability to effectively utilize various brushes and tools at the intermediate levels. In the advanced evaluation section, it is a part of a new perspective or originality centered on creativity and originality, and a unique perspective or interpretation of a given subject. In addition, as an understanding of design principles, the evaluation of completeness was derived focusing on the ability to actively utilize various functions of digital drawing software through design principles such as placement, color, and shape. The importance of introducing rubric evaluation is to allow instructors to make objective and consistent evaluations, and the key to research in rubric evaluation in these art subjects is to help learners clearly grasp their strengths and weaknesses, and learners can identify what needs to be improved and develop better drawing skills accordingly through feedback on each item.

Analysis and Design of Profiling Adaptor for XML based Energy Storage System (XML 기반의 에너지 저장용 프로파일 어댑터 분석 및 설계)

  • Woo, Yongje;Park, Jaehong;Kang, Mingoo;Kwon, Kiwon
    • Journal of Internet Computing and Services
    • /
    • v.16 no.5
    • /
    • pp.29-38
    • /
    • 2015
  • The Energy Storage System stores electricity for later use. This system can store electricity from legacy electric power systems or renewable energy systems into a battery device when demand is low. When there is high electricity demand, it uses the electricity previously stored and enables efficient energy usage and stable operation of the electric power system. It increases the energy usage efficiency, stabilizes the power supply system, and increases the utilization of renewable energy. The recent increase in the global interest for efficient energy consumption has increased the need for an energy storage system that can satisfy both the consumers' demand for stable power supply and the suppliers' demand for power demand normalization. In general, an energy storage system consists of a Power Conditioning System, a Battery Management System, a battery cell and peripheral devices. The specifications of the subsystems that form the energy storage system are manufacturer dependent. Since the core component interfaces are not standardized, there are difficulties in forming and operating the energy storage system. In this paper, the design of the profile structure for energy storage system and realization of private profiling system for energy storage system is presented. The profiling system accommodates diverse component settings that are manufacturer dependent and information needed for effective operation. The settings and operation information of various PCSs, BMSs, battery cells, and other peripheral device are analyzed to define profile specification and structure. A profile adapter software that can be applied to energy storage system is designed and implemented. The profiles for energy storage system generated by the profile authoring tool consist of a settings profile and operation profile. Setting profile consists of configuration information for energy device what composes energy saving system. To be more specific, setting profile has three parts of category as information for electric control module, sub system, and interface for communication between electric devices. Operation profile includes information in relation to the method in which controls Energy Storage system. The profiles are based on standard XML specification to accommodate future extensions. The profile system has been verified by applying it to an energy storage system and testing charge and discharge operations.

A Thermal Time-Driven Dormancy Index as a Complementary Criterion for Grape Vine Freeze Risk Evaluation (포도 동해위험 판정기준으로서 온도시간 기반의 휴면심도 이용)

  • Kwon, Eun-Young;Jung, Jea-Eun;Chung, U-Ran;Lee, Seung-Jong;Song, Gi-Cheol;Choi, Dong-Geun;Yun, Jin-I.
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.8 no.1
    • /
    • pp.1-9
    • /
    • 2006
  • Regardless of the recent observed warmer winters in Korea, more freeze injuries and associated economic losses are reported in fruit industry than ever before. Existing freeze-frost forecasting systems employ only daily minimum temperature for judging the potential damage on dormant flowering buds but cannot accommodate potential biological responses such as short-term acclimation of plants to severe weather episodes as well as annual variation in climate. We introduce 'dormancy depth', in addition to daily minimum temperature, as a complementary criterion for judging the potential damage of freezing temperatures on dormant flowering buds of grape vines. Dormancy depth can be estimated by a phonology model driven by daily maximum and minimum temperature and is expected to make a reasonable proxy for physiological tolerance of buds to low temperature. Dormancy depth at a selected site was estimated for a climatological normal year by this model, and we found a close similarity in time course change pattern between the estimated dormancy depth and the known cold tolerance of fruit trees. Inter-annual and spatial variation in dormancy depth were identified by this method, showing the feasibility of using dormancy depth as a proxy indicator for tolerance to low temperature during the winter season. The model was applied to 10 vineyards which were recently damaged by a cold spell, and a temperature-dormancy depth-freeze injury relationship was formulated into an exponential-saturation model which can be used for judging freeze risk under a given set of temperature and dormancy depth. Based on this model and the expected lowest temperature with a 10-year recurrence interval, a freeze risk probability map was produced for Hwaseong County, Korea. The results seemed to explain why the vineyards in the warmer part of Hwaseong County have been hit by more freeBe damage than those in the cooler part of the county. A dormancy depth-minimum temperature dual engine freeze warning system was designed for vineyards in major production counties in Korea by combining the site-specific dormancy depth and minimum temperature forecasts with the freeze risk model. In this system, daily accumulation of thermal time since last fall leads to the dormancy state (depth) for today. The regional minimum temperature forecast for tomorrow by the Korea Meteorological Administration is converted to the site specific forecast at a 30m resolution. These data are input to the freeze risk model and the percent damage probability is calculated for each grid cell and mapped for the entire county. Similar approaches may be used to develop freeze warning systems for other deciduous fruit trees.

Behavioural Analysis of Password Authentication and Countermeasure to Phishing Attacks - from User Experience and HCI Perspectives (사용자의 패스워드 인증 행위 분석 및 피싱 공격시 대응방안 - 사용자 경험 및 HCI의 관점에서)

  • Ryu, Hong Ryeol;Hong, Moses;Kwon, Taekyoung
    • Journal of Internet Computing and Services
    • /
    • v.15 no.3
    • /
    • pp.79-90
    • /
    • 2014
  • User authentication based on ID and PW has been widely used. As the Internet has become a growing part of people' lives, input times of ID/PW have been increased for a variety of services. People have already learned enough to perform the authentication procedure and have entered ID/PW while ones are unconscious. This is referred to as the adaptive unconscious, a set of mental processes incoming information and producing judgements and behaviors without our conscious awareness and within a second. Most people have joined up for various websites with a small number of IDs/PWs, because they relied on their memory for managing IDs/PWs. Human memory decays with the passing of time and knowledges in human memory tend to interfere with each other. For that reason, there is the potential for people to enter an invalid ID/PW. Therefore, these characteristics above mentioned regarding of user authentication with ID/PW can lead to human vulnerabilities: people use a few PWs for various websites, manage IDs/PWs depending on their memory, and enter ID/PW unconsciously. Based on the vulnerability of human factors, a variety of information leakage attacks such as phishing and pharming attacks have been increasing exponentially. In the past, information leakage attacks exploited vulnerabilities of hardware, operating system, software and so on. However, most of current attacks tend to exploit the vulnerabilities of the human factors. These attacks based on the vulnerability of the human factor are called social-engineering attacks. Recently, malicious social-engineering technique such as phishing and pharming attacks is one of the biggest security problems. Phishing is an attack of attempting to obtain valuable information such as ID/PW and pharming is an attack intended to steal personal data by redirecting a website's traffic to a fraudulent copy of a legitimate website. Screens of fraudulent copies used for both phishing and pharming attacks are almost identical to those of legitimate websites, and even the pharming can include the deceptive URL address. Therefore, without the supports of prevention and detection techniques such as vaccines and reputation system, it is difficult for users to determine intuitively whether the site is the phishing and pharming sites or legitimate site. The previous researches in terms of phishing and pharming attacks have mainly studied on technical solutions. In this paper, we focus on human behaviour when users are confronted by phishing and pharming attacks without knowing them. We conducted an attack experiment in order to find out how many IDs/PWs are leaked from pharming and phishing attack. We firstly configured the experimental settings in the same condition of phishing and pharming attacks and build a phishing site for the experiment. We then recruited 64 voluntary participants and asked them to log in our experimental site. For each participant, we conducted a questionnaire survey with regard to the experiment. Through the attack experiment and survey, we observed whether their password are leaked out when logging in the experimental phishing site, and how many different passwords are leaked among the total number of passwords of each participant. Consequently, we found out that most participants unconsciously logged in the site and the ID/PW management dependent on human memory caused the leakage of multiple passwords. The user should actively utilize repudiation systems and the service provider with online site should support prevention techniques that the user can intuitively determined whether the site is phishing.