• Title/Summary/Keyword: API method

Search Result 526, Processing Time 0.03 seconds

A Prototype Implementation for 3D Animated Anaglyph Rendering of Multi-typed Urban Features using Standard OpenGL API

  • Lee, Ki-Won
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.5
    • /
    • pp.401-408
    • /
    • 2007
  • Animated anaglyph is the most cost-effective method for 3D stereo visualization of virtual or actual 3D geo-based data model. Unlike 3D anaglyph scene generation using paired epipolar images, the main data sets of this study is the multi-typed 3D feature model containing 3D shaped objects, DEM and satellite imagery. For this purpose, a prototype implementation for 3D animated anaglyph using OpenGL API is carried out, and virtual 3D feature modeling is performed to demonstrate the applicability of this anaglyph approach. Although 3D features are not real objects in this stage, these can be substituted with actual 3D feature model with full texture images along all facades. Currently, it is regarded as the special viewing effect within 3D GIS application domains, because just stereo 3D viewing is a part of lots of GIS functionalities or remote sensing image processing modules. Animated anaglyph process can be linked with real-time manipulation process of 3D feature model and its database attributes in real world problem. As well, this approach of feature-based 3D animated anaglyph scheme is a bridging technology to further image-based 3D animated anaglyph rendering system, portable mobile 3D stereo viewing system or auto-stereo viewing system without glasses for multi-viewers.

An Method of Viewport Prediction and Bitrate Allocation based on Angle Information in 360 VR Contents (각도정보 기반 360 VR 콘텐츠 내 사용자 시점예측기법 및 비트율 할당 방법)

  • Jeong, Eunyoung;Seo, Bong-seok;Hyun, Chanjong;Kim, Dong Ho
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.77-80
    • /
    • 2018
  • 360 VR 콘텐츠는 기존의 선형적인 일반 영상에 비해 사용자에게 더 많은 정보와 높은 몰입감을 제공할 수 있어 의학, 군사, 교육, 게임 등 다양한 분야에서 활용되고 있다. 최근에는 모바일 기기의 성능 향상과 통신기술의 발달에 힘입어 모바일 네트워크를 사용한 360 VR 콘텐츠 소비가 증가하는 추세이다. 모바일 네트워크는 대역폭이 한정적이고 가변적인 특성이 있어 이를 통해 용량이 큰 360 VR 콘텐츠 전송 시 초기 접속 지연 및 재생 끊김이 발생하여 사용자의 만족도를 감소시킬 수 있다. 이에 본 논문은 위에 언급한 문제를 해결하기 위해 360 VR 콘텐츠 전송 시 전체 요구대역폭을 감소시키고 사용자 초기 접속 속도를 향상시키는 것을 목표로, 360 VR 콘텐츠의 지오메트리 값과 사용자의 요(i.e. yaw)값을 활용하여 각도 기반으로 사용자의 현재 시점에 해당하는 타일을 확인하고 해당 타일에 높은 비트율을 할당하는 방법 및 웹 기반 전송에 대해 연구 개발하였다. 이를 위하여 웹 기반 3D 렌더링 API 인 WebVR API, HTTP Adaptive Streaming 기술의 표준 MPEG-DASH의 dash.js API를 활용하여 개발하고, 성능 확인 실험을 통해 요구대역폭 감소, 클라이언트 접속 속도 향상을 제시한다.

  • PDF

A Study on the Establishment of Odor Management System in Gangwon-do Traditional Market

  • Min-Jae JUNG;Kwang-Yeol YOON;Sang-Rul KIM;Su-Hye KIM
    • Journal of Wellbeing Management and Applied Psychology
    • /
    • v.6 no.2
    • /
    • pp.27-31
    • /
    • 2023
  • Purpose: Establishment of a real-time monitoring system for odor control in traditional markets in Gangwon-do and a system for linking prevention facilities. Research design, data and methodology: Build server and system logic based on data through real-time monitoring device (sensor-based). A temporary data generation program for deep learning is developed to develop a model for odor data. Results: A REST API was developed for using the model prediction service, and a test was performed to find an algorithm with high prediction probability and parameter values optimized for learning. In the deep learning algorithm for AI modeling development, Pandas was used for data analysis and processing, and TensorFlow V2 (keras) was used as the deep learning library. The activation function was swish, the performance of the model was optimized for Adam, the performance was measured with MSE, the model method was Functional API, and the model storage format was Sequential API (LSTM)/HDF5. Conclusions: The developed system has the potential to effectively monitor and manage odors in traditional markets. By utilizing real-time data, the system can provide timely alerts and facilitate preventive measures to control and mitigate odors. The AI modeling component enhances the system's predictive capabilities, allowing for proactive odor management.

Development of Safe Korean Programming Language Using Static Analysis (정적 분석을 이용한 안전한 한글 프로그래밍 언어의 개발)

  • Kang, Dohun;Kim, Yeoneo;Woo, Gyun
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.4
    • /
    • pp.79-86
    • /
    • 2016
  • About 75% of software security incidents are caused by software vulnerability. In addition, the after-market repairing cost of the software is higher by more than 30 times than that in the design stage. In this background, the secure coding has been proposed as one of the ways to solve this kind of maintenance problems. Various institutions have addressed the weakness patterns of the standard software. A new Korean programming language Saesark has been proposed to resolve the security weakness on the language level. However, the previous study on Saesark can not resolve the security weakness caused by the API. This paper proposes a way to resolve the security weakness due to the API. It adopts a static analyzer inspecting dangerous methods. It classifies the dangerous methods of the API into two groups: the methods of using tainted data and those accepting in-flowing tainted data. It analyses the security weakness in four steps: searching for the dangerous methods, configuring a call graph, navigating a path between the method for in-flowing tainted data and that uses tainted data on the call graph, and reporting the security weakness detected. To measure the effectiveness of this method, two experiments have been performed on the new version of Saesark adopting the static analysis. The first experiment is the comparison of it with the previous version of Saesark according to the Java Secure Coding Guide. The second experiment is the comparison of the improved Saesark with FindBugs, a Java program vulnerability analysis tool. According to the result, the improved Saesark is 15% more safe than the previous version of Saesark and the F-measure of it 68%, which shows the improvement of 9% point compared to 59%, that of FindBugs.

Efficient Similarity Measurement Technique of Windows Software using Dynamic Birthmark based on API (API 기반 동적 버스마크를 이용한 윈도우용 소프트웨어의 효율적인 유사도 측정 기법)

  • Park, Daeshin;Jie, Hyunho;Park, Youngsu;Hong, JiMan
    • Smart Media Journal
    • /
    • v.4 no.2
    • /
    • pp.34-45
    • /
    • 2015
  • The illegal copy of Windows software is one of the problems, because Windows is the most popular operating system in the country. The illegal copy can be infringe a software copyright, and software birthmark is one of solutions which is protecting software copyright. Software birthmark is a technique to distinguish software piracy using feature information from software. The type of software birthmark can be differentiated between static birthmark and dynamic birthmark through an extraction method. Static birthmark and dynamic birthmark have strengths and weaknesses. In this paper, we propose similarity measurement technique using dynamic birthmark based on API, and we explain extraction process of dynamic birthmark. In addition, we have verified that the proposed similarity measurement technique meet resilience and credibility through experiment. Furthermore, we saw that proposed measurement technique better than existing measurement technique.

The Structure Integrity Assessment of the Wall Thinned Elbow Considering In/Out-Plane Bending (열림·닫힘 방향 하중이 고려된 두께 감소된 엘보우의 건전성평가)

  • Jang, Ungburm;Shin, Kyuin;Lee, Sungho;Kuan, Changhee
    • Journal of the Society of Disaster Information
    • /
    • v.12 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • Local wall thinning elbow due to the water flow is one of the main degradation phenomenon in carbon steel pipe of plant system. The API579 code of FFS (fitness for service) used in the chemical plant gives a guideline to protect local wall thin problem in a straight pipe, but it does not include an elbow. In this study, the locally wall thinned elbow, which is considered an extrados or intrados wall thinned elbow, was carried out considering in-plane or out-plane bending using FEM (finite element method) analysis, and some of results were also compared with the experimental data. The results could give the structure integrity assessment to protect the local wall thinned elbow.

Comparison of Path Exploration and Model Checking Techniques for Checking Automotive API Call Safety (차량전장용 소프트웨어의 API 제약사항 위배여부 탐지를 위한 실행경로 탐색방법과 모델검증 방법의 비교)

  • Kim, Dongwoo;Choi, Yunja
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.12
    • /
    • pp.615-622
    • /
    • 2016
  • Automotive control software can be a source of critical safety issues when developers do not comply system constraints. However, a violation is difficult to identify in complicated source code if not supported by an automated verification tool. This paper introduces two possible approaches that check whether an automotive control software complies API call constraints to compare their performance and effectiveness. One method statically analyzes the source code and explores all possible execution paths, and the other utilizes a model checker to monitor constraint violations for a given set of constraint automata. We have implemented both approaches and performed a series of experiments showing that the approach with model-checking finds constraint violations more accurately and scales better.

An automatic detection scheme of anti-debugging routines to the environment for analysis (분석 환경에 따른 안티 디버깅 루틴 자동 탐지 기법)

  • Park, Jin-Woo;Park, Yong-Su
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.47-54
    • /
    • 2014
  • Anti-debugging is one of the techniques implemented within the computer code to hinder attempts at reverse engineering so that attackers or analyzers will not be able to use debuggers to analyze the program. The technique has been applied to various programs and is still commonly used in order to prevent malware or malicious code attacks or to protect the programs from being analyzed. In this paper, we will suggest an automatic detection scheme for anti-debugging routines. With respect to the automatic detection, debuggers and a simulator were used by which trace information on the Application Program Interface(API) as well as executive instructions were extracted. Subsequently, the extracted instructions were examined and compared so as to detect points automatically where suspicious activity was captured as anti-debugging routines. Based on experiments to detect anti-debugging routines using such methods, 21 out of 25 anti-debugging techniques introduced in this paper appear to be able to detect anti-debugging routines properly. The technique in the paper is therefore not dependent upon a certain anti-debugging method. As such, the detection technique is expected to also be available for anti-debugging techniques that will be developed or discovered in the future.

HBase-based Automatic Summary System using Twitter Trending Topics (트위터 트랜딩 토픽을 이용한 HBase 기반 자동 요약 시스템)

  • Lee, Sanghoon;Moon, Seung-Jin
    • Journal of Internet Computing and Services
    • /
    • v.15 no.5
    • /
    • pp.63-72
    • /
    • 2014
  • Twitter has been a popular social media platform where people post short messages of 140 characters or less via the web. A hashtag is a word or acronym created by Twitter users to open a discussion about certain topics and issues that have a very high percentage of trending. Since the hashtag posts are sorted by time, not relevancy, people who firstly use Twitter have had difficulty understanding their context. In this paper, we propose a HBase-based automatic summary system in order to reduce the difficulty of understanding. The proposed system combines an automatic summary method with a fuzzy system after storing the streaming data provided by Twitter API to the HBase. Throughout this procedure, we have eliminated the duplicate of contents in the hashtag posts and have computed scores between posts so that the users can access to the trending topics with relevancy.

A Converged Profile and Authentication Control Scheme for Supporting Converged Media Service (융합 미디어 서비스 제공을 위한 통합 프로파일 및 인증제어 기술 연구)

  • Lee, Hyun-Woo;Kim, Kwi-Hoon;Ryu, Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.503-516
    • /
    • 2010
  • In this paper, we propose the converged profile and authentication scheme for supporting converged media services of broadcasting & communications convergence in fixed mobile convergence networks. The proposed scheme supports the management of access, service, mobility and IPTV profiles on subscriber and a function of open API(Application Program Interface) for providing the subscriber profile for the third party service provider with the PUSH/PULL method. The open API is based on a web service and a REST(Representational State Transfer) and provides various services for the third party service provider with ease. In addition, the proposed scheme supports a function of SSO(Single Sign-on). After user succeeded in establishing an access connection, user can sustain the same authentication state with this function although connected access network is changed or IMS(IP Multimedia Subsystem) service network is attached. We evaluate and analyze the performance of the proposed scheme through the implementation of CUPS(Converged User Profile Server) system test-bed.