• Title/Summary/Keyword: Application Example

Search Result 2,025, Processing Time 0.032 seconds

Speech Synthesis System for Detected Objects by Smart Phone (스마트폰으로 검출된 객체의 음성합성 시스템)

  • Kwon, Soon-Kak
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.469-478
    • /
    • 2016
  • This paper designs an application for detecting various objects using a smart phone with camera sensor, then implements the application that detects the number of faces in front of a user by using the Face API provided by android and generates a speech to the user. For implementing the application, the GoF strategy pattern is applied to design the application. It provides some advantages; first, the algorithm development schedule can separate the whole application development schedule; next, it makes easier to add the algorithm. For example, another detecting algorithm for the other objects (character, motion detection) that may be developed in the future, or it may be replaced by a more high-performance algorithm. With the propose method, a general smart phone can make some advantages that can provide information of various objects (such as moving people and objects, and detected character from signboards) to the person who is visually impaired.

A Study on Scenario-based Web Application Security Education Method

  • Gilja So
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.3
    • /
    • pp.149-159
    • /
    • 2023
  • Web application security education that can provide practical experience is needed to reduce damage caused by the recent increase in web application vulnerabilities and to strengthen security. In this paper, we proposed a scenario-based web application education method, applied the proposed method to classes, and analyzed the results. In order to increase the effectiveness of scenario-based education, a real-life practice environment to perform scenarios and instructions to be performed by learners are needed. As an example of the proposed method, instructions to be performed by learners from the viewpoint of the attacker and the victim were shown in a practice environment to teach XSS and SQL injection vulnerabilities. After applying the proposed method to the class for students majoring in cyber security, when the lecture evaluation results were analyzed, it was shown that the learner's interest, understanding, and major ability all improved.

Asymptotic Properties of a Robust Estimator for Regression Models with Random Regressor

  • Chang, Sook-Hee;Kim, Hae-Kyung
    • Communications for Statistical Applications and Methods
    • /
    • v.6 no.2
    • /
    • pp.345-356
    • /
    • 1999
  • This paper deals with the problem of estimating regression coefficients in nonlinear regression model having random regressor. The sufficient conditions for consistency of the $L_1$-estimator with random regressor are given and discussed in this paper. An example is given to illustrate the application of the main results.

  • PDF

Robust tracking controller design for a load variation (부하변화에 견실한 추적 제어기 설계)

  • 김광태;정구락;김재환;박원철;박래석
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1991.10a
    • /
    • pp.629-632
    • /
    • 1991
  • Load Variation effects on the system driving performance. Therefore, this paper presents as a application example of Anti-windup method using general incremental form for a gun servo system of load variation involved. Also, this method can be easily implemented compared to gain scheduling technique.

  • PDF

Automation of forming machine using pneumatic equipments (공압에 의한 단위기계의 자동화)

  • 김장호
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1986.10a
    • /
    • pp.678-681
    • /
    • 1986
  • Pneumatic equipments are widely used in factory automation. Compressed air has many merits, but because of compressibility pneumatic actuators are used limitedly where requires an exact intermediate stopping positions and very slow constant speed. This paper shows the application example of multi-position cylinder to the forming machine.

  • PDF

Recent Advances in Web Services Composition and Their Implications to Seamless Business Process Integration.

  • Park, Jong-Hun
    • Proceedings of the CALSEC Conference
    • /
    • 2004.02a
    • /
    • pp.191-196
    • /
    • 2004
  • Web Service ·A software application identified by a URI, whose interface and bindings are capable of being defined, described, and discovered as XML artifacts A Web service supports direct interactions with other software agents using XML-based messages exchanges via Internet-based protocols(W3C) ·Utilize the WWW infrastructure ·Example : http://etech.kaist.ac.kr:8080/search.html(omitted)

  • PDF

Selection and Directed Evolution of New Microbial Biocatalysts and Their Application to Organic Synthesis

  • Asano, Yasuhisa
    • Journal of Applied Biological Chemistry
    • /
    • v.43 no.4
    • /
    • pp.207-210
    • /
    • 2000
  • As a typical example of the screening for a microbial biocatalyst from nature, isolation of nitrilesynthesizing microorganisms, characterization of a new enzyme aldoxime dehydratase, and its function in the aldoxime-nitrile pathway are introduced. Catalytic properties of some of our enzymes were improved through a direct evolutionary approach.

  • PDF