• Title/Summary/Keyword: Automatic Access

Search Result 268, Processing Time 0.022 seconds

Automatic detection of discontinuity trace maps: A study of image processing techniques in building stone mines

  • Mojtaba Taghizadeh;Reza Khalou Kakaee;Hossein Mirzaee Nasirabad;Farhan A. Alenizi
    • Geomechanics and Engineering
    • /
    • v.36 no.3
    • /
    • pp.205-215
    • /
    • 2024
  • Manually mapping fractures in construction stone mines is challenging, time-consuming, and hazardous. In this method, there is no physical access to all points. In contrast, digital image processing offers a safe, cost-effective, and fast alternative, with the capability to map all joints. In this study, two methods of detecting the trace of discontinuities using image processing in construction stone mines are presented. To achieve this, we employ two modified Hough transform algorithms and the degree of neighborhood technique. Initially, we introduced a method for selecting the best edge detector and smoothing algorithms. Subsequently, the Canny detector and median smoother were identified as the most efficient tools. To trace discontinuities using the mentioned methods, common preprocessing steps were initially applied to the image. Following this, each of the two algorithms followed a distinct approach. The Hough transform algorithm was first applied to the image, and the traces were represented through line drawings. Subsequently, the Hough transform results were refined using fuzzy clustering and reduced clustering algorithms, along with a novel algorithm known as the farthest points' algorithm. Additionally, we developed another algorithm, the degree of neighborhood, tailored for detecting discontinuity traces in construction stones. After completing the common preprocessing steps, the thinning operation was performed on the target image, and the degree of neighborhood for lineament pixels was determined. Subsequently, short lines were removed, and the discontinuities were determined based on the degree of neighborhood. In the final step, we connected lines that were previously separated using the method to be described. The comparison of results demonstrates that image processing is a suitable tool for identifying rock mass discontinuity traces. Finally, a comparison of two images from different construction stone mines presented at the end of this study reveals that in images with fewer traces of discontinuities and a softer texture, both algorithms effectively detect the discontinuity traces.

A Study on the Demand for Equipent Development in Nursing (간호기기 개발수요 조사연구)

  • Chang, Soon-Book;Kim, Eui-Sook;Whang, Ae-Ran;Kang, Kyu-Sook;Suh, Mi-Hae
    • The Korean Nurse
    • /
    • v.35 no.2
    • /
    • pp.71-91
    • /
    • 1996
  • The objectives of thes study were to identify the need for equipment development in nursing, and to determine the priorities for that development. The study was descriptive study done between March 2 and May 30, 1995, in which the subjects, including 421 patients, 223 family members, and 198 nurses from neurosurgery, orthopedic, rehabilitation medicine, internal medicine and intensive care units of nine general hospitals in Seoul, completed a questionnarie developed by the research team. The questionnaire consisted of 35 open and closed questions. Data was analyzed using frequencies and percentages. The results ware summarized as follows: 1) The average age of the nurses was 27.9 years, 48% of the patients were between 20 and 40 years of age, and 17% were over 60. The average lingth of experience for the nurse subjects was four years five months with 36.9%. having over five years experience. The most frequent diagnoses of patients were spinal disc(35.9%), internal medicine disease(26.0%), cerebral vascular accident(16.6%) and spinal cord injury(10%) 2) Many of the nurses(96.4%) reported deficiencies with existing equipment and 96.5% of the nurses, but only 79.8% of the patients, nurses' time. Further, 82.3% of the nurses and 75.8% of the patients felt that the development of new equipment would lead to a decrease in the cost of nursing care. 3) Nurses felt that the greatest areas of inconvenience were patient feeding(71.7%), hygiene(71.2%), caring for a patient confined to bed(70.7%), patient clothing(67.2%), mobility transfers(63.5%) and urinary elimination(52.0%). However, patients and family members listed the following as being the most inconvenient: urinary elimination(58.7%), Hygiene(50.5), feeding(48.4%), mobility transfers(47.1%) and bed care(45.2%). 4) Generally the nurses listed more inconveniences and patients and family members listed more demands for the development of equipment. These included utensils with large handles, and regulators for tube feedings; mattresses that provide for automatic position change and massage, which have patient controlled levers and a place for bed pan insertion; automatic lifts or transfer from bed to wheelchair; equipment to facilitate washing and oral hygiene as well as equipment that will allow patients with spinal cord injuries easy access to showers; a bed pan/urinal for women that is comfortable and effective from which urine can be measured and disposed of easily; disposable dressing sets and tracheostomy care sets and a convenient way of measuring changes in wound size; a safe delivery system for oxygen, a variety of mask sizes and better control of humidity, tracheal material than at present, as well as a communication system for patients with tracheostomies; clothing that will allow access to various parts of the body for treament or assessment without patients having to remove all of their clothing; and finally a system that will allow the patient to control lighting, telephones and pagers. Priority areas for equipment development reported by the nurses were, urinary elimination(58. 7%), hygiene(50.5%), feeding(48.4%), mobility transfers(47..1%), bowel elimination(40.8%). Those reported by the patients family members were feeding(71.7%), hygiene(70.0%), bedcare(70.7%), clothing(67.2%), mobility transfers(63.6%), urinary elimination(52.9%) and bowel elimination(50.5%) Altogether, nurses, patients and family members listed the following as priorities; clothing (178), bed care(144), urinary elimination(92), environment(81), hygiene(70). Further, a health professional forum listed urinary elimination, oxygen delivery, medication delivery, mobility transfers, bed care and hygiene in that order as priority areas. From this study it can be concluded that the first need is to develop equipment that will address the problems of urinary elimination. To do (l)This nurses who are interested in equipment development should organize an equipment development team to provide a forum for discussion and production of equipment for nursing.

  • PDF

A Study on the RFID's Application Environment and Application Measure for Security (RFID의 보안업무 적용환경과 적용방안에 관한 연구)

  • Chung, Tae-Hwang
    • Korean Security Journal
    • /
    • no.21
    • /
    • pp.155-175
    • /
    • 2009
  • RFID that provide automatic identification by reading a tag attached to material through radio frequency without direct touch has some specification, such as rapid identification, long distance identification and penetration, so it is being used for distribution, transportation and safety by using the frequency of 125KHz, 134KHz, 13.56MHz, 433.92MHz, 900MHz, and 2.45GHz. Also it is one of main part of Ubiquitous that means connecting to net-work any time and any place they want. RFID is expected to be new growth industry worldwide, so Korean government think it as prospective field and promote research project and exhibition business program to linked with industry effectively. RFID could be used for access control of person and vehicle according to section and for personal certify with password. RFID can provide more confident security than magnetic card, so it could be used to prevent forgery of register card, passport and the others. Active RFID could be used for protecting operation service using it's long distance date transmission by application with positioning system. And RFID's identification and tracking function can provide effective visitor management through visitor's register, personal identification, position check and can control visitor's movement in the secure area without their approval. Also RFID can make possible of the efficient management and prevention of loss of carrying equipments and others. RFID could be applied to copying machine to manager and control it's user, copying quantity and It could provide some function such as observation of copy content, access control of user. RFID tag adhered to small storage device prevent carrying out of item using the position tracking function and control carrying-in and carrying-out of material efficiently. magnetic card and smart card have been doing good job in identification and control of person, but RFID can do above functions. RFID is very useful device but we should consider the prevention of privacy during its application.

  • PDF

A Study on the standardization of ETCS (Focused on RF) (자동요금징수시스템(ETCS) 표준화 연구(주파수방식을 중심으로))

  • Kwon, Han-Joon;Lee, Ki-Hyun;Kim, Yong-Deak
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.3
    • /
    • pp.62-73
    • /
    • 2008
  • In this paper, domestic standard revision plan of dynamic frequency method which is used both in unmanned automatic toll collection system and manned collection system of the express highway is presented. For such ETCS, the infrared rays (870 nm) of active frequency method and the frequency integrated method (5.8 GHz) are adopted and extended to be operated to the all around the Toll Gate. This standardization plan is based on inter connection reference model between OSI (Open System Interconnection) in process of ITS short range radio communication standardization of 5.8 GHz bandwidth to support traffic information and control system service, and the derived revision plan by starting from physical layer which support interoperability for multiple access between RSE (Road Side Equipment) and OBE (On Board Equipment), in which is categorized into physical layer, data link layer, and application layer. In case of radiation power, existing standard is divided by class1 (within 10 m) and Class2 (within 100 m) according to transmission lengthwhile it is operated with just single standard 'Class1' because of notification of Ministry of Information and Communication in 2004. In the case of the limitation value of incident power in communication area, considering operation plan of ETCS that is on actuality operation the measurements are reflected to the standard. In other wort this paper proposed the improvement standard of incident power, pseudo response in the communication area and radiated power in order to secure stability and compatibility among operator systems about the needed part on ETCS operation.

  • PDF

A Study on Touchless Finger Vein Recognition Robust to the Alignment and Rotation of Finger (손가락 정렬과 회전에 강인한 비 접촉식 손가락 정맥 인식 연구)

  • Park, Kang-Ryoung;Jang, Young-Kyoon;Kang, Byung-Jun
    • The KIPS Transactions:PartB
    • /
    • v.15B no.4
    • /
    • pp.275-284
    • /
    • 2008
  • With increases in recent security requirements, biometric technology such as fingerprints, faces and iris recognitions have been widely used in many applications including door access control, personal authentication for computers, internet banking, automatic teller machines and border-crossing controls. Finger vein recognition uses the unique patterns of finger veins in order to identify individuals at a high level of accuracy. This paper proposes new device and methods for touchless finger vein recognition. This research presents the following five advantages compared to previous works. First, by using a minimal guiding structure for the finger tip, side and the back of finger, we were able to obtain touchless finger vein images without causing much inconvenience to user. Second, by using a hot mirror, which was slanted at the angle of 45 degrees in front of the camera, we were able to reduce the depth of the capturing device. Consequently, it would be possible to use the device in many applications having size limitations such as mobile phones. Third, we used the holistic texture information of the finger veins based on a LBP (Local Binary Pattern) without needing to extract accurate finger vein regions. By using this method, we were able to reduce the effect of non-uniform illumination including shaded and highly saturated areas. Fourth, we enhanced recognition performance by excluding non-finger vein regions. Fifth, when matching the extracted finger vein code with the enrolled one, by using the bit-shift in both the horizontal and vertical directions, we could reduce the authentic variations caused by the translation and rotation of finger. Experimental results showed that the EER (Equal Error Rate) was 0.07423% and the total processing time was 91.4ms.

A Study on System Requirements for Integrated Electronic Document Management System (IEDMS) (통합전자문서체계구현을 위한 요구기능 분석 연구 -A사의 전자문서관리 사례를 중심으로-)

  • 권택문
    • Journal of Information Technology Application
    • /
    • v.2 no.1
    • /
    • pp.55-81
    • /
    • 2000
  • An Electronic Document Management System(EDMS) is an electronic system solution that is used to create, capture, distribute, edit, store and manage documents and related structured data repositories throughout an organization. Recently, documents of any type, such as text, images, and video files, and structured databases can be controlled and managed by an office automation system and an EDMS. Thus, many organizations are already using these information technologies to reduce process cycle-times. But what the organizations are missing is a integrated system the current workflow or office automation system and provides immediate access to and automatic routing of the organization's mission-critical information. This study tried to find out the user's requirements for integrating current information system and relatively new technology, electronic document management system in order to improve business operations, productivity and quality, and reduces waste. integration of electronic document management system(EDMS) and office automation system and proper use of these technological will improve organization's processes, and compress the process cycle-times. For this study a case study was done by a project team in cooperation with a government organization(say A company). Through this case study valuable electronic document management and office automation system requirement have been identified and reported for providing a system model in order to design an Integrated EDMS(IMDMS).

  • PDF

A Study on Security Level-based Authentication for Supporting Multiple Objects in RFID Systems (다중 객체 지원을 위한 RFID 시스템에서 보안 레벨 기반의 인증 기법에 관한 연구)

  • Kim, Ji-Yeon;Jung, Jong-Jin;Jo, Geun-Sik;Lee, Kyoon-Ha
    • The Journal of Society for e-Business Studies
    • /
    • v.13 no.1
    • /
    • pp.21-32
    • /
    • 2008
  • RFID systems provide technologies of automatic object identification through wireless communications in invisible ranges and adaptability against various circumstances. These advantages make RFID systems to be applied in various fields of industries and individual life. However, it is difficult to use tags with distinction as tags are increasingly used in life because a tag usually stores only one object identifier in common RFID applications. In addition, RFID systems often make serious violation of privacy caused by various attacks because of their weakness of radio frequency communication. Therefore, information sharing methods among applications are necessary for expansive development of RFID systems. In this paper, we propose efficient RFID scheme. At first, we design a new RFID tag structure which supports many object identifiers of different applications in a tag and allows those applications to access them simultaneously. Secondly, we propose an authentication protocol to support the proposed tag structure. The proposed protocol is designed by considering of robustness against various attacks in low cost RFID systems. Especially, the proposed protocol is focused on efficiency of authentication procedure by considering security levels of applications. In the proposed protocol, each application goes through one of different authentication procedures according to their security levels. Finally, we prove efficiency of th proposed scheme compared with the other schemes through experiments and evaluation.

  • PDF

A Method of Generating Table-of-Contents for Educational Video (교육용 비디오의 ToC 자동 생성 방법)

  • Lee Gwang-Gook;Kang Jung-Won;Kim Jae-Gon;Kim Whoi-Yul
    • Journal of Broadcast Engineering
    • /
    • v.11 no.1 s.30
    • /
    • pp.28-41
    • /
    • 2006
  • Due to the rapid development of multimedia appliances, the increasing amount of multimedia data enforces the development of automatic video analysis techniques. In this paper, a method of ToC generation is proposed for educational video contents. The proposed method consists of two parts: scene segmentation followed by scene annotation. First, video sequence is divided into scenes by the proposed scene segmentation algorithm utilizing the characteristics of educational video. Then each shot in the scene is annotated in terms of scene type, existence of enclosed caption and main speaker of the shot. The ToC generated by the proposed method represents the structure of a video by the hierarchy of scenes and shots and gives description of each scene and shot by extracted features. Hence the generated ToC can help users to perceive the content of a video at a glance and. to access a desired position of a video easily. Also, the generated ToC automatically by the system can be further edited manually for the refinement to effectively reduce the required time achieving more detailed description of the video content. The experimental result showed that the proposed method can generate ToC for educational video with high accuracy.

Web Accessibility Evaluation of Social Network Sites (소셜 네트워크 사이트의 웹 접근성 평가)

  • Han, Hyuk-Soo;Kim, Cho-Yi
    • Science of Emotion and Sensibility
    • /
    • v.12 no.4
    • /
    • pp.481-488
    • /
    • 2009
  • The SNS(Social Network Service or Social Network Sites), the concept which came along with the Web2.0 is on-line service which focuses on building social network communities of people which used to be established off-line. Foreign SNS sites such as Facebook, MySpace and Twitter and domestic SNS sites such as Cyworld, Me2Day are getting popularity continuously and became one of the most important application in internet environments. Since these SNS sites have the purpose of providing infrastructure which enable all the people to share his/her interests with all the other people, it is necessary to appraise whether these sites provide convenient interfaces with proper accessibility to handicapped people and old people who are considered having difficulties in using internet. Web accessibility refers to the practice of providing equal access to people of all abilities and disabilities. If the web accessibility of a SNS site is so low that handicapped people and old people cannot use it properly, those gaps between user groups may become social problems. Therefore, the paper appraised web accessibility of Facebook and Cyworld using automatic tool, KADO-WAH 2.0 and Standard guideline, WCAG 2.0 and suggested the improvement opportunities based on the results of the appraisal.

  • PDF

Automatic Recommendation of (IP)TV programs based on A Rank Model using Collaborative Filtering (협업 필터링을 이용한 순위 정렬 모델 기반 (IP)TV 프로그램 자동 추천)

  • Kim, Eun-Hui;Pyo, Shin-Jee;Kim, Mun-Churl
    • Journal of Broadcast Engineering
    • /
    • v.14 no.2
    • /
    • pp.238-252
    • /
    • 2009
  • Due to the rapid increase of available contents via the convergence of broadcasting and internet, the efficient access to personally preferred contents has become an important issue. In this paper, for recommendation scheme for TV programs using a collaborative filtering technique is studied. For recommendation of user preferred TV programs, our proposed recommendation scheme consists of offline and online computation. About offline computation, we propose reasoning implicitly each user's preference in TV programs in terms of program contents, genres and channels, and propose clustering users based on each user's preferences in terms of genres and channels by dynamic fuzzy clustering method. After an active user logs in, to recommend TV programs to the user with high accuracy, the online computation includes pulling similar users to an active user by similarity measure based on the standard preference list of active user and filtering-out of the watched TV programs of the similar users, which do not exist in EPG and ranking of the remaining TV programs by proposed rank model. Especially, in this paper, the BM (Best Match) algorithm is extended to make the recommended TV programs be ranked by taking into account user's preferences. The experimental results show that the proposed scheme with the extended BM model yields 62.1% of prediction accuracy in top five recommendations for the TV watching history of 2,441 people.