• Title/Summary/Keyword: Design and implementation

Search Result 12,781, Processing Time 0.043 seconds

Design and implementation of motion tracking based no double difference with PTZ control (PTZ 제어에 의한 이중차영상 기반의 움직임 추적 시스템의 설계 및 구현)

  • Yang Geum-Seok;Yang Seung Min
    • The KIPS Transactions:PartB
    • /
    • v.12B no.3 s.99
    • /
    • pp.301-312
    • /
    • 2005
  • Three different cases should be considered for motion tracking: moving object with fixed camera, fixed object with moving camera and moving object with moving camera. Two methods are widely used for motion tracking: the optical flow method and the difference frame method. The optical new method is mainly used when either one, object or camera is fixed. This method tracks object using time-space vector which compares object position frame by frame. This method requires heavy computation, and is not suitable for real-time monitoring system such as DVR(Digital Video Recorder). The different frame method is used for moving object with fixed camera. This method tracks object by comparing the difference between background images. This method is good for real-time applications because computation is small. However, it is not applicable if the camera is moving. This thesis proposes and implements the motion tracking system using the difference frame method with PTZ(Pan-Tilt-Zoom) control. This system can be used for moving object with moving camera. Since the difference frame method is used, the system is suitable for real-time applications such as DVR.

Design and Implementation of a Cardiac Arrest Supporting System Using Wearable Device (웨어러블 기기를 사용한 심정지 환자 지원 시스템의 설계 및 구현)

  • Jang, Jin-Soo;Lee, Seo-Joon;Lee, Kwang-In;Lee, Tae-Ro
    • Journal of Digital Convergence
    • /
    • v.15 no.1
    • /
    • pp.227-238
    • /
    • 2017
  • Cardiac arrest is a serious intensive emergency disease that causes death within less than several minutes by depriving the body and brain of blood supply. Survival rate of cardiac arrest patients outside of hospitals is especially low. This is because pedestrians usually do not perceive the patient as a sick person, also, even if they do so, they have no medical knowledge to properly react to such emergency. The purpose of this study is to propose a solution that uses widely spread smart phones to alert pedestrians of the cardiac arrest patient, prevents cardiac arrest, and provides first-aid measures. By applying the proposed solution, cardiac arrest can be prevented in advance, pedestrians can be alerted to keep the golden time(4 minutes), and first witness can quickly proceed with CPR, ultimately enhancing the survival rate of the cardiac arrest patient.

Design and Implementation of Constructing and Utilizing an Attendance Book based on SmartPhone Apps (스마트폰 앱을 활용한 출석부 구성 및 활용 시스템의 설계와 구현)

  • Pyun, Kihyun
    • The Journal of the Korea Contents Association
    • /
    • v.14 no.9
    • /
    • pp.14-23
    • /
    • 2014
  • Existing attending management systems require a high cost and are lack of convenience. In this paper, we propose a convenient and practical attending management system as follows: First, our system allows us to construct an attendance book in an easy and simple way. A professor does not have to provide the information of students using the small screen of his smartphone. Instead, each student manages his own information via the app designed for a student in our system. Then the professor can construct the attendance book using another app designed for the professor by confirming the requests from the app designed for a student. Second, our system enables a professor to utilize the pictures of students as well as other information of students to have a good relationship with students. Third, our system provides a functionality of checking attendance automatically by calling the names of students via the app designed for the professor. Then the professor has only to match the name with the face of each student. Fourth, our system provides a functionality of checking attendance in a very fast manner. Our system can complete this behavior within a short time since all students can join the attendance simultaneously by using the app designed for the student. Fifth, our system can prevent an illegal attendance easily by utilizing the distance information.

Implementation of Role-based Command Hierarchy Model for Actor Cooperation (ROCH: 워게임 모의개체 간 역할기반 협력 구현 방안 연구)

  • Kim, Jungyoon;Kim, Hee-Soo;Lee, Sangjin
    • Journal of the Korea Society for Simulation
    • /
    • v.24 no.4
    • /
    • pp.107-118
    • /
    • 2015
  • Many approaches to agent collaboration have been introduced in military war-games, and those approaches address methods for simulation entity (actor) collaboration within a team to achieve given goals. To meet fast-changing battlefield situations, an actor must be loosely coupled with their tasks and be able to take over the role of other actors if necessary to reflect role handovers occurring in real combat. Achieving these requirements allows the transfer of tasks assigned one actor to another actor in circumstances when that actor cannot execute its assigned role, such as when destroyed in action. Tight coupling between an actor and its tasks can prevent role handover in fast-changing situations. Unfortunately, existing approaches and war-game strictly assign tasks to actors during design, therefore they prevent the loose coupling. To overcome these shortcomings, our Role-based Command Hierarchy (ROCH) model dynamically assigns roles to actors based on their situation at runtime. In the model, "Role" separates actors from their tasks. In this paper, we implement the ROCH model as a component that uses a publish-subscribe pattern to handle the link between an actor and the roles of its subordinates (other actors).

Scalable RSA public-key cryptography processor based on CIOS Montgomery modular multiplication Algorithm (CIOS 몽고메리 모듈러 곱셈 알고리즘 기반 Scalable RSA 공개키 암호 프로세서)

  • Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.100-108
    • /
    • 2018
  • This paper describes a design of scalable RSA public-key cryptography processor supporting four key lengths of 512/1,024/2,048/3,072 bits. The modular multiplier that is a core arithmetic block for RSA crypto-system was designed with 32-bit datapath, which is based on the CIOS (Coarsely Integrated Operand Scanning) Montgomery modular multiplication algorithm. The modular exponentiation was implemented by using L-R binary exponentiation algorithm. The scalable RSA crypto-processor was verified by FPGA implementation using Virtex-5 device, and it takes 456,051/3,496347/26,011,947/88,112,770 clock cycles for RSA computation for the key lengths of 512/1,024/2,048/3,072 bits. The RSA crypto-processor synthesized with a $0.18{\mu}m$ CMOS cell library occupies 10,672 gate equivalent (GE) and a memory bank of $6{\times}3,072$ bits. The estimated maximum clock frequency is 147 MHz, and the RSA decryption takes 3.1/23.8/177/599.4 msec for key lengths of 512/1,024/2,048/3,072 bits.

Design and Implementation of the Higher-quality Terrestrial 3DTV Broadcasting Standard Specification Based on Synchronization with Non-Real-Time Contents (고화질 스테레오스코픽 영상 서비스를 위한 비실시간 콘텐츠 연동 지상파 3DTV 방송 표준규격 설계 및 검증)

  • Lee, Jangwon;Kim, Kyuheon;Yim, Hyun-Jeong;Cheong, Won-Sik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37C no.12
    • /
    • pp.1185-1194
    • /
    • 2012
  • This paper proposes a new terrestrial 3DTV broadcasting standard specification based on synchronization with non-real-time contents in order to overcome quality limitations of the current 3DTV services that are arisen from the limited bandwidth of the legacy broadcasting channel. In the services using the proposed specification, one view sequence of a stereoscopic video content is delivered as a non-real-time content in idle time, and the other view sequence is transmitted in real time broadcasting signal, thereafter two sequences are synchronized in a receiver for display. Thus, it is possible to provide higher-quality stereoscopic video content services than the current 3DTV services. In order to realize these services, a new mechanism is required which enables synchronization between the data that are from different transmission media and time. Therefore, this paper suggests a solution by multiplexing the synchronization signals of non-real-time contents into broadcasting signals with real-time streams together. This solution can provide a accurate synchronization mechanism by minimum updates of legacy broadcasting systems while maintaining compatibility with legacy services.

A TransGate System for Convenient Wireless Internet Contents Generation (편리한 무선인터넷 컨텐츠 생성을 위한 TransGate 시스템)

  • Ryu Dong-Yeop;Han Seung-Hyun;Lim Young-Whan
    • Journal of Internet Computing and Services
    • /
    • v.7 no.2
    • /
    • pp.37-52
    • /
    • 2006
  • A mobile device like ceil phone is the necessity of modern people, of ich con be easily connected to a wireless internet through such a mobile device. The demand for a wireless data communication is growing rapidly. However, agencies have not yet completed standardization of a markup language. Due to the development of the Mobile Device, agencies in this field have provided different data formats with each Mobile Device Platform. Traditionally, contents is hand-tailored to suit the target device. A key problem is that the characteristics and capabilities of the mobile device are too diverse to service the most suitable mobile contents. Because of these problems, the need for a re-usable document description language increases. In this paper, we defined Template file that is common data to service mobile devices. We proposed a method that could be an effective wireless web service though design and the implementation of the Call manager & the XSL Generator. In the methodology, when requesting a wireless internet service, a mobile device finds out markup language and a hardware specification of the mobile device through the Call Manager component supports. The XSL Generator component creates the XSL file dynamically that is the most suitable to a device. Finally, contents is serviced to each device by XSLT. It can generate a wireless page more easily by reusing the existing web contents through such course. Therefore, it can save the time and expense for generating a wireless page.

  • PDF

Design and Implementation of the Flash File System that Maintains Metadata in Non-Volatile RAM (메타데이타를 비휘발성 램에 유지하는 플래시 파일시스템의 설계 및 구현)

  • Doh, In-Hwan;Choi, Jong-Moo;Lee, Dong-Hee;Noh, Sam-H.
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.2
    • /
    • pp.94-101
    • /
    • 2008
  • Non-volatile RAM (NVRAM) is a form of next-generation memory that has both characteristics of nonvolatility and byte addressability each of which can be found in nonvolatile storage and RAM, respectively. The advent of NVRAM may possibly bring about drastic changes to the system software landscape. When NVRAM is efficiently exploited in the system software layer, we expect that the system performance can be significantly improved. In this regards, we attempt to develop a new Flash file system, named MiNVFS (Metadata in NVram File System). MiNVFS maintains all the metadata in NVRAM, while storing all file data in Flash memory. In this paper, we present quantitative experimental results that show how much performance gains can be possible by exploiting NVRAM. Compared to YAFFS, a typical Flash file system, we show that MiNVFS requires only minimal time for mounting. MiNVFS outperforms YAFFS by an average of around 400% in terms of the total execution time for the realistic workloads that we considered.

Educational Effects of Flipped Learning on University Teaching Courses (대학 교직수업에 적용한 플립드 러닝의 교육적 효과)

  • Lee, Soon-Deok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.2
    • /
    • pp.346-357
    • /
    • 2019
  • The purpose of this study was to examine the effects of flipped learning and explore the learners' experiences. Data were collected from 64 students who participated in flipped learning for 7 weeks at N university. The results were as follows. First, after applying flipped learning, learners feel more comfortable learning together and prefer collaborative learning. Second, flipped learning had no significant effects on learner's overall metacognition, but it had positive effects on the awareness and cognitive strategies. Third, flipped learning had no significant effects on academic self-efficacy, but it positively affected the task difficulty preference and confidence of learners who had a lower level of collaborative tendencies. Fourth, flipped learning had no significant effects on SDL ability, but it positively affected the learning plan of learners who had a higher level of collaborative tendencies. Fifth, learners' class satisfaction of flipped learning was generally very high. We suggested a policy, instructional design and strategies for effective implementation of flipped learning.

Design and Implementation of an E-mail Worm-Virus Filtering System on MS Windows (MS 윈도우즈에서 E-메일 웜-바이러스 차단 시스템의 설계 및 구현)

  • Choi Jong-Cheon;Chang Hye-Young;Cho Seong-Je
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.37-47
    • /
    • 2005
  • Recently, the malicious e-mail worm-viruses have been widely spreaded over the Internet. If the recipient opens the e-mail attachment or an e-mail itself that contains the worm-virus, the worm-virus can be activated and then cause a tremendous damage to the system by propagating itself to everyone on the mailing list in the user's e-mail package. In this paper, we have designed and implemented two methods blocking e-mail worm-viruses. In the fist method, each e-mail is transmitted only by sender activity such as the click of button on a mail client application. In the second one, we insert the two modules into the sender side, where the one module transforms a recipient's address depending on a predefined rule only in time of pushing button and the other converts the address reversely with the former module whenever an e-mail is sent. The lader method also supports a polymorphism model in order to cope with the new types of e-mail worm-virus attacks. The two methods are designed not to work for the e-mail viruses. There is no additional fraction on the receiver's side of the e-mail system. Experimental results show that the proposed methods can screen the e-mail worm-viruses efficiently with a low overhead.