• Title/Summary/Keyword: Electronic Business

Search Result 1,712, Processing Time 0.033 seconds

Feature Extraction of Shape of Image Objects in Content-based Image Retrieval (내용기반으로한 이미지 검색에서 이미지 객체들의 외형특징추출)

  • Cho, June-Suh
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.823-828
    • /
    • 2003
  • The main objective of this paper is to provide a methodology of feature extraction using shape of image objects for content-based image retrieval. The shape of most real-life objects is irregular, and hence there is no universal approach to quantify the shape of an arbitrary object. In particular. electronic catalogs contain many image objects for their products. In this paper, we perform feature extraction based on individual objects in images rather than on the whole image itself, since our method uses a shape-based approach of objects using RLC lines within an image. Experiments show that shape parameters distinctly represented image objects and provided better classification and discrimination among image objects in an image database compared to Texture.

Implementation of Subsequence Mapping Method for Sequential Pattern Mining

  • Trang Nguyen Thu;Lee Bum-Ju;Lee Heon-Gyu;Park Jeong-Seok;Ryu Keun-Ho
    • Korean Journal of Remote Sensing
    • /
    • v.22 no.5
    • /
    • pp.457-462
    • /
    • 2006
  • Sequential Pattern Mining is the mining approach which addresses the problem of discovering the existent maximal frequent sequences in a given databases. In the daily and scientific life, sequential data are available and used everywhere based on their representative forms as text, weather data, satellite data streams, business transactions, telecommunications records, experimental runs, DNA sequences, histories of medical records, etc. Discovering sequential patterns can assist user or scientist on predicting coming activities, interpreting recurring phenomena or extracting similarities. For the sake of that purpose, the core of sequential pattern mining is finding the frequent sequence which is contained frequently in all data sequences. Beside the discovery of frequent itemsets, sequential pattern mining requires the arrangement of those itemsets in sequences and the discovery of which of those are frequent. So before mining sequences, the main task is checking if one sequence is a subsequence of another sequence in the database. In this paper, we implement the subsequence matching method as the preprocessing step for sequential pattern mining. Matched sequences in our implementation are the normalized sequences as the form of number chain. The result which is given by this method is the review of matching information between input mapped sequences.

Legal System and Regulation Analysis by S/W Development Security (S/W 개발 분석 단계에서 식별 및 인증)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang;Lee, Yang-Won
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.211-212
    • /
    • 2014
  • This paper is to suggest the security requirements for identification and authentication in analysis step. Firstly, individual ID should be uniquely identified. The second element is to apply the length limitations, combination and periodic changes of passwords. The third should require the more reinforced authentication methods besides ID and passwords and satisfy the defined security elements on authentication process.

  • PDF

Utilization Exercise Rehabilitation Using Metaverse (VR·AR·MR·XR) (메타버스(가상·증강·혼합·확장현실)를 이용한 운동재활의 활용 방안)

  • Yang, Jeong Ok;Lee, Jook Sook
    • Korean Journal of Applied Biomechanics
    • /
    • v.31 no.4
    • /
    • pp.249-258
    • /
    • 2021
  • Objective: The aim of this study was to analyze domestic and foreign studies using virtual reality or metaverse for exercise rehabilitation in order to help the disabled or elderly patients with exercise rehabilitation, and suggest a method for using metaverse for exercise rehabilitation. Method: In this study, after analyzing and discussing various information related to the metaverse and exercise rehabilitation through electronic search of recently published papers, academic journals, books, and internet websites, the exercise rehabilitation plan using the metaverse was proposed. Results: In the case of domestic research, the diversity of virtual reality application technology for the rehabilitation of disabled and elderly patients was not secured, but recently, virtual reality or metaverse-related technologies were developed and specialized in a form suitable for exercise rehabilitation. In the case of overseas studies, it was analyzed that exercise rehabilitation using virtual reality and metaverse games for the rehabilitation of disabled and elderly patients can help improve brain, physical ability, and anti-aging by activating the body and mind. Conclusion: Smart metaverse health care is actively introduced to exercise rehabilitation, metaverse telemedicine business is applied to exercise rehabilitation programs, and digital twin games and exercise rehabilitation programs developed by metaverse related companies take into account the characteristics of disabled and elderly patients. If customized smart metaverse healthcare is used for exercise rehabilitation, it is analyzed that it can lead this field.

A Study on Vehicle License Plates and Character Sorting Algorithms in YOLOv5 (YOLOv5에서 자동차 번호판 및 문자 정렬 알고리즘에 관한 연구)

  • Jang, Mun-Seok;Ha, Sang-Hyun;Jeong, Seok-Chan
    • Journal of the Korean Society of Industry Convergence
    • /
    • v.24 no.5
    • /
    • pp.555-562
    • /
    • 2021
  • In this paper, we propose a sorting method for extracting accurate license plate information, which is currently used in Korea, after detecting objects using YOLO. We propose sorting methods for the five types of vehicle license plates managed by the Ministry of Land, Infrastructure and Transport by classifying the plates with the number of lines, Korean characters, and numbers. The results of experiments with 5 license plates show that the proposed algorithm identifies all license plate types and information by focusing on the object with high reliability score in the result label file presented by YOLO and deleting unnecessary object information. The proposed method will be applicable to all systems that recognize license plates.

Legal System and Regulation Analysis by S/W Development Security (주차시설 현황 조사를 통한 주차 회전율 파악)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.227-228
    • /
    • 2014
  • In this paper, a license plate investigation which is one of parking usage is performed. We survey research that should be given time interval using the camera without the observer. We assigned the investigation time interval to each of to each of the parking car, average parking duration is determined. Parking turnover, the number of vehicles of parking per hour per parking surface, is examined.

  • PDF

Considerations of the Record Management of the Digital Age While CRMS was Introduced (CRMS 도입을 맞아 생각해보는 디지털 시대의 기록관리)

  • Yim, Jin-Hee
    • Proceedings of Korean Society of Archives and Records Management
    • /
    • 2019.05a
    • /
    • pp.61-67
    • /
    • 2019
  • Recently, the central government organizations have changed their Business Management System to the cloud-based On-nara Document 2.0. According to this, the National Archives of Korea is spreading a cloud-based records management system. With the development of digital technology, including cloud computing, preservation and utilization of records must be redesigned continuously to be effective and efficient. It is needed that the process and method of the electronic records management will change from simple digitization of paper-based recording to digital technology. This article offers opinions related to the logical transfer, storage and redundancy elimination of digital objects, machine-readable format, big-data analysis, templates of official documents, and authenticity authentication system based on universally unique identifiers (UUID) and hash value.

E-commerce adoption within SME's in Ghana, a Tool for Growth?

  • Agyapong, Christian Sarfo
    • 한국벤처창업학회:학술대회논문집
    • /
    • 2018.11a
    • /
    • pp.269-275
    • /
    • 2018
  • Electronic commerce, the act of trading online, with its myriad of potential has been seldom looked at within the context of developing countries. E-commerce presents SMEs in developing economies the opportunity to adequately compete on a global stage. The exponential growth of e-commerce in developed economies further widens the financial gap between developed and developing economies. This study looks at a practical e-commerce adoption framework for Ghanaian SMEs and by extension, developing economies and looks at the net benefits that are available to current adopters. The study uses structural equation modeling, using Partial least squares (PLS) regression to analyze the data in the research. Using PLS algorithms as well as bootstrapping calculations. It combines the use of surveys (154) and interviews (38) as means of data collection. The findings of the research indicate that there is a need for legislation on e-commerce trading to regulate the trade in Ghana, with policies such as e-contracting and e-signature laws among others. Also, a current call for an expansion of the mobile payment methods within the country. For the private investor, a ripe market for logistics services. The study also proposes a simple guideline for SMEs looking to adopt or expand their e-commerce usage, that considers technological, organizational and environmental factors that come to play within e-commerce adoption.

  • PDF

Factors Affecting Attitudes toward Social Login Services: The Moderating Role of Individual Innovativeness (소셜 로그인 서비스 태도에 영향을 미치는 요인: 개인 혁신성의 조절효과)

  • Qiu, Xiao-Yan;Koh, Joon
    • Journal of Information Technology Applications and Management
    • /
    • v.25 no.4
    • /
    • pp.1-21
    • /
    • 2018
  • Due to the increase in the use of the Internet, it is becoming more common to provide or use a social login for registering for services. Herein, the purpose of this study is to analyze the influence of security, individual innovativeness, ubiquity and brand awareness on the use of social log-in service through the individuals' attitude who have memorized various IDs and passwords by using Technology Acceptance Model (TAM). In addition, the effect of individual innovativeness on the relationship between social login characteristic factors and attitudes toward social login services are examined. Based on the statistical results, it is found that the significant factors affecting the attitude toward the social login service are the security, ubiquity, brand awareness and perceived usefulness. Moreover, the individual innovativeness is found to have the moderating effects in the relationship between the three factors (the perceived usefulness, and perceived ease of use, and security) and attitude toward the social login service. Positive attitudes increase with the usefulness, ease of using social login serive when individual innovativeness is high. On the other hand, when individual innovativeness is low, the stronger the effect of security on attitude toward the social login services. In accordance with these results, the implications and limitations of this study are discussed.

Legal System and Regulation Analysis by S/W Development Security (승강기 내에서 폭행의 추출)

  • Shin, Seong-Yoon;Jin, Dong-Soo;Shin, Kwong-Seong;Lee, Hyun-Chang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.205-207
    • /
    • 2014
  • This paper uses $Color-x^2$ histogram that is composed of merits of color histogram and ones of histogram, in order to efficiently extract violent scenes in elevator. Also, we use a threshold so as to find out key frame, by use of existing $Color-x^2$ histogram. To increase the probability that discerns whether a real violent scene or not, we take advantage of statistical judgments with 20 sample visual images.

  • PDF