• Title/Summary/Keyword: Image Download

Search Result 27, Processing Time 0.031 seconds

Design of infrared image storage board for outdoor testing (야외시험용 적외선 영상 저장보드 설계)

  • Kim, Hong-Rak;Park, Jin-Ho;Kim, Kyoung-Il;Lee, Da-Been
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.5
    • /
    • pp.161-166
    • /
    • 2021
  • When testing various images outdoors with an infrared imaging system, it is necessary to save the tested images for comparison. In addition, after the test, it should be possible to easily connect to the PC and download the stored data. With the recent development of the memory system, it is possible to design an infrared image storage board for an outdoor test by using the eMMC memory that can be easily used in the form of an on board. In this paper, we describe the design of a portable image storage board that can easily store and download infrared images, and describe the GUI program that can connect to a PC and download the stored images.

Analysis of Image Processing Speed Using Multi-Threads (멀티 스레드를 이용한 영상 처리 속도 분석)

  • Hur Tai-sung;Jang Hyeong-kyu
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2023.07a
    • /
    • pp.471-472
    • /
    • 2023
  • 본 논문에서는 멀티 쓰레드를 이용하여 UI에 영상을 표현할 때, 걸리는 시간 및 적정 사용 방법을 연구하였다. 영상처리는 오픈 API인 OpenCV를 사용하여 처리하였으며, 1~4개의 스레드로 영상을 다운로드하는 시간부터 GUI에 보여주는 시간까지를 계산하는 기능을 구현하여 영상을 다운로드하고, GUI에 넣어주어야 할 때 스레드의 개수가 퍼포먼스에 관여하는 처리속도를 알아볼 수 있다.

  • PDF

A Study on Life Cycle analysis and prediction of Contents Service in the Wireless Internet (로지스틱 회귀 모형을 이용한 무선인터넷 콘텐츠 서비스의 life cycle 분석 및 예측)

  • Park, Ji-Hong;Jeon, Joon-Hyeon
    • Proceedings of the IEEK Conference
    • /
    • 2005.11a
    • /
    • pp.1161-1164
    • /
    • 2005
  • In this paper, we proposed the technique to estimate the life cycle of Internet content services based on the logistic regression model. In this paper, to define parameters of Internet contents estimating life cycle by logistic regression model, we used market size, traffic amount, page view and session-visit number as the parameters of Internet contents estimating life cycle by logistic regression model. In this paper, to compare the performance of our proposed scheme, we estimated life cycle for the download services of bell sound & character contents in mobile network. As a result, using our proposed logistic regression, we were able to estimate exactly the life cycle of the download services of bell sound & character contents.

  • PDF

A Study on FOTA Upgrade Efficiency by Manipulating a Scatter Loading (FOTA에서 Scatter Loading의 최적화 방법 연구)

  • Lee, Hee-Young;Cho, Jun-Dong
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10d
    • /
    • pp.608-612
    • /
    • 2007
  • FOTA는 무선기능이 장착된 Mobile Device에 새로운 Software에 대한 알림기능이 도착하면, Software가 탐재된 서버에 접속하여 Software를 Download 받고, 그 Download한 Software를 Upgrade 하는 기능을 말한다. FOTA 기능을 장착하기 위해서 Mobile Device는 Delta Package의 사이즈를 최소화하기 위한 특별한 Binary 구조를 가지는데 두 Binary의 차이를 압축한 것을 Delta Package라고 부르며, Binary 사이에 Upgrade를 위한 여분의 Gap을 두어, 향후 수정된 내용이 있을 때, 수정사항을 공간 내에 포함할 수 있도록 한다. 바이너리를 구성하는 Object들이 Image내에 어떤 위치에 포함될 것인지를 결정하는 Scatter Loader에 따라, Binary의 구조 및 확장성, Delta의 크기를 결정하게 되는데, 이것은 Object의 Type이나 Scatter Loading File내에서 명시한 순서와는 관계가 없고, Execution Region의 분할 개수를 늘릴수록, 각 Object의 Dependency 별로 묶을수록 Delta Size가 작아지는 것을 알게 되었다. 이 논문에서는 위에서 제시한 조건이 Delta Size에 미치는 원인에 대해 분석하고, Scatter Loading File을 최적화시킬 수 있는 방안에 대해서 연구한다.

  • PDF

Execution-based System and Its Performance Analysis for Detecting Malicious Web Pages using High Interaction Client Honeypot (고 상호작용 클라이언트 허니팟을 이용한 실행 기반의 악성 웹 페이지 탐지 시스템 및 성능 분석)

  • Kim, Min-Jae;Chang, Hye-Young;Cho, Seong-Je
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.1003-1007
    • /
    • 2009
  • Client-side attacks including drive-by download target vulnerabilities in client applications that interact with a malicious server or process malicious data. A typical client-side attack is web-based one related to a malicious web page exploiting specific browser vulnerability that can execute mal ware on the client system (PC) or give complete control of it to the malicious server. To defend those attacks, this paper has constructed high interaction client honeypot system using Capture-HPC that adopts execution-based detection in virtual machine. We have detected and classified malicious web pages using the system. We have also analyzed the system's performance in terms of the number of virtual machine images and the number of browsers executed simultaneously in each virtual machine. Experimental results show that the system with one virtual machine image obtains better performance with less reverting overhead. The system also shows good performance when the number of browsers executed simultaneously in a virtual machine is 50.

Generation of 3 Dimensional Image Model from Multiple Digital Photographs (다중 디지털 사진을 이용한 3차원 이미지 모델 생성)

  • 정태은;석정민;신효철;류재평
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.1634-1637
    • /
    • 2003
  • Any given object on the motor-driven turntable is pictured from 8 to 72 different views with a digital camera. 3D shape reconstruction is performed with the integrated software called by Scanware from these multiple digital photographs. There are several steps such as configuration, calibration, capturing, segmentation, shape creation, texturing and merging process during the shape reconstruction process. 3D geometry data can be exported to cad data such as Autocad input file. Also 3D image model is generated from 3D geometry and texture data, and is used to advertise the model in the internet environment. Consumers can see the object realistically from wanted views by rotating or zooming in the internet browsers with Scanbull spx plug-in. The spx format allows a compact saving of 3D objects to handle or download. There are many types of scan equipments such as laser scanners and photogrammetric scanners. Line or point scan methods by laser can generate precise 3D geometry but cannot obtain color textures in general. Reversely, 3D image modeling with photogrammetry can generate not only geometries but also textures from associated polygons. We got various 3D image models and introduced the process of getting 3D image model of an internet-connected watchdog robot.

  • PDF

Teleoperation System of a Networked Mobile Robot Based on H_263 Video Codec (H_263 영상압축 방식을 이용한 인터넷 기반 탐사로봇의 원격 운용 시스템)

  • 최준영;김재훈;강근택;이원창
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2577-2580
    • /
    • 2003
  • In this paper we present a teleoperation system of an internet-based mobile robot based on H.263 image compression algorithm. We control remotely the networked mobile robot with vision over the internet under unknown environments in the real time. The main feature of this system is that local operators need to download and install a client program and so they can command the robot in a remote location. Image information of remote location is compressed by H.263 video codec algorithm and then transmitted to a local operator. We constructed and tested a networked autonomous mobile robot in the real field. The experimental results show the usefulness of the robot under test.

  • PDF

ASEAN+3 Satellite Image Archive for Environmental Study

  • Vibulsresth, Suvit
    • Proceedings of the KSRS Conference
    • /
    • 2002.10a
    • /
    • pp.803-803
    • /
    • 2002
  • Several environmental problems have occurred and extremely affected throughout the East Asia region. Satellite imageries and spatial information have been used in the applications of environmental and natural hazard management for years. Sharing these data and resources in the community is considered as one of the optimal solution. It would consequently bring cost saving to all participated countries and eventually be beneficial to mankind as a whole. Encouraged by these factors, ASEAN+3 Satellite Image Archive for Environmental Study project was submitted by Thailand in the 3rd Senior Official Meeting between ASEAN, China, Japan and Korea (SEOM+3 Meeting) and approved by the SEOM+3. The main objectives of this project are to share satellite images, information related to natural resources and environmental issues, and to provide data information services to all ASEAN+3 countries. The proposed system is basically embedded by distributed system. The network of data users, data providers, and the center will be established using the Internet. User can access, navigate, display, and even download some archived contents. Its service site can be generally categorized into two parts, which are environmental related data archive and the Integrated satellite image catalogue. The extension of web based GIS is also planned for future development so that GIS users can conduct some preliminary analysis directly on line. This presentation will indicate scope of work, system, working scenario, and work plan of the project.

  • PDF

Effect of Cellular Phone User's Self Image to select Ring-Tone and Ring-Back-Tone (휴대전화 이용자 자아이미지가 벨소리와 통화연결음 선택에 미치는 영향)

  • Yang, Soung-Hoon
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.9
    • /
    • pp.182-193
    • /
    • 2012
  • Recent growth of ring-tone and ring-back-tone download market as the derived market of cellular phone yields the new trend in music consumption from listening to display. This means that consumer purchase the ring-tone and RBT not for his appreciation but for counterpart's consumption, in a word, conspicuous consumption. Study aims at questions on whether cellular phone user can perceive the ring-tone and RBT's brand personality and how they express their self-image via ring-tone and RBT. Survey was administered for 196 college students who is dominant purchase group of market segment. Hypotheses are such as : congruity of self image and brand personality of ring-tone and RBT. Through the T-test, findings said that user's extrovert self image are not led to ring-tone's extrovert brand personality and user's introvert self image are not led to introvert ring-tone's brand personality of ringtone. same result was applicable to RTB. Cellular phone user's purchase behavior are different from those of product and service.

Website Falsification Detection System Based on Image and Code Analysis for Enhanced Security Monitoring and Response (이미지 및 코드분석을 활용한 보안관제 지향적 웹사이트 위·변조 탐지 시스템)

  • Kim, Kyu-Il;Choi, Sang-Soo;Park, Hark-Soo;Ko, Sang-Jun;Song, Jung-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.871-883
    • /
    • 2014
  • New types of attacks that mainly compromise the public, portal and financial websites for the purpose of economic profit or national confusion are being emerged and evolved. In addition, in case of 'drive by download' attack, if a host just visits the compromised websites, then the host is infected by a malware. Website falsification detection system is one of the most powerful solutions to cope with such cyber threats that try to attack the websites. Many domestic CERTs including NCSC (National Cyber Security Center) that carry out security monitoring and response service deploy it into the target organizations. However, the existing techniques for the website falsification detection system have practical problems in that their time complexity is high and the detection accuracy is not high. In this paper, we propose website falsification detection system based on image and code analysis for improving the performance of the security monitoring and response service in CERTs. The proposed system focuses on improvement of the accuracy as well as the rapidity in detecting falsification of the target websites.