• Title/Summary/Keyword: Light ID

Search Result 60, Processing Time 0.03 seconds

A Study on the HMD-AR Interaction System Combining Optical Camera Communication to Provide Location-based Service for Tourist in Jeonju Hanok Village (전주 한옥마을 관광객의 위치 기반 서비스 제공을 위한 광카메라통신 접목형 HMD-AR 인터렉션 시스템에 관한 연구)

  • Min, Byung-Jun;Choi, Jin-Yeong;Cha, Jae-Sang;Choi, Bang-Ho;Cho, Ju-Phil
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.445-451
    • /
    • 2018
  • In this paper, we propose an HMD-AR interaction system that combines optical camera communication to provide location-based service for tourists in Jeonju Hanok Village. The proposed system receives optical camera communication data from Light infrastructure existing in Jeonju Hanok Village and provides service through ID information along with its own location information. We researched optical camera communication technology and smart device based HMD-AR system and constructed the actual HMD-AR system and tested it. The proposed system is expected that it will be applied to various tourist attractions by utilizing the proposed system in the future, and it is expected to be used as a valuable feedback for smart device based HMD-AR.

Hysteresis Phenomenon of Hydrogenated Amorphous Silicon Thin Film Transistors for an Active Matrix Organic Light Emitting Diode (능동형 유기 발광 다이오드(AMOLED)에서 발생하는 수소화된 비정질 실리콘 박막 트랜지스터 (Hydrogenated Amorphous Silicon Thin Film Transistor)의 이력 (Hysteresis) 현상)

  • Choi, Sung-Hwan;Lee, Jae-Hoon;Shin, Kwang-Sub;Park, Joong-Hyun;Shin, Hee-Sun;Han, Min-Koo
    • Proceedings of the KIEE Conference
    • /
    • 2006.07c
    • /
    • pp.1295-1296
    • /
    • 2006
  • 수소화된 비정질 실리콘 박막 트랜지스터(a-Si:H TFT)의 이력 현상이 능동형 유기 발광 다이오드(Active-Matrix Organic Light Emitting Diode) 디스플레이 패널을 구동할 경우에, 발생할 수 있는 잔상(Residual Image) 문제를 단위 소자 및 회로에서 실험을 통하여 규명하였다. 게이트 시작 전압을 바꾸어 VGS-ID 특성을 측정할 경우, 게이트 시작 전압이 5V에서 시작한 VGS-ID 곡선이 10V에서 시작한 VGS-ID 곡선에 비해 왼쪽으로 0.15V 이동하였다. 이러한 결과는 게이트 시작 전압의 차이에 의해 발생한 트랩된 전하량(Trapped Charge) 변화로 설명할 수 있다. 또한, 인가하는 게이트 전압 간격을 0.5V에서 0.05V로 감소시켰을 때 전하 디트래핑 비율의 변화(Charge De-trapping Rate)로 인하여, 이력 현상(Hysteresis Phenomenon)으로 인한 단위 소자에서의 문턱전압의 변화가 0.78V에서 0.39V로 감소함을 관찰하였다. 제작된 2-TFT 1-Capacitor의 ANGLED 화소에서 (n-1)번째 프레임에서의 OLED 전류가 (n)번째 프레임에서의 OLED 전류에 35%의 전류오차를 발생시키는 것을 측정 및 분석하였다.

  • PDF

Performance of Double Binary Turbo Coding for LED-ID Systems (LED-ID 시스템을 위한 이중 이진 터보 코딩의 성능)

  • Hwang, Yu-Min;Kim, Kyung-Ho;Kim, Jin-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38C no.11
    • /
    • pp.1078-1083
    • /
    • 2013
  • At the ubiquitous age, applications of Wireless Personal Area Network (WPAN) technology using LEDs are in progress. However, visible light communication using LED have weakness, which deteriorates performance of communication. To reduce information losses, which is caused by optical noise, such as incandescent lamps, fluorescent lamps, sunbeam etc., proposed channel coding scheme, double binary turbo codes. In this paper, encoding scheme of the proposed system is described and simulation results are analyzed. We had expected improved performance by using double binary turbo codes. Finally, performances of the proposed system came up to our expectations.

Overview of LED Communication Networks

  • Huynh, Vu Van;Le, Nam-Tuan;Uddin, Muhammad Shahin;Choi, Sun-Woong;Jang, Yeong-Min
    • Information and Communications Magazine
    • /
    • v.28 no.12
    • /
    • pp.50-60
    • /
    • 2011
  • Visible light communication(VLC) is one type of short-range, optical, and wireless communication system utilizing light emitting diode(LED) and laser diode(LD) as optical source. In a VLC system, visible light is used as a transmission medium and used to illuminate. Using VLC has a lot of advantages: it is harmless to human body; it transmits with high power, and it has excellent security, a high data rate, and a license free frequency band. With such a unique blend of communication and illumination in one system, the most common application would be an indoor environment. We aim at reviewing key issues in VLC network such as : FOV(field of view), priority MAC, cooperative MAC, link switching, LED-ID technique, cell site diversity, and link recovery.

Implementation of multi-touching and application based touch interface using Infrared (적외선을 이용한 멀티 터치와 터치 인터페이스의 구현)

  • Yoo, Ki-Sun;Hong, Rok-Ji;Moon, Il-Young
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.6
    • /
    • pp.928-934
    • /
    • 2010
  • In this paper, the method introduce for touching signals and run the application on the multi touch environment using infrared light. When the user touches the screen, the infrared camera make a movie the light and the light which made through image processing communicate from TUIO(Tangble User Interface Object) protocol to Application. this Program is using the delivery informations which are occurred the event to Application. The Application which use the touch can exchange the Andoroid Phone between Mobile picture supervision Application also this equipment introduces about the musical entertainment Application which play a music many users at the same time.

A study on development of RGB color variable optical ID module considering smart factory environment (스마트 팩토리 환경을 고려한 RGB 컬러 가변형 광 ID 모듈개발 연구)

  • Lee, Min-Ho;Timur, Khudaybergenov;Lee, Beom-Hee;Cho, Ju-Phil;Cha, Jae-Sang
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.5
    • /
    • pp.623-629
    • /
    • 2018
  • Smart Factory is a concept of automatic production system of machines by the fusion of ICT and manufacturing. As a base technology for realizing such a smart factory, there is an increasing interest in a low-power environmentally friendly LED lighting system, and researches on so-called optical ID related application technologies such as communication using a LED and position recognition are actively underway. In this paper, We have proposed a system that can reliably identify logistics location and additional information without being affected by electromagnetic interference such as high voltage, high current, and generator in the plant. Through the basic experiment, we confirmed the applicability of the color ID recognition rate from 98.8% to 93.8% according to the eight color variations in the short distance.

IoT/M2M 응용 서비스 지원을 위한 IEEE 802.15.7m Optical Wireless Communication 표준화 현황

  • Hossan, Md.Tanvir;Hong, Chang-Hyeon;Nguyen, Trang;Le, Nam Tuan;Jang, Yeong-Min
    • Information and Communications Magazine
    • /
    • v.33 no.10
    • /
    • pp.10-16
    • /
    • 2016
  • IEEE 802.15.7 VLC(Visible Light Communication) 규격 이후에 카메라 기반 ISC(Image Sensor Communication) 관련 개정 필요성이 제기되어서 현재 IEEE 802.15.7m OWC(Optical Wireless Communication) TG가 표준화를 진행 중에 있다. 2016년 5월에 결정된 Baseline Document D0를 기반으로 LiFi(Light Fidelity), OCC(Optical Camera Communication) 및 LED-ID(LED Identification) 기술로 간단하게 분류하고 각 핵심 변조 기법을 소개한다. 5세대 이동통신과 함께 사용될 수 있는 다양한 IoT/ M2M 응용 서비스(LED, 디지털사이니지, 방송, 자동차 안전, 디스플레이 등)들이 포함되어 있다. 국내에서 혁신적인 비즈니스 모델 발굴과 국내 산/학/연/관이 협력하여 가시광, 적외선 및 자외선 분야에서 적극적인 연구개발이 있어야 할 것이다.

Hard calibration of a structured light for the Euclidian reconstruction (3차원 복원을 위한 구조적 조명 보정방법)

  • 신동조;양성우;김재희
    • Proceedings of the IEEK Conference
    • /
    • 2003.11a
    • /
    • pp.183-186
    • /
    • 2003
  • A vision sensor should be calibrated prior to infer a Euclidian shape reconstruction. A point to point calibration. also referred to as a hard calibration, estimates calibration parameters by means of a set of 3D to 2D point pairs. We proposed a new method for determining a set of 3D to 2D pairs for the structured light hard calibration. It is simply determined based on epipolar geometry between camera image plane and projector plane, and a projector calibrating grid pattern. The projector calibration is divided two stages; world 3D data acquisition Stage and corresponding 2D data acquisition stage. After 3D data points are derived using cross ratio, corresponding 2D point in the projector plane can be determined by the fundamental matrix and horizontal grid ID of a projector calibrating pattern. Euclidian reconstruction can be achieved by linear triangulation. and experimental results from simulation are presented.

  • PDF

An Evaluation of Crashworthiness for the Full Rake KHST Using ID Model (1차원 모델을 이용한 한국형 고속전철의 충돌 안전도 평가)

  • 구정서;조현직;김동성;윤영한
    • Proceedings of the KSR Conference
    • /
    • 2001.10a
    • /
    • pp.217-222
    • /
    • 2001
  • The best method to evaluate crashworthiness of a trainset as a whole is to analyse one dimensional dynamic model composed of nonlinear dampers, springs and bars, and masses. In this study, crashworthiness of KHST was evaluated by analysing a nonlinear spring/bar-damper-mass model. The numerical results show that the KHST can easily absorb kinetic energy at lower impact force and acceleration in a heavy collision, when compared with KTX. Also, the KHST can be protected from any damage in its carbody and components except the prepared energy absorbing tube in a light collision, like a traint-to-train accident at speed under 8 kph. However, the KTX can be much damaged in the a light collision because there is no energy absorbing tube.

  • PDF

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.