• Title/Summary/Keyword: Location tracking

Search Result 907, Processing Time 0.026 seconds

A Synchronized Playback Method of 3D Model and Video by Extracting Golf Swing Information from Golf Video (골프 동영상으로부터 추출된 스윙 정보를 활용한 3D 모델과 골프 동영상의 동기화 재생)

  • Oh, Hwang-Seok
    • Journal of the Korean Society for Computer Game
    • /
    • v.31 no.4
    • /
    • pp.61-70
    • /
    • 2018
  • In this paper, we propose a synchronized playback method of 3D reference model and video by extracting golf swing information from learner's golf video to precisely compare and analyze each motion in each position and time in the golf swing, and present the implementation result. In order to synchronize the 3D model with the learner's swing video, the learner's golf swing movie is first photographed and relative time information is extracted from the photographed video according to the position of the golf club from the address posture to the finishing posture. Through applying time information from learners' swing video to a 3D reference model that rigs the motion information of a pro-golfer's captured swing motion at 120 frames per second through high-quality motion capture equipment into a 3D model and by synchronizing the 3D reference model with the learner's swing video, the learner can correct or learn his / her posture by precisely comparing his or her posture with the reference model at each position of the golf swing. Synchronized playback can be used to improve the functionality of manually adjusting system for comparing and analyzing the reference model and learner's golf swing. Except for the part where the image processing technology that detects each position of the golf posture is applied, It is expected that the method of automatically extracting the time information of each location from the video and of synchronized playback can be extended to general life sports field.

Study on Establishment of Deoksugung Palace, Tourist Information Services using Augmented Reality(AR) Technology (증강현실(AR) 기술을 이용한 덕수궁 관광안내서비스 구축방안 연구)

  • Oh, Sung-hwan;Kim, Ki-duk
    • Korean Journal of Heritage: History & Science
    • /
    • v.46 no.2
    • /
    • pp.26-45
    • /
    • 2013
  • Sudden increase exceeding 30million in the number of smart phone users, and rising interest in the technology of augmented reality, is now trying to combine it with AR technology in other areas very much. The field of cultural heritage, which has been constructed by the Internet and 3D technology, is not unusual and this field is now rapidly changing thanks to the AR technology which can make users experience cultural heritage with high reality. The Palaces in Seoul, however, use fragmentary tools of information - lack of heritage commentators, leaflet, etc, even though the number of visitors is gradually increasing. Therefore, three-dimensional and comprehensive cultural heritage information service is needed with the guidance in the mobile era. This study utilizes the AR technology for building the Deoksugung Tourist Information Service Application(App.) applying the markerless-based recognition technology which is a more advanced tool than the location-based AR technology. This new AR technology can switch perceived real images such as the tablet of the King in the Palace of in the real world, patterns and pedestals into virtual world, which can reproduce the damaged cultural assets as 3D. This also composes photos of the past with the current buildings, which can increase people's interest and absorption of the contents, and helps them understand and be aware of Korean traditional culture and cultural heritage effectively. In addition, convergence between IT new technology, Augmented Reality(AR) and humanities through storytelling based implementation of cultural heritage in smart phone is attempted to demonstrate that there is strength in which augmented reality technique exerts infinite creativity based on actual reality world.

Hash-based Authentication Protocol for RFID Applicable to Desynchronization between the Server and Tag with efficient searching method (서버와 태그 비동기시에도 효율적으로 검색이 가능한 해시기반 RFID 인증 프로토콜)

  • Kwon, Hye-Jin;Kim, Hae-Mun;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.71-82
    • /
    • 2011
  • The RFID system provides undeniable advantages so that it is used for various application. However recent RFID system is vulnerable to some attacks as eavesdropping, replay attack, message hijacking, and tag tampering, because the messages are transmitted through the wireless channel and the tags are cheap. Above attacks cause the tag and reader impersonation, denial of service by invalidating tag, and the location tracking concerning bearer of tags, A lot of RFID authentication protocol bas been proposed to solve the vulnerability. Since Weis, Sanna, Rivest, and Engel, proposed the bash-based RFID authentication protocol, many researchers have improved hash-based authentication protocol and recent bash-based authentication protocols provide security and desirable privacy. However, it remains open problem to reduce the tag identification time as long as privacy and security are still guaranteed. Here we propose a new protocol in which the tags generate the message depending on the state of previous communitions between tag and reader. In consequence, our protocol allows a server to identify a tag in a reasonable amount of time while ensuring security and privacy, To be specific, we reduced the time for the server to identify a tag when the last session finished abnormally by at least 50% compared with other bash-based schemes that ensure levels of security and privacy similar to ours.

Animal Home Range Estimators - A Review and a Case Study - (동물 행동권 분석 방법론 고찰 - 괭이갈매기 사례 분석과 시사점 -)

  • Lee, Sung-Joo;Lee, Who-Seung
    • Korean Journal of Environment and Ecology
    • /
    • v.36 no.2
    • /
    • pp.202-216
    • /
    • 2022
  • Animals exhibit certain behaviors and movement patterns as they react to their internal needs, external stimuli, and surrounding environments. They have a bounded range in which they mostly spend their time, and it is referred to as a home range. Based on the fact that the home range is a critical area for the survival and preservation of species, there has been a growing body of research on developing more precise home range estimation methods to use the estimated ranges as a ground for establishing an effective conservation policy since the early 1940s. Recent rapid advancements in telemetry technology that resulted in the presence of autocorrelation between locations with short time intervals revealed the limitations of the existing estimators. Many novel estimators have been developed to compensate for it by incorporating autocorrelation in calculating home ranges. However, studies on the animal home range are still in their early stage in Korea, and newly developed methodologies have not yet been adopted. Therefore, this study aims to introduce the foreign home range estimation methods and foster domestic research activities on home ranges. Firstly, we compared and contemplated seven estimators by categorizing them into geometrical and statistical methodologies and then divided them into estimators that assume independent observations and those that consider autocorrelation in each category. After that, the home ranges of black-tailed gulls (Larus crassirostris) were calculated using GPS tracking data for the month of June and derived home range estimators by applying the methodology introduced in this study. We analyzed and compared the results to discuss the strengths and weaknesses of each method. Lastly, we proposed a guideline that can help researchers choose an appropriate estimator for home range calculation based on the animal location data characteristics and analysis purpose.

Study on security method for scenario-based smartphone vulnerability (시나리오 기반의 스마트폰 취약점에 대한 보안방안 연구)

  • Lee, Jaeho;Son, Minwoo;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.835-844
    • /
    • 2018
  • Recently, as the number of smartphone users has been increasing worldwide, various services such as electronic payment, internet use, and financial settlement are being used as a smartphone. In addition, researches for home appliance control and automobile control using smartphone are conducted. As such, smartphone users can enjoy a more convenient life, but by hacking smartphones, tapping texts and conversations on smartphones, tracking location through spy apps, DDoS attacks using smartphones, and malicious apps When a message is received at a specific telephone number when using a micropayment, the corresponding text message is transmitted to a remote server, thereby increasing the risk of leakage of personal information and the like. Therefore, in this paper, we define the risk factors of the smartphone that are caused by the internal and external environmental, physical, contents (apps) of the smartphone through the smartphone that we use in real life, We propose a method to check vulnerability of smartphone security solution such as CC evaluation and the most effective response technique for each risk of smartphone by defining the technique.

Implementation of High Efficiency Generators Applicable to Climbing Sticks (등산스틱에 적용 가능한 고효율 발전기 구현)

  • Gul-Won Bang
    • Journal of Industrial Convergence
    • /
    • v.22 no.7
    • /
    • pp.15-21
    • /
    • 2024
  • A hiking stick is generally one of the walking aids that allow hikers to walk while relying on their own bodies when walking. A rechargeable battery must be built into the hiking stick, which is an auxiliary device, in order to perform various functions. A separate power supply is required to charge the rechargeable battery. This study is about a self-generated power supply and develops a power generation device using a screw with higher power generation efficiency than the existing method. It is differentiated from the method suggested in this study by comparing and analyzing it with the existing power generation method, and identifying problems therewith. The screw-type power generation device generates power when the climbing stick comes into contact with the ground and when it is separated from the ground. The built-in power generation device does not require a separate power supply, and it can be used by attaching the role of a mobile phone auxiliary battery and a lighting lamp, and it has the effect of being able to find it through location tracking by embedding a GPS sensor, etc., and using lighting to keep the user safe in emergency situations such as distress. The existing generator with built-in mountain climbing stick is difficult to charge due to very weak current and low practicality, but the generator developed in this research could achieve high efficiency to obtain a sufficient current, so it is possible to charge a battery and practicality.

Analysis of the Effect of Corner Points and Image Resolution in a Mechanical Test Combining Digital Image Processing and Mesh-free Method (디지털 이미지 처리와 강형식 기반의 무요소법을 융합한 시험법의 모서리 점과 이미지 해상도의 영향 분석)

  • Junwon Park;Yeon-Suk Jeong;Young-Cheol Yoon
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.1
    • /
    • pp.67-76
    • /
    • 2024
  • In this paper, we present a DIP-MLS testing method that combines digital image processing with a rigid body-based MLS differencing approach to measure mechanical variables and analyze the impact of target location and image resolution. This method assesses the displacement of the target attached to the sample through digital image processing and allocates this displacement to the node displacement of the MLS differencing method, which solely employs nodes to calculate mechanical variables such as stress and strain of the studied object. We propose an effective method to measure the displacement of the target's center of gravity using digital image processing. The calculation of mechanical variables through the MLS differencing method, incorporating image-based target displacement, facilitates easy computation of mechanical variables at arbitrary positions without constraints from meshes or grids. This is achieved by acquiring the accurate displacement history of the test specimen and utilizing the displacement of tracking points with low rigidity. The developed testing method was validated by comparing the measurement results of the sensor with those of the DIP-MLS testing method in a three-point bending test of a rubber beam. Additionally, numerical analysis results simulated only by the MLS differencing method were compared, confirming that the developed method accurately reproduces the actual test and shows good agreement with numerical analysis results before significant deformation. Furthermore, we analyzed the effects of boundary points by applying 46 tracking points, including corner points, to the DIP-MLS testing method. This was compared with using only the internal points of the target, determining the optimal image resolution for this testing method. Through this, we demonstrated that the developed method efficiently addresses the limitations of direct experiments or existing mesh-based simulations. It also suggests that digitalization of the experimental-simulation process is achievable to a considerable extent.

Information Privacy Concern in Context-Aware Personalized Services: Results of a Delphi Study

  • Lee, Yon-Nim;Kwon, Oh-Byung
    • Asia pacific journal of information systems
    • /
    • v.20 no.2
    • /
    • pp.63-86
    • /
    • 2010
  • Personalized services directly and indirectly acquire personal data, in part, to provide customers with higher-value services that are specifically context-relevant (such as place and time). Information technologies continue to mature and develop, providing greatly improved performance. Sensory networks and intelligent software can now obtain context data, and that is the cornerstone for providing personalized, context-specific services. Yet, the danger of overflowing personal information is increasing because the data retrieved by the sensors usually contains privacy information. Various technical characteristics of context-aware applications have more troubling implications for information privacy. In parallel with increasing use of context for service personalization, information privacy concerns have also increased such as an unrestricted availability of context information. Those privacy concerns are consistently regarded as a critical issue facing context-aware personalized service success. The entire field of information privacy is growing as an important area of research, with many new definitions and terminologies, because of a need for a better understanding of information privacy concepts. Especially, it requires that the factors of information privacy should be revised according to the characteristics of new technologies. However, previous information privacy factors of context-aware applications have at least two shortcomings. First, there has been little overview of the technology characteristics of context-aware computing. Existing studies have only focused on a small subset of the technical characteristics of context-aware computing. Therefore, there has not been a mutually exclusive set of factors that uniquely and completely describe information privacy on context-aware applications. Second, user survey has been widely used to identify factors of information privacy in most studies despite the limitation of users' knowledge and experiences about context-aware computing technology. To date, since context-aware services have not been widely deployed on a commercial scale yet, only very few people have prior experiences with context-aware personalized services. It is difficult to build users' knowledge about context-aware technology even by increasing their understanding in various ways: scenarios, pictures, flash animation, etc. Nevertheless, conducting a survey, assuming that the participants have sufficient experience or understanding about the technologies shown in the survey, may not be absolutely valid. Moreover, some surveys are based solely on simplifying and hence unrealistic assumptions (e.g., they only consider location information as a context data). A better understanding of information privacy concern in context-aware personalized services is highly needed. Hence, the purpose of this paper is to identify a generic set of factors for elemental information privacy concern in context-aware personalized services and to develop a rank-order list of information privacy concern factors. We consider overall technology characteristics to establish a mutually exclusive set of factors. A Delphi survey, a rigorous data collection method, was deployed to obtain a reliable opinion from the experts and to produce a rank-order list. It, therefore, lends itself well to obtaining a set of universal factors of information privacy concern and its priority. An international panel of researchers and practitioners who have the expertise in privacy and context-aware system fields were involved in our research. Delphi rounds formatting will faithfully follow the procedure for the Delphi study proposed by Okoli and Pawlowski. This will involve three general rounds: (1) brainstorming for important factors; (2) narrowing down the original list to the most important ones; and (3) ranking the list of important factors. For this round only, experts were treated as individuals, not panels. Adapted from Okoli and Pawlowski, we outlined the process of administrating the study. We performed three rounds. In the first and second rounds of the Delphi questionnaire, we gathered a set of exclusive factors for information privacy concern in context-aware personalized services. The respondents were asked to provide at least five main factors for the most appropriate understanding of the information privacy concern in the first round. To do so, some of the main factors found in the literature were presented to the participants. The second round of the questionnaire discussed the main factor provided in the first round, fleshed out with relevant sub-factors. Respondents were then requested to evaluate each sub factor's suitability against the corresponding main factors to determine the final sub-factors from the candidate factors. The sub-factors were found from the literature survey. Final factors selected by over 50% of experts. In the third round, a list of factors with corresponding questions was provided, and the respondents were requested to assess the importance of each main factor and its corresponding sub factors. Finally, we calculated the mean rank of each item to make a final result. While analyzing the data, we focused on group consensus rather than individual insistence. To do so, a concordance analysis, which measures the consistency of the experts' responses over successive rounds of the Delphi, was adopted during the survey process. As a result, experts reported that context data collection and high identifiable level of identical data are the most important factor in the main factors and sub factors, respectively. Additional important sub-factors included diverse types of context data collected, tracking and recording functionalities, and embedded and disappeared sensor devices. The average score of each factor is very useful for future context-aware personalized service development in the view of the information privacy. The final factors have the following differences comparing to those proposed in other studies. First, the concern factors differ from existing studies, which are based on privacy issues that may occur during the lifecycle of acquired user information. However, our study helped to clarify these sometimes vague issues by determining which privacy concern issues are viable based on specific technical characteristics in context-aware personalized services. Since a context-aware service differs in its technical characteristics compared to other services, we selected specific characteristics that had a higher potential to increase user's privacy concerns. Secondly, this study considered privacy issues in terms of service delivery and display that were almost overlooked in existing studies by introducing IPOS as the factor division. Lastly, in each factor, it correlated the level of importance with professionals' opinions as to what extent users have privacy concerns. The reason that it did not select the traditional method questionnaire at that time is that context-aware personalized service considered the absolute lack in understanding and experience of users with new technology. For understanding users' privacy concerns, professionals in the Delphi questionnaire process selected context data collection, tracking and recording, and sensory network as the most important factors among technological characteristics of context-aware personalized services. In the creation of a context-aware personalized services, this study demonstrates the importance and relevance of determining an optimal methodology, and which technologies and in what sequence are needed, to acquire what types of users' context information. Most studies focus on which services and systems should be provided and developed by utilizing context information on the supposition, along with the development of context-aware technology. However, the results in this study show that, in terms of users' privacy, it is necessary to pay greater attention to the activities that acquire context information. To inspect the results in the evaluation of sub factor, additional studies would be necessary for approaches on reducing users' privacy concerns toward technological characteristics such as highly identifiable level of identical data, diverse types of context data collected, tracking and recording functionality, embedded and disappearing sensor devices. The factor ranked the next highest level of importance after input is a context-aware service delivery that is related to output. The results show that delivery and display showing services to users in a context-aware personalized services toward the anywhere-anytime-any device concept have been regarded as even more important than in previous computing environment. Considering the concern factors to develop context aware personalized services will help to increase service success rate and hopefully user acceptance for those services. Our future work will be to adopt these factors for qualifying context aware service development projects such as u-city development projects in terms of service quality and hence user acceptance.

Usefulness of Breast Lymphoscintigraphy after Whole Body Bone Scan (유방암 환자에서 전신 뼈 검사 후 감시림프절 위치 파악 검사의 유용성)

  • Jang, Dong-Gun;Bahn, Young-Kag;Chung, Seok;Park, Hoon-Hee;Kang, Chun-Goo;Lim, Han-Sang;Kim, Jae-Sam;Lee, Chang-Ho
    • The Korean Journal of Nuclear Medicine Technology
    • /
    • v.14 no.2
    • /
    • pp.133-137
    • /
    • 2010
  • Purpose: Breast cancer is known to be more vulnerable to bone metastasis and lymph node metastasis than other types of cancer, and nuclear examinations whole body bone scan and lymphoscintigraphy are performed commonly before and after breast cancer operation. In case whole body bone scan is performed on the day before lymphoscintigraphy, the radiopharmaceutical taken into and remaining in the bones provides anatomical information for tracking and locating sentinel lymph nodes. Thus, this study purposed to examine how much bone density affects in locating sentinel lymph nodes. Materials and Methods: The subjects of this study were 22 patients (average age $52{\pm}7.2$) who had whole body bone scan and lymphoscintigraphy over two days in our hospital during the period from January to December, 2009. In the blind test, 22 patients (average age $57{\pm}6.5$) who had lymphoscintigraphy using $^{57}Co$ flood phantom were used as a control group. In quantitative analysis, the relative ratio of the background to sentinel lymph nodes was measured by drawing ROIs on sentinel lymph nodes and the background, and in gross examination, each of a nuclear physician and a radiological technologist with five years' or longer field experience examined images through blind test in a five-point scale. Results: In the results of quantitative analysis, the relative ratio of the background to sentinel lymph nodes was 14.2:1 maximum and 8.5:1 ($SD{\pm}3.48$) on the average on the front, and 14.7:1 maximum and 8.5:1 ($SD{\pm}3.42$) on the average on the side. In the results of gross examination, when $^{57}Co$ flood phantom images were compared with images containing bones, the score was relative high as 3.86 ($SD{\pm}0.35$) point for $^{57}Co$ flood phantom images and 4.09 ($SD{\pm}0.42$) for bone images. Conclusion: When whole body bone scan was performed on the day before lymphoscintigraphy, the ratio of the background to sentinel lymph nodes was over 10:1, so there was no problem in locating lymph nodes. In addition, we expect to reduce examination procedures and improve the quality of images by indicating the location of sentinel lymph nodes using bone images as body contour without the use of a source.

  • PDF

International Success the Second Time Around: A Case Study (제이륜국제성공(第二轮国际成功): 일개안례연구(一个案例研究))

  • Colley, Mary Catherine;Gatlin, Brandie
    • Journal of Global Scholars of Marketing Science
    • /
    • v.20 no.2
    • /
    • pp.173-178
    • /
    • 2010
  • A privately held, third generation family owned company, Boom Technologies, Inc. (BTI), a provider of products and services to the electric utility, telecommunications and contractor markets, continues to make progress in exporting. Although export sales only equaled 5% of total revenue in 2008, BTI has an entire export division. Their export division's Managing Director reveals the trial and errors of a privately held company and their quest for success overseas. From its inception, BTI has always believed its greatest asset is its employees. When export sales struggled due to lack of strategy and direction, BTI hired a Managing Director for its export division. With leadership and guidance from BTI's president and from the Managing Director, they utilized the department's skills and knowledge. Structural changes were made to expand their market presence abroad and increase export sales. As a result, export sales increased four-fold, area managers in new countries were added and distribution networks were successfully cultivated. At times, revenue generation was difficult to determine due to the structure of the company. Therefore, in 1996, the export division was restructured as a limited liability company. This allowed the company to improve the tracking of revenue and expenses. Originally, 80% of BTI's export sales came from two countries; therefore, the initial approach to selling overseas was not reaching their anticipated goals of expanding their foreign market presence. However, changes were made and now the company manages the details of selling to over 80 countries. There were three major export expansion challenges noted by the Managing Director: 1. Product and Shipping - The major obstacle for BTI was product assembly. Originally, the majority of the product was assembled in the United States, which increased shipping and packaging costs. With so many parts specified in the order, many times the order would arrive with parts missing. The missing parts could equate to tens of thousands of dollars. Shipping these missing parts separately in another shipment also cost tens of thousands of dollar, plus a delivery delay time of six to eight weeks; all of which came out of the BTI's pockets. 2. Product Adaptation - Safety and product standards varied widely for each of the 80 countries to which BTI exported. Weights, special licenses, product specification requirements, measurement systems, and truck stability can all differ from country to country and can serve as a type of barrier to entry, making it difficult to adapt products accordingly. Technical and safety standards are barriers that serve as a type of protection for the local industry and can stand in the way of successfully pursuing foreign markets. 3. Marketing Challenges - The importance of distribution creates many challenges for BTI as they attempt to determine how each country prefers to operate with regard to their distribution systems. Some countries have competition from a small competitor that only produces one competing product; whereas BTI manufactures over 100 products. Marketing material is another concern for BTI as they attempt to push marketing costs to the distributors. Adapting the marketing material can be costly in terms of translation and cultural differences. In addition, the size of paper in the United States differs from those in some countries, causing many problems when attempting to copy the same layout and With distribution being one of several challenges for BTI, the company claims their distribution network is one of their competitive advantages, as the location and names of their distributors are not revealed. In addition, BTI rotates two offerings yearly: training to their distributors one year and then the next is a distributor's meeting. With a focus on product and shipping, product adaptation, and marketing challenges, the intricacies of selling overseas takes time and patience. Another competitive advantage noted is BTI's cradle to grave strategy, where they follow the product from sale to its final resting place, whether the truck is leased or purchased new or used. They also offer service and maintenance plans with a detailed cost analysis provided to the company prior to purchasing or leasing the product. Expanding abroad will always create challenges for a company. As the Managing Director stated, "If you don't have patience (in the export business), you better do something else." Knowing how to adapt quickly provides BTI with the skills necessary to adjust to the changing needs of each country and its own unique challenges, allowing them to remain competitive.