• Title/Summary/Keyword: POS-System

Search Result 177, Processing Time 0.025 seconds

A research on the media player transferring vibrotactile stimulation from digital sound (디지털 음원의 촉각 자극 전이를 위한 미디어 플레이어에 대한 연구)

  • Lim, Young-Hoon;Lee, Su-Jin;Jung, Jong-Hwan;Ha, Ji-Min;Whang, Min-Cheol;Park, Jun-Seok
    • 한국HCI학회:학술대회논문집
    • /
    • 2007.02a
    • /
    • pp.881-886
    • /
    • 2007
  • This study was to develope a vibrotactile display system using windows media player from digital audio signal. WMPlayer10SDK system which was plug-in tool by microsoft windows media player provided its video and audio signal information. The audio signal was tried to be change into vibrotactile display. Audio signal had 4 sections such as 8bit, 16bit, 24bit, and 32bit. Each section was computed its frequency and vibrato scale. And data was transferred to 38400bps network port(COM1) for vibration. Using this system was able to develop the music suit which presented tactile feeling of music beyond sound. Therefore, it may provide cross modal technology for fusion technology of human senses.

  • PDF

A Study on the Relationship between the Tax Evasion Factors and the Tax Evasion Inclination of Value Added Tax in Korea (부가가치세 포탈요인과 포탈성향에 관한 실증적 연구)

  • Kim, Beom-Jin;Ham, Young-Bok
    • Korean Business Review
    • /
    • v.14
    • /
    • pp.1-30
    • /
    • 2001
  • To prevent the VAT evasion and to form a sound VAT paying culture, we can draw the policy directions for government as follows: First, it is necessary to strengthen the tax supervision of small business and the administration of tax sources of cash-income industry. Second, the tax-deductible rate of the received tax invoices should be increased in a short-term base, and a simplified taxation system should be abolished in a long-term base. Third, in cases a trader has not received a tax invoice, an additional tax should be applied. Forth, to issue the tax invoice faster and conveniently, it is requested to introduce a new system which issues electronic card of registration when a businessman applies for his/her business registration. Fifth, to make tax standard transparent, it is desirable to punish the violator, relating to credit card regulations, stricter than present and to enforce the electronic bookkeeping. Sixth, for the reduction of noncompliance rate and creating a climate for autonomous, faithful tax return, it is necessary to expand and intensify tax investigation. And also it is necessary to make the level of penalty tax higher up and the level of criminal punishment less down, to keep up tax audit coverage. Seventh, a trader who is eligible for simplified taxation, whose tax base is under 12,000 thousand won, should not be required to pay the value added tax. But it is desirable to cut down them for the fairness of tax burden. Eighth, the effective date of the revised tax law should be fixed. Ninth, it is necessary to reinforce publicity and to educate on tax system and administration, for reducing tax evasion or tax avoidance and encouraging faithful tax return. Tenth, as the tendency of VAT evasion of distribution industry turns out to be the highest, it is requested not only to intensify tax administration on them but also to establish system and incentives, for introducing information system in distribution industry(introducing POS system, computerization of transaction record, establishing EDI between traders).

  • PDF

A Robust Pattern-based Feature Extraction Method for Sentiment Categorization of Korean Customer Reviews (강건한 한국어 상품평의 감정 분류를 위한 패턴 기반 자질 추출 방법)

  • Shin, Jun-Soo;Kim, Hark-Soo
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.12
    • /
    • pp.946-950
    • /
    • 2010
  • Many sentiment categorization systems based on machine learning methods use morphological analyzers in order to extract linguistic features from sentences. However, the morphological analyzers do not generally perform well in a customer review domain because online customer reviews include many spacing errors and spelling errors. These low performances of the underlying systems lead to performance decreases of the sentiment categorization systems. To resolve this problem, we propose a feature extraction method based on simple longest matching of Eojeol (a Korean spacing unit) and phoneme patterns. The two kinds of patterns are automatically constructed from a large amount of POS (part-of-speech) tagged corpus. Eojeol patterns consist of Eojeols including content words such as nouns and verbs. Phoneme patterns consist of leading consonant and vowel pairs of predicate words such as verbs and adjectives because spelling errors seldom occur in leading consonants and vowels. To evaluate the proposed method, we implemented a sentiment categorization system using a SVM (Support Vector Machine) as a machine learner. In the experiment with Korean customer reviews, the sentiment categorization system using the proposed method outperformed that using a morphological analyzer as a feature extractor.

A Study on the Effect of the IoT Technology on SCM (IoT 기술이 공급사슬관리에 미치는 영향에 관한 연구)

  • Lee, Kangbae;Baek, Daehan;Kim, Doohawn
    • Journal of Information Technology Services
    • /
    • v.15 no.1
    • /
    • pp.227-243
    • /
    • 2016
  • In order to maximize profitability by optimizing the entire supply chain process, enterprises have made efforts to apply IT technologies such as POS, MES, and TMS. In addition, academic societies have also made efforts to verify the effects of IT technology introduction through various researches. However, until now, there is almost no research that analyzes the relationship between the IoT, a new IT technology, and the SCM. To study the effect of IoT technology on SCM, this study conducted professional Delphi surveys for three times. Through this method, this study analyzed changes that will be caused by the IoT technology, the priority area in IoT introduction, and the expected difficulty in IoT introduction on SCM. As a result of the Delphi surveys and analyses, it was expected that when IoT technology is introduced, the level of SCM's IT use and partnership will increase. However, the effect of the increased performance of the supply chain, which includes inventory management and quality control, will become weaker. The reason is that the development of operation and management skills, as well as the improvement of IT technology, are also important elements for the performance improvement of the supply chain. As for the priority area in IoT introduction, it was expected that the effect will be greater when IoT is introduced in customer service, transportation, and delivery areas. As difficulties in IoT technology introduction, such as the shortage of IoT platform development personnel, standardization, integration with the existing system, securing professional manpower, expenses, data management, and operation, were derived, it has thus become necessary for us to exert greater efforts in order to come up with solutions.

Development of Dynamic Magnetic Field Emulator for Smart Multi-Card (스마트멀티카드를 위한 동적자장모사장치의 개발)

  • Bae, Jae-Ho
    • Journal of Korean Society of Industrial and Systems Engineering
    • /
    • v.40 no.4
    • /
    • pp.183-190
    • /
    • 2017
  • This paper proposes a dynamic magnetic field emulator (DMFE), which can electrically emulate information for the magnetic stripes of most widely used credit cards. Payment transactions with most common credit cards are performed by reading the card's information, encoded in magnetic stripes, using the reader head of a point-of-sale (POS) system. A stripe-type permanent magnet is attached to the back side of the credit card, and information for payments or value-added service is reorganized by exposing it to strong magnetic field. The process of data recording and retrieving as stated above has been pointed out as a major cause of illegal credit card use, because the information on the magnetic stripe is always exposed, and is thus vulnerable to forgery or alteration. A dynamic magnetic field emulator displays card information only when necessary by using the principle of solenoidal magnets. The DMFE proposed in this paper can prevent fraudulent use if it is operated with a device, like a smart phone, or a separate user-authentication procedure. In addition, because it is possible to display various information as needed, it can be utilized for a smart multi-card application, in which information for multiple cards is stored in one card, and can be selected and used as needed. This paper introduces the necessity of the DMFE and its manufacturing principles. As a result, this study will be helpful for making various application cases in payment, which is a core area of the Fintech (a newly-coined word of finance and technology) industry.

The Performance Evaluation for PHY-LINK Data Transfer using SPI-4.2 (SPI-4.2 프로토콜을 사용한 PHY-LINK 계층간의 데이터 전송 성능평가)

  • 박노식;손승일;최익성;이범철
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.3
    • /
    • pp.577-585
    • /
    • 2004
  • System Packet Interface Level 4 Phase(SPI-4.2) is an interface for packet and cell transfer between a physical layer(PHY) device and a link layer device, for aggregate bandwidths of OC-192 ATM and Packet Over Sonet/SDH(POS), as well as 10Gbps Ethernet applications. In this paper, we performs the research for SPI-4.2. Also we analyze the performance of SPI-4.2 interface module after modeling using C programming language. This paper shows that SPI-4.2 interface module with 512-word FIFO depth is able to be adapted for the offered loads to 97% in random uniform traffic and 94% in bursty traffic with bursty length 32. SPI-4.2 interface module can experience an performance degradation due to heavy overhead when it massively receives small size packets less than 14-byte. SPI-4.2 interface module is suited for line cards in gigabit/terabit routers, and optical cross-connect switches, and SONET/SDH-based transmission systems.

New Text Steganography Technique Based on Part-of-Speech Tagging and Format-Preserving Encryption

  • Mohammed Abdul Majeed;Rossilawati Sulaiman;Zarina Shukur
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.18 no.1
    • /
    • pp.170-191
    • /
    • 2024
  • The transmission of confidential data using cover media is called steganography. The three requirements of any effective steganography system are high embedding capacity, security, and imperceptibility. The text file's structure, which makes syntax and grammar more visually obvious than in other media, contributes to its poor imperceptibility. Text steganography is regarded as the most challenging carrier to hide secret data because of its insufficient redundant data compared to other digital objects. Unicode characters, especially non-printing or invisible, are employed for hiding data by mapping a specific amount of secret data bits in each character and inserting the character into cover text spaces. These characters are known with limited spaces to embed secret data. Current studies that used Unicode characters in text steganography focused on increasing the data hiding capacity with insufficient redundant data in a text file. A sequential embedding pattern is often selected and included in all available positions in the cover text. This embedding pattern negatively affects the text steganography system's imperceptibility and security. Thus, this study attempts to solve these limitations using the Part-of-speech (POS) tagging technique combined with the randomization concept in data hiding. Combining these two techniques allows inserting the Unicode characters in randomized patterns with specific positions in the cover text to increase data hiding capacity with minimum effects on imperceptibility and security. Format-preserving encryption (FPE) is also used to encrypt a secret message without changing its size before the embedding processes. By comparing the proposed technique to already existing ones, the results demonstrate that it fulfils the cover file's capacity, imperceptibility, and security requirements.

Driver Assistance System for Integration Interpretation of Driver's Gaze and Selective Attention Model (운전자 시선 및 선택적 주의 집중 모델 통합 해석을 통한 운전자 보조 시스템)

  • Kim, Jihun;Jo, Hyunrae;Jang, Giljin;Lee, Minho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.3
    • /
    • pp.115-122
    • /
    • 2016
  • This paper proposes a system to detect driver's cognitive state by internal and external information of vehicle. The proposed system can measure driver's eye gaze. This is done by concept of information delivery and mutual information measure. For this study, we set up two web-cameras at vehicles to obtain visual information of the driver and front of the vehicle. We propose Gestalt principle based selective attention model to define information quantity of road scene. The saliency map based on gestalt principle is prominently represented by stimulus such as traffic signals. The proposed system assumes driver's cognitive resource allocation on the front scene by gaze analysis and head pose direction information. Then we use several feature algorithms for detecting driver's characteristics in real time. Modified census transform (MCT) based Adaboost is used to detect driver's face and its component whereas POSIT algorithms are used for eye detection and 3D head pose estimation. Experimental results show that the proposed system works well in real environment and confirm its usability.

User-independent blockchain donation system

  • Sang-Dong Sul;Su-Jeong Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.11
    • /
    • pp.113-123
    • /
    • 2023
  • This paper introduces the Cherry system, a user-independent blockchain donation system. This is a procedure that is delivered to the beneficiary's bank account through a virtual account when a donor makes a donation, so there is no difference from the existing donation delivery method from the user's point of view However, within the blockchain, Cherry Points, a virtual currency based on the user ID, are issued and delivered to the beneficiary, while all transactions and the beneficiary's usage history are managed on the blockchain. By adopting this method, there was an improvement in blockchain performance, with transaction processing exceeding 1,000 TPS in typical transaction condition and service completion within 21.3 seconds. By applying the automatic influence control algorithm to this system, the influence according to stake, which is an individual donation, is greatly reduced to 0.3 after 2 months, thereby concentrating influence could be controlled automatically. In addition, it was designed to enable micro tracking by adding a tracking function by timestamp to the donation ledger for each individual ID, which greatly improved the transparency in the use of donations. From a service perspective, existing blockchain donation systems were handled as limited donation delivery methods. Since it is a direct service in a user-independent method, convenience has been greatly improved by delivering donations in various forms.

Korean Named Entity Recognition and Classification using Word Embedding Features (Word Embedding 자질을 이용한 한국어 개체명 인식 및 분류)

  • Choi, Yunsu;Cha, Jeongwon
    • Journal of KIISE
    • /
    • v.43 no.6
    • /
    • pp.678-685
    • /
    • 2016
  • Named Entity Recognition and Classification (NERC) is a task for recognition and classification of named entities such as a person's name, location, and organization. There have been various studies carried out on Korean NERC, but they have some problems, for example lacking some features as compared with English NERC. In this paper, we propose a method that uses word embedding as features for Korean NERC. We generate a word vector using a Continuous-Bag-of-Word (CBOW) model from POS-tagged corpus, and a word cluster symbol using a K-means algorithm from a word vector. We use the word vector and word cluster symbol as word embedding features in Conditional Random Fields (CRFs). From the result of the experiment, performance improved 1.17%, 0.61% and 1.19% respectively for TV domain, Sports domain and IT domain over the baseline system. Showing better performance than other NERC systems, we demonstrate the effectiveness and efficiency of the proposed method.