• Title/Summary/Keyword: Personal Data Processing

Search Result 415, Processing Time 0.025 seconds

A Camera Tracking System for Post Production of TV Contents (방송 콘텐츠의 후반 제작을 위한 카메라 추적 시스템)

  • Oh, Ju-Hyun;Nam, Seung-Jin;Jeon, Seong-Gyu;Sohn, Kwang-Hoon
    • Journal of Broadcast Engineering
    • /
    • v.14 no.6
    • /
    • pp.692-702
    • /
    • 2009
  • Real-time virtual studios which could run only on expensive workstations are now available for personal computers thanks to the recent development of graphics hardware. Nevertheless, graphics are rendered off-line in the post production stage in film or TV drama productions, because the graphics' quality is still restricted by the real-time hardware. Software-based camera tracking methods taking only the source video into account take much computation time, and often shows unstable results. To overcome this restriction, we propose a system that stores camera motion data from sensors at shooting time as common virtual studios and uses them in the post production stage, named as POVIS(post virtual imaging system). For seamless registration of graphics onto the camera video, precise zoom lens calibration must precede the post production. A practical method using only two planar patterns is used in this work. We present a method to reduce the camera sensor's error due to the mechanical mismatch, using the Kalman filter. POVIS was successfully used to track the camera in a documentary production and saved much of the processing time, while conventional methods failed due to lack of features to track.

Performance Analysis of Noncoherent OOK UWB Transceiver for LR-WPAN (저속 WPAN용 비동기 OOK 방식 UWB 송수신기 성능 분석)

  • Ki Myoungoh;Choi Sungsoo;Oh Hui-Myoung;Kim Kwan-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1027-1034
    • /
    • 2005
  • IEEE802.15.4a, which is started to realize the PHY layer including high precision ranging/positioning and low data rate communication functions, requires a simple and low power consumable transceiver architecture. To satisfy this requirements, the simple noncoherent on-off keying (OOK) UWB transceiver with the parallel energy window banks (PEWB) giving high precision signal processing interface is proposed. The flexibility of the proposed system in multipath fading channel environments is acquired with the pulse and bit repetition method. To analyze the bit error rate (BER) performance of this proposed system, a noise model in receiver is derived with commonly used random variable distribution, chi-square. BER of $10^{-5}$ under the line-of-sight (LOS) residential channel is achieved with the integration time of 32 ns and signal to noise ratio (SNR) of 15.3 dB. For the non-line-of-sight (NLOS) outdoor channel, the integration time of 72 ns and SNR of 16.2 dB are needed. The integrated energy to total received energy (IRR) for the best BER performance is about $86\%$.

Negative Transition of Smart Device Utility: Empirical Study on IT-enabled Work Flexibility, After Hours Work Connectivity, and Work-Life Conflict (스마트기기 효용의 부정적 전이: IT기반 업무 유연성, 근무시간 외 업무 연결성, 일-삶 갈등에 관한 실증 연구)

  • Kim, Hyung-Jin;Lee, Yoon-ji;Lee, Ho-Geun
    • Informatization Policy
    • /
    • v.26 no.4
    • /
    • pp.36-61
    • /
    • 2019
  • While smart devices can have a positive impact on work efficiency and productivity by reducing time-space constraints and enabling rapid processing of tasks, side effects can arise from the imbalances between work and personal life. In recent years, as smart devices are increasingly used in work environments, it is more necessary than ever to understand the related phenomenon, find the cause of negative effects, and search for appropriate solutions. This study has developed and verified a theoretical model that shows how the technical characteristics known as the utility of smart devices are converted into negative results such as work-life conflict. As a result of analyzing the collected data from the employees, our study provides significant implications for the researchers, as well as the practitioners and policy makers, regarding various relationships among IT-enabled work flexibility, after-hours work connectivity and work-life conflict, and the new knowledge about the important role of segmentation supplies from the organization.

Microbiological Quality Evaluation for Application of the HACCP System to the Bakery Products at Small Scale Bakeries (소규모 베이커리에서의 HACCP적용을 위한 미생물학적 위해도 평가)

  • 엄애선;권성희;정덕화;오상석;이헌옥
    • Korean journal of food and cookery science
    • /
    • v.19 no.4
    • /
    • pp.454-462
    • /
    • 2003
  • Recently, the HACCP(Hazard Analysis Critical Control Point) system has been emphasized in food processing industries throughout the world. However, the system has, as yet, not been applied very well to domestic food industries. Due to the increase in the consumption of bakery products, more studies are required on the application of HACCP to establish the system in small-scale bakeries. This study was designed to provide basic data for setting management standards for HACCP, based on microbiological hazard evaluations of bakery products. Red bean paste filled breads, custard cream filled breads and cakes covered with fresh whipping cream were collected, and microbiological evaluations conducted on the raw materials, the manufacturing processes and potential hazards. The result showed the presence of coliforms in fresh cream of cakes and the soybean paste of soybean paste breads at levels as high as 105 CFU/g on the hazard analysis of the raw materials. Moreover, the general levels of bacteria and coliforms were over those of the standards during the intermediate fermentation and molding processes. Furthermore, high levels of coliforms were detected on the hands of the salesmen and bakers themselves. This suggests that the CCPs (Critical Control Points), such as fresh cream and red bean paste manufacturing process desperately require better management. There is also a requirement for education relating to personal hygiene for the production of hygienic bakery products and for the publics health.

Gesture Spotting by Web-Camera in Arbitrary Two Positions and Fuzzy Garbage Model (임의 두 지점의 웹 카메라와 퍼지 가비지 모델을 이용한 사용자의 의미 있는 동작 검출)

  • Yang, Seung-Eun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.1 no.2
    • /
    • pp.127-136
    • /
    • 2012
  • Many research of hand gesture recognition based on vision system have been conducted which enable user operate various electronic devices more easily. 3D position calculation and meaningful gesture classification from similar gestures should be executed to recognize hand gesture accurately. A simple and cost effective method of 3D position calculation and gesture spotting (a task to recognize meaningful gesture from other similar meaningless gestures) is described in this paper. 3D position is achieved by calculation of two cameras relative position through pan/tilt module and a marker regardless with the placed position. Fuzzy garbage model is proposed to provide a variable reference value to decide whether the user gesture is the command gesture or not. The reference is achieved from fuzzy command gesture model and fuzzy garbage model which returns the score that shows the degree of belonging to command gesture and garbage gesture respectively. Two-stage user adaptation is proposed that off-line (batch) adaptation for inter-personal difference and on-line (incremental) adaptation for intra-difference to enhance the performance. Experiment is conducted for 5 different users. The recognition rate of command (discriminate command gesture) is more than 95% when only one command like meaningless gesture exists and more than 85% when the command is mixed with many other similar gestures.

A Study on the Current State of the Library's AI Service and the Service Provision Plan (도서관의 인공지능(AI) 서비스 현황 및 서비스 제공 방안에 관한 연구)

  • Kwak, Woojung;Noh, Younghee
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.155-178
    • /
    • 2021
  • In the era of the 4th industrial revolution, public libraries need a strategy for promoting intelligent library services in order to actively respond to changes in the external environment such as artificial intelligence. Therefore, in this study, based on the concept of artificial intelligence and analysis of domestic and foreign artificial intelligence related trends, policies, and cases, we proposed the future direction of introduction and development of artificial intelligence services in the library. Currently, the library operates a reference information service that automatically provides answers through the introduction of artificial intelligence technologies such as deep learning and natural language processing, and develops a big data-based AI book recommendation and automatic book inspection system to increase business utilization and provide customized services for users. Has been provided. In the field of companies and industries, regardless of domestic and overseas, we are developing and servicing technologies based on autonomous driving using artificial intelligence, personal customization, etc., and providing optimal results by self-learning information using deep learning. It is developed in the form of an equation. Accordingly, in the future, libraries will utilize artificial intelligence to recommend personalized books based on the user's usage records, recommend reading and culture programs, and introduce real-time delivery services through transport methods such as autonomous drones and cars in the case of book delivery service. Service development should be promoted.

A Study on the Feature Point Extraction Methodology based on XML for Searching Hidden Vault Anti-Forensics Apps (은닉형 Vault 안티포렌식 앱 탐색을 위한 XML 기반 특징점 추출 방법론 연구)

  • Kim, Dae-gyu;Kim, Chang-soo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.2
    • /
    • pp.61-70
    • /
    • 2022
  • General users who use smartphone apps often use the Vault app to protect personal information such as photos and videos owned by individuals. However, there are increasing cases of criminals using the Vault app function for anti-forensic purposes to hide illegal videos. These apps are one of the apps registered on Google Play. This paper proposes a methodology for extracting feature points through XML-based keyword frequency analysis to explore Vault apps used by criminals, and text mining techniques are applied to extract feature points. In this paper, XML syntax was compared and analyzed using strings.xml files included in the app for 15 hidden Vault anti-forensics apps and non-hidden Vault apps, respectively. In hidden Vault anti-forensics apps, more hidden-related words are found at a higher frequency in the first and second rounds of terminology processing. Unlike most conventional methods of static analysis of APK files from an engineering point of view, this paper is meaningful in that it approached from a humanities and sociological point of view to find a feature of classifying anti-forensics apps. In conclusion, applying text mining techniques through XML parsing can be used as basic data for exploring hidden Vault anti-forensics apps.

A Study on Deep Learning Model for Discrimination of Illegal Financial Advertisements on the Internet

  • Kil-Sang Yoo; Jin-Hee Jang;Seong-Ju Kim;Kwang-Yong Gim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.8
    • /
    • pp.21-30
    • /
    • 2023
  • The study proposes a model that utilizes Python-based deep learning text classification techniques to detect the legality of illegal financial advertising posts on the internet. These posts aim to promote unlawful financial activities, including the trading of bank accounts, credit card fraud, cashing out through mobile payments, and the sale of personal credit information. Despite the efforts of financial regulatory authorities, the prevalence of illegal financial activities persists. By applying this proposed model, the intention is to aid in identifying and detecting illicit content in internet-based illegal financial advertisining, thus contributing to the ongoing efforts to combat such activities. The study utilizes convolutional neural networks(CNN) and recurrent neural networks(RNN, LSTM, GRU), which are commonly used text classification techniques. The raw data for the model is based on manually confirmed regulatory judgments. By adjusting the hyperparameters of the Korean natural language processing and deep learning models, the study has achieved an optimized model with the best performance. This research holds significant meaning as it presents a deep learning model for discerning internet illegal financial advertising, which has not been previously explored. Additionally, with an accuracy range of 91.3% to 93.4% in a deep learning model, there is a hopeful anticipation for the practical application of this model in the task of detecting illicit financial advertisements, ultimately contributing to the eradication of such unlawful financial advertisements.

Design and Implementation of a Web Application Firewall with Multi-layered Web Filter (다중 계층 웹 필터를 사용하는 웹 애플리케이션 방화벽의 설계 및 구현)

  • Jang, Sung-Min;Won, Yoo-Hun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.12
    • /
    • pp.157-167
    • /
    • 2009
  • Recently, the leakage of confidential information and personal information is taking place on the Internet more frequently than ever before. Most of such online security incidents are caused by attacks on vulnerabilities in web applications developed carelessly. It is impossible to detect an attack on a web application with existing firewalls and intrusion detection systems. Besides, the signature-based detection has a limited capability in detecting new threats. Therefore, many researches concerning the method to detect attacks on web applications are employing anomaly-based detection methods that use the web traffic analysis. Much research about anomaly-based detection through the normal web traffic analysis focus on three problems - the method to accurately analyze given web traffic, system performance needed for inspecting application payload of the packet required to detect attack on application layer and the maintenance and costs of lots of network security devices newly installed. The UTM(Unified Threat Management) system, a suggested solution for the problem, had a goal of resolving all of security problems at a time, but is not being widely used due to its low efficiency and high costs. Besides, the web filter that performs one of the functions of the UTM system, can not adequately detect a variety of recent sophisticated attacks on web applications. In order to resolve such problems, studies are being carried out on the web application firewall to introduce a new network security system. As such studies focus on speeding up packet processing by depending on high-priced hardware, the costs to deploy a web application firewall are rising. In addition, the current anomaly-based detection technologies that do not take into account the characteristics of the web application is causing lots of false positives and false negatives. In order to reduce false positives and false negatives, this study suggested a realtime anomaly detection method based on the analysis of the length of parameter value contained in the web client's request. In addition, it designed and suggested a WAF(Web Application Firewall) that can be applied to a low-priced system or legacy system to process application data without the help of an exclusive hardware. Furthermore, it suggested a method to resolve sluggish performance attributed to copying packets into application area for application data processing, Consequently, this study provide to deploy an effective web application firewall at a low cost at the moment when the deployment of an additional security system was considered burdened due to lots of network security systems currently used.

An Exploratory Study on the Business Failure Recovery Factors of Serial Entrepreneurs: Focusing on Small Business (연속 기업가의 사업 실패 회복요인에 관한 탐색적 연구: 소상공인을 중심으로)

  • Lee, Kyung Suk;Park, Joo Yeon;Sung, Chang Soo
    • Asia-Pacific Journal of Business Venturing and Entrepreneurship
    • /
    • v.16 no.6
    • /
    • pp.17-29
    • /
    • 2021
  • Recently, as social distancing have been raised due to the re-spread of COVID-19, the number of serial entrepreneurs who are closing their business is rapidly increasing. Learning from failure is a source of success, but business failure can result in psychological and economic losses and negative emotions of the serial entrepreneur. At this point, it is very important to find a way to recover the negative emotions caused by business failures of serial entrepreneurs. Recently, a strategic model has emerged to deal with the negative emotions of grief caused by business failures of serial entrepreneurs. This study identified the recovery factors from the grief of business failures of serial entrepreneurs and analyzed Shepherd's(2003) three areas: loss orientation, restoration orientation, and dual process. To this end, individual in-depth interviews were conducted with 12 small business serial entrepreneurs who challenged re-startup to identify the attributes of recovery factors that were not identified with quantitative data. As a result of the study, first, recovery factors were investigated in three areas: individual orientation, family orientation, and network orientation. It was found to help improve recovery in nine categories: self-esteem, persistence, personal competence, hobbies, self-confidence, family support, networks, religion, and social support. Second, recovery obstacle factors were investigated in three areas: psychological, economic, and environmental factors. Nine categories including family, health, social network, business partner, competitor, partner, fund, external environment, and government policy were found to persist negative emotions. Third, the emotional processing process for grief was investigated in three areas: loss orientation, restoration orientation, and dual process. Ten categories such as family, partner support, social member support, government support, hobbies, networks, change of business field, moving, third-party perspective, and meditation were confirmed to enhance rapid recovery in the emotional processing process for grief. The implications of this study are as follows. The process of recovering from the grief caused by business failures of serial entrepreneurs was attempted by a qualitative study. By extending the theory of Shepherd(2003), This study can be applied to help with recovery research. In addition, conceptual models and propositions for future empirical research were presented, which can be discussed in carious academic ways.