• Title/Summary/Keyword: Processing Route

Search Result 403, Processing Time 0.024 seconds

Smart Bus System using BLE Beacon and Computer Vision (BLE 비콘과 컴퓨터비전을 적용한 스마트 버스 시스템)

  • You, Minjung;Rhee, Eugene
    • Journal of IKEEE
    • /
    • v.22 no.2
    • /
    • pp.250-257
    • /
    • 2018
  • In this paper, a smart bus system that automates public bus traffic payment by applying beacon and computer vision and provides bus route information, real-time location information, getting off alarm is proposed. By using the beacon to recognize busses near the stop and to board the bus to be boarded, this system automatically processes the payment when boarding by using the distance from the beacon and the information provided by the beacon and the face comparison. After the payment processing, the system provides the route information of the boarded bus and the real-time bus location information to the user, and when the user sets an alarm using these informations, the alarm is activated when the bus leaves the bus stop.

E-Smart Health Information Adoption Processes: Central versus Peripheral Route

  • Koo, Chulmo;Lim, Min Kyung;Park, Keeho
    • Asia pacific journal of information systems
    • /
    • v.24 no.1
    • /
    • pp.65-91
    • /
    • 2014
  • Our study adopted ELM (Elaboration Likelihood Model) to measure the impact of central and peripheral cues on e-healthcare website behavior and its consequence on perceived loyalty of users. While most of ELM studies did not elaborate the antecedent of both central and peripheral cues, we measured the antecedents of those information processing routes to clarify how technical and quality factors (i.e. information organization, security concern, and website attractiveness) develop the nature of either central or peripheral route. We found that information organization was the main antecedent of information quality presented on the website. Second, the results revealed that website security has a positive effect on website credibility. Third, we also found that website attractiveness was positively associated with website credibility. Fourth, consistent with elaboration likelihood model, the empirical findings suggested that information quality (central cue) and website credibility (peripheral cue) were strong predictors of behavior intention to use health website. Our findings also suggested that behavior intention to use health website significantly influenced perceived loyalty.

A ZRP-based Reliable Route Discovery Scheme in Ad-Hoc Networks (애드혹 네트워크에서 ZRP를 기반으로 하는 경로 탐색 기법)

  • Kim, Kyoung-Ja;Chang, Tae-Mu
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.293-300
    • /
    • 2004
  • Ad hoc networks are groups of mobile hosts without any fixed infrastructure. Frequent changes in network topology owing to node mobility make these networks very difficult to manage. Therefore, enhancing the reliability of routing paths in ad hoc networks gets more important. In this paper, we propose a ZRP(Zone Routing Protocol)-based route discovery scheme that can not only reduce the total hops of routing path, but Improve security through authentications between two nodes. And to solve the problem in maintenance of routing paths owing to frequent changes of the network topology, we adopt a query control mechanism. The effectiveness of our scheme is shown by simulation methods.

Clue for Secure Route Optimization in Mobile IPv6 (모바일 IPv6 바인딩 업데이트의 보안 향상 기법)

  • Song, Se-Hwa;Choi, Hyoung-Kee;Kim, Jung-Yoon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.2
    • /
    • pp.153-158
    • /
    • 2010
  • Mobile IPv6 is one of method can keep Mobile node's session. To solve legacy Mobile IPv4's triangular routing problem, in Mobile IPv6, Mobile Node could directly communicate with Correspond node by Binding Update. But, attacker could interfere Return Routability Procedure that is Correspond node check Home address and Care of address reachable. At this result, Attacker is able to hijack Session to correspond node from Mobile node. In This paper, We propose new Binding Update scheme for solving that problem. Our approach is that MN gives association both home token and care of token using onewayness of keyed hash fuction. From security and performance analysis, we can see that proposed binding Update Scheme can achieve stronger security than legacy scheme and at the same time requires minimal computational overhead.

Identification of Underwater Objects using Sonar Image (소나영상을 이용한 수중 물체의 식별)

  • Kang, Hyunchul
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.3
    • /
    • pp.91-98
    • /
    • 2016
  • Detection and classification of underwater objects in sonar imagery are challenging problems. This paper proposes a system that detects and identifies underwater objects at the sea floor level using a sonar image and image processing techniques. The identification process of underwater objects consists of two steps; detection of candidate regions and identification of underwater objects. The candidate regions of underwater objects are extracted by image registration through the detection of common feature points between the reference background image and the current scanning image. And then, underwater objects are identified as the closest pattern within the database using eigenvectors and eigenvalues as features. The proposed system is expected to be used in efficient securement of Q route in vessel navigation.

Mobile Agent Based Route Search Method Using Genetic Algorithm (유전 알고리즘을 이용한 이동 에이전트 기반의 경로 탐색 기법)

  • Ji, Hong-il;Moon, Seok-hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.599-602
    • /
    • 2014
  • Proposal algorithm in this thesis introduced cells, units of router group, for distributed processing of previous genetic algorithm. This thesis presented ways to reduce search delay time of overall network through cell-based genetic algorithm. With regard to procedures of proposal algorithm, duplicated agents were transferred to the point, where the second, third, and fourth cells were created in order, after the first cell was made, and the agents were engineered to search the shortest path to each cell, and then find the most efficient element through competition.

  • PDF

Optical Properties of Spherical YAG:Ce3+ Phosphor Powders Synthesized by Atmospheric Plasma Spraying Method Appling PVA Solution Route and Domestic Aluminium Oxide Seed (PVA 용액법과 국산 산화알루미늄을 적용하여 대기 플라즈마 용사법으로 합성된 구형의 YAG:Ce3+ 형광체의 발광특성)

  • Yong-Hyeon Kim;Sang-Jin Lee
    • Journal of Powder Materials
    • /
    • v.30 no.5
    • /
    • pp.424-430
    • /
    • 2023
  • YAG phosphor powders were fabricated by the atmospheric plasma spraying method with the spray-dried spherical YAG precursor. The YAG precursor slurry for the spray drying process was prepared by the PVA solution chemical processing utilizing a domestic easy-sintered aluminum oxide (Al2O3) powder as a seed. The homogenous and viscous slurry resulted in dense granules, not hollow or porous particles. The synthesized phosphor powders demonstrated a stable YAG phase, and excellent fluorescence properties of approximately 115% compared with commercial YAG:Ce3+ powder. The microstructure of the phosphor powder had a perfect spherical shape and an average particle size of approx imately 30 ㎛. As a result of the PKG test of the YAG phosphor powder, the synthesized phosphor powders exhibited an outstanding luminous intensity, and a peak wavelength was observed at 531 nm.

High-Speed Maritime Object Detection Scheme for the Protection of the Aid to Navigation

  • Lee, Hyochan;Song, Hyunhak;Cho, Sungyoon;Kwon, Kiwon;Park, Sunghyun;Im, Taeho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.692-712
    • /
    • 2022
  • Buoys used for Aid to Navigation systems are widely used to guide the sea paths and are powered by batteries, requiring continuous battery replacement. However, since human labor is required to replace the batteries, humans can be exposed to dangerous situation, including even collision with shipping vessels. In addition, Maritime sensors are installed on the route signs, so that these are often damaged by collisions with small and medium-sized ships, resulting in significant financial loss. In order to prevent these accidents, maritime object detection technology is essential to alert ships approaching buoys. Existing studies apply a number of filters to eliminate noise and to detect objects within the sea image. For this process, most studies directly access the pixels and process the images. However, this approach typically takes a long time to process because of its complexity and the requirements of significant amounts of computational power. In an emergent situation, it is important to alarm the vessel's rapid approach to buoys in real time to avoid collisions between vessels and route signs, therefore minimizing computation and speeding up processes are critical operations. Therefore, we propose Fast Connected Component Labeling (FCCL) which can reduce computation to minimize the processing time of filter applications, while maintaining the detection performance of existing methods. The results show that the detection performance of the FCCL is close to 30 FPS - approximately 2-5 times faster, when compared to the existing methods - while the average throughput is the same as existing methods.

A Big-Data Trajectory Combination Method for Navigations using Collected Trajectory Data (수집된 경로데이터를 사용하는 내비게이션을 위한 대용량 경로조합 방법)

  • Koo, Kwang Min;Lee, Taeho;Park, Heemin
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.386-395
    • /
    • 2016
  • In trajectory-based navigation systems, a huge amount of trajectory data is needed for efficient route explorations. However, it would be very hard to collect trajectories from all the possible start and destination combinations. To provide a practical solution to this problem, we suggest a method combining collected GPS trajectories data into additional generated trajectories with new start and destination combinations without road information. We present a trajectory combination algorithm and its implementation with Scala programming language on Spark platform for big data processing. The experimental results proved that the proposed method can effectively populate the collected trajectories into valid trajectory paths more than three hundred times.

An Improved Zone-Based Routing Protocol for Heterogeneous Wireless Sensor Networks

  • Zhao, Liquan;Chen, Nan
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.500-517
    • /
    • 2017
  • In this paper, an improved zone-based routing protocol for heterogeneous wireless sensor networks is proposed. The proposed protocol has fixed the sized zone according to the distance from the base station and used a dynamic clustering technique for advanced nodes to select a cluster head with maximum residual energy to transmit the data. In addition, we select an optimal route with minimum energy consumption for normal nodes and conserve energy by state transition throughout data transmission. Simulation results indicated that the proposed protocol performed better than the other algorithm by reducing energy consumption and providing a longer network lifetime and better throughput of data packets.