• Title/Summary/Keyword: Real time android

Search Result 200, Processing Time 0.03 seconds

A Method for Reliable Transmission of Real-Time Multimedia Data over 802.11 WLANs using Broadcast Packets (802.11 WLAN 방송 패킷을 이용한 신뢰성 있는 실시간 멀티미디어 데이터 전송 방법)

  • Kim, Se-Mi;Kim, Dong-Hyun;Kim, Jong-Deok
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.04a
    • /
    • pp.681-684
    • /
    • 2011
  • 최근 IEEE 802.11 WLAN(Wireless Local Area Network)에서 실시간 멀티미디어 서비스가 증가하고 있다. WLAN 의 패킷 전송방식은 Unicast 또는 Broadcast 방식이 있다. Unicast 방식은 재전송을 포함하여 유실율이 적으나 사용자가 증가할수록 AP 에서 필요한 무선 자원의 크기가 증가한다. 무선 자원의 크기가 증가하면 AP 부하가 증가하여 서비스 수용에 한계가 있다. Broadcast 방식은 사용자 수에 상관 없이 무선 자원의 크기가 일정하나, 패킷 유실율이 높다. 본 논문에서는 이러한 문제점을 해결하기 위해 Broadcast 와 FEC(Forward Error Correction) Erasure Code 기반 기술을 적용하는 것을 제안한다. 방송 패킷을 이용 AP 의 부하를 줄이고, Reed Solomon Erasure Code 를 적용하여 패킷 유실 복구율을 높인다. 이러한 방법을 통하여 다수의 사용자에게 안정적인 실시간 멀티미디어 방송 서비스를 제공 할 수 있다. 제안한 방법을 검증하기 위해 Android Platform 에서 FEC 적용 유무에 따른 수신율을 측정하였다. 그 결과 유실율 30%미만인 Broadcast 환경에서 96.4% 이상의 수신율을 보였다.

Design of Continuous Passive Motion Medical Device System with Range of Motion Measurement Function (관절가동범위 측정 기능을 갖는 연속수동운동 의료기기 시스템 설계)

  • Kang Won Lee;Min Soo Park;Do Woo Yu;Oh Yang;Chang Ho Lee
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.4
    • /
    • pp.87-92
    • /
    • 2023
  • As the elderly population increases, the number of patients with various joint diseases, including degenerative arthritis, is steadily increasing. CPM medical devices are needed to effectively treat degenerative arthritis that is common in the elderly population. Domestic CPM medical devices have limited functions and are highly dependent on imports for expensive imported medical devices. To solve this problem, we designed a ROM measurement function using a current sensor that is not present in existing composite joint CPM medical devices. The algorithm was designed using the fact that the force caused by joint stiffness greatly increases the current flowing through the DC motor. In addition, the need for digital healthcare in the medical field is gradually expanding as the proportion of chronically ill patients increases due to the spread of the non-face-to-face economy due to COVID-19 and the aging population. Therefore, this paper aims to improve the performance of CPM medical devices by allowing real-time confirmation of rehabilitation exercise information and operation range measurement results in accordance with digital healthcare trends through a Bluetooth application developed as an Android studio.

  • PDF

Design of an Efficient Control System for Harbor Terminal based on the Commercial Network (상용망 기반의 항만터미널 효율적인 관제시스템 설계)

  • Kim, Yong-Ho;Ju, YoungKwan;Mun, Hyung-Jin
    • Journal of Industrial Convergence
    • /
    • v.16 no.1
    • /
    • pp.21-26
    • /
    • 2018
  • The Seaborne Trade Volume accounts for 97% of the total. This means that the port operation management system can improve port efficiency, reducing operating costs, and the manager who manages all operations at the port needs to check and respond quickly when delays of work and equipment support is needed. Based on the real-time location information confirmation of yard automation equipment used the existing system GPS, the real-time location information confirmation system is a GPS system of the tablet, rather than a port operation system that monitors location information for the entered information, depending on the completion of the task or the start of the task. Network configurations also reduce container processing delays by using commercial LTE services that do not have shading due to containers in the yard also reduce container processing delays. Trough introduction of smart devices using Android or IOS and container processing scheduling utilizing artificial intelligence, we will build a minimum delay system with Smart Device usage of container processing applications and optimization of container processing schedule. The adoption of smart devices and the minimization of container processing delays utilizing artificial intelligence are expected to improve the quality of port services by confirming the processing containers in real time to consumers who are container information demanders.

Smartphone Security Using Fingerprint Password (다중 지문 시퀀스를 이용한 스마트폰 보안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.3
    • /
    • pp.45-55
    • /
    • 2013
  • Thereby using smartphone and mobile device be more popular the more people utilize mobile device in many area such as education, news, financial. In January, 2007 Apple release i-phone it touch off rapid increasing in user of smartphone and it create new market and these broaden its utilization area. Smartphone use WiFi or 3G mobile radio communication network and it has a feature that can access to internet whenever and anywhere. Also using smartphone application people can search arrival time of public transportation in real time and application is used in mobile banking and stock trading. Computer's function is replaced by smartphone so it involves important user's information such as financial and personal pictures, videos. Present smartphone security systems are not only too simple but the unlocking methods are spreading out covertly. I-phone is secured by using combination of number and character but USA's IT magazine Engadget reveal that it is easily unlocked by using combination with some part of number pad and buttons Android operation system is using pattern system and it is known as using 9 point dot so user can utilize various variable but according to Jonathan smith professor of University of Pennsylvania Android security system is easily unlocked by tracing fingerprint which remains on the smartphone screen. So both of Android and I-phone OS are vulnerable at security threat. Compared with problem of password and pattern finger recognition has advantage in security and possibility of loss. The reason why current using finger recognition smart phone, and device are not so popular is that there are many problem: not providing reasonable price, breaching human rights. In addition, finger recognition sensor is not providing reasonable price to customers but through continuous development of the smartphone and device, it will be more miniaturized and its price will fall. So once utilization of finger recognition is actively used in smartphone and if its utilization area broaden to financial transaction. Utilization of biometrics in smart device will be debated briskly. So in this thesis we will propose fingerprint numbering system which is combined fingerprint and password to fortify existing fingerprint recognition. Consisted by 4 number of password has this kind of problem so we will replace existing 4number password and pattern system and consolidate with fingerprint recognition and password reinforce security. In original fingerprint recognition system there is only 10 numbers of cases but if numbering to fingerprint we can consist of a password as a new method. Using proposed method user enter fingerprint as invested number to the finger. So attacker will have difficulty to collect all kind of fingerprint to forge and infer user's password. After fingerprint numbering, system can use the method of recognization of entering several fingerprint at the same time or enter fingerprint in regular sequence. In this thesis we adapt entering fingerprint in regular sequence and if in this system allow duplication when entering fingerprint. In case of allowing duplication a number of possible combinations is $\sum_{I=1}^{10}\;{_{10}P_i}$ and its total cases of number is 9,864,100. So by this method user retain security the other hand attacker will have a number of difficulties to conjecture and it is needed to obtain user's fingerprint thus this system will enhance user's security. This system is method not accept only one fingerprint but accept multiple finger in regular sequence. In this thesis we introduce the method in the environment of smartphone by using multiple numbered fingerprint enter to authorize user. Present smartphone authorization using pattern and password and fingerprint are exposed to high risk so if proposed system overcome delay time when user enter their finger to recognition device and relate to other biometric method it will have more concrete security. The problem should be solved after this research is reducing fingerprint's numbering time and hardware development should be preceded. If in the future using fingerprint public certification becomes popular. The fingerprint recognition in the smartphone will become important security issue so this thesis will utilize to fortify fingerprint recognition research.

Mobile Volume Rendering System for Client-Server Environment (클라이언트 서버 기반 모바일 볼륨 가시화 시스템)

  • Lee, Woongkyu;Kye, Heewon
    • Journal of the Korea Computer Graphics Society
    • /
    • v.21 no.3
    • /
    • pp.17-26
    • /
    • 2015
  • In this paper, we explain a volume rendering system for client-server environment. A single GPU-equipped PC works as a server which is based on the ideas that only a few concurrent users use a volume rendering system in a small hospital. As the clients, we used Android mobile devices such as smart phones. User events are transformed to rendering requests by the client application. When the server receives a rendering request, it renders the volume using the GPU. The rendered image is compressed to JPEG or PNG format so that we can save network bandwidth and reduce transfer time. In addition, we perform an event pruning method while a user is dragging the touch to enhance latency. The server compensates the pruning by interpolating the touch positions. As the result, real-time volume rendering is possible for 5 concurrent users on single GPU-equipped commodity hardware.

Malware Detection Using Deep Recurrent Neural Networks with no Random Initialization

  • Amir Namavar Jahromi;Sattar Hashemi
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.8
    • /
    • pp.177-189
    • /
    • 2023
  • Malware detection is an increasingly important operational focus in cyber security, particularly given the fast pace of such threats (e.g., new malware variants introduced every day). There has been great interest in exploring the use of machine learning techniques in automating and enhancing the effectiveness of malware detection and analysis. In this paper, we present a deep recurrent neural network solution as a stacked Long Short-Term Memory (LSTM) with a pre-training as a regularization method to avoid random network initialization. In our proposal, we use global and short dependencies of the inputs. With pre-training, we avoid random initialization and are able to improve the accuracy and robustness of malware threat hunting. The proposed method speeds up the convergence (in comparison to stacked LSTM) by reducing the length of malware OpCode or bytecode sequences. Hence, the complexity of our final method is reduced. This leads to better accuracy, higher Mattews Correlation Coefficients (MCC), and Area Under the Curve (AUC) in comparison to a standard LSTM with similar detection time. Our proposed method can be applied in real-time malware threat hunting, particularly for safety critical systems such as eHealth or Internet of Military of Things where poor convergence of the model could lead to catastrophic consequences. We evaluate the effectiveness of our proposed method on Windows, Ransomware, Internet of Things (IoT), and Android malware datasets using both static and dynamic analysis. For the IoT malware detection, we also present a comparative summary of the performance on an IoT-specific dataset of our proposed method and the standard stacked LSTM method. More specifically, of our proposed method achieves an accuracy of 99.1% in detecting IoT malware samples, with AUC of 0.985, and MCC of 0.95; thus, outperforming standard LSTM based methods in these key metrics.

Design and Implementation of Safe-Guard for Elementary School Students (초등학생 안전도우미 설계 및 구현)

  • Kim, Jin-Mook;Moon, Jeong-Kyung
    • Journal of the Korea Convergence Society
    • /
    • v.4 no.2
    • /
    • pp.29-33
    • /
    • 2013
  • From one elementary school of last 2005 Pusan was started "the school police" system is being applied the effect in the elementary school of the human nature receiving entire country. But "with school police system " have a limit about manpower that is insufficient. So we try to make "Baumter-Gikimy " that is extended scollo police in seoul. Despite being like that at 2010 and 2011 cannot forget the elementary student suicide events which are shocking or sexual assault events occur from the campus.From elementary school 4 grade the students between junior high school 1 grade crime occurrence ratio are highest. These people the group leaving out mainly, suicide, with group violence and sexual assault problem gets up same problems. In order to solve like this problems stands the countermeasure of the dimension which is national certainly is necessary. But so far only the damage student and the parents have an interest in about like this problems and they hurt. We the smart phone of Android bases it will be able to solve like this problem points [ayp] from under planning and development boil the elementary student safe helper it will can use. When it uses the elementary student safe helper system which we propose before the accident occurs, it will grasp the state information of the student and it will be able to prevent an accident in advance. We will try to more efficient safe guard to elementary school student by real-time monitoring skill soon.

Embedded Multi-LED Display System based on Wireless Internet using Otsu Algorithm (오츠 알고리즘을 활용한 무선인터넷 기반 임베디드 다중 LED 전광판 시스템)

  • Jang, Ho-Min;Kim, Eui-Ryong;Oh, Se-Chun;Kim, Sin-Ryeong;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.6
    • /
    • pp.329-336
    • /
    • 2016
  • In the outdoor advertising and industrial sites, are trying to implement the LED electric bulletin board system that is based on image processing in order to express a variety of intention in real time. Recently, in various field, rather than simple text representation, the importance of intuitive communication using images is increasing. Thus, instead of outputting the simple input information for communication, a system that can output a real-time information being sought. Therefore, the system is directed to overcoming by converting the problem of mapping an image on a variety of conventional LED display that can not be output images, the possible image output formats. Using an LED of low power, it has developed to output the efficient messages and images within a limited resources. This paper provides a system capable of managing the LED display on the wireless network. Atmega2560, Wi-Fi module, using the server and Android applications client, rather than printing a text only, it is a system to reduce the load generated image output character output in to the conversion process as can be managed by the server.

The Analysis of the Characteristic Types of Fashion Brand Application - Concentrating on Korean Application cases - (패션 브랜드 어플리케이션의 특징적 유형 분석 - 한국 계정 어플리케이션 사례를 중심으로 -)

  • Park, Min-A;Ko, Hyun-Zin
    • Journal of the Korean Society of Costume
    • /
    • v.64 no.1
    • /
    • pp.136-151
    • /
    • 2014
  • This study systematically analyzed types of fashion brand application focusing on accounts created in Korea. While referring to 'Chanel' which has developed a fashion brand app for the first time in August of 2008, not only for App store by Apple Inc. of the greatest market share but also for Android market, the one and only competitor of App store, the study examined cases of fashion brand app in Korea and foreign countries which have been in service till August of 2013 since the year of 2008. To achieve the research goal, the study conducted a literature research and a case review, categorizing the app by their distinctive functions which were Basic Information, SNS, AR, LBS, Entertainment, Mobile Shopping and Live Streaming. As for the first function, Basic Information, it was considered to provide information on a brand such as prices, sizes and colors of products which should be the most fundamental function of a fashion brand. The function would include look book, catalogues, photographs and others of products, helping users of the app with their understanding on images and concepts of the brand. Second, SNS function was considered useful for its mobility and communication and with the help of theirs, the users share fashion information with each other. Third, AR function as in a filed of virtual reality would edit virtual objects to look real in an actual environment. This would eventually offer the users a chance to try for clothes virtually. The fourth function, LBS, would work with GPS to find a store closest from a present location. This would be a help when the users try to find stores holding promotion events or trails while hiking in mountains. The fifth Entertainment function would include all sorts of games and chances for the users to listen to music and keep fashion diaries. The sixth function, Mobile Shopping, would help the users purchase items online via the app as they would not visit a store in person. The seventh function, Live Streaming, would give the users chances to actually see fashion collections in real time, held all over the world in every season. Because of this function, not only fashion experts but also regular people have become able to enjoy the fashion shows. The distinctive characteristics of the fashion brand application discussed in the study will be a useful reference when any relevant fields try to design other new fashion brand application.

Smart Portable Navigation System Development and Implementation of 1:N Service for Visually impaired Persons (시각 장애인을 위한 Smart Portable Navigation System 개발과 1:N 서비스 구현)

  • Byun, Jae-Ryoung;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.191-193
    • /
    • 2012
  • the existing developed route guidance services for the visually impaired aids for using RFID tags attached to the cane, the extent to which the cover blocks and RF communication was a simple walking guide service. It has a detection range of RFID readers in short, clear obstacles to location, size and shape can not be determined. And the risk of escape routes in case of questions or directions Measures are urgently needed. Today, due to the Smart Device Development convenience to users and offers many benefits. And the Android platform, Client and Server (PC) between the socket stream, using real-time video and voice information, location information by sending a dangerous situation for the visually impaired to take immediate action on the system and 1: N is to implement the service.

  • PDF