• Title/Summary/Keyword: Realtime system

Search Result 914, Processing Time 0.032 seconds

A Cell Loading Algorithm for Realtime Navigation in the Web-Based Virtual Space (웹기반 가상공간에서 실시간 네비게이션을 위한 셀 로딩 알고리즘)

  • Lee, Ki-Dong;Ha, Ju-Han
    • The KIPS Transactions:PartB
    • /
    • v.11B no.3
    • /
    • pp.337-344
    • /
    • 2004
  • Most of the virtual space constructed sufficiently realistic need a lot of memory space to navigate smoothly. And this kind of virtual space also requires real-time responsibility for the navigation as well as realism. In the off-line virtual system, real-time responsibility can be resolved by using large scale if secondary memory. In the web-based online virtual system, on the other hand, real-time responsibility is highly related to the latency time of network data communication. This induces the necessity of the algorithm for fast data loading. In this paper, we propose and verify the validity of the two methodology for cell leading algorithm. According to the results of computer simulation, the algorithm using hexagonal type cell promotes the real-time responsibility over 30% than that of the rectangular type.

Response Technique for the Vulnerability of Broadcast Intent Security in Android (안드로이드 브로드캐스트 인텐트의 보안 취약성 대응기법)

  • Lim, Jae-Wan;Ryu, Hwang-Bin;Yoon, Chang-Pyo
    • Convergence Security Journal
    • /
    • v.12 no.6
    • /
    • pp.61-67
    • /
    • 2012
  • Accordingly the number of smart-phone-based malicious codes is also increasing and their techniques for malicio us purpose are getting more clever and evolved. Among them, the malicious codes related to Android take the major portion and it can be estimated that they are based on open source so that the access to the system is easy. Intent is a technique to support the communication between application's components by transmitting message subjects in Android. Intent provides convenience to developers, but it can be utilized as security vulnerability that allows the developer with a malicious purpose to control the system as intended. The vulnerability of intent security is that personal information can be accessed using discretionally its proper function given to application and smart phone's functions can be maliciously controlled. This paper improves with the Intent security vulnerability caused by the smart phone users' discretional use of custom kernel. Lastly, it verifies the malicious behaviors in the process of installing an application and suggests a technique to watch the Intent security vulnerability in realtime after its installation.

A Study on the Application Technique of Realtime Bridge Monitoring System based on GNSS (GNSS 기반의 실시간 교량변위 모니터링 시스템 적용기술 연구)

  • Yeon, Sang-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.1
    • /
    • pp.362-369
    • /
    • 2016
  • Recently, Last to check the security status of various medium and large bridge structures using various kinds of measurement equipment, but most of the methods are used to measure and check the displacement behavior of the bridge by a certain period. In this study, receive GPS satellite signals that can be observed in real time the whole region, a bridge to automatically measure the displacement and behavior characteristics of the structure in real-time in mm over the 24 hours, the measurement information and transmits the data to the wireless network, by making use, it was applied to the real-time monitoring system in connection with a bridge to be able to automatically notify GNSS fine displacement behavior. In fact, analysis and receives the measurement data to GNSS provided in the upper bridge of the middle and large-sized aging for this purpose, measuring USN and at the same time is converted into a three-dimensional position information of a test study was conducted to monitor the bridge displacement in real time. As a result, a vertical displacement of about 0.027~0.037m at the measurement time of day of the measurement point is that the repeated and confirmed.

The Analysis of Characteristics of Swell in Korea using the Ubiquitous Measurement System (유비쿼터스 관측시스템을 이용한 국내 너울의 특성규명에 관한 연구)

  • Jang, Bok-Jin;Yeo, Woon-Kwang;Lee, Jong-Kook;Park, Kwang-Soon
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.8
    • /
    • pp.785-795
    • /
    • 2008
  • The swell is a major cause of interruption for the activity in a port and the ship navigation in coastal waters, coastal geographical changes, and the disaster with a loss of lives. However, many researches about the observation and the prediction of swells have not been conducted actively due to the difficulties to collect and synthesize the massive amount of long term field data for waves and meteorological information. In this study, the internet-based realtime monitoring system(Fieldbox) was developed to collect the wave data. The characteristics and main components of swells occurred in Korea were analyzed using wave data observed through the Fieldbox and the meteorological data collected by the KMA(Korea Meteorological Administration) and NASA(National Aeronautics and Space Administration). The characteristics of the swell generation patterns were analyzed using the monthly data of the Kwangan Tower between 2004 and 2006 to estimate the specific features such as sources and locations of swells generated in Korea.

Smart device research for the prevention of missing child (미아 방지용 스마트 디바이스 구현에 관한 연구)

  • Ahn, Jong-Chan;Kim, Young-Kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.437-440
    • /
    • 2007
  • Recently embedded system developed a lot. Physically, embedded systems range from portable devices such as digital watches and MP3 players, to large stationary installations like traffic lights, factory controllers, or the systems controlling nuclear power plants. This paper focuses on implementation of portable device which is applicable to the child-kidnap or missing child prevention system in residential area or public area. To be specific, this device is to transmit video data which comes from the camera in the device into the host PC via WLAN. Embedded hardware platform consists of s3c2440 with ARM9 core, WindowsCE OS and other sensors. OS enables the platform to do multitasking jobs which are handling GPS data, taking video, capturing audio via microphone in the device and transfer all kind of realtime data to the host PC.

  • PDF

Hardware Design of Bilateral Filter Based on Window Division (윈도우 분할 기반 양방향 필터의 하드웨어 설계)

  • Hyun, Yongho;Park, Taegeun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.12
    • /
    • pp.1844-1850
    • /
    • 2016
  • The bilateral filter can reduce the noise while preserving details computing the filtering output at each pixels as the average of neighboring pixels. In this paper, we propose a real-time system based on window division. Overall performance is increased due to the parallel architectures which computes five rows in the kernel window simultaneously but with pipelined scheduling. We consider the tradeoff between the filter performance and the hardware cost and the bit allocation has been determined by PSNR analysis. The proposed architecture is designed with verilogHDL and synthesized using Dongbu Hitek 110nm standard cell library. The proposed architecture shows 416Mpixels/s (397fps) of throughput at 416MHz of operating frequency with 132K gates.

Face Classification Using Cascade Facial Detection and Convolutional Neural Network (Cascade 안면 검출기와 컨볼루셔널 신경망을 이용한 얼굴 분류)

  • Yu, Je-Hun;Sim, Kwee-Bo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.1
    • /
    • pp.70-75
    • /
    • 2016
  • Nowadays, there are many research for recognizing face of people using the machine vision. the machine vision is classification and analysis technology using machine that has sight such as human eyes. In this paper, we propose algorithm for classifying human face using this machine vision system. This algorithm consist of Convolutional Neural Network and cascade face detector. And using this algorithm, we classified the face of subjects. For training the face classification algorithm, 2,000, 3,000, and 4,000 images of each subject are used. Training iteration of Convolutional Neural Network had 10 and 20. Then we classified the images. In this paper, about 6,000 images was classified for effectiveness. And we implement the system that can classify the face of subjects in realtime using USB camera.

Determining Method of Factors for Effective Real Time Background Modeling (효과적인 실시간 배경 모델링을 위한 환경 변수 결정 방법)

  • Lee, Jun-Cheol;Ryu, Sang-Ryul;Kang, Sung-Hwan;Kim, Sung-Ho
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.1
    • /
    • pp.59-69
    • /
    • 2007
  • In the video with a various environment, background modeling is important for extraction and recognition the moving object. For this object recognition, many methods of the background modeling are proposed in a process of preprocess. Among these there is a Kumar method which represents the Queue-based background modeling. Because this has a fixed period of updating examination of the frame, there is a limit for various system. This paper use a background modeling based on the queue. We propose the method that major parameters are decided as adaptive by background model. They are the queue size of the sliding window, the sire of grouping by the brightness of the visual and the period of updating examination of the frame. In order to determine the factors, in every process, RCO (Ratio of Correct Object), REO (Ratio of Error Object) and UR (Update Ratio) are considered to be the standard of evaluation. The proposed method can improve the existing techniques of the background modeling which is unfit for the real-time processing and recognize the object more efficient.

A Study on the Improvement of Total Cost Change Control in Private Investment Projects (민간투자시설사업에 있어 총사업비 변경관리의 개선방안 연구 - 고속도로 민간투자시설사업을 중심으로)

  • Kim Se-Jong;Kim Yong-Su
    • Proceedings of the Korean Institute Of Construction Engineering and Management
    • /
    • autumn
    • /
    • pp.119-126
    • /
    • 2001
  • This paper analyzes problems related to total cost changes in private investment projects, and then proposes an improvement measure for the control of cost changes within the framework of the project management, contract, human resource, project communication, cost, and time management. From the viewpoint of contract management, the basis of cost change ought to be cleared up with standardization of related provisions in the concession agreement, and potentiality of change ought to be excluded with prescription of the private investor's leading role from the design phase. Regarding human resource management, this paper proposes a standard work flow granting much sovereign rights to private parts by putting restriction on work scopes of the entrusted authority of government, and transferring the rights of assignment, contract, and control about the responsible supervisor to the concessionaire. With regard to project communication management the notification of changes on drawings and technical documents ought to be automated and the realtime database ought to be established with DMIS (Drawings & Documents Management Information System). From the cost management point of view, this thesis integrates the control of cost-change-approved items and disapproved items to one cost breakdown system, and then harmonizes the actual progress with EVMS in time management.

  • PDF

A 2-Tier Server Architecture for Real-time Multiple Rendering (실시간 다중 렌더링을 위한 이중 서버 구조)

  • Lim, Choong-Gyoo
    • Journal of Korea Game Society
    • /
    • v.12 no.4
    • /
    • pp.13-22
    • /
    • 2012
  • The wide-spread use of the broadband Internet service makes the cloud computing-based gaming service possible. A game program is executed on a cloud node and its live image is fed into a remote user's display device via video streaming. The user's input is immediately transmitted and applied to the game. The minimization of the time to process remote user's input and transmit the live image back to the user and thus satisfying the requirement of instant responsiveness for gaming makes it possible. However, the cost to build its servers can be very expensive to provide high quality 3D games because a general purpose graphics system that cloud nodes are likely to have for the service supports a single 3D application at a time. Thus, the server must have a technology of 'realtime multiple rendering' to execute multiple 3D games simultaneously. This paper proposes a new architecture of 2-tier servers of clouds nodes of which one group executes multiple games and the other produces game's live images. It also performs a few experimentations to prove the feasibility of the new architecture.