• Title/Summary/Keyword: Software Implementation

Search Result 2,897, Processing Time 0.031 seconds

Design and implementation of unmanned payment and inventory management systems using RFID technology (RFID 기술을 이용한 무인 결제 및 재고 관리 시스템 설계 및 구현)

  • Jang, Eun-Gyeom;Kang, Eun-Bi;Jung, Gun-Young;Jung, Jee-Hwan;Lee, Tae-Hyun
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.515-516
    • /
    • 2021
  • 본 논문은 대형 매장 및 편의점 등과 같은 상품의 구매와 판매가 이루어지는 시스템에서 RFID를 활용하여 무인 결제 서비스를 지원한다. 제안 기술은 사용자가 결제처리, 재고관리 기능을 갖는다. 결재 시스템은 상품 결재와 동시에 재고 관리가 가능하도록 설계하였다. 소비자의 입장에서는 편리하고 쾌적한 스마트 쇼핑 환경을 제공 받을 수 있고, 판매자 입장에서는 인건비 절감효과, 재고관리에 효율성과 편의성을 제공한다.

  • PDF

Implementation of facemask wearing identification and body temperature measurement system using deep learning (딥러닝 알고리즘을 활용한 마스크 착용 판별 및 체온 측정 시스템 구현)

  • Bang, Min-Ki;Kim, Do-Yeon;Choi, Da-Young;Lee, Jun-Beom;Jung, Young-Seok
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2021.07a
    • /
    • pp.523-524
    • /
    • 2021
  • COVID-19 확산으로 인해 우리나라는 공공장소 출입 시 마스크 착용이 의무화되었고, 체온이 37.5℃ 이상일 경우 발열로 간주하여 출입을 금지함에 따라 이를 효율적으로 검사할 수 있는 자동화 시스템을 개발하고자 한다. 이를 위해 다양한 각도, 마스크의 착용 위치에 따른 자료를 수집하여 모델에 적용하였고, 실시간 영상은 96.5%의 높은 정확도를 보였고, 영상 처리 추론 속도는 28fps임을 확인했다. 본 논문은 딥러닝 알고리즘을 활용한 마스크 착용 판별 및 체온 측정 시스템을 제시한다.

  • PDF

Design and Implementation of the UCC Site (UCC 사이트 설계 및 구현)

  • Jung, Taeil;Lee, Chungho;Yook, Sangman;Kye, Jusung;Kim, Woosaeng
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.497-500
    • /
    • 2007
  • UCC는 'User Created Contents'의 약자로 사용자들에 의해 만들어진 컨텐츠를 의미한다. 핸드폰과 디지털카메라의 대중화와 동영상 제작 툴 발전 등 미디어 제작 환경이 향상됨에 따라 다양하고 많은 수의 UCC가 제작되게 되었다. 이에 따라 UCC 관련 서비스를 제공하는 업체들도 생겨나게 되었다. 본 논문에서는 FFmpeg 라이브러리를 이용하여 동영상 파일을 FLV 파일형식으로 변환하는 인코딩 기술과 사용자들이 쉽게 접근할 수 있는 웹사이트와 결합하여 UCC 사이트를 설계하고 구현하였다.

A Software Engineering Process for Safety-critical Software Application (Safety-critical 소프트웨어 적용을 위한 소프트웨어 개발 절차)

  • Kang, Byung-Heon;Kim, Hang-Bae;Chang, Hoon-Seon;Jeon, Jong-Sun;Park, Suk-Joon
    • Nuclear Engineering and Technology
    • /
    • v.27 no.1
    • /
    • pp.84-95
    • /
    • 1995
  • Application of computer software to safety-critical systems is on the increase. To be successful, the software must be designed and constructed to meet the functional and performance requirements of the system. For safety reason, the software must be demonstrated not only to meet these requirements, but also to operate safely as a component within the system. For longer-term cost consideration, the software must be designed and structured to ease future maintenance and modifications. This paper present a software engineering process for the production of safety-critical software for a nuclear power plant The presentation is expository in nature of a viable high quality safety-critical software development. It is based on the ideas of a rational design process and on the experience of the adaptation of such process in the production of the safety-critical software for the Shutdown System Number Two of Wolsong 2, 3 & 4 nuclear power generation plants. This process is significantly different from a conventional process in terms of rigorous software development phases and software design techniques. The process covers documentation, design, verification and testing using mathematically precise notations and highly reviewable tabular format to specify software requirements and software design. These specifications allow rigorous, stepwise verification of software design against software requirements, and code against software design using static analysis. The software engineering process described in this paper applies the principle of information-hiding decomposition in software design using a modular design technique so that when a change is' required or an error is detected, the affected scope can be readily and confidently located. It also facilitates a sense of high degree of confidence in the ‘correctness’ of the software production, and provides a relatively simple and straightforward code implementation effort.

  • PDF

A Fast SIFT Implementation Based on Integer Gaussian and Reconfigurable Processor

  • Su, Le Tran;Lee, Jong Soo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.2 no.3
    • /
    • pp.39-52
    • /
    • 2009
  • Scale Invariant Feature Transform (SIFT) is an effective algorithm in object recognition, panorama stitching, and image matching, however, due to its complexity, real time processing is difficult to achieve with software approaches. This paper proposes using a reconfigurable hardware processor with integer half kernel. The integer half kernel Gaussian reduces the Gaussian pyramid complexity in about half [] and the reconfigurable processor carries out a parallel implementation of a full search Fast SIFT algorithm. We use a low memory, fine grain single instruction stream multiple data stream (SIMD) pixel processor that is currently being developed. This implementation fully exposes the available parallelism of the SIFT algorithm process and exploits the processing and I/O capabilities of the processor which results in a system that can perform real time image and video compression. We apply this novel implementation to images and measure the effectiveness. Experimental simulation results indicate that the proposed implementation is capable of real time applications.

  • PDF

Efficient Implementation Method Of Depth Image Segmentation In SoC System (SoC 시스템에서의 깊이 영상 분할을 위한 효율적인 설계 구성 방법)

  • Sung, Jimok;Kim, Bongsung;Kang, Bongsoon
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.2
    • /
    • pp.122-127
    • /
    • 2016
  • This paper propose implementation method of SoC system for efficient depth image segmentation. SoC systems are combined platform in the form of the Software and Hardware IP. In order to perform effectively, the user to determine the operation of the configuration of each part. In this paper, we implemented a segmentation of depth images taken by the infrared sensor at APU of SoC system. The proposed method efficiently implements high performance and low power in SoC system. Proposed method that using software parts of SoC system is capable to use at several depth image processing systems.

CRC8 Implementation using Direct Table Algorithm (테이블 기반 알고리즘을 이용한 CRC8의 구현)

  • Seo, Seok-Bae;Kim, Young-Sun;Park, Jong-Euk;Kong, Jong-Phil;Yong, Sang-Soon;Lee, Seung-Hoon
    • Aerospace Engineering and Technology
    • /
    • v.13 no.2
    • /
    • pp.38-46
    • /
    • 2014
  • CRC (Cyclic Redundancy Codes) is a error detection method for the date transmission, which is applied to the GRDDP (GOES-R Reliable Data Delivery Protocol) between satellite and GEMS (Geostationary Environmental Monitoring Sensor) on the GEO-KOMPSAT 2B development. This paper introduces a principle of the table based CRC, and explains software implementation results of the CRC8 applied to GEMS.

The Design and Implementation of Implicit Object Classes for Geometric Modeling System (형상 모델링을 위한 음함수 객체의 설계 및 구현)

  • Park, Sang-Kun;Chung, Seong-Youb
    • Korean Journal of Computational Design and Engineering
    • /
    • v.13 no.3
    • /
    • pp.187-199
    • /
    • 2008
  • This paper describes a C++ class hierarchy of implicit objects for geometry modeling and processing. This class structure provides a software kernel for integrating many various models and methods found in current implicit modeling areas. The software kernel includes primitive objects playing a role of unit element in creating a complex shape, and operator objects used to construct more complex shape of implicit object formed with the primitive objects and other operators. In this paper, class descriptions of these objects are provided to better understand the details of the algorithm or implementation, and its instance examples to show the capabilities of the object classes for constructive shape geometry. In addition, solid modeling system shown as an application example demonstrates that the proposed implicit object classes allow us to carry out modern solid modeling techniques, which means they have the capabilities to extend to various applications.

A D2D communication architecture under full control using SDN

  • Ngo, Thanh-Hai;Kim, Younghan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.8
    • /
    • pp.3435-3454
    • /
    • 2016
  • Device-to-device (D2D) communication is a potential solution to the incessant increase in data traffic on cellular networks. The greatest problem is how to control the interference between D2D users and cellular mobile users, and between D2D users themselves. This paper proposes a solution for this issue by putting the full control privilege in cellular network using the software-defined networking (SDN) concept. A software virtual switch called Open vSwitch and several components are integrated into mobile devices for data forwarding and radio resource mapping, whereas the control functions are executed in the cellular network via a SDN controller. This allows the network to assign radio resources for D2D communication directly, thus reducing interference. This solution also brings out many benefits, including resource efficiency, energy saving, topology flexibility, etc. The advantages and disadvantages of this architecture are analyzed by both a mathematical method and a simple implementation. The result shows that implementation of this solution in the next generation of cellular networks is feasible.

Hardware Design of 352-bit Cipher Algorithm (352-비트 암호 알고리즘의 하드웨어 설계)

  • Park, Young Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.5 no.1
    • /
    • pp.51-61
    • /
    • 2009
  • Conventional DES has been not only shown to have a vulnerable drawback to attack method called 'Meet in the Middle', but also to be hard to use that it is because software implementation has a number of problem in real time processing. This paper describes the design and implementation of the expanded DES algorithm using VHDL for resolving the above problems. The main reason for hardware design of an encryption algorithm is to ensure a security against cryptographic attack because there is no physical protection for the algorithm written in software. Total key length of 352 bits is used for the proposed DES. The result of simulation shows that the inputted plaintext in cryptosystem are equal to the outputted that in decryptosystem.