• Title/Summary/Keyword: Software component

Search Result 1,215, Processing Time 0.029 seconds

Geometrical Feature-Based Detection of Pure Facial Regions (기하학적 특징에 기반한 순수 얼굴영역 검출기법)

  • 이대호;박영태
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.7_8
    • /
    • pp.773-779
    • /
    • 2003
  • Locating exact position of facial components is a key preprocessing for realizing highly accurate and reliable face recognition schemes. In this paper, we propose a simple but powerful method for detecting isolated facial components such as eyebrows, eyes, and a mouth, which are horizontally oriented and have relatively dark gray levels. The method is based on the shape-resolving locally optimum thresholding that may guarantee isolated detection of each component. We show that pure facial regions can be determined by grouping facial features satisfying simple geometric constraints on unique facial structure. In the test for over 1000 images in the AR -face database, pure facial regions were detected correctly for each face image without wearing glasses. Very few errors occurred in the face images wearing glasses with a thick frame because of the occluded eyebrow -pairs. The proposed scheme may be best suited for the later stage of classification using either the mappings or a template matching, because of its capability of handling rotational and translational variations.

A Study on the VoIP Security Countermeasure of SIP-based (SIP(Session Initiation Protocol) 기반의 VoIP 보안 대책 연구)

  • Tae, Jang-Won;Kwak, Jin-Suk
    • Journal of Advanced Navigation Technology
    • /
    • v.17 no.4
    • /
    • pp.421-428
    • /
    • 2013
  • Voice over IP refers to technology that enables routing of voice conversations over the Internet or a TCP/IP network. VoIP communication costs cheaper than traditional analog phone. Phone calls can be made to anywhere / anyone: Both to VoIP numbers as well as people with normal phone numbers. VoIP protocol equipment available today follows the SIP standard. Older VoIP equipment though would follow H 323, MGCP, Megaco/H.248. A SIP server is the main component of an IP PBX, dealing with the setup of all SIP calls in the TCP/IP network. A SIP server is also referred to a Asterisk IP-PBX. A VoIP telephone, also known as a SIP phone or a softphone, allows the user to make phone calls to any softphone, mobile or PC by using App store. A VoIP telephone can be a simple software-based softphone. However, the SIP Server and the program is vulnerable to VoIP attacks. In this paper, eavesdropping attacks tested by using the Asterisk SIP server. Eavesdropping attacks and TLS security methods apply to VoIP system. TLS can be applied to determine whether the eavesdropping available for VoIP Environments.

Flight Range and Time Analysis for Classification of eVTOL PAV (eVTOL PAV 유형별 항속거리 및 항속시간 분석)

  • Lee, Bong-Sul;Yun, Ju-Yeol;Hwang, Ho-Yon
    • Journal of Advanced Navigation Technology
    • /
    • v.24 no.2
    • /
    • pp.73-84
    • /
    • 2020
  • To overcome ground congestions due to growing number of cars, a lot of companies have proposed personal aerial vehicle (PAV). Among PAV, electric vertical take-off and landing (eVTOL) aircrafts capable of vertical take-off and landing with electric power are drawing attention, and their configurations vary from multicopters to tilt ducted fans. This study tries to analyze the characteristics of each eVTOL design configurations. Parasite drag was calculated using component build up method for Vahana, Aurora, Volocopter representing each eVTOL PAV type of tilt-wing, compound, and multicopter. Wetted area and induced drag was calculated using OpenVSP and XFLR5 that are aircraft design and aerodynamic analysis software. The batteries used in the eVTOL PAV was assumed as Tesla 2170 batteries and flight ranges were calculated. Also, energy consumption and maximum flight time for the given mission profile including take-off and landing, cruising segments were compared for each eVTOL.

MVC Architecture-aware Restructuring of Web Apps (MVC 아키텍처 인지하는 웹 앱 재구조화)

  • Oh, Jaewon;Ahn, Woo Hyun;Kim, Taegong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2153-2166
    • /
    • 2017
  • Web apps have a problem that they cause same data to be repetitively retrieved, processed, and displayed when web browsers load different web pages. To resolve the problem, this paper presents and evaluates a new method for restructuring of Java web apps. This approach dynamically analyzes Java web apps from the MVC (Model-View-Controller) architecture point of view and identifies redundant data by using the composite view pattern. Then the input apps are restructured in order not to load the redundant data when users make requests for new pages. This restructuring generates new web apps that conform to the MVC architecture and improve the performance of input web apps. The experimental results showed that when compared to legacy web apps, the restructured apps' response time was reduced on desktop PCs and mobile devices by 38% and 55%, respectively. In addition, case studies using open-source web apps showed the applicability of the proposed approach.

Recognition of License Plates Using a Hybrid Statistical Feature Model and Neural Networks (하이브리드 통계적 특징 모델과 신경망을 이용한 자동차 번호판 인식)

  • Lew, Sheen;Jeong, Byeong-Jun;Kang, Hyun-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.12
    • /
    • pp.1016-1023
    • /
    • 2009
  • A license plate recognition system consists of image processing in which characters and features are extracted, and pattern recognition in which extracted characters are classified. Feature extraction plays an important role in not only the level of data reduction but also performance of recognition. Thus, in this paper, we focused on the recognition of numeral characters especially on the feature extraction of numeral characters which has much effect in the result of plate recognition. We suggest a hybrid statistical feature model which assures the best dispersion of input data by reassignment of clustering property of input data. And we verify the effectiveness of suggested model using multi-layer perceptron and learning vector quantization neural networks. The results show that the proposed feature extraction method preserves the information of a license plate well and also is robust and effective for even noisy and external environment.

An Application of XML Based Manufacturing Information for Forming Shop (XML을 이용한 곡면 가공 시스템의 정보 구조화에 관한 연구)

  • Ha, Kwang-Cheol;Lee, Jang-Hyun;Oh, Dae-Kyun;Shin, Jong-Gye;Ryu, Cheol-Ho
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.41 no.6
    • /
    • pp.126-133
    • /
    • 2004
  • As the automation of ship production system proliferates, it is unavoidable to move the real machinery, facility, application software, and virtual environment from the heterogeneous data environment to the integrated one. However, it is a prevailing situation that each component operates under the different environment, due to the inability of interchanging the data in a structured manner between the components. The issue is obstacles to improvement of the application system. To facilitate seamless exchange of data among the manufacturing systems, STEP, PDML, and XML has been tried by other studies. This study has investigated how XML data can be applied to exchange the data among the ship production system components. XML data is applied to the forming shop in shipyard to overcome the present difficulties on sharing and exchanging of the information. An example of forming information is represented by XML to demonstrate the feasibility of the proposed approach. In addition, an application of XML information applicable to virtual factory and electronic work order sheet is included.

Conjunctive Management Considering Stream-Aquifer Systems for Drought Season (지표수 지하수 연계운영에 의한 갈수기 지표수-수자원관리)

  • Cha, Kee-Uk;Kim, Woo-Gu;Shin, Young-Rho
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2008.05a
    • /
    • pp.389-394
    • /
    • 2008
  • The purpose of this research was to develop a methodology to determine whether conjunctive surface water and groundwater management could significantly reduce deficits in a river basin with a relatively limited alluvial aquifer. The Geum River basin is one of major river basins in South Korea. The upper region of the Geum River basin is typical of many river basins in Korea where the shape of river basin is narrow with small alluvial aquifer depths from 10m to 20m and where most of the groundwater pumped comes quickly from the steamflow. The basin has two surface reservoirs, Daecheong and Yongdam. The most recent reservoir, Yongdam, provides water to a trans-basin diversion, and therefore reduces the water resources available in the Geum River basin. After the completion of Yongdam reservoir, the reduced water supply in the Geum basin resulted in increasing conflicts between downstream water needs and required instream flows, particularly during the low flow season. Historically, the operation of groundwater pumping has had limited control and is administered separately from surface water diversions. Given the limited size of the alluvial aquifer, it is apparent that groundwater pumping is essentially taking its water from the stream. Therefore, the operation of the surface water withdrawals and groundwater pumping must be considered together. The major component of the conjunction water management in this study is a goal-programmin g based optimization model that simultaneously considers surface water withdrawals, groundwater pumping and instream flow requirements. A 10-day time step is used in the model. The interactions between groundwater pumping and the stream are handled through the use of response and lag coefficients. The impacts of pumping on streamflow are considered for multiple time periods. The model is formulated as a linear goal-programming problem that is solved with the commercial LINGO optimization software package.

  • PDF

A Q-methodological Study on Nursing Students' Attitudes toward Nursing Ethics

  • Yeun Eun-Ja;Kwon Young-Mi;Kim Hung-Kyu
    • Journal of Korean Academy of Nursing
    • /
    • v.34 no.8
    • /
    • pp.1434-1442
    • /
    • 2004
  • Purpose. Professional nursing ethics is a living, dynamic set of standards for nurses' professional moral behavior. Furthermore, in daily clinical nursing training, nursing students are constantly confronted with decision-making that is moral in nature. The aim of this study was to identify the perceived ethical attitudes in the clinical training process of senior nursing students using Q-methodology to offer basic strategies for nursing ethics education and thereby improve patients' care. Methods. Q-methodology provides a scientific method for identifying perception structures that exist within certain individuals or groups. Thirty-seven participants in a university rated 38 selected Q-statements on a scale of 1-9. The collected data were analyzed using pc-QUNAL software. Results. Principal component analysis identified 3 types of ethical attitudes in nursing students in Korea. The categories were labeled Sacred-life, Science-realistic and Humane-life. Sacred-life individuals think that a life belongs to an absolute power (God), not a man, and a human life is a high and noble thing. Science-realistic individuals disagreed that allowing an induced abortion or embryo (human) duplication is unethical behavior that provokes a trend, which takes the value of a life lightly; most of them took a utilitarian position with respect to ethical decisions. Humane-life individuals exhibit a tendency toward human-centered thought with respect to ethical attitudes. Conclusion. This study will be of interest to educators of students of nursing and hospital nursing administrators. Also, the findings may provide the basis for the development of more appropriate strategies to improve nursing ethics education programs.

Development of Intrusion Detection System for GOOSE Protocol Based on the Snort (GOOSE 프로토콜 환경에서 Snort 기반의 침입 탐지 시스템 개발)

  • Kim, Hyeong-Dong;Kim, Ki-Hyun;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.6
    • /
    • pp.1181-1190
    • /
    • 2013
  • The GOOSE(Generic Object Oriented Substation Event) is used as a network protocol to communicate between IEDs(Intelligent Electronic Devices) in international standard IEC 61850 of substation automation system. Nevertheless, the GOOSE protocol is facing many similar threats used in TCP/IP protocol due to ethernet-based operation. In this paper, we develop a IDS(Intrusion Detection System) for secure GOOSE Protocol using open software-based IDS Snort. In this IDS, two security functions for keyword search and DoS attack detection are implemented through improvement of decoding and preprocessing component modules. And we also implement the GOOSE IDS and verify its accuracy using GOOSE packet generation and communication experiment.

Logging Based System Design and Implementation of Business Transaction Management for a Distributed Network Environment (분산네트워크 환경에서의 Logging 기반 BTM 설계 및 구현)

  • Kim, Yong-Ok;Choi, Yong-Lak;Sung, Ki-Bum;Lee, Nam-Yong;Kim, Jong-Bae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.12
    • /
    • pp.976-983
    • /
    • 2013
  • The targets for the traditional IT management solutions has been mostly systems (server) and networks. Such that management system for system and network, SMS and NMS respectively, used be the IT management solutions. Now the speed of hardware improvement is faster than ever, the performance improvement scope is shifting from hardware towards software. Therefore, it is not arguable that the business success depends on the efficient and optimized application performance management. There are many different approaches are developed in the application performance management, but in this study, API-based logging system that most efficiently visualizes the correlation of call and response between Components and enables active performance management for monitoring real-time applications operation status and resolving the problems and failures quickly.