• Title/Summary/Keyword: User Connection

Search Result 580, Processing Time 0.028 seconds

Design and Implementation of LED Lighting Control System Using Arduino Yun and Cloud in IoT (사물인터넷에 아두이노 윤과 클라우드를 이용한 LED 조명 제어 시스템 설계)

  • Xu, Hao;Kim, Chul-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.10
    • /
    • pp.983-988
    • /
    • 2016
  • Internet of Things Iranian people and things, things and things are connected through the Cloud. It can significantly save energy through a combination of LED lighting as a new ICT technologies and industry-to provide a human-centric, eco-friendly, and the content is embedded multifunction solutions that meet your needs, environment, implementation time according to user requirements, technology It can be systematized as converged next-generation lighting. In this paper, we have developed regarding whether the building in relation to the LED lighting control system using smart devices and Cloud-based user as a human connection through the board to the Arduino Yun lit LED lighting, wireless smart device or to the Cloud or off. After the Arduino Yun is connected to the Internet, taking the current date and time information from the Linux shell command used the way coming across the bridge (BRIDGE) its value.

Slide-show of Panoramic Image through a Secondary Device by using MPEG-4 LASeR PMSI (MPEG-4 LASeR PMSI를 활용한 Secondary Device 기반 파노라믹 영상 슬라이드 쇼 재생 기술)

  • Park, Yongchul;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.17 no.6
    • /
    • pp.1014-1028
    • /
    • 2012
  • Recently, N-screen service and secondary device have gotten an attention from public. Also, we can experience N-screen service through various digital devices. N-screen means multimedia technology which can seamlessly consume multimedia content. Secondary device means auxiliary multimedia device which can consume content related to main content through adjunct connection to main device. Not only be electronic manufactures interested in N-screen technology and services but also digital devices applied for N-screen have been released. But it has limitation that user can only consume content to be purchased from content company server not device of user. This paper proposes the system that composes effective and various N-screen multimedia service through MPEG-4 LASeR (Lightweight Application Scene Representation) PMSI (Presentation and Modification of Structured Information) as international standard technology which can provide scene description including many instruction for dynamic update of scene.

Implementation of Worksheet System for Fashion Design (패션디자인 작업지시서 작성을 위한 시스템의 구현)

  • Lee Hea-Jung;Lee Min-Kyu;Kim Young-un;Jung Sung-tae;Lee Yong-Ju;Cho Jin-Ei;Joung Suck-tea
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.4 s.32
    • /
    • pp.99-107
    • /
    • 2004
  • In a field of clothing fashion design within the country, CADs and diagraming programs are existed variously. However, Connection of producton line through the worksheet is insufficient. This research implement design and worksheet system grafted on database system. This system can be completed desige through the fashion design system and made out worksheet at the same time. Also, It is possible that designer utilize more quickly and easily find intend to use the data because this system provide retrieval function for existed data with user. A special feature of the system is easy interface(GUI) for user, support of tool for detail, utilize for stored data, printing support for off-line output, comfortable framework for record of clothes size and etc.

  • PDF

The design and implementation of Object-based bioimage matching on a Mobile Device (모바일 장치기반의 바이오 객체 이미지 매칭 시스템 설계 및 구현)

  • Park, Chanil;Moon, Seung-jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.1-10
    • /
    • 2019
  • Object-based image matching algorithms have been widely used in the image processing and computer vision fields. A variety of applications based on image matching algorithms have been recently developed for object recognition, 3D modeling, video tracking, and biomedical informatics. One prominent example of image matching features is the Scale Invariant Feature Transform (SIFT) scheme. However many applications using the SIFT algorithm have implemented based on stand-alone basis, not client-server architecture. In this paper, We initially implemented based on client-server structure by using SIFT algorithms to identify and match objects in biomedical images to provide useful information to the user based on the recently released Mobile platform. The major methodological contribution of this work is leveraging the convenient user interface and ubiquitous Internet connection on Mobile device for interactive delineation, segmentation, representation, matching and retrieval of biomedical images. With these technologies, our paper showcased examples of performing reliable image matching from different views of an object in the applications of semantic image search for biomedical informatics.

User-friendly Web-based ezSIM Platform Development for SMBs (중소·중견기업을 위한 사용자 친화형 웹 기반 ezSIM 플랫폼 개발)

  • Yoon, Tae Ho;Park, Hyungwook;Sohn, Ilyoup;Hwang, Jae Soon;Seo, Dongwoo
    • Korean Journal of Computational Design and Engineering
    • /
    • v.20 no.1
    • /
    • pp.65-74
    • /
    • 2015
  • Structure and/or fluid analysis is gradually increased by an essential design process in the small and medium-sized businesses (SMBs) because of the needs for a rapid design process and the certification about the supplement of the parts by the large business (LB). In this paper, we developed the web-based ezSIM platform installed in the resources integrated system server. The ezSIM platform is based on the heterogeneous linux and windows operating system for the user-friendly connection with the part of the analysis for the SMBs. The procedure of the structure/fluid analysis service module using the public software and the license-free open code in the ezSIM platform was explained. The convenience of the ezSIM platform service was presented by the reaction rate of the graphic motion compared with that of a local PC and the solving and pre-post processing interface compared with that of the KISTI supercomputer. The web-based ezSIM platform service was identified as a useful and essential platform to the SMBs for the usage of the structure and/or fluid analysis procedure.

A Design of Protocol for Credit Card Transaction on PDA Using ECC (타원곡선 암호를 이용한 PDA 기반의 신용카드 결제 프로토콜 설계)

  • Yu, Seong-Jin;Kim, Seong-Youl;Youn, Chun-Kyun;Chung, Il-Yong
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.1033-1040
    • /
    • 2003
  • In order to provode information services on M-Commerce, a payment solution with security function should be required. User's mobile terminals for using M-Commerce services are diversifying to cellular phone, PDA, Smart phone etc. Among them, intergration of PDA's interface and mobile connection overcomes the weak point of existing cullular phone depending on information via the internet. In this paper, the protocol for a credit card transaction on PDA using ECC is presented. Secure Card module on this protocol encrypts user's information such as private information, delivery information and credit card information and store them on PDA in order to free from inputting information whenever it is used. This scheme also offers security services on M-Commerce including authentication, confidentiality, integration, non-repudiation and so on.

A Study on Influencing Factors of Continuous Use Intention by SNS Connection Type and User Psychology (SNS 접속형태와 이용심리에 의한 지속사용의도 영향요인 연구)

  • Hong, Hee-Kyung;Choi, Jung-Il;Han, Kyeong-Seok
    • Journal of Digital Contents Society
    • /
    • v.18 no.5
    • /
    • pp.957-967
    • /
    • 2017
  • In this study, factor, is focused on user's psychology and SNS using style, of intention to use SNS continuously being affeted to who want to stop using SNS. This study utilized the foundational frame of PCM and TAM2 and indepednent variable and Mediating variable were based on previous research. I used statistical programs such as AMOS 18.0 and SPSS 18.0 to verify the practical examination of the hypothesis of this study and the questionnaire was distributed to the public and IT students who once used SNS, and made the 443 questionnaires to analyze on final except missing values and insincere responses. The result of study was that intention to use SNS continuously are affected by positive and negative psychological factors and will be helpful to provide a service plan for SNS and establish for marketing strategy.

Development of Parallel Event-Driven Remote IT Convergence (병렬 이벤트 기반 원격 IT 융합 개발)

  • Kim, Jung-Sook;Kim, Sung-Wan;Kim, Hong-Sup
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.12
    • /
    • pp.1-9
    • /
    • 2010
  • This paper describes parallel event-driven remote IT convergence applications which are a combination of traditional industry and IT Technology including advanced communication. In IT convergence system, events can occur currently from many sensors of devices or users. And IT convergence system must have a parallel processing method. In this paper, the parallel processing method was implemented using a thread and we developed a connection method between a device and a mode of communication which is a wireless communication or a power line communication. In addition to that, we developed object modeling, device, user and event modeling, based on XML (eXtensible Markup Language) using object-oriented modeling method. To efficiently show results in real time, systems provide various graphic user interfaces such as a bar graph, a table, and a combination of the two.

The Authentication Model which Utilized Tokenless OTP (Tokenless OTP를 활용한 인증 모델)

  • Kim, Ki-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.107-116
    • /
    • 2007
  • Is need Remote Access through internet for business of Ubiquitous Computing age, and apply OTP for confidentiality about inputed ID and Password, network security of integrity. Current OTP must be possessing hardware of Token, and there is limitation in security. Install a Snooping tool to OTP network in this treatise, and because using Cain, enforce ARP Cache poisoning attack and confirm limitation by Snooping about user password. Wish to propose new system that can apply Tokenless OTP by new security way, and secure confidentiality and integrity. Do test for access control inflecting Tokenless OTP at Remote Access from outside, and could worm and do interface control with certification system in hundred. Even if encounter hacking at certification process, thing that connection is impossible without pin number that only user knows confirmed. Because becoming defense about outward flow and misuse and hacking of password when apply this result Tokenless OTP, solidify security, and evaluated by security system that heighten safety.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.