• Title/Summary/Keyword: Video Software Method

Search Result 308, Processing Time 0.032 seconds

Development of NFC Mobile Application for Information on Textile Materials (패션소재 정보 전달을 위한 NFC 모바일 어플리케이션 개발)

  • Park, Sohyun;Kim, Jongjun
    • Journal of Fashion Business
    • /
    • v.20 no.1
    • /
    • pp.142-156
    • /
    • 2016
  • Convergence of IT devices and fashion is enabling the industry to take fully different approaches in various areas including product planning, fabric selecting, distributing, and marketing. At the same time, it also transforms the definition of clothing itself. Convergence of IT technologies in the realm of fashion and textiles industries can create a powerful synergy through connection digital devices, such as mobile phone. In this context, this study attempts to suggest how IT technology can be efficiently harnessed through the usage of mobile devices in the planning stage of fashion materials, where the initial production plan of a clothing item is mapped out. This study ultimately aims to enhance the effectiveness of databases on fashion material information by using mobile devices to utilize NFC, an RFID technology having as much revolutionary power as Internet - which can be the convergence between IT and fashion across the software dimensions. To pursue this research, data on fashion material information regarding 200 woven fabric specimens were provided by textile companies. The information includes elements such as its composition, weight, width, yarn, density and sales report. These pieces of information were organized into a database. Drawing on this data, Android-based applications that allow smart phones to read off fabric information from NFC tags were developed for this study using two methods. The system works as follows: 1. NFC tag stickers are attached onto the hangers where 200 fabric samples are hanging. 2. The NFC tag stickers are tagged, or read off from a smart phone that support NFC functions. 3. Upon tagging, the Smart phone swiftly displays all information available on its screen - not only the aforementioned six elements, but also the image of the clothing item from the fabric in its finalized product form, and the video of the model wearing the item - for convenient view. The method harbors immense potential for the fashion industry in general, and will also be useful in those fields inside the industry that harness NFC technology.

Splog Detection Using Post Structure Similarity and Daily Posting Count (포스트의 구조 유사성과 일일 발행수를 이용한 스플로그 탐지)

  • Beak, Jee-Hyun;Cho, Jung-Sik;Kim, Sung-Kwon
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.2
    • /
    • pp.137-147
    • /
    • 2010
  • A blog is a website, usually maintained by an individual, with regular entries of commentary, descriptions of events, or other material such as graphics or video. Entries are commonly displayed in reverse chronological order. Blog search engines, like web search engines, seek information for searchers on blogs. Blog search engines sometimes output unsatisfactory results, mainly due to spam blogs or splogs. Splogs are blogs hosting spam posts, plagiarized or auto-generated contents for the sole purpose of hosting advertizements or raising the search rankings of target sites. This thesis focuses on splog detection. This thesis proposes a new splog detection method, which is based on blog post structure similarity and posting count per day. Experiments based on methods proposed a day show excellent result on splog detection tasks with over 90% accuracy.

The Design of Motion Estimation Hardware for High-Performance HEVC Encoder (고성능 HEVC 부호기를 위한 움직임추정 하드웨어 설계)

  • Park, Seungyong;Jeon, Sunghun;Ryoo, Kwangki
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.3
    • /
    • pp.594-600
    • /
    • 2017
  • This paper proposes a global search based motion estimation algorithm for high performance HEVC encoder and its hardware architecture. To eliminate temporal redundancy, motion estimation in HEVC inter-view prediction uses global search and fast search algorithm to search for a predicted block having a high correlation with the current PU in an interpolated reference picture. The global search method predicts the motion of all candidate blocks in a given search area, thus ensuring optimal results, but has a disadvantage of large computation time. Therefore we propose a new algorithm that reduces computational complexity by reusing SAD operation in global search to reduce computation time of inter prediction. As a result of applying the proposed algorithm to standard software HM16.12, the computation time was reduced by 61%, BDBitrate by 11.81%, and BDPSNR by about 0.5% compared with the existing search algorithm. As a result of hardware design, the maximum operating frequency is 255 MHz and the total number of gates is 65.1K.

AGV Distance Learning Model Based on Virtual Simulation (가상 시뮬레이션 기반의 AGV 원격 교육 모델)

  • Jin, Go-Whan
    • Journal of the Korea Convergence Society
    • /
    • v.11 no.11
    • /
    • pp.41-46
    • /
    • 2020
  • The start of the Fourth Industrial Revolution has brought about various changes in the domestic industry in general, and smart factories have spread to companies in the fields of production, manufacturing and logistics, and they are using automation equipment. Especially in the field of logistics automation, AGVs are widely used, and most of them use the line guidance system, which is the traditional AGV drive system. In addition, the demand for AGV system developers, system operators and managers, and maintenance personnel is increasing, and the installation of systems for education is expensive and requires a large space to utilize. It is a situation where systematic education is difficult. In this paper, we propose a virtual simulation-based AGV distance education model for smooth practice of trainees. The proposed model consisted of a model that can drive the AGV by analyzing video information, instead of the line guidance method that is the conventional technology. As a result of self-diagnosis evaluation, it was confirmed that the experimental group through online education had an average satisfaction level of 0.65 higher than the control group using existing equipment, and that it could be used in an online education environment.

CPS(Cyber Physical System) & Research Opportunities for MIS (CPS(Cyber Physical System)와 MIS의 연구기회 탐색)

  • Choi, Moo-Jin;Park, Jong-Pil
    • The Journal of Information Systems
    • /
    • v.26 no.4
    • /
    • pp.63-85
    • /
    • 2017
  • Purpose Recently, much attention in building smart factory has dramatically increased with an emergence of the Industry 4.0. As we noted a connectivity gap between main concerns of MIS and the automated manufacturing systems such as POP and MES, it is recommended that CPS (Cyber-Physical System) can be an important building block for the smart factory and enrich the depth of MIS knowledge. Therefore, first, this study attempted to identify the connectivity gap between the traditional field of MIS (ERP, SCM, CRM, etc.) and the automated manufacturing systems, and then recommended CPS as a technical bridge to fill the gap. Secondly, we studied concepts and research trend of CPS that is believed to be a virtual mechanism to manage manufacturing systems in an integrated manner. Finally, we suggested research and educational opportunities in MIS based on the CPS perspectives. Design/methodology/approach Since this paper introduced relatively new idea of CPS originally discussed in the field of engineering, traditional MIS research method such as survey and experiment may not fit well. Therefore this research collected technical cases through literature survey in engineering fields, video clips from Youtube, and field references from various ICT Exhibitions and Conventions. Then we analyzed and reorganized them to highlight the necessity of CPS and draw some insight to share with MIS academia. Findings This paper introduced CPS to bridge the connectivity gap between the traditional MIS and automated manufacturing system (smart factory), a concern far away from the MIS academia. Further, this paper suggested future research subjects of MIS such as developing software to share big production data and systems to support manufacturing decisions, and innovating MIS curricula including smart and intelligent manufacturing technology within the context of traditional enterprise systems.

Laser Thermal Processing System for Creation of Low Temperature Polycrystalline Silicon using High Power DPSS Laser and Excimer Laser

  • Kim, Doh-Hoon;Kim, Dae-Jin
    • 한국정보디스플레이학회:학술대회논문집
    • /
    • 2006.08a
    • /
    • pp.647-650
    • /
    • 2006
  • Low temperature polycrystalline silicon (LTPS) technology using a high power laser have been widely applied to thin film transistors (TFTs) for liquid crystal, organic light emitting diode (OLED) display, driver circuit for system on glass (SOG) and static random access memory (SRAM). Recently, the semiconductor industry is continuing its quest to create even more powerful CPU and memory chips. This requires increasing of individual device speed through the continual reduction of the minimum size of device features and increasing of device density on the chip. Moreover, the flat panel display industry also need to be brighter, with richer more vivid color, wider viewing angle, have faster video capability and be more durable at lower cost. Kornic Systems Co., Ltd. developed the $KORONA^{TM}$ LTP/GLTP series - an innovative production tool for fabricating flat panel displays and semiconductor devices - to meet these growing market demands and advance the volume production capabilities of flat panel displays and semiconductor industry. The $KORONA^{TM}\;LTP/GLTP$ series using DPSS laser and XeCl excimer laser is designed for the new generation of the wafer & FPD glass annealing processing equipment combining advanced low temperature poly-silicon (LTPS) crystallization technology and object-oriented software architecture with a semistandard graphical user interface (GUI). These leading edge systems show the superior annealing ability to the conventional other method. The $KORONA^{TM}\;LTP/GLTP$ series provides technical and economical benefits of advanced annealing solution to semiconductor and FPD production performance with an exceptional level of productivity. High throughput, low cost of ownership and optimized system efficiency brings the highest yield and lowest cost per wafer/glass on the annealing market.

  • PDF

New Video Compression Method based on Low-complexity Interpolation Filter-bank (저 복잡도 보간 필터 뱅크 기반의 새로운 비디오 압축 방법)

  • Nam, Jung-Hak;Jo, Hyun-Ho;Sim, Dong-Gyu;Choi, Byeong-Doo;Cho, Dae-Sung
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.165-174
    • /
    • 2010
  • The H.264/AVC standard obtained better performance than previous compression standards, but it also increased the computational complexity of CODEC simultaneously. Various techniques recently included at the KTA software developed by VCEG also were increasing its complexity. Especially adaptive interpolation filter has more complexity than two times due to development for coding efficiency. In this paper, we propose low-complexity filter bank to improve speed up of decoding and coding gain. We consists of filter bank of a fixed-simple filter for low-complexity and adaptive interpolation filter for high coding efficiency. Then we compensated using optimal filter at each macroblock-level or frame-level. Experimental results shows a similar coding efficiency compared to existing adaptive interpolation filter and decoding speed of approximately 12% of the entire decoder gained.

Application and Verification of Time-Division Watermarking Algorithm in H.264 (시간 분할 워터마킹 알고리즘의 H.264 적용 및 검증)

  • Youn, Jin-Seon;Choi, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.45 no.6
    • /
    • pp.68-73
    • /
    • 2008
  • In this paper, we propose watermark algorithm called TDWA(Time-Division Watermarking Algorithm) and we applied the proposed algorithm to H.264 video coding standard. We establish that a proposed algorithm is applied to H.264 baseline profile CODEC. The proposed algorithm inserts a watermark into the spatial domain of several frames. We can easily insert strong and invisible watermarks into original pictures using this method. For verification of the proposed algorithm we design hardware core using Verilog-HDL and Excalibur for JM 8.7 code with hardware & software co-simulation. As a result of verification, the PSNR between watermarked pictures and original pictures are more than 60dB and we found the watermark is kept more than 80% after encoding of H.264/AVC with quantization parameter of 28 in baseline profile.

Animal Face Classification using Dual Deep Convolutional Neural Network

  • Khan, Rafiul Hasan;Kang, Kyung-Won;Lim, Seon-Ja;Youn, Sung-Dae;Kwon, Oh-Jun;Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.4
    • /
    • pp.525-538
    • /
    • 2020
  • A practical animal face classification system that classifies animals in image and video data is considered as a pivotal topic in machine learning. In this research, we are proposing a novel method of fully connected dual Deep Convolutional Neural Network (DCNN), which extracts and analyzes image features on a large scale. With the inclusion of the state of the art Batch Normalization layer and Exponential Linear Unit (ELU) layer, our proposed DCNN has gained the capability of analyzing a large amount of dataset as well as extracting more features than before. For this research, we have built our dataset containing ten thousand animal faces of ten animal classes and a dual DCNN. The significance of our network is that it has four sets of convolutional functions that work laterally with each other. We used a relatively small amount of batch size and a large number of iteration to mitigate overfitting during the training session. We have also used image augmentation to vary the shapes of the training images for the better learning process. The results demonstrate that, with an accuracy rate of 92.0%, the proposed DCNN outruns its counterparts while causing less computing costs.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.