• Title/Summary/Keyword: location tracking system

Search Result 573, Processing Time 0.03 seconds

USE OF A COMPUTER NAVIGATION SYSTEM FOR OSTEOTOMIES IN THE ORTHOGNATHIC SURGERY: TECHNICAL NOTE (악교정수술 골절단술시 컴퓨터 네비게이션 시스템의 이용: Technical Note)

  • Kim, Moon-Key;Kang, Sang-Hoon;Choi, Young-Su;Kim, Jung-In;Byun, In-Young;Park, Won-Se;Lee, Sang-Hwy
    • Maxillofacial Plastic and Reconstructive Surgery
    • /
    • v.32 no.3
    • /
    • pp.282-288
    • /
    • 2010
  • Surgery with the computer navigation system can make it possible to identify important anatomical structures which are difficult to be confirmed with the naked eye in the operation, and has extended their applications in various surgical fields. The head and neck surgery especially requires detailed anatomical knowledges and these knowledges have influences on postoperative functions and esthetics of a patient. In the orthognathic surgery, we should take osteotomies in the precise locations of the jawbones and move segments to the intended positions. There are so many important anatomical structures around the osteotomy-sites in the orthognathic surgery that the prevention of damage to these structures to obtain satisfactory results without any complication. There are vessels of the pterygoid plexus posterior to the pterygoid plate in the maxilla and the mandibular nerve enters the mandibluar foramen in the mandibular ramus. These locations should be confirmed perioperatively to avoid any injury to these structures. The navigation-assisted surgery may be helpful for this purpose. We performed navigational orthognathic surgeries with preoperative CT images and obtained satisfactory results. The osteotomy was performed in the proper location and damaging the surrounding important anatomical structures was avoided by keeping the saw away from them with the real-time navigation. It may be required to develop proper devices and protocols for the navigation-assisted orthognathic surgery.

Similar Trajectory Store Scheme for Efficient Store of Vehicle Historical Data (효율적인 차량 이력 데이터 저장을 위한 유사 궤적 저장 기법)

  • Kwak Ho-Young;Han Kyoung-Bok
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.114-125
    • /
    • 2006
  • Since wireless Internet services and small mobile communication devices come into wide use as well as the use of GPS is rapidly growing, researches on moving object, whose location information shifts sequently in accordance with time interval, are being carried out actively. Especially, the researches on vehicle moving object are applied to Advanced traveler information system, vehicle tracking system, and distribution transport system. These systems are very useful in searching previous positions, predicted future positions, the optimum course, and the shortest course of a vehicle by managing historical data of the vehicle movement. In addition, vehicle historical data are used for distribution transport plan and vehicle allocation. Vehicle historical data are stored at regular intervals, which can have a pattern. For example, a vehicle going repeatedly around a specific section follows a route very similar to another. If historical data of the vehicle with a repeated route course are stored at regular intervals, many redundant data occur, which result in much waste of storage. Therefore this thesis suggest a vehicle historical data store scheme for vehicles with a repeated route course using similar trajectory which efficiently store vehicle historical data.

  • PDF

THE ACTIVITIES OF AMALGAMATED TERRITORIAL COMMUNITIES IN THE CONTEXT OF SUSTAINABLE DEVELOPMENT OF THE ENVIRONMENT: THE EXPERIENCE OF UKRAINE AND THE EU STATES

  • Ridei, Nataliia;Bakhmat, Oleh;Plahtiy, Danylo;Polova, Olena;Holovnia, Yuliia
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.9
    • /
    • pp.323-331
    • /
    • 2021
  • The relevance of the study implies the need to explain the main determinants of environmental policy, allowing countries to converge on a common working basis. The purpose of the research is to explore ways in which the environmental aspects of EU regions and territories can be shaped to apply to domestic environmental policy. A total of 997 representatives from the Ukrainian UTCs, who are involved in local environmental policy, participated in the survey. Results of the research. A hierarchy of regional environmental policy objectives has been identified. Three key principles of eco-policy development have been distinguished. The means of the innovative approach strategy implementation have been outlined (formation of the regional market of environmental services; organization of interaction between environmental agencies and market structures; establishment of environmental funds which finance environmental activities; implementation of the "collateral return" system; formation of a system of benefits and loans to enterprises that successfully implement the environmental policy). The means of the prognostic approach implementation strategy to the development of the region's environmental policy have been determined (the use of an orderly and successful long-term strategy of economic development of the region; obligatory consideration in the mechanisms strategy aimed at improvement of environmental management system of the region, interbranch impact of the projects implemented on the region's ecological situation; taking into consideration the economic and geographical peculiarities of the region, the necessary infrastructure, issues of the territorial location of the large enterprises in the region and their impact on the environment). The means of the traditional approach strategy implementation have been outlined (activity programs focused on solution of specific problems, rather than on the implementation of measures for environmental restoration and enhancement; nature conservation problems have interbranch, interdepartmental character due to unity of the region's ecosystem; tracking complexity of changing conditions (water basins, woodlands, air-mass transport), regional boundaries generally do not coincide with natural ecosystems boundaries). The practical significance of the study lies in providing recommendations for the implementation of certain aspects of Ukrainian UTC's environmental policy.

Fraud Detection in E-Commerce

  • Alqethami, Sara;Almutanni, Badriah;AlGhamdi, Manal
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.312-318
    • /
    • 2021
  • Lack of knowledge and digital skills is a threat to the information security of the state and society, so the formation and development of organizational culture of information security is extremely important to manage this threat. The purpose of the article is to assess the state of information security of the state and society. The research methodology is based on a quantitative statistical analysis of the information security culture according to the EU-27 2019. The theoretical basis of the study is the theory of defense motivation (PMT), which involves predicting the individual negative consequences of certain events and the desire to minimize them, which determines the motive for protection. The results show the passive behavior of EU citizens in ensuring information security, which is confirmed by the low level of participation in trainings for the development of digital skills and mastery of basic or above basic overall digital skills 56% of the EU population with a deviation of 16%. High risks to information security in the context of damage to information assets, including software and databases, have been identified. Passive behavior of the population also involves the use of standard identification procedures when using the Internet (login, password, SMS). At the same time, 69% of EU citizens are aware of methods of tracking Internet activity and access control capabilities (denial of permission to use personal data, access to geographical location, profile or content on social networking sites or shared online storage, site security checks). Phishing and illegal acquisition of personal data are the biggest threats to EU citizens. It have been identified problems related to information security: restrictions on the purchase of products, Internet banking, provision of personal information, communication, etc. The practical value of this research is the possibility of applying the results in the development of programs of education, training and public awareness of security issues.

Portable system module for wireless based on mountain climbing safety using 447 MHz band FSK (447MHz 대역 FSK방식을 이용한 무선 통신 기반 산행 안전을 위한 휴대 시스템)

  • Lim, Jae Don;Kim, Jung Jip;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1428-1433
    • /
    • 2019
  • Interest in mountain accidents among the technical trends of disasters in Korea is increasing continuously. When accidents occur, the most common methods are location tracking and accident reporting using smartphones, and rescue activities are being carried out by using them. In this paper, we proposed an improvement of wireless safety system for mountain climbing safety using 447 FSK. Using the 447 MHz band transmitter / receiver, it accumulates position coordinates and data through position transmission and rescue signal transmission in case of anomalies. If a sender is out of the threshold of the set area range, a danger warning notification can be generated to quickly exit the danger zone. Provide services. In addition, it is considered that the health condition of the sender is continuously checked and the receiver is warned when the specified threshold is exceeded, so that it is possible to respond to the sender's disaster.

Tag Trajectory Generation Scheme for RFID Tag Tracing in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 RFID 태그 추적을 위한 태그 궤적 생성 기법)

  • Kim, Jong-Wan;Oh, Duk-Shin;Kim, Kee-Cheon
    • The KIPS Transactions:PartD
    • /
    • v.16D no.1
    • /
    • pp.1-10
    • /
    • 2009
  • One of major purposes of a RFID system is to track moving objects using tags attached to the objects. Because a tagged object has both location and time information expressed as the location of the reader, we can index the trajectory of the object like existing spatiotemporal objects. More efficient tracking may be possible if a spatiotemporal trajectory can be formed of a tag, but there has not been much research on tag trajectory indexes. A characteristic that distinguishes tags from existing spatiotemporal objects is that a tag creates a separate trajectory in each reader by entering and then leaving the reader. As a result, there is a trajectory interruption interval between readers, in which the tag cannot be located, and this makes it difficult to track the tag. In addition, the point tags that only enter and don't leave readers do not create trajectories, so cannot be tracked. To solve this problem, we propose a tag trajectory index called TR-tree (tag trajectory R-tree in RFID system) that can track a tag by combining separate trajectories among readers into one trajectory. The results show that TR-tree, which overcomes the trajectory interruption superior performance than TPIR-tree and R-tree.

Feasibility of Using Norad Orbital Elements for Pass Programming and Catalog Generation for High Resolution Satellite Images (고해상도 위성영상 촬영계획 수립 및 카탈로그 생성을 위한 NORAD 궤도 데이터의 이용 가능성 연구)

  • 신동석;김탁곤;곽성희;이영란
    • Korean Journal of Remote Sensing
    • /
    • v.15 no.2
    • /
    • pp.119-130
    • /
    • 1999
  • At present, many ground stations all over the world are using NORAD orbit element data in order to track and communicate with Earth orbiting satellites. The North American Aerospace Defense Command (NORAD) observes thousands of Earth orbiting objects on daily basis and provides their orbital information via internet. The orbital data provided by NORAD, which is also called two line element (TLE) sets, allows ground stations to predict the time-varying positions of satellites accurately enough to communicate with the satellites. In order to complete the mission of a high resolution remote sensing satellite which requires very high positional determination and control accuracy, however, a mission control and tracking ground station is dedicated for the observation and positional determination of the satellite rather than using NORAD orbital sets. In the case of KITSAT-3, NORAD orbital elements are currently used for image acquisition planning and for the processing of acquired images due to the absence of a dedicated KITSAT-3 tracking ground system. In this paper, we tested and analyzed the accuracy of NORAD orbital elements and the appropriate prediction model to determine how accurately a satellite acquisites an image of the location of interest and how accurately a ground processing system can generate the catalog of the images.

Location Tracking and Visualization of Dynamic Objects using CCTV Images (CCTV 영상을 활용한 동적 객체의 위치 추적 및 시각화 방안)

  • Park, Sang-Jin;Cho, Kuk;Im, Junhyuck;Kim, Minchan
    • Journal of Cadastre & Land InformatiX
    • /
    • v.51 no.1
    • /
    • pp.53-65
    • /
    • 2021
  • C-ITS(Cooperative Intelligent Transport System) that pursues traffic safety and convenience uses various sensors to generate traffic information. Therefore, it is necessary to improve the sensor-related technology to increase the efficiency and reliability of the traffic information. Recently, the role of CCTV in collecting video information has become more important due to advances in AI(Artificial Intelligence) technology. In this study, we propose to identify and track dynamic objects(vehicles, people, etc.) in CCTV images, and to analyze and provide information about them in various environments. To this end, we conducted identification and tracking of dynamic objects using the Yolov4 and Deepsort algorithms, establishment of real-time multi-user support servers based on Kafka, defining transformation matrices between images and spatial coordinate systems, and map-based dynamic object visualization. In addition, a positional consistency evaluation was performed to confirm its usefulness. Through the proposed scheme, we confirmed that CCTVs can serve as important sensors to provide relevant information by analyzing road conditions in real time in terms of road infrastructure beyond a simple monitoring role.

Improved RFID Authentication Protocol Providing Mutual Authentication (상호인증을 제공하는 개선된 RFID 인증 프로토콜)

  • Jeon, Seo-Kwan;Eun, Sun-Ki;Oh, Soo-Hyun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.113-120
    • /
    • 2010
  • RFID system is the contact-less recognition technology and use for distribution system, environment, transport, security and so on. However, it may create many security relevant problems such as privacy because constraints of RFID communication environment. So several methods of resolving these problems have been proposed. Recently, Shin and Park proposed an efficient RFID authentication protocol with protecting user's privacy using hash function and exclusive-OR.. But Ahn and Bu et al. poia problem that a attacker can to masquerade as malicious reader because their protocol can't providing mutual authentication.nted out weakness of Shin and Park's protocol and proposed more secure and efficient protocol. Unfortunately, Ahn and But's protocol has In this paper, We propose an improved RFID authentication protocol providing mutual authentication. The proposed protocol has advantages that providing mutual authentication between a tag and a reader, secure against replay attack and spoofing attack. Also, it guarantees anonymity of RFID tag and secure against location tracking attack by collusion of malicious readers.

Detection of Abnormal Behavior by Scene Analysis in Surveillance Video (감시 영상에서의 장면 분석을 통한 이상행위 검출)

  • Bae, Gun-Tae;Uh, Young-Jung;Kwak, Soo-Yeong;Byun, Hye-Ran
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.12C
    • /
    • pp.744-752
    • /
    • 2011
  • In intelligent surveillance system, various methods for detecting abnormal behavior were proposed recently. However, most researches are not robust enough to be utilized for actual reality which often has occlusions because of assumption the researches have that individual objects can be tracked. This paper presents a novel method to detect abnormal behavior by analysing major motion of the scene for complex environment in which object tracking cannot work. First, we generate Visual Word and Visual Document from motion information extracted from input video and process them through LDA(Latent Dirichlet Allocation) algorithm which is one of document analysis technique to obtain major motion information(location, magnitude, direction, distribution) of the scene. Using acquired information, we compare similarity between motion appeared in input video and analysed major motion in order to detect motions which does not match to major motions as abnormal behavior.