• Title/Summary/Keyword: location-based applications

Search Result 595, Processing Time 0.032 seconds

Crosswalk Detection Model for Visually impaired Using Deep Learning (딥러닝을 이용한 시각장애인용 횡단보도 탐지 모델 연구)

  • Junsoo Kim;Hyuk Lee
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.1
    • /
    • pp.67-75
    • /
    • 2024
  • Crosswalks play an important role for the safe movement of pedestrians in a complex urban environment. However, for the visually impaired, crosswalks can be a big risk factor. Although assistive tools such as braille blocks and acoustic traffic lights exist for safe walking, poor management can sometimes act as a hindrance to safety. This paper proposes a method to improve accuracy in a deep learning-based real-time crosswalk detection model that can be used in applications for pedestrian assistance for the disabled at the beginning. The image was binarized by utilizing the characteristic that the white line of the crosswalk image contrasts with the road surface, and through this, the crosswalk could be better recognized and the location of the crosswalk could be more accurately identified by using two models that learned the whole and the middle part of the crosswalk, respectively. In addition, it was intended to increase accuracy by creating a boundary box that recognizes crosswalks in two stages: whole and part. Through this method, additional frames that the detection model did not detect in RGB image learning from the crosswalk image could be detected.

Stochastic failure analysis of [0/θ]s laminated composite plate containing edge crack and voids using XFEM

  • Ashok B. Magar;Achchhe Lal
    • Advances in materials Research
    • /
    • v.13 no.4
    • /
    • pp.299-319
    • /
    • 2024
  • Due to higher strength-to-weight ratio of composite laminates, they find uses in many weight-sensitive applications like aerospace, automobile and marine structures. From a reliability point of view, accurate prediction of failure of these structures is important. Due to the complexities in the manufacturing processes of composite laminates, there is a variation in the material properties and geometric parameters. Hence stochastic aspects are important while designing the composite laminates. Many existing works of composite laminate failure analysis are based on the deterministic approach but it is important to consider the randomness in the material properties, geometry and loading to predict accurate failure loads. In this paper the statistics of the ultimate failure load of the [0/θ]s laminated composite plate (LCP) containing the edge crack and voids subjected to the tensile loading are presented in terms of the mean and coefficient of variance (COV). The objective is to better the efficacy of laminate failure by predicting the statistics of the ultimate failure load of LCP with random material, geometric and loading parameters. The stochastic analysis is done by using the extended finite element method (XFEM) combined with the second-order perturbation technique (SOPT). The ultimate failure load of the LCP is obtained by ply-by-ply failure analysis using the ply discount method combined with the Tsai-Wu failure criterion. The aim is to know the effect of the stacking sequence, crack length, crack angle, location of voids and number of voids on the mean and corresponding COV of the ultimate failure load of LCP is investigated. The results of the ultimate failure load obtained by the present method are in good agreement with the existing experimental and numerical results. It is observed that [0/θ]s LCPs are very sensitive to the randomness in the crack length, applied load, transverse tensile strength of the laminate and modulus of elasticity of the material, so precise control of these parameters is important. The novelty of the present study is, the stochastic implementation in XFEM for the failure prediction of LCPs containing crack and voids.

Exploring the Effect of Gamification and Privacy Concerns upon Behavioural Intention to Use Fitness Apps (게임화 및 개인정보 염려가 피트니스 앱 사용의도에 미치는 영향)

  • Melisa Gunhan;Hyojung Song;Taeha Kim
    • Information Systems Review
    • /
    • v.26 no.2
    • /
    • pp.185-203
    • /
    • 2024
  • This study empirically explores the influence of gamification elements and privacy concerns on users' intention to use fitness apps, based on the technology acceptance model (TAM). This research classifies gamification in fitness apps into three categories: achievement-related elements, social-related elements, and immersion-related elements. Although previous research investigated the gamification of fitness apps, few studies combined the impact of gamification with privacy concerns. Considering the significant amount of sensitive personal data collected by fitness apps, we recognize the importance of data privacy and aim to address this gap in research. To achieve this goal, we collected and analyzed data from 187 Korean fitness app users through an online questionnaire. The results confirm the highly significant influence of perceived ease of use, perceived usefulness, and achievement-related gamification elements. Social-related gamification elements, immersion-related gamification elements, and privacy concerns however show insignificant results for the intention to use fitness apps in the Korean market. Location and time limit the generalizability of this study; however, the findings of this study nonetheless offer valuable insights for practitioners and developers to enhance the design and development of their applications.

Geospatial Analysis and Modeling in Korea: A Literature Review (한국의 지리공간분석 및 모델링 연구)

  • Lee, Sang-Il;Kim, Kam-Young
    • Journal of the Korean Geographical Society
    • /
    • v.47 no.4
    • /
    • pp.606-624
    • /
    • 2012
  • The main objective of this paper is to provide an adequate and comprehensive review of what has been done in South Korea in the field of geospatial analysis and modeling. This review focuses on spatial data analysis and spatial statistics, spatial optimization, and geosimulation among various aspects of the field. It is recognized that geospatial analysis and modeling in South Korea got through the initial stage during the 1990s when computer and analytical cartography and GIS were introduced, moved to the growth stage during the first decade of the $21^{st}$ century when there was a surge of relevant researches, and now is heading for its maturity stage. In spatial data analysis and spatial statistics, various topics have been addressed for spatial point pattern data, areal data, geostatistical data, and spatial interaction data. In spatial optimization, modeling and applications related to facility location problems, districting problems, and routing problems have been mostly researched. Finally, in geosimulation, while most of research has focused on cellular automata, studies on agent-based model and simulation are in beginning stage. Among all these works, some have fostered methodological advances beyond simple applications of the standard techniques.

  • PDF

Image Quality of a Rotating Compton Camera Evaluated by Using 4-D Monte Carlo Simulation Technique (4-D 전산모사 기법을 이용한 호전형 컴프턴 카메라의 영상 특성 평가)

  • Seo, Hee;Lee, Se-Hyung;Park, Jin-Hyung;Kim, Chan-Hyeong;Park, Sung-Ho;Lee, Ju-Hahn;Lee, Chun-Sik;Lee, Jae-Sung
    • Journal of Radiation Protection and Research
    • /
    • v.34 no.3
    • /
    • pp.107-114
    • /
    • 2009
  • A Compton camera, which is based on Compton kinematics, is a very promising gamma-ray imaging device in that it could overcome the limitations of the conventional gamma-ray imaging devices. In the present study, the image quality of a rotating Compton camera was evaluated by using 4-D Monte Carlo simulation technique and the applicability to nuclear industrial applications was examined. It was found that Compton images were significantly improved when the Compton camera rotates around a gamma-ray source. It was also found that the 3-D imaging capability of a Compton camera could enable us to accurately determine the 3-D location of radioactive contamination in a concrete wall for decommissioning purpose of nuclear facilities. The 4-D Monte Carlo simulation technique, which was applied to the Compton camera fields for the first time, could be also used to model the time-dependent geometry for various applications.

Applications of Fuzzy Theory on The Location Decision of Logistics Facilities (퍼지이론을 이용한 물류단지 입지 및 규모결정에 관한 연구)

  • 이승재;정창무;이헌주
    • Journal of Korean Society of Transportation
    • /
    • v.18 no.1
    • /
    • pp.75-85
    • /
    • 2000
  • In existing models in optimization, the crisp data improve has been used in the objective or constraints to derive the optimal solution, Besides, the subjective environments are eliminated because the complex and uncertain circumstances were regarded as Probable ambiguity, In other words those optimal solutions in the existing models could be the complete satisfactory solutions to the objective functions in the Process of application for industrial engineering methods to minimize risks of decision-making. As a result of those, decision-makers in location Problems couldn't face appropriately with the variation of demand as well as other variables and couldn't Provide the chance of wide selection because of the insufficient information. So under the circumstance. it has been to develop the model for the location and size decision problems of logistics facility in the use of the fuzzy theory in the intention of making the most reasonable decision in the Point of subjective view under ambiguous circumstances, in the foundation of the existing decision-making problems which must satisfy the constraints to optimize the objective function in strictly given conditions in this study. Introducing the Process used in this study after the establishment of a general mixed integer Programming(MIP) model based upon the result of existing studies to decide the location and size simultaneously, a fuzzy mixed integer Programming(FMIP) model has been developed in the use of fuzzy theory. And the general linear Programming software, LINDO 6.01 has been used to simulate, to evaluate the developed model with the examples and to judge of the appropriateness and adaptability of the model(FMIP) in the real world.

  • PDF

Timestamps based sequential Localization for Linear Wireless Sensor Networks (선형 무선 센서 네트워크를 위한 시각소인 기반의 순차적 거리측정 기법)

  • Park, Sangjun;Kang, Jungho;Kim, Yongchul;Kim, Young-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1840-1848
    • /
    • 2017
  • Linear wireless sensor networks typically construct a network topology with a high reliability through sequential 1:1 mapping among sensor nodes, so that they are used in various surveillance applications of major national infrastructures. Most existing techniques for identifying sensor nodes in those networks are using GPS, AOA, and RSSI mechanisms. However, GPS or AOA based node identification techniques affect the size or production cost of the nodes so that it is not easy to construct practical sensor networks. RSSI based techniques may have a high deviation regrading location identification according to propagation environments and equipment quality so that complexity of error correction algorithm may increase. We propose a timestamps based sequential localization algorithm that uses transmit and receive timestamps in a message between sensor nodes without using GPS, AOA, and RSSI techniques. The algorithms for distance measurement between each node are expected to measure distance within up to 1 meter in case of an crystal oscillator of 300MHz or more.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

Design of Adaptive Security Framework based on Carousel for Cognitive Radio Network (인지무선네트워크를 위한 회전자 기반 적응형 보안프레임워크 설계)

  • Kim, Hyunsung
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.165-172
    • /
    • 2013
  • Convergence is increasingly prevalent in the IT world which generally refers to the combination of two or more different technologies in a single device. Especially, the spectrum scarcity is becoming a big issue because there are exponential growth of broadcasting and communication systems in the spectrum demand. Cognitive radio (CR) is a convergence technology that is envisaged to solve the problems in wireless networks resulting from the limited available spectrum and the inefficiency in the spectrum usage by exploiting the existing wireless spectrum opportunistically. However, the very process of convergence is likely to expose significant security issues due to the merging of what have been separate services and technologies and also as a result of the introduction of new technologies. The main purpose of this research is focused on devising an adaptive security framework based on carousel for CR networks as a distinct telecommunication convergence application, which are still at the stage of being developed and standardized with the lack of security concerns. The framework uses a secure credential, named as carousel, initialized with the location related information from objects position, which is used to design security mechanisms for supporting privacy and various securities based on it. The proposed adaptive security framework could be used as a security building block for the CR network standards and various convergence applications.

Call-Site Tracing-based Shared Memory Allocator for False Sharing Reduction in DSM Systems (분산 공유 메모리 시스템에서 거짓 공유를 줄이는 호출지 추적 기반 공유 메모리 할당 기법)

  • Lee, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.32 no.7
    • /
    • pp.349-358
    • /
    • 2005
  • False sharing is a result of co-location of unrelated data in the same unit of memory coherency, and is one source of unnecessary overhead being of no help to keep the memory coherency in multiprocessor systems. Moreover. the damage caused by false sharing becomes large in proportion to the granularity of memory coherency. To reduce false sharing in a page-based DSM system, it is necessary to allocate unrelated data objects that have different access patterns into the separate shared pages. In this paper we propose call-site tracing-based shared memory allocator. shortly CSTallocator. CSTallocator expects that the data objects requested from the different call-sites may have different access patterns in the future. So CSTailocator places each data object requested from the different call-sites into the separate shared pages, and consequently data objects that have the same call-site are likely to get together into the same shared pages. We use execution-driven simulation of real parallel applications to evaluate the effectiveness of our CSTallocator. Our observations show that by using CSTallocator a considerable amount of false sharing misses can be additionally reduced in comparison with the existing techniques.