• Title/Summary/Keyword: multiple platforms

Search Result 204, Processing Time 0.025 seconds

Design and Development of Implementation of augment reality application with support cross-platform (크로스 플랫폼을 지원하는 증강현실 구현 앱의 설계 및 개발)

  • Jo, Jae-ik;Jeon, Je-eung;Bae, Dong-hyeun;Yoon, Hyeon-su;Choi, Byeong-yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.438-440
    • /
    • 2017
  • In this research, we design and develop an app that can be run on multiple platforms and easily realize augmented reality. It works on PC and mobile (Android, iOS) in cross platform and users want to lower the barriers to entry of augmented reality by allowing users to select the marker to be augmented reality coordinates and the model to be implemented within the app. The app consists of Unity 3D engine and ARToolkit, an open source augmented reality SDK. Unity 3D integrates UI, markers and objects, and is used as the main engine for cross-platform development. This paper presents the design and production method of the augmented reality application and explains the use examples.

  • PDF

The Similarity of the Image Comparison System utilizing OpenCV (OpenCV를 활용한 이미지 유사성 비교 시스템)

  • Ban, Tae-Hak;Bang, Jin-Suk;Yuk, Jung-Soo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.834-835
    • /
    • 2016
  • In recent years, advances in technology, IT is rapidly growing. Accordingly, real time image processing and multiple platforms, providing compatibility with OpenCV for image processing technology research on actively in progress. At present, different, comparing the images to determine the similarity is low, the system will match the rate of people using the analogue figures to determine the system is for the most part. In this paper, Template Matching of OpenCV and Feature Matching utilizing different images to determine the similarity between digital values for the system. A comparison of the features of a specific point on the screen the image to extract the same feature in a different size, you can compare the features of the target image recognized as compared to three historic castle in comparison, verification. This is the voice and image recognition and analysis, check the matching rate readings than in Zhengzhou treatment techniques are available. The future of forensic and other image processing technologies for OpenCV studies will be needed to feed.

  • PDF

Development of the SONAR System for an Unmanned Surface Vehicle (무인수상정 탑재 소나시스템 개발)

  • Bae, Ho Seuk;Kim, Wan-Jin;Kim, Woo-Shik;Choi, Sang-Moon;Ahn, Jin-Hyeong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.18 no.4
    • /
    • pp.358-368
    • /
    • 2015
  • Recently, unmanned systems are largely utilized in various fields due to the persistency and the least operational risk and an unmanned surface vehicle(USV) is the one of the representative application in the naval field. To assign multiple roles to an USV, we developed a sonar system which consists of a forward detecting sonar for the long-range detection, a downward detecting sonar for the small target scan and identification, and a strut type body for mounting sonar systems. In this paper, we described the developed sonar system for USV and the sea test results for verifying system performance. The test results showed that the developed sonar system was able to detect the underwater target about several kilometers away and could recognize a small object at the downside of the sonar system. We expect that the developed sonar system will be easily applied to other unmanned platforms without serious consideration.

Healthcare System using Pegged Blockchain considering Scalability and Data Privacy

  • Azizan, Akmal;Pham, Quoc-Viet;Han, Suk Young;Kim, Jung Eon;Kim, Hoon;Park, Junseok;Hwang, Won-Joo
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.613-625
    • /
    • 2019
  • The rise of the Internet of Things (IoT) devices have greatly influenced many industries and one of them is healthcare where wearable devices started to track all your daily activities for better health monitoring accuracy and even down to tracking daily food intake in some cases. With the amounts of data that are being tracked and shared between from these devices, questions were raised on how to uphold user's data privacy when data is shared between these IoT devices and third party. With the blockchain platforms started to mature since its inception, the technology can be implemented according to a variety of use case scenarios. In this paper, we present a system architecture based on the healthcare system and IoT network by leveraging on multiple blockchain networks as the medium in between that should enable users to have direct authority on data accessibility of their shared data. We provide proof of concept implementation and highlight the results from our testing to show how the efficiency and scalability of the healthcare system improved without having a significant impact on the performance of the Electronic Medical Record (EMR) that mostly affected by the previous solution since these solutions directly connected to a public blockchain network and which resulted in significant delays and high cost of operation when a large amount of data or complicated functions are involved.

Overlay2 file system's Source Protection Methodology (Overlay2 파일 시스템의 소스 보호 방법에 관한 연구)

  • Han, Sung-Hwa
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1397-1402
    • /
    • 2021
  • The overlay2 file system is one of the union file systems that mounts multiple directories into one. The source directory used for this overlay2 file system mount has a characteristic that it operates independently of the write-able layer after mounting, so it is often used for container platforms for application delivery. However, the overlay2 file system has a security vulnerability that the write-able layer is also modified when file in the source directory is modified. In this study, I proposed the overlay2 file system protection technology to remove the security vulnerabilities of the overlay2 file system. As a result of empirically implementing the proposed overlay2 file system protection technology and verifying the function, the protection technology proposed in this study was verified to be effective. However, since the method proposed in this study is a passive protection method, a follow-up study is needed to automatically protect it at the operating system level.

Efficient Re-Establishment Mechanism of Diameter Security Association lost in MIP Application (MIP 환경에서의 Diameter Security Association 정보 분실시의 재설정 기법)

  • 유희종;김말희;김현곤
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.13 no.5
    • /
    • pp.39-48
    • /
    • 2003
  • AAA(Authentication, Authorization, Accounting) protocol is a framework that propose functions of AAA on multiple networks and platforms. AAA protocol is extending from previous RADIUS protocol to Diameter protocol. There are some Diameter applications for variety purpose. Diameter CMS Application makes Diameter messages more secure by using PKI. Diameter CMS Application establish DSA(Diameter Security Association) for end to end security. However the Application has some problems to establish DSA(Diameter Security Association), which can make Diameter system unstable. If one system lose DSA information for some system error - for example, reboot -, the secure communication between two nodes may not be possible. At the application such as MIP, even user registration can't be done. In this paper, we propose a mechannism for DSA re-establishment, and also show the result of the implementation.

A Study on University Students' Intention to Use Video Contents as an Information Source of Serious Leisure Activities (대학생의 진지한 여가 활동 정보원으로서 동영상 콘텐츠 이용 의도에 관한 연구)

  • Back, Ga Yeon;Park, Ji-Hong
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.32 no.2
    • /
    • pp.69-99
    • /
    • 2021
  • This study aims at exploring what kinds of factors affect university students to choose video contents as information sources of serious leisure activities. Among other, It focuses on the effect of information quality and cognitive authority. This study analyzed 209 sets of data collected by conducting an online survey of university students from across the country. The implications and results of this study are as follows: First, among the sub-components of information quality, timeliness, relevance, and accuracy had a positive effect significantly on the intention of video contents use as an serious leisure information source, and among those of cognitive authority, the characteristics of platforms was the most influential one. Second, the multiple regression analysis was used to figure out that, some sub-components of cognitive authority turned out to have a positive effect significantly on the evaluation of information quality. This study has a significant meaning in that it investigated the intention of video content use with the two factors (information quality and cognitive authority), especially at this time when more and more people are enjoying video contents as an serious leisure information source.

An investigation into the Online Sales Channels of Small Business Fashion Retailers on Portal Shopping and Fashion Shopping Malls (소상공인 패션판매업자의 온라인 판매채널 연구: 포털쇼핑몰과 패션쇼핑몰(종합물/전문몰)을 중심으로)

  • Son, Mi Young
    • Human Ecology Research
    • /
    • v.59 no.4
    • /
    • pp.449-463
    • /
    • 2021
  • The aim of this study was to analyze the perceptions and entering status of small business online fashion retailers on portal shopping and fashion shopping malls. Case studies were conducted on a total of 10 research samples. The results were as follows: first, regarding the strategic factors of online fashion stores, 'price competitiveness' is important, especially in portal shopping and low-cost brands; 'product assortment' is important but not essential in all platforms; and 'differentiation' is important to continuously secure loyal customers in fashion shopping malls. Customer satisfaction leads to customer loyalty, and customer loyalty affects the sales conversion rate and brand growth of online sales channels. Factors that promoted sales activities in online sales channels were exposure, advertisements, SNS, events, special exhibitions, and events. Hindrance factors were low price competition, overheated competition, and the MD of sales channels. Second, the research samples used multiple online sales channels, including portal shopping malls and fashion shopping malls, in addition to their own malls. The selection factors were platform reputation and commission, branding, and customer inflow through exposure. Portal shopping malls were perceived as providing easy access, advertising/customer communication, exposure/search, price competitiveness, scalability, and intense competition, whereas fashion shopping malls were perceived as providing a brand image and concept, brand promotion, high commissions, difficult entry, and low profits. The factors for success in portal shopping malls were exposure/search, price competitiveness, and brand recognition, whereas the factors for success in fashion shopping malls were differentiation, brand, exposure/advertisement, product assortment, and MD.

The Stimulus Factors Influencing Intention to Participate in Shopping during the Distribution of the 12.12 Online Shopping Festivals in Malaysia

  • MAHMUDDIN, Yasmin;ABDULLAH, Mazilah;RAMDAN, Mohamad Rohieszan;MOHD ANIM, Nur Aqilah Hazirah;ABD AZIZ, Nurul Ashykin;ABD AZIZ, Nurul Aien;YAHAYA, Rusliza;ABD AZIZ, Noreen Noor
    • Journal of Distribution Science
    • /
    • v.20 no.8
    • /
    • pp.93-103
    • /
    • 2022
  • Purpose: Online shopping festivals have quickly become the newest trend in online shopping worldwide due to the COVID-19 pandemic. This has led to marketing distribution channels that traditionally emphasized traditional techniques having turned to electronic commerce platforms. Although the pandemic scenario encourages online purchasing, other factors, such as the influence of participation intention to shop during the Online Shopping Festival, must also be considered. Research design, data and methodology: Multiple linear regression analysis was used to test the hypothesis based on data from 121 respondents who are actively involved with online shopping activities in Klang Valley, Selangor. Results: The results of this study show that promotion categories and the perceived influence of mass participation have a significant influence on participation intention. Meanwhile, the perceived temptation of price promotion and perceived fun promotional activities did not significantly influence participation intention. Conclusions: Theoretically, this study contributes to the literature by using the Theory of Planned Behavior and Stimulus-Response models to explain the factors that drive participation intention for online shopping. In practice, this study attracts and encourages customers to shop during the festival day because various attractive promotions are offered by sellers in Malaysia.

FIDO Platform of Passwordless Users based on Multiple Biometrics for Secondary Authentication (암호 없는 사용자의 2차 인증용 복합생체 기반의 FIDO 플랫폼)

  • Kang, Min-goo
    • Journal of Internet Computing and Services
    • /
    • v.23 no.4
    • /
    • pp.65-72
    • /
    • 2022
  • In this paper, a zero trust-based complex biometric authentication was proposed in a passwordless environment. The linkage of FIDO 2.0 (Fast IDENTITY Online) transaction authentication platforms was designed in conjunction with metaverse. In particular, it was applied with the location information of a smart terminal according to a geomagnetic sensor, an accelerator sensor, and biometric information for multi-factor authentication(MFA). At this time, a FIDO transaction authentication platform was presented for adaptive complex authentication with user's environment through complex authentication with secondary authentication based on situational awareness such as illuminance and temperature/humidity. As a result, it is possible to authenticate secondary users based on zero trust with behavior patterns such as fingerprint recognition, iris recognition, face recognition, and voice according to the environment. In addition, it is intended to check the linkage result of the FIDO platform for complex integrated authentication and improve the authentication accuracy of the linkage platform for transaction authentication using FIDO2.0.