• Title/Summary/Keyword: the single′ time use

Search Result 1,112, Processing Time 0.036 seconds

Availability of Mobile Art in Smartphone Environment of Augmented Reality Content Industrial Technology (증강현실 콘텐츠 산업기술의 스마트폰 환경 모바일 아트 활용 가능성)

  • Kim, Hee-Young;Shin, Chang-Ok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.5
    • /
    • pp.48-57
    • /
    • 2013
  • Smartphones provide users with environment for communication and sharing information and at the same time play an important role of mobile technology and mobile art development. Smartphone technology-related researches are being accelerated especially with the advent of mobile Augmented Reality(AR) age, but the studies on user participation that is essential for AR content industry were insufficient. In that regard, the assistance from mobile art area that has already developed these characteristics is essential. Thus, this article is to classify mobile art that has not been studied a lot domestically into feature phone usage and smartphone usage and to analyze each example case with the three most used methods. The usage of feature phones which use the sound and images of mobile devices can be divided into three: installation and performing methods, single channel video art method and five senses communication method. On the other hand, the usage of smartphones that use sensors, cameras, GPS and AR can be divided into location-based AR, marker-based AR and markerless AR. Also, as a result of examining mobile AR content utilization technology by industries, combined methods are utilized; tourism and game-related industries use location-based AR, education and medicine-related industries use marker-based AR, and shopping-related industries use markerless AR. The development of AR content industry is expected to be accelerated with mobile art that makes use of combined technology method and constant communication method through active participation of users. The future development direction of mobile AR industry is predicted to have minimized HMD, integration of hologram technology and artificial intelligence and make the most of big data and social network so that we could overcome the technological limitation of AR.

Anterior Cruciate Ligament Reconstruction with a Four-Strand Single Semitendinosus Tendon Autograft (반건양건 단일 4가닥을 이용한 전방십자인대 재건술)

  • Kyung, Hee-Soo;Kim, Tae-Gong;Oh, Chang-Wug;Yoon, Sang-Hyup
    • Journal of the Korean Arthroscopy Society
    • /
    • v.13 no.2
    • /
    • pp.138-142
    • /
    • 2009
  • Purpose: The purpose of this study was to evaluate the result of anterior cruciate ligament (ACL) reconstruction using a fourstrand single semitendinous tendon to decrease the donor site morbidity due to harvest both semitendinosus and gracilis tendon. Materials and Methods: Thirty seven consecutive patients who had underwent ACL reconstruction using four-strand single semitendinosus tendon were evaluated. Mean age was 28.6 years old. Male was 34, female 3 patients. Time from injury to surgery was 5.4 months. Combined injuries were 10 meniscus injuries, 3 medial collateral ligament injuries and 1 osteochondral injury. Mean follow-up period was 16 months(12~18 months). Clinical evaluation was done using range of motion, Lachman test, pivot-shift test, Lysholm score & KT-2000 arthrometer. Results: All patients showed the normal range of motion of mean 150..at follow-up. Lachman test and pivot-shift test was negative in 35 cases. Lysholm score was improve from 84 to 92. Two cases had residual laxity due to poor compliance. Mean anterior translation compared to contralateral side by KT-2000 arthrometer improved from 6.7 mm preoperatively to 2.1 mm at follow-up. Conclusion: Reconstruction of the anterior cruciate ligament with use of a four-strand single semitendinosus tendon autograft showed good clinical results.

  • PDF

A New Deadlock Detection Mechanism in Wormhole Networks (웜홀 네트웍을 위한 새로운 교착상태 발견 기법)

  • Lee, Su-Jung
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.5_6
    • /
    • pp.280-289
    • /
    • 2003
  • Deadlock recovery-based routing algorithms in wormhole networks have gained attraction due to low hardware complexity and high routing adaptability Progressive deadlock recovery techniques require a few dedicated resources to transmit deadlocked packets rather than killing them. Selection of deadlocked packets is primarily based on time-out value which should be carefully determined considering various traffic patterns or packet length. By its nature, current techniques using time-out accompany unignorable number of false deadlock detections especially in a heavy-loaded network or with long packet size. Moreover, when a deadlock occurs, more than one packet may be marked as deadlocked, which saturate the resources allocated for recovery. This paper proposes more accurate deadlock detection scheme which does not make use of time-out to declare deadlock. The proposed scheme reduces the probability to detect false deadlocks considerably. Furthermore, a single message is selected as deadlocked for each cycle of blocked messages, thereby eliminating recovery overheads.

Real-time Travel Time Estimation Model Using Point-based and Link-based Data (지점과 구간기반 자료를 활용한 실시간 통행시간 추정 모형)

  • Yu, Jeong-Whon
    • International Journal of Highway Engineering
    • /
    • v.10 no.1
    • /
    • pp.155-164
    • /
    • 2008
  • It is critical to develop a core ITS technology such as real-time travel time estimation in order that the efficient use of the ITS implementation can be achieved as the ITS infrastructure and relevant facilities are broadly installed in recent years. The provision of travel time information in real-time allows travellers to make informed decisions and hence not only the traveller's travel utilities but also the road utilization can be maximized. In this paper, a hybrid model is proposed to combine VDS and AVI which have different characteristics in terms of space and time dimensions. The proposed model can incorporate the immediacy of VDS data and the reality of AVI data into one single framework simultaneously. In addition, the solution algorithm is made to have no significant computational burden so that the model can be deployable in real world. A set of real field data is used to analyze the reliability and applicability of the proposed model. The analysis results suggest that the proposed model is very efficient computationally and improves the accuracy of the information provided, which demonstrates the real-time applicability of the proposed model. In particular, the data fusion methodology developed in this paper is expected to be used more widely when a new type of traffic data becomes available.

  • PDF

Deep Learning-Based User Emergency Event Detection Algorithms Fusing Vision, Audio, Activity and Dust Sensors (영상, 음성, 활동, 먼지 센서를 융합한 딥러닝 기반 사용자 이상 징후 탐지 알고리즘)

  • Jung, Ju-ho;Lee, Do-hyun;Kim, Seong-su;Ahn, Jun-ho
    • Journal of Internet Computing and Services
    • /
    • v.21 no.5
    • /
    • pp.109-118
    • /
    • 2020
  • Recently, people are spending a lot of time inside their homes because of various diseases. It is difficult to ask others for help in the case of a single-person household that is injured in the house or infected with a disease and needs help from others. In this study, an algorithm is proposed to detect emergency event, which are situations in which single-person households need help from others, such as injuries or disease infections, in their homes. It proposes vision pattern detection algorithms using home CCTVs, audio pattern detection algorithms using artificial intelligence speakers, activity pattern detection algorithms using acceleration sensors in smartphones, and dust pattern detection algorithms using air purifiers. However, if it is difficult to use due to security issues of home CCTVs, it proposes a fusion method combining audio, activity and dust pattern sensors. Each algorithm collected data through YouTube and experiments to measure accuracy.

A Study on Touch-screen Development Using Visible-ray (가시광선을 이용한 터치스크린 구현에 대한 연구)

  • Park, Jun-Woo;Jeong, Yong-Jin
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.48 no.3
    • /
    • pp.50-61
    • /
    • 2011
  • The Infrared touch method is generally used for a mid and large-size touch screen. But this method has several problems, such as difficulty with installation of a touch-object recognition device, limited application and coordinate error in multi-point touch system. Since we can take advantages of both color and local information when we use general cameras for a touch screen, a touch screen using general camera is more efficient than infrared one. It also has an advantage of easy installation of a touch-object device. However, it did not much appeal in a market because of several problems, such as color sensitivity, illumination and reflected light. In this paper, we study a method for a touch screen using a general camera and image processing method to recognize touch objects and coordinate calculation method to single and multi-point touch screen. It has the same recognition performance as an infrared touch screen for single-point method. And it does not have ghost point problem by using distance information of touch object and camera in multi-point touch system. But recognition performances of multi-point touch screen are less than single-point. If we improve execution time, this method can replace an infrared method for a single point touch screen, according to result of experience.

On the Suitability of the Korean Standard Time (한국 표준시 제도의 타당성에 대한 연구)

  • Hong, Sung-Gil;Ryu, Chan-Su;Kim, Young-Sung
    • Journal of the Korean earth science society
    • /
    • v.23 no.6
    • /
    • pp.494-506
    • /
    • 2002
  • The Korean Standard-Time (KST) in practice is about 30 minutes earlier than Korea’s solar-time. Suitability of tile KST is analysed by whether it is suitable for the society in general and for the mental and physical health of the Korean people. About 56% of the countries in the world use single standard-time coincident, 18% are 30 minutes earlier, and 21% are an hour or more earlier than their solar-times, respectively, and only 5% have standard-times 30 minutes later than their solar-time. This means adoption of the standard-time earlier than the solar-time is rather acceptable in most countries without any harm to the mental and physical health of their people. Because Korea is located on the western margin of the I-time zone (which is used standard longitude of 135$^{\circ}$E and is used as KST), KST is about 30 minutes earlier than Korea’s solar-time. This situation does not seem to affect adversely the physical, physiological or psychological activities of the people of Korea. It also helps in effective use of the daily time schedule throughout the year, moreover it diminishes the necessity of the summer-time system in the Korea. If H$^{\ast}$-time of the longitude of 127.5$^{\circ}$E that passes through middle of the Korean peninsular is used as KST, non-integer time difference from UTC is inevitable which may be of great inconvenience, and also the introduction of a summer-time system like most countries in high latitude, using their standard-time coincidentally with or even earlier than their solar time, will become essential.

The Etrance Authentication Systems Using Real-Time Object Extraction and the RFID Tag (얼굴 인식과 RFID를 이용한 실시간 객체 추적 및 인증 시스템)

  • Jung, Young Hoon;Lee, Chang Soo;Lee, Kwang Hyung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.4 no.4
    • /
    • pp.51-62
    • /
    • 2008
  • In this paper, the proposal system can achieve the more safety of RFID System with the 2-step authentication procedures for the enhancement about the security of general RFID systems. After authentication RFID Tag, additionally, the proposal system extract the characteristic information in the user image for acquisition of the additional authentication information of the user with the camera. In this paper, the system which was proposed more enforce the security of the automatic entrance and exit authentication system with the cognitive characters of RFID Tag and the extracted characteristic information of the user image through the camera. The RFID system which use the active tag and reader with 2.4GHz bandwidth can recognize the tag of RFID in the various output manner. Additionally, when the RFID system have errors, the characteristic information of the user image is designed to replace the RFID system as it compare with the similarity of the color, outline and input image information which was recorded to the database previously. In the result of experiment, the system can acquire more exact results as compared with the single authentication system when it using RFID Tag and the information of color characteristics.

A Study on the Attrition Rate of Facility Using the WinJMEM (WinJMEM 모형을 이용한 시설물 피해산정에 관한 연구)

  • 백종학;이상헌
    • Journal of the military operations research society of Korea
    • /
    • v.28 no.2
    • /
    • pp.70-84
    • /
    • 2002
  • This paper deals with the attrition rate of major facility such as a particular building that is one of the most important target in the war time. In order to estimate the attrition rate, we use JAWS, WinJMEM which are programed by JTCG/ME of AMSAA and spreadsheet package which is able to assist the limitation of those programs and calculate all the procedure of this computation. This method uses the effectiveness index(El) which indicates the numerical measure of the effectiveness of a given weapon of a given target. The range error probable(REP) and the deflection error probable(DEP) in the ground plane also should be used. Those mean the measure of delivery accuracy of the weapon system. In this paper, it is improved that the El can be obtained from the regression analysis using the weight of the warhead explosive as the independent variable. It implies that we are able to obtain the El and the conditional probability of damage of the enemy weapon. After that, the single-sortie probability of damage can be computed using WinJMEM or another assistant program such as the spreadsheet package which shows the result immediately.

A Study on the DSM Effect of a Refrigerant-Subcooling Refrigeration System with an Ice Storage Tank (축열조를 이용한 냉매과냉각 시스템의 전력수요관리 효과에 대한 연구)

  • Kim, Jeong-bae;Lee, Eun-Ji;Lee, Dong-Won
    • Korean Journal of Air-Conditioning and Refrigeration Engineering
    • /
    • v.22 no.12
    • /
    • pp.845-851
    • /
    • 2010
  • This study was experimentally performed to find the effects of refrigerant subcooling in the refrigeration system and to propose how to get the efficient use of energy. A refrigerant-subcooling refrigeration system consisted of a typical single vapor-compression refrigeration cycle, a subcooler, and an ice storage tank. The degree of subcooling at the exit of the condenser can be increased by the heat transfer between the subcooler and the ice storage tank. The cold heat in the ice storage tank was stored by using the refrigeration cycle during night time and then used to absorb the heat from the subcooler during daytime. The cooling capacity and COP of this system were higher than those of the conventional system due to the increase in the degree of subcooling. Typically, the refrigerant-subcooling system showed superior performance to the conventional refrigeration system and would also contribute to load leveling.