• Title/Summary/Keyword: use of digital devices

Search Result 559, Processing Time 0.025 seconds

Design and Implementation of Elevator Control and Information System based on Media Streaming Service (미디어 스트리밍 서비스 기반 엘리베이터 제어 및 정보 시스템 설계 및 구현)

  • Kim, Woon-Yong;Park, Seok-Gyu
    • Journal of Advanced Navigation Technology
    • /
    • v.14 no.3
    • /
    • pp.409-414
    • /
    • 2010
  • Recently, It has enlarged various service requirements for the market of elevator with the environment of IT convergency. In this paper, we propose the information and control system of elevator based on media streaming service that is extended from the existing control system of an elevator. There is the service environments based on Internet for architecture of information communication in the framework of the suggested streaming service. We use this framework to operate and integrate the various services of elevator system. And also, we so apply to the user requirements easily that we can construct the smart elevator environment by convergence home network and various electronic devices based on IT.

Fine Digital Sun Sensor(FDSS) Design and Analysis for STSAT-2

  • Rhee, Sung-Ho;Jang, Tae-Seong;Ryu, Chang-Wan;Nam, Myeong-Ryong;Lyou, Joon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1787-1790
    • /
    • 2005
  • We have developed satellite devices for fine attitude control of the Science & Technology Satellite-2 (STSAT-2) scheduled to be launched in 2007. The analog sun sensors which have been continuously developed since the 1990s are not adequate for satellites which require fine attitude control system. From the mission requirements of STSAT-2, a compact, fast and fine digital sensor was proposed. The test of the fine attitude determination for the pitch and roll axis, though the main mission of STSAT-2, will be performed by the newly developed FDSS. The FDSS use a CMOS image sensor and has an accuracy of less than 0.01degrees, an update rate of 20Hz and a weight of less than 800g. A pinhole-type aperture is substituted for the optical lens to minimize the weight while maintaining sensor accuracy by a rigorous centroid algorithm. The target process speed is obtained by utilizing the Field Programmable Gate Array (FPGA) in acquiring images from the CMOS sensor, and storing and processing the data. This paper also describes the analysis of the optical performance for the proper aperture selection and the most effective centroid algorithm.

  • PDF

Development of Smartwatch game contents utilizing the Watch face (워치페이스를 활용한 스마트워치 게임 개발)

  • Yoo, Wang-Yun;Woo, Tack
    • Journal of Korea Game Society
    • /
    • v.16 no.3
    • /
    • pp.127-138
    • /
    • 2016
  • Watchface is a content accounted for the largest number of current Smartwatch content posted on the App Store. However, the watch face itself does not find that the game content. Games operated in connection with the Watchface can minimize game controls and increase accessibility, while decreasing battery use, which ultimately can enhance immersion into the game. Beginning with background research on wearable devices, the current study puts forth development methodologies encompassing the entirety of the content development process from content design, to production. Through the current study, the author hopes to the ultimate effect of vitalizing Smartwatch game development.

The Windows Push Server System with Smart Device Identifying Fingerprints over IEEE 802.15.4 Protocol (IEEE 802.15.4 통신을 활용한 지문인식 스마트 기기 연동 푸쉬서버 시스템)

  • Choi, Sung-Ja;Kang, Byeong-Gwon
    • Journal of Digital Convergence
    • /
    • v.10 no.11
    • /
    • pp.419-425
    • /
    • 2012
  • In these days, the trends of home networking system is implementation of easily configured system with home security of emergency alarm and visitor verification services. In this paper, we implemented push server system based on Arduino of open source physical computation platform to verify visitors for the homes without home networking services. In the suggested system, visitor verification is performed in and out of home, and home access security of the system could be constructed with low-cost price by use of windows push server system and smart devices with alarm operation in corresponding to not allowed access trying.

A study on the Application of Augmented Reality Technology Exhibition Environment (증강현실 기술의 전시 환경의 응용에 관한 연구)

  • Lee, Jae-Young;Kwon, Jun-Sik
    • Journal of Digital Contents Society
    • /
    • v.16 no.6
    • /
    • pp.943-950
    • /
    • 2015
  • In this study, we propose an annotation system exhibits a secondary role using augmented reality in the exhibition environment. Common methods that utilize the description of the picture or photo booklet or audio device to the exhibition and in the form of viewing the exhibits while people describe method is used. We are using augmented reality technology, in addition to these conventional methods to provide a variety of information about the exhibits utilizing text, photos, video and audio of the multimedia medium. Where visitors can use a smart phone in hand deulgoseo, the exhibition becomes a secondary role by applying the Augmented Reality technology in tablet-based devices.

A Development of Comprehensive Framework for Continuous Information Security (기업의 지속적 정보보안 강화를 위한 접근법 개발)

  • Jeong, Tae-Seok;Yim, Myun-Seong;Lee, Jae-Beom
    • Journal of Digital Convergence
    • /
    • v.10 no.2
    • /
    • pp.1-10
    • /
    • 2012
  • The growth in computer use has ushered increased concerns of information security throughout the world. Historically, researchers interested in the security of information systems have long investigated extensively themselves with building technological countermeasures in order to prevent several information security problems. However, due to infusion of more procedures and logical or physical devices within the information environment, no system can be completely secure. Therefore, keeping IT environment safe demands a more comprehensive understanding of the phenomenon, which requires broadening information security far beyond the technical aspects. This study is aimed at proposing a information security framework from holistic view.

A Review of Research Trends on Brain Computer Interface(BCI) Games using Brain Wave (뇌파를 이용한 BCI 게임 동향 고찰)

  • Kim, Gui-Jung;Han, Jung-Soo
    • Journal of Digital Convergence
    • /
    • v.13 no.6
    • /
    • pp.177-184
    • /
    • 2015
  • Brain-computer interface is (BCI) is a communication device that the brain activity is directly input to the computer without input devices, such as a mouse or keyboard. As the brain wave interface hardware technology evolves, expensive and large EEG equipment has been downsized cheaply. So it will be applied to various multimedia applications. Among BCI studies, we suggest the domestic and foreign research trend about how the BCI is applied about the game almost people use. Next, look at the problems of the game with the BCI, we would like to propose the future direction of domestic BMI research and development.

A Beverage Can Recognition System Based on Deep Learning for the Visually Impaired (시각장애인을 위한 딥러닝 기반 음료수 캔 인식 시스템)

  • Lee Chanbee;Sim Suhyun;Kim Sunhee
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.19 no.1
    • /
    • pp.119-127
    • /
    • 2023
  • Recently, deep learning has been used in the development of various institutional devices and services to help the visually impaired people in their daily lives. This is because not only are there few products and facility guides written in braille, but less than 10% of the visually impaired can use braille. In this paper, we propose a system that recognizes beverage cans in real time and outputs the beverage can name with sound for the convenience of the visually impaired. Five commercially available beverage cans were selected, and a CNN model and a YOLO model were designed to recognize the beverage cans. After augmenting the image data, model training was performed. The accuracy of the proposed CNN model and YOLO model is 91.2% and 90.8%, respectively. For practical verification, a system was built by attaching a camera and speaker to a Raspberry Pi. In the system, the YOLO model was applied. It was confirmed that beverage cans were recognized and output as sound in real time in various environments.

A Design on Time Structure of MPEG-21 Event Reporting for Digital Contents over Multimedia Framework (멀티미디어 프레임워크에서의 디지털 콘텐츠 사용을 위한 MPEG-21 이벤트 리포팅 Time에 관한 연구)

  • Ji, Kyung-Hee;Moon, Nam-Mee;Kim, Jae-Gon
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.5
    • /
    • pp.587-595
    • /
    • 2005
  • The vision for MPEG-21 is to define a multimedia framework to enable transparent and augmented use of multimedia resources across a wide range of networks and devices used by different communities MPEG-21 Event Reporting is required within the MPEG-21 Multimedia Framework in order to provide a standardized means for sharing information about Events amongst Peers and Users. There are several Time used in MPEG-21 Event Reporting. In this paper, we analyze and categorize various kinds of Time used in Event Reporting. And we define ERTimeType to be applied for every. Time used in Event Reporting and implement it by XML to support interoperability of standard. The ERTimeType structure we defined is established its objectivity as it is selected to 'ISO/IEC 21000-Part IS: Event Reporting WD 2.0'.

  • PDF

The Effects of User's Security Awareness on Password Security Behavior (정보보안의식이 패스워드 보안행동에 미치는 영향에 관한 연구)

  • Ha, Sang-Won;Kim, Hyoung-Joong
    • Journal of Digital Contents Society
    • /
    • v.14 no.2
    • /
    • pp.179-189
    • /
    • 2013
  • With the rapid development of information technology in 21st century, networks are being used with various devices. Most human actions are processed through cyber space, and it is no longer separate from daily life; it has changed into one of the most important aspects of human life. Unfortunately, in cyber space, certification method has not only technical problems, but also ethological problems. Many users seemed to use the same password throughout several sites. And for a long period they refused to change it or made a small change from the earlier password. This research aims to discuss general factors of choosing and using passwords within information security through statistical analysis.