Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
2001.06c
-
The computer programs based upon graphic user interface(GUI) became commonplace with the advance of computer technology. Nevertheless, programs for the visually-handicapped have still remained at the level of TTS(text to speech) programs and this prevents many visually-handicapped from enjoying the pleasure and convenience of the information age. This paper is, paying attention to the importance of character recognition in images, about the configuration of the system that converts text in the image selected by a user to the speech by extracting the character part, and carrying out character recognition.
-
Learning vector quantization (LVQ) is a supervised learning technique that uses class information to move the vector quantizer slightly, so as to improve the quality of the classifier decision regions. In this paper we propose a selection method of initial codebook vectors for a teaming vector quantization (LVQ3) using support vector machines (SVM). The method is experimented with artificial and real design data sets and compared with conventional methods of the condensed nearest neighbor (CNN) and its modifications (mCNN). From the experiments, it is discovered that the proposed method produces higher performance than the conventional ones and then it could be used efficiently for designing nonparametric classifiers.
-
In reinforcement teaming, Q-learning converges quite slowly to a good policy. Its because searching for the goal state takes very long time in a large stochastic domain. So I propose the speedup method using the Q-value initialization for model-free reinforcement learning. In the speedup method, it learns a naive model of a domain and makes boundaries around the goal state. By using these boundaries, it assigns the initial Q-values to the state-action pairs and does Q-learning with the initial Q-values. The initial Q-values guide the agent to the goal state in the early states of learning, so that Q-teaming updates Q-values efficiently. Therefore it saves exploration time to search for the goal state and has better performance than Q-learning. 1 present Speedup Q-learning algorithm to implement the speedup method. This algorithm is evaluated. in a grid-world domain and compared to Q-teaming.
-
In this paper, we propose growing algorithm of wavelet neural network. It is growing algorithm that adds hidden nodes using wavelet frame which approximately supports orthogonality in wavelet neural network based on wavelet theory. The result of this processing can be reduced global error and progresses performance efficiency of wavelet neural network. We apply the proposed algorithm to approximation problem and evaluate effectiveness of proposed algorithm.
-
In this paper, we design a nonlinear adaptive controller using wavelet neural network. The method proposed in this paper performs for a nonlinear system with unknown parameters, identification with using a wavelet neural network, and then a nonlinear adaptive controller is designed with those identified informations. The advantage of the proposed control method is simple to design a controller for unknown nonlinear systems, because we use the identified informations and design parameters are positioned within a negative real part of s-plane. The simulation results showed the effectiveness of proposed controller design method.
-
In this paper, we Propose a new computational approach to stability analysis of the linguistic control system. The FLC is assumed to be modeled as a combination of affine system. Stability is tested via the LMI. Computer simulation result is given to illustrate the validity of the suggested methodology.
-
RBFN has some problem that because the basis function isn't orthogonal to each others the number of used basis function goes to big. In this reason, the Wavelet Neural Network which uses the orthogonal basis function in the hidden node appears. In this paper, we propose the composition method of the actual function in hidden layer with the scaling function which can represent the region by which the several wavelet can be represented. In this method, we can decrease the size of the network with the pure several wavelet function. In addition to, when we determine the parameters of the scaling function we can process rough approximation and then the network becomes more stable. The other wavelets can be determined by the global solutions which is suitable for the suggested problem using the genetic algorithm and also, we use the back-propagation algorithm in the learning of the weights. In this step, we approximate the target function with fine tuning level. The complex neural network suggested In this paper is a new structure and important simultaneously in the point of handling the determination problem in the wavelet initialization.
-
In this paper, we applied the high-performance PGAP(Parallel Genetic Algorithm Processor) to recognizing rotated pattern. In order to perform this research efficiently, we used Multi-PGAP system consisted of four PGAP. In addition, we used mental rotation based on the rotated pattern recognition mechanism of human to reduce the number of operation. Also, we experimented with distinguishing specific pattern from similar coin patterns and determine rotated angle between patterns. The result showed that the development of future artificial recognition system is feasible by employing high performance PGAPS.
-
With all the researches to define human genom and to look for some new bio-activated material in the bio-technology field recently, it is more highly needed to analyse DNA or so called Material than ever before. First, the lanes are extracted based on histogram analysis and projection technique. And then three other approaches are applied for band extraction: SB, RG-1, and RG-2. In SB method, a search line is set dividing each lane equally and vertically to find peaks and valleys. And according to them, minimum enclosing rectangle of each band is determined. In RC-1 approach, on the other hand, band areas are extracted by region growing with the peaks as seeds, avoiding the overlap with the neighboring bands. In RC-2 approach, peaks and valleys are searched in two lines that trisect the lane vertically, and the pair of peaks in the same band are determined, and then used to grow the region. To compare the accuracy of the three suggested methods, we measure the location and amount of bands. The result shows that the mean deviation of the location is 0.06, 0.03, and 0.01 for SB, RG-1, and RC-2 respectively. And the mean deviation of the amount of bands is 0.08, 0.05, and 0.02 for SB, RG-1, and RG-2 respectively. In conclusion, the RG-2 method suggested in this paper appears to be the most reliable on the degree of the accuracy in measuring the location and amount of bands
-
There are over a billion web sites on the Internet and the number of web sites is still growing. This paper describes an information system. We have designed Trigger Agent System based on RMI (Remote Method invocation) and distribution object system. In this paper, we introduce Trigger agent system which is one of Intelligent agent system.
-
This thesis proposes the design method of intelligent robot agent system and deals with the implementation of the system which is able to produce key internet statistics. It is believed that the statistics lead to effective investment from internet industry on its development. The system consists of robot agent process module, statistics production module and management module, and has an algorithm that can produce periodically the number of domestic homepages, active domain using .kr or gTLD and intenet hosts. It provides the result of the implementation and performance of the system as well.
-
This paper took advantage of SVD (Singular value Decomposition) techniques of LSI(Latent Semantic Indexing) to grasp easily terminology distribution. Existent LSI did to static database, propose that apply to dynamic database in this paper. But, if dynamic applies LSI to database, updating problem happens. Existent updating way is Recomputing method, Folding-in method, SVD-updating method. Proposed QR decomposition method to show performance improvement than existent three methods in this paper.
-
Recently Hwang and Li[1] proposed a remote user authentication scheme using smart cards. Their scheme is based on the ElGamal public key cryptosystem and does not need to maintain a password table for verifying the legitimacy of the login users. In this paper, we proposed an advanced user authentication scheme using smart cards. Unlike Hwang and Li's scheme, smart card contains a pair of public parameters(h, P) where h is a hash function which is used in login phase. In result, we reduce one exponential computation frequency in login phase and two exponential computation frequencies in authentication phase with comparing the Hwang and Li's scheme. The proposed scheme not only provides the advantages as security of Hwang and Li's scheme, but also reduces computation cost.
-
In this paper, we present the development of a JavaCard for public key crypto algorithms and its performance evaluation. To make a high performance for the public key crypto algorithm such as RSA and ECC on a JavaCard, we have implemented a crypto coprocessor in hardware and ported it to the card operating system and virtual machine environments. The performance of the public key crypto algorithms on the JavaCard shows that our JavaCard is suitable for If card applications which needs high performance and high level of security.
-
This paper discusses a data mining technique for time series analysis of traffic data, which provides useful knowledge for network configuration management. Commonly, a network designer must employ a combination of heuristic algorithms and analysis in an interactive manner until satisfactory solutions are obtained. The problem of heuristic algorithms is that it is difficult to deal with large networks and simplification or assumptions have to be made to make them solvable. Various data mining techniques are studied to gain valuable knowledge in large and complex telecommunication networks. In this paper, we propose a traffic pattern association technique among network nodes, which produces association rules of traffic fluctuation patterns among network nodes. Discovered rules can be utilized for improving network topologies and dynamic routing performance.
-
In this paper, We propose the new interconnection network which is designed to edge numbering labeling using postorder traversal which can reduce diameter when it has same node number with Hypercube, which can reduce total node numbers considering node degree and diameter on Fibonacci trees and its jump sequence of circulant is Fibonacci numbers. It has a simple (shortest oath)routing algorithm, diameter, node degree. It has a spaning subtree which is Fibonacci tree and it is embedded to Fibonacci tree. It is compared with Hypercube. We improve diameter compared with Hypercube.
-
This paper has analyzed an SNMP architecture, Structure of Management Information, Management Information Base, Also in this paper, the Design of GUI environment necessary for the implementation of SNMP Manager Application, Software Module related to the boards of DSLAM system, and MIB that stores management informations are defined and implemented in this paper
-
We propose a new method for image coding that it is based on highly related property between a spatial image and wavelet transform image. The characteristics have an important role in the design of proposed algorithm. This algorithm for image coding is to obtain high compression rate at low bit rate. The other side, the high activity regions are related to significant coefficients which give much influence to image reconstruction, because they mean the important factor to represent the appearance of images such as edge or boundary. For some images with low activity, we can obtain the reconstructed image with near to 30 dB at 150: 1 compression ratio.
-
In general, the informations of the inner image that user interested in are limited to a special domain. In this paper, as using Wavelet Transform for dividing image into high frequency and low frequency, We can separate foreground including many data. After calculating object boundary of separated part, We extract special features using Color Coherence Vector. According to results of this experiment, the method of comparing data extracting foreground features is more effective than comparing data extracting features of entire image when we extract the image user interested in.
-
The retrieval techniques of multimedia contents have been developed along with MPEG-7. But as human being distinguishes objects with the eyesight, researches for high retrieval efficiency applied a high level computer vision technology are difficult because of the increase of processing time caused by complexity of algorithm, and the difficulty of an implementation. In this paper, for an effective news retrieval using the human face information, we suggest a method which extracts face information like as location, size and number of the face in the news video, and then we prove the validity of method by experiment.
-
3D parallel rasterizer on a single chip for high performance generates consistency problem. To solve this problem, 3D parallel rasterizer with consistency buffer Os proposed. This can simultaneously process a plurality of Primitives. Experimental results show 1.1-2.0x speedups using a simple model. This method can achieve high performance and cost effectiveness.
-
This paper had been analyzed a triangle setup in 3-D graphics and the necessity of high throughput division unit. And then this paper had been designed a pipelined division unit modifying series expansion algorithm and checked the error and performance of the designed division unit.
-
In this paper, we propose a delay-constrained retransmission method to control packet error or loss in common internet. The Delay Regulator(or Jitter Buffer) which is used to control errors caused by unreliable UDP connection, stores received data packets fDr a small amount of time to prevent network jitter from affecting display quality, which causes constant delay. In this paper, we propose a retransmission method to increase efficiency of ARQ(Automatic Repeat reQuest) by using characteristic of delay regulator.
-
A common network such as internet does not provide a guaranteed network bandwidth to accommodate multimedia service in a reliable fashion. In this paper, we propose a new rate control mechanism for multimedia service on the internet which is adaptive to the dynamic QoS in real-time. Also we adapt an QoS monitoring module and real-time transmission control module to adapt dynamic network bandwidth. To do this, we used layer attribution of media data and also considered loss rate and buffer threshold in receiver side for measurement of dynamic QoS.
-
Over the last few years, streaming audio and video content on Internet sites has increased at unprecedented rates. The predominant method of delivering video over the current Internet is video streaming such as SureStream or Intelligent Stream. Since each method provides the client with only one data stream from one server, it often suffers from poor qualify of pictures in the case of network link congestion. In this paper, we propose a novel method of delivering video stream based on wavelet to a client by utilizing multi-threaded parallel connections from the client to multiple servers and to provides a better way to address the scalability functionalities. The experimental results show that the video quality delivered by the proposed multithreaded stream could significantly be improved over the conventional single video stream methods.
-
In this paper, "The PLC Controlling on Web Browser" is designed and implemented to remote control and to monitor FA system. Protocol bidirectional communication with PLC is written and sotted. Then Administration system sets Web server and JAVA Sevelet Program. The client system located at the monitoring Web browser are a JAVA Sevelet base system, and sends some commands to the server system which guards and controls the PLC system. The commands are delivered to the server system and the driver software exists in the server controls the PLC system directly.
-
This paper proposes an efficient algorithm of extracting anchor blocks for a semantic structure of a news video. We define the FRFD to calculate the frame difference of anchor face position rather than simply uses the general frame difference. Since, The FRFD value is sensitive to existing face in frame, anchor block can be efficiently extracted. In this paper, an algorithm to extract a face position using partial decoded MPEG data is also proposed. In this way a news video can be structured semantically using the extracted anchor blocks.
-
XML (extensible Markup Language) is a flexible way to create common information formats and share both the format and the data on the World Wide Web, intranets, and elsewhere. A document type definition (DTD) is a specific definition of the rules of the Standard Generalized Markup Language. A relational database management system (RDBMS) is a program that lets you create, update, and administer a relational database. An RDBMS takes Structured Query Language (SQL) statements entered by a user or contained in an application program and creates, updates, or provides access to the database. This paper has been studied a method of mappings from XML DTD to RDB schemas based on object model.
-
In this paper, we designed and implemented a preliminary system of web-based real-time interactive courseware on a RealServer System by using webcasting streaming technology and Javascript language to increase of learning effects and its efficiency. From the experiments, it is known that internet service suppliers and client users could interact with each other efficiently in real-time through the implemented courseware.
-
In this paper, a method of generating the facial gesture CG animation on different avatar models is provided. At first, to edit emotional expressions efficiently, regeneration of the comic expression on different polygonal mesh models is carried out, where the movements of the cheeks and numerical methods. Experimental results show a possibility that the method could be used for intelligent avatar communications between Korea and Japan.
-
Nowadays, Internet users are widespread internationally. Fallowing the users requirements, server has to transfer real-time multimedia data to many clients. Multicast can significantly reduce the system overhead and the network resource waste, so it supports efficient mechanism when server has to transfer same data to many clients. We can deliver multimedia data transfer in real-time using Patching Algorithm which has no delay for service request. And multicast algorithm can support different network bandwidth using Receiver driven Layered Multicast under heterogeneous environment network. The purpose of this paper is to suggest an algorithm that can create new multicast group adequately and transfer real-time multimedia data efficiently under heterogeneous environment.
-
오류 제어 부호화(ECC : Error Control Coding) 의 기법을 이용한 이진 영상의 강인한 워터마킹에 관하여 다룬다. 워터마크를 채널 부호화법을 이용하여 부호화하고, 매입할 대상 영상을 DCT변환을 하여 주파수 영역으로 표현한 후, 부호화된 워터마크를 저전력 영역과 고전력 영역에 매입한다. 이러한 과정을 거친 워터마크된 영상은 외부의 다양한 공격에 대해 강인함을 실험을 통하여 보인다.
-
Numerous challenges have been made to retrieve video using the contents. Recently MPEG-7 had set up a set of visual descriptors for such purpose of searching and retrieving multimedia data. Among them, color and motion descriptors are employed to develop a content-based video retrieval system to search for videos that have similar characteristics in terms of color and motion features of the video sequence. In this paper, the performance of the proposed system is analyzed and evaluated. Experimental results indicate that the processing time required for a retrieval using MPEG-7 descriptors is relatively short at the expense of the retrieval accuracy.
-
This paper has been studied for alphabet recognition by using MPEG-7 descriptors. As an application of MPEG-7, the algorithms in this paper have employed Homogeneous Texture descriptor and Edge Histogram descriptor. For confident matching a voting system is used with a tree structure,
-
In this paper, a new algorithm for extracting and recognizing characters from video, without pre-knowledge such as font, color, size of character, is proposed. To improve the recognition rate for videos with complex background at low resolution, continuous frames with identical text region are automatically detected to compose an average frame. Using boundary pixels of a text region as seeds, we apply region filling to remove background from the character Then color clustering is applied to remove remaining backgrounds according to the verification of region filling process. Features such as white run and zero-one transition from the center, are extracted from unknown characters. These feature are compared with a pre-composed character feature set to recognize the characters.
-
This paper presents a phase-based stereo matching algorithm in order to efficiently extract 3-dimensional objects from two 2D images. Conventional phase-based methods, especially using windowed Fourier phases, inherit good properties in the cage of hierarchical approaches, because they basically use a multi-resolution phase map. On the contrary, their computational cost is too heavy. Therefore, a fast hierarchical approach, using multi-resolution phase-based strategy and reducing redundancies of phase calculations based on FFT concept is proposed in this paper. In addition, a structural matching algorithm on the phase domain is presented to improve the matching quality. In experimental results. it is shown that the computation loads are considerably reduced about 8 times and stable outputs are obtained from various images.
-
Fuzzy controllers also show good performance In case of the systems being nonlinear and difficult to solve. But these fuzzy controllers have problems which have to decide suitable rules and membership functions. In general we decide those using the heuristic methods or the experience of experts. Therefore, many researchers have applied genetic algorithms to make fuzzy rule automatically. In this paper, we suggest a new coding method and a new crossover method to maintain the good fuzzy rule base and the shape of membership
-
This paper has been studied a Adaptive Mutation rate Genetic Algorithm Processor. Genetic Algorithm(GA) has some control parameters such as the probability of bit mutation or the probability of crossover. These value give a priori by the designer There exists a wide variety of values for for control parameters and it is difficult to find the best choice of these values in order to optimize the behavior of a particular GA. We proposed a Adaptive mutation rate GA within a steady-state genetic algorithm in order to provide a self-adapting mutation mechanism. In this paper, the proposed a adaptive mutation rate GAP is implemented on the FPGA board with a APEX EP20K600EBC652-3 devices. The proposed a adaptive mutation rate GAP increased the speed of finding optimal solution by about 10%, and increased probability of finding the optimal solution more than the conventional GAP
-
This paper partially presents a Hierachical neural network architecture for providing the intelligent control of complex Automatic Transmission(A/T) system which is usually nonlinear and hard to model mathematically. It consists of the module to apply or release an engine brake at the slope and that to judge the intention of the driver. The HNN architecture simplifies the structure of the overall system and is efficient for the learning time. This paper describes how the sub-neural networks of each module have been constructed and will compare the result of the intelligent A/T control to that of the conventional shift pattern.
-
In recent years, many studies regarding the modeling of fuzzy system have been conducted. In this paper, a new computational approach to modeling of linguistic fuzzy system is proposed The fuzzy system is modeled as a combination of affine systems, The proposed method can be used in a rigorous stability analysis of fuzzy system including the linguistic fuzzy controller.
-
This paper proposes training algorithms of neuro-fuzzy systems. First, we introduce a structure training algorithm, which produces the necessary number of hidden nodes from training data. From this algorithm, initial fuzzy rules are also obtained. Second, the parameter training algorithm using evolution strategy is introduced. In order to show their usefulness, we apply our neuro-fuzzy system to a nonlinear system identification problem. It was found from experiments that proposed training algorithms works well.
-
영상에 존재하는 객체들을 인식하기 위해서는 먼저 영상의 영역분할이 필요하다. 통계적 모델을 이용한 영상의 영역분할은 미리서 분할하고자 하는 클러스터의 수를 결정한 후 이를 토대로 영상을 분할하게 된다. 그러나 영상마다 특성상 분할하고자 하는 클러스터 수가 다를 경우 이를 수동적으로 해주는 것은 비능률적이다. 따라서 본 논문은 영상의 영역분할에 통계적 모델에서 미리 결정해줘야 하는 클러스터의 수 문제를 자동으로 검출하고 퍼지 c-Means 글러스터링 알고리즘을 통한 영상의 영역분할 시 노이즈문제를 이웃한 픽셀들의 멤버쉽 값을 평균화합으로써 해결하는 방법을 제안하였다.
-
In recent, a morphological analyzer be used for indexing system in information retrieval system. A morphological analyzer as a indexing system must have multiprocessing ability to deal with multiple users and documents. To meet the needs of these, we propose a morphological analyzer with multi-threads method. To use multi-threads method, we consider memory allocation problem, threads synchronization problem, code optimization and so on. In this paper, first, we report several manners for multi-threads. And next, to evaluate our proposed system, we make a comparison test between proposed system and existing system.
-
In this paper, a cascade fuzzy control method is proposed, which presents a robustness of the effect of disturbances, and in which the number of rules of the controller increase linearly instead of exponentially with the number of input variables. The proposed fuzzy control method is composed of cascade structure. Each stage has a state and a change of state, and one consequent control variable, and previous consequent control variable is an input of next stage. Simulation of the proposed controller, which is applied to the linear and nonlinear system as SISO (single-input single-output) system, showed that the proposed control method has a good control performance and robustness of disturbances compared with a conventional fuzzy control method.
-
In this paper, we propose a ADALINE controller using fuzzy-backpropagation algorithm to adjust weight. In the proposed ADALINE controller, using fuzzy algorithm for traning neural network, controller make use of ADALINE due to simple and computing efficiency. This controller includes adaptive learning rate to accelerate teaming. It applies to servo-motor as an controlled process. And then it take a simulation for the position control, so the verify the usefulness of the proposed ADALINE controller.
-
Components are abstractions of system level computational entities, connectors are abstractions of component interrelationships. we propose connectors as transferable abstractions of system level component interconnection and inter-operation. Connectors are architectural abstractions of component coordination in the abstract architecture of a system only. Connectors describe a collaboration rationale for component adaptations, which are then modeled in the concrete architecture of a system.
-
In this paper, we proposed and analyzed a new class of irregular fault-tolerant multistage interconnection network named as Extended-QT(Quad Tree) network. E-QT network is extended QT network. A unique path MIN usually is low hardware complexity and control algorithm. So we proposes a class of multipath MIN which are obtained by adding self-loop auxiliary links at the a1l stages in QT(Quad Tree) networks so that they can provide more paths between each source-destination pair. The routing of proposed structure is adaptived and is based by a routing tag. Starting with the routing tag for the minimum path between a given source-destination pair, routing algorithm uses a set of rules to select switches and modify routing tag. Trying the self-loop auxiliary link when both of the output links are unavailable. If the trying is failure, the packet discard. In simulation, an index of performance called reliability and cost are introduced to compare different kinds of MINs. As a result, the prouosed MINs have better capacity than 07 networks.
-
In the EKMT system, the part of Korea generation makes Korea sentence by using information obtained in the part of transfer. In the case of Korea generation, the conventional EKMT system don't arrange hierarchical word order and performs word order in the only modifier word. This paper proposes Korean adverb odering rule in English-Korean Machine Translation system which generates Korean sentence.
-
In this paper, an intelligent notification system has been presented. The system operates on both wired and wireless internet. When a new message has been uploaded in a bulletin board systems(BBS) on HTTP web server, it sends the same message to their cellular phones of all members of a given group at the same time via SMS(Short Message Service). In addition, on reading SMS message, those who read them respond to a WAP server using pulling technique via wireless internet. Therefore, the HTTP server does know the members who did not read the message yet. Two different web servers, the HTTP server and the WAP server, running on a single system has been implemented. They share the single database which covers al1 related information about the BBS. The set of experiments shows that the notification system works well as we have expected Thus, we conclude that the proposed system that operates on both wired and wireless internet is the one of successful model for such environments.
-
Key frame extraction is an important method of summarizing a long video. This paper propose a technique to automatically extract several key frames representative of its content from video. We use the color layout descriptor to select key frames from video. For selection of key frames, we calculate similarity of color layout features extracted from video, and extract key frames using similarity. An important aspect of our algorithm is that does not assume a fixed number of key frames per video; instead, it selects the number of appropriate key frames of summarizing a long video Experimental results show that our method using color layout descriptor can successfully select several key frames from a video, and we confirmed that the processing speed for extracting key frames from video is considerably fast.
-
The detection of face in color images is important for many multimedia applications. It is the first step for face recognition and ran be used for classifying specific shots. In this paper describes a new method to detect faces in color images based on the skin color and hair color. In the first step of the processing, regions of the human skin color and head color are extracted and those regions are found by their color information. Then we converted binary scale from the image. Then we are connected regions in a binary image by label. In the next step we are found regions of interesting by their region information and some conditions.
-
Role-Based Access Control(RBAC) is a flexible and policy-neutral access control technology. But, for large systems, managing roles, users, permissions and their interrelationships is a formidable task that cannot be centralized in a small team of security administrators. Using RBAC to manage RBAC provides addition히 administrative convenience. In this paper we demonstrate the implementation of one of the components of ARBAC99 which deals with permission-role assignment and is called PRA99. We implement it by using EJB component and use Oracle stored procedures to implement it.
-
There are two standards currently compete for the dominance of IP telephony architecture. Those are H.323 protocol suit by International Telecommunication Union Sector T(ITU-T) and Session Initiation Protocol/Session Description Protocol(SIP/SDP) by International Engineering Task Force(IETF). This paper has been studied a adaption VoIP in home networking, Especially SIP-based call screening service in home gateway. And then this paper has designed SIP-based call screening service in home gateway working protocol, verified them.
-
Wireless Internet based in WAP(Wireless Application Protocol) has been a very useful and attractive means picking up information through service irrelavant to time and space. And more the request of user has been diverse. In this paper, we implemented a Diet Menu System using expert knowledge-based rules on the WAP environment. This enables the moving man interested in diet to get information through wireless mobil hand phone. There are only connection-oriented system for this type of service till now. This paper has designed basic expert knowledge rules for result display, verified and implemented for WAP environment.
-
When we execute a online game in the network, a lots of game informations and user informations are transfered between game server and game clients. This information has deferent data structure and communication protocol. So, game developers will be design the communication protocols and packet structures after analyze the game. And, they will be design the database for user management. It will be lots of overload to the game developers. From a user point of view, they must be register to each game server to use several games. It is a undesible operation for the game users. This problems are solved by using the communication server which operates commonly with several game servers. Game providers can get the benefit of multiple access of users and get freedom from user management. Game users can access the several games which connected to communication server by register the communication server only. In this paper we design the communication packet and propose a communication protocol which operates on the communication server described previous.
-
An image processing and decision making method for the Automatic Surveillance System is proposed. The aim of our Automatic Surveillance System is to detect a moving object and make a decision on whether it is human or not. Various object features such as the ratio of the width and the length of the moving object, the distance dispersion between the principal axis and the object contour, the eigenvectors, the symmetric axes, and the areas if the segmented region are used in this paper. These features are not the unique and decisive characteristics for representing human Also, due to the outdoor image property, the object feature information is unavoidably vague and inaccurate. In order to make an efficient decision from the information, we use a fuzzy rules base system ai an approximate reasoning method. The fuzzy rules, combining various object features, are able to describe the conditions for making an intelligent decision. The fuzzy rule base system is initially constructed by heuristic approach and then, trained and tasted with input/output data Experimental result are shown, demonstrating the validity of our system.