• Title/Summary/Keyword: 성능정보 제공

Search Result 4,896, Processing Time 0.029 seconds

A Finger Counting Method for Gesture Recognition (제스처 인식을 위한 손가락 개수 인식 방법)

  • Lee, DoYeob;Shin, DongKyoo;Shin, DongIl
    • Journal of Internet Computing and Services
    • /
    • v.17 no.2
    • /
    • pp.29-37
    • /
    • 2016
  • Humans develop and maintain relationship through communication. Communication is largely divided into verbal communication and non-verbal communication. Verbal communication involves the use of a language or characters, while non-verbal communication utilizes body language. We use gestures with language together in conversations of everyday life. Gestures belong to non-verbal communication, and can be offered using a variety of shapes and movements to deliver an opinion. For this reason, gestures are spotlighted as a means of implementing an NUI/NUX in the fields of HCI and HRI. In this paper, using Kinect and the geometric features of the hand, we propose a method for recognizing the number of fingers and detecting the hand area. A Kinect depth image can be used to detect the hand region, with the finger number identified by comparing the distance of outline and the central point of a hand. Average recognition rate for recognizing the number of fingers is 98.5%, from the proposed method, The proposed method would help enhancing the functionality of the human computer interaction by increasing the expression range of gestures.

A study on the Effectivness of Hand-made Paraffin Thyroid Phantom (Paraffin을 이용한 Thyroid Phantom제작에 따른 유용성에 관한 연구)

  • Park, Soung-Ock;Lee, In-Ja
    • Journal of radiological science and technology
    • /
    • v.30 no.3
    • /
    • pp.237-243
    • /
    • 2007
  • Phantoms are very necessary for quality assurance of radio nuclides imaging systems to maintain standards and to ensure reproducibility of test. General quality assurance and instrument quality control are essential in every hospital. The human tissue equivalent materials are aluminum, areryl, water and epoxy..etc. It is very important to select optimum equivalant materials for a phantoms in QC. Especially, paraffin is very similar with human soft tissue in X or Gamma-ray physical characteristics and easy to buy with economically. We made a paraffin thyroid phantom and compare with thyroid areryl phantom, also used commercially in practice. Two small size cold spots(3 and 6 mm diameter) and a hot spot(3 mm diameter) embeded in paraffin phantom. And imaged with $^{99m}TcO_4$ by camera for analysis about spatial resolution and noise at the hot and cold spots. We got some results as below : 1. No difference in counting rate and noise between both arcryl and paraffin thyroid phantoms. 2. The best spatial resolution can be seen 6 cm distance between pinhole collimator and thyroid phantoms(arcryl and paraffin). 3. More optimal spatial resolution could acquired in paraffin thyroid phantom. Paraffin is very similar with human soft tissue in atomic number, density and relative absorbtion function, and can be shaped easily what we wanted. So we can recommendation paraffin as quality assurance phantom because its usefulness, economical benefit and purchasability.

  • PDF

Analysis on Power Consumption Characteristics of SHA-3 Candidates and Low-Power Architecture (SHA-3 해쉬함수 소비전력 특성 분석 및 저전력 구조 기법)

  • Kim, Sung-Ho;Cho, Sung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.1
    • /
    • pp.115-125
    • /
    • 2011
  • Cryptographic hash functions are also called one-way functions and they ensure the integrity of communication data and command by detecting or blocking forgery. Also hash functions can be used with other security protocols for signature, authentication, and key distribution. The SHA-1 was widely used until it was found to be cryptographically broken by Wang, et. al, 2005. For this reason, NIST launched the SHA-3 competition in November 2007 to develop new secure hash function by 2012. Many SHA-3 hash functions were proposed and currently in review process. To choose new SHA-3 hash function among the proposed hash functions, there have been many efforts to analyze the cryptographic secureness, hardware/software characteristics on each proposed one. However there are few research efforts on the SHA-3 from the point of power consumption, which is a crucial metric on hardware module. In this paper, we analyze the power consumption characteristics of the SHA-3 hash functions when they are made in the form of ASIC hardware module. Also we propose power efficient hardware architecture on Luffa, which is strong candidate as a new SHA-3 hash function. Our proposed low power architecture for Luffa achieves 10% less power consumption than previous Luffa hardware architecture.

Analysis of Blockchain Platforms from the Viewpoint of Privacy Protection (프라이버시 보호 관점에서의 블록체인 플랫폼 분석)

  • Park, Ji-Sun;Shin, Sang Uk
    • Journal of Internet Computing and Services
    • /
    • v.20 no.6
    • /
    • pp.105-117
    • /
    • 2019
  • Bitcoin, which can be classified as a cryptocurrency, has attracted attention from various industries because it is an innovative digital currency and the beginning of a Blockchain system. However, as the research on Bitcoin progressed, several security vulnerabilities and possible attacks were analyzed. Among them, the security problem caused by the transparency of the Blockchain database prevents the Blockchain system from being applied to various fields. This vulnerability is further classified as the weak anonymity of participating nodes and privacy problem due to disclosure of transaction details. In recent years, several countermeasures have been developed against these vulnerabilities. In this paper, we first describe the main features of the public and private Blockchain, and explain privacy, unlinkability and anonymity. And, three public Blockchain platforms, Dash, Zcash and Monero which are derived from Bitcoin, and Hyperledger Fabric which is a private Blockchain platform, are examined. And we analyze the operating principles of the protocols applied on each platform. In addition, we classify the applied technologies into anonymity and privacy protection in detail, analyze the advantages and disadvantages, and compare the features and relative performance of the platforms based on the computational speed of the applied cryptographic mechanisms.

A Design and Implementation of WML Compiler for WAP Gateway for Wireless Internet Services (무선 인터넷 서비스를 위한 WAP 게이트웨이용 WML 컴파일러의 설계 및 구현)

  • Choi, Eun-Jeong;Han, Dong-Won;Lim, Kyung-Shik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.7 no.2
    • /
    • pp.165-182
    • /
    • 2001
  • In this paper, we describe a design and implementation of the Wireless Markup Language(WML) compiler to deploy wireless Internet services effectively. The WML compiler translates textual WML decks into binary ones in order to reduce the traffic on wireless links that have relatively low bandwidth to wireline links and mitigate the processing overhead of WML decks on, wireless terminals that have relatively low processing power to fixed workstations. In addition, it takes over the overhead of eXtensible Markup Language(XML) well-formedness and validation processes. The WML compiler consists of the lexical analyzer and parser modules. The granunar for the WML parser module is LALR(1) context-free grammar that is designed based on XML 1.0 and WML 1.2 DTD(Document Type Definition) with the consideration of the Wireless Application Protocol Binary XML grammar. The grammar description is converted into a C program to parse that grammar by using parser generator. Even though the tags in WML will be extended or WML DTD will be upgraded, this approach has the advantage of flexibility because the program is generated by modifying just the changed parts. We have verified the functionality of the WML compiler by using a WML decompiler in the public domain and by using the Nokia WAP Toolkit as a WAP client. To measurethe compressibility gain of the WML compiler, we have tested a large number of textual WML decks and obtained a maximum 85 %. As the effect of compression is reduced when the portion of general textual strings increases relative to one of the tags and attributes in a WML deck, an extended encoding method might be needed for specific applications such as compiling of the WML decks to which the Hyper Text Markup Language document is translated dynamically.

  • PDF

A Correlation Study for the Prediction of the Maximum Heat Release Rate in Closed-Compartments of Various Configurations (다양한 형상의 밀폐된 구획에서 최대 열발생률 예측을 위한 상관식 검토)

  • Yun, Hong-Seok;Hwang, Cheol-Hong
    • Fire Science and Engineering
    • /
    • v.32 no.1
    • /
    • pp.16-23
    • /
    • 2018
  • In a closed-compartment with various configurations, the correlation that can predict the maximum heat release rate (HRR) with the changes in internal volume and fire growth rate was investigated numerically. The volume of the compartment was controlled by varying the length ratio based on the bottom surface shape of the ISO 9705 fire room, where the ceiling height was fixed to 2.4 m. As a main result, the effect of a change in ceiling height on the maximum HRR was examined by a comparison with a previous study that considered the change in ceiling height. In addition, a more generalized correlation equation was proposed that could predict the maximum HRR in closed-compartments regardless of the changes in ceiling height. This correlation had an average error of 7% and a maximum error of 19% for various fire growth rates when compared with the numerical results. Finally, the applicability of the proposed correlation to representative fire compartments applied to the domestic performance-based design (PBD) was examined. These results are expected to provide useful information on predicting the maximum HRR caused by flashover in closed-compartments as well as the input information required in a fire simulation.

Study on Local Path Control Method based on Beam Modeling of Obstacle Avoidance Sonar (장애물회피소나 빔 모델링 기반의 국부경로제어 기법 연구)

  • Kim, Hyun-Sik
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.2
    • /
    • pp.218-224
    • /
    • 2012
  • Recently, as the needs of developing the micro autonomous underwater vehicle (AUV) are increasing, the acquisition of the elementary technology is urgent. While they mostly utilizes information of the forward looking sonar (FLS) in conventional studies of the local path control as an elementary technology, it is desirable to use the obstacle avoidance sonar (OAS) because the size of the FLS is not suitable for the micro AUV. In brief, the local path control system based on the OAS for the micro AUV operates with the following problems: the OAS offers low bearing resolution and local range information, it requires the system that has reduced power consumption to extend the mission execution time, and it requires an easy design procedure in terms of its structures and parameters. To solve these problems, an intelligent local path control algorithm based on the beam modeling of OAS with the evolution strategy (ES) and the fuzzy logic controller (FLC), is proposed. To verify the performance and analyze the characteristic of the proposed algorithm, the course control of the underwater flight vehicle (UFV) is performed in the horizontal plane. Simulation results show that the feasibility of real application and the necessity of additional work in the proposed algorithm.

A Fast Algorithm of the Belief Propagation Stereo Method (신뢰전파 스테레오 기법의 고속 알고리즘)

  • Choi, Young-Seok;Kang, Hyun-Soo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.5
    • /
    • pp.1-8
    • /
    • 2008
  • The belief propagation method that has been studied recently yields good performance in disparity extraction. The method in which a target function is modeled as an energy function based on Markov random field(MRF), solves the stereo matching problem by finding the disparity to minimize the energy function. MRF models provide robust and unified framework for vision problem such as stereo and image restoration. the belief propagation method produces quite correct results, but it has difficulty in real time implementation because of higher computational complexity than other stereo methods. To relieve this problem, in this paper, we propose a fast algorithm of the belief propagation method. Energy function consists of a data term and a smoothness tern. The data term usually corresponds to the difference in brightness between correspondences, and smoothness term indicates the continuity of adjacent pixels. Smoothness information is created from messages, which are assigned using four different message arrays for the pixel positions adjacent in four directions. The processing time for four message arrays dominates 80 percent of the whole program execution time. In the proposed method, we propose an algorithm that dramatically reduces the processing time require in message calculation, since the message.; are not produced in four arrays but in a single array. Tn the last step of disparity extraction process, the messages are called in the single integrated array and this algorithm requires 1/4 computational complexity of the conventional method. Our method is evaluated by comparing the disparity error rates of our method and the conventional method. Experimental results show that the proposed method remarkably reduces the execution time while it rarely increases disparity error.

TV White Space Low-noise and High-Linear RF Front-end Receiver (텔레비전 유휴 주파수 대역을 지원하는 저잡음 및 고선형 특성의 RF 수신기 설계)

  • Kim, Chang-wan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.91-99
    • /
    • 2018
  • This paper has proposed a low-noise and high-linear RF receiver supporting TV white space from 470 MHz to 698 MHz), which is implemented in $0.13-{\mu}m$ CMOS technology. It consists of a low-noise amplifier, a RF band-pass filter, a RF amplifier, a passive down-conversion mixer, and a channel-selection low-pass filter. A low-noise amplifier and RF amplifier provide a high voltage gain to improve the sensitivity level. To suppress strong and nearby interferers, two RF filtering schemes have been performed by using a RF BPF and a down-conversion mixer. The proposed LPF has been based on the common-gate topology and adopted a bi-quad cell to achieve -24dB/oct characteristics. In addition, the RF receiver can support the overall TV band by controlling a LO frequency. The simulated results show a voltage gain of 56 dB, a noise figure of less than 2 dB, and an out-of-channel IIP3 of -2.3 dBm. It consumes 37 mA from a 1.5 V supply voltage.

Design and Implementation of Geographical Handoff System Using GPS Information (GPS정보를 이용한 위치기반 핸드오프 시스템의 설계 및 구현)

  • Han, Seung-Ho;Yang, Seung-Chur;Kim, Jong-Deok
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.1A
    • /
    • pp.33-43
    • /
    • 2010
  • Recently, users want to use real-time multimedia services, such as internet, VoIP, etc., using their IEEE 802.11 wireless lan mobile stations. In order to provide such services, a handoff among access points is essential to support the mobility of a node, in such an wide area. However, the legacy handoff methods of IEEE 802.11 technology are easy to lose connections. Also, the recognition of a disconnection and channel re-searching time make the major delay of the next AP to connect. In addition, because IEEE 802.11 decides the selection of an AP depending only on received signal strength, regardless of a node direction, position, etc., it cannot guarantee a stable bandwidth for communication. Therefore, in order to provide a real-time multimedia service, a node must reduce the disconnection time and needs an appropriate algorithm to support a sufficient communication bandwidth. In this paper, we suggest an algorithm which predicts a handoff point of a moving node by using GPS location information, and guarantees a high transmission bandwidth according to the signal strength and the distance. We implemented the suggested algorithm, and confirmed the superiority of our algorithm by reducing around 3.7ms of the layer-2 disconnection time, and guaranteed 24.8% of the communication bandwidth.