• Title/Summary/Keyword: 영상통신

Search Result 6,035, Processing Time 0.032 seconds

Underwater Drone Development for Ship Inspection Part 2: Monitoring System and Operation (선박 검사 수중 드론 개발 Part 2: 모니터링 시스템 및 운용)

  • Ha, Yeon-Chul;Kim, Jin-Woo;Kim, Goo;Jeong, Kyeong-Taek;Choi, Hyun-Deuk
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.21 no.3
    • /
    • pp.133-141
    • /
    • 2020
  • In this paper, the communication method of data information accepted by underwater drones and the implementation method to console display of data information were described, and the function of integrated monitoring system interface and the design and implementation of sonar interface were explained. The operation and posture of underwater drones can be controlled using a controller connected to the console, and the distance information between underwater drones and obstacles is obtained from sonar so that they can be visually displayed on the console screen along with camera images. The integrated monitoring navigation console is implemented to suit improvements, making it convenient and easy for workers to use. In addition, by upgrading integrated monitoring and control software functions, the company added user-specific project management functions and the output of reports for hull inspection to make them different and competitive from other underwater drones.

CNN-based Sign Language Translation Program for the Deaf (CNN기반의 청각장애인을 위한 수화번역 프로그램)

  • Hong, Kyeong-Chan;Kim, Hyung-Su;Han, Young-Hwan
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.22 no.4
    • /
    • pp.206-212
    • /
    • 2021
  • Society is developing more and more, and communication methods are developing in many ways. However, developed communication is a way for the non-disabled and has no effect on the deaf. Therefore, in this paper, a CNN-based sign language translation program is designed and implemented to help deaf people communicate. Sign language translation programs translate sign language images entered through WebCam according to meaning based on data. The sign language translation program uses 24,000 pieces of Korean vowel data produced directly and conducts U-Net segmentation to train effective classification models. In the implemented sign language translation program, 'ㅋ' showed the best performance among all sign language data with 97% accuracy and 99% F1-Score, while 'ㅣ' showed the highest performance among vowel data with 94% accuracy and 95.5% F1-Score.

Ultimate-Game Automatic Trace and Analysis System Using IoT (사물인터넷 기반 얼티미트 경기 자동추적 및 분석 시스템)

  • Lim, Jea Yun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.11 no.1
    • /
    • pp.59-66
    • /
    • 2022
  • In this paper, by applying IoT technology to the Ultimate game, which is one of the games using Flyingdisc, the process of the game is traced based on the players and the flyingdisc, and a comprehensive relationship analysis between players is performed on the results of the game. A WiFi module with built-in GPS is attached in the players and flyingdisc. The player's ID, latitude/longitude values received from GPS and time are stored in the database in realtime during the game. Process informations of the game is also stored in the database at the same time using mobile Ultimate game App. Based on this informations after the game is over, we developed a system that can perform comprehensive analysis of the game contents. By using the informations stored in the database, the player-based game process and the flyingdisc-based scoring process are visualized in the virtual playground. Various game result informations for players are graphically analyzed using Python.

Implementation of portable WiFi extender using Raspberry Pi (라즈베리파이를 이용한 이동형 와이파이 확장기 구현)

  • Jung, Bokrae
    • Journal of Industrial Convergence
    • /
    • v.20 no.1
    • /
    • pp.63-68
    • /
    • 2022
  • In schools and corporate buildings, public WiFi Access Points are installed on the ceilings of hallways. In the case of an architectural structure in which a WiFi signal enters through a steel door made of a material with high signal attenuation, Internet connection is frequently cut off or fails when the door is closed. To solve this problem, our research implements an economical and portable WiFi extender using a Raspberry Pi and an auxiliary battery. Commercially available WiFi extenders have limitations in the location where the power plug is located, and WiFi extension using the WiFi hotspot function of an Android smartphone is possible only in some high-end models. However, because the proposed device can be installed at the position where the Wi-Fi reception signal is the best inside the door, the WiFi range can be extended while minimizing the possibility of damage to the original signal. Experimental results show that it is possible to eliminate the shadows of radio waves and to provide Internet services in the office when the door is closed, to the extent that web browsing and real-time video streaming for 720p are possible.

Analysis of Radio Frequency (RF) Characteristics and Effectiveness according to the Number of Gores of Mesh Antenna (그물형 안테나의 고어 개수에 따른 Radio Frequency (RF) 특성 분석)

  • Kim, Jin-Hyuk;Lee, Si-A;Park, Tae-Yong;Choi, Han-Sol;Kim, Hongrae;Chae, Bong-Geon;Oh, Hyun-Ung
    • Journal of Space Technology and Applications
    • /
    • v.1 no.3
    • /
    • pp.364-374
    • /
    • 2021
  • This research discusses the change in radio frequency (RF) characteristics according to the number of Gores on the deployable mesh antennas for potential micro-satellite applications. The deployable type of lightweight mesh antenna can be used for various space missions such as communication/SAR/ SIGINT. In order to implement an ideal curvature of antenna surface, sufficient number of antenna rib structures are required. However, the increase in antenna ribs affects various design factors of the antenna system, especially total system mass, complexity of deployable mechanism and reliability. In this paper, the proper number of ribs for the mesh antenna were derived by comparison of electro-magnetic (EM) simulation results of example of antenna model in accordance with the various number of ribs.

Telemedicine robot system for visual inspection and auscultation using WebRTC (WebRTC를 이용한 육안 검사 및 청진용 원격진료 로봇 시스템)

  • Jae-Sam Park
    • Journal of Advanced Navigation Technology
    • /
    • v.27 no.1
    • /
    • pp.139-145
    • /
    • 2023
  • When a doctor examines a patient in a hospital, the doctor directly checks the patient's condition and conducts a face-to-face diagnosis through dialogue with the patient. However, it is often difficult for doctors to directly treat patients. Recently, several types of telemedicine systems have been developed. However, the systems have lack of capabilities to observe heart disease, neck condition, skin condition, inside ear condition, etc. To solve this problem, in this paper, an interactive telemedicine robot system with autonomous driving in a room capable of visual examination and auscultation of patients is developed. The developed robot can be controlled remotely through the WebRTC platform to move toward the patient and check a patient's condition under the doctor's observation using the multi-joint robot arm. The video information, audio information, patient's heart sound, and other data obtained remotely from patients can be transmitted to a doctor through the web RTC platform. The developed system can be applied to the various places where doctors are not possible to attend.

AI Model-Based Automated Data Cleaning for Reliable Autonomous Driving Image Datasets (자율주행 영상데이터의 신뢰도 향상을 위한 AI모델 기반 데이터 자동 정제)

  • Kana Kim;Hakil Kim
    • Journal of Broadcast Engineering
    • /
    • v.28 no.3
    • /
    • pp.302-313
    • /
    • 2023
  • This paper aims to develop a framework that can fully automate the quality management of training data used in large-scale Artificial Intelligence (AI) models built by the Ministry of Science and ICT (MSIT) in the 'AI Hub Data Dam' project, which has invested more than 1 trillion won since 2017. Autonomous driving technology using AI has achieved excellent performance through many studies, but it requires a large amount of high-quality data to train the model. Moreover, it is still difficult for humans to directly inspect the processed data and prove it is valid, and a model trained with erroneous data can cause fatal problems in real life. This paper presents a dataset reconstruction framework that removes abnormal data from the constructed dataset and introduces strategies to improve the performance of AI models by reconstructing them into a reliable dataset to increase the efficiency of model training. The framework's validity was verified through an experiment on the autonomous driving dataset published through the AI Hub of the National Information Society Agency (NIA). As a result, it was confirmed that it could be rebuilt as a reliable dataset from which abnormal data has been removed.

Proposal on the Improvement of Psychological Support System for Cyber Sexual Crime Investigators Based on Their Mental Health Survey (사이버성폭력수사관 정신건강 실태조사에 근거한 심리지원제도 개선 방향에 관한 연구)

  • Bora Kim;Sujin Lim
    • Knowledge Management Research
    • /
    • v.23 no.4
    • /
    • pp.43-67
    • /
    • 2022
  • One of the dark sides of the development of information and communication technology is the significant increase in cybercrime. In particular, investigators in charge of cyber sexual crime are repeatedly exposed to video data of illegal sexual violence; hence, they are at high risk of post-traumatic stress disorder (PTSD) and experiencing vicarious trauma. Notwithstanding, few studies have focused on these investigators' PTSD, and, to the best of our knowledge, no study has been conducted on the vicarious trauma of cyber sexual crime investigators. Therefore, this study identifies investigators' mental health status (trauma-related, especially) and examines their perception of the currently operating psychological support programs. Further, by reviewing the psychological support system of overseas institutions, we would suggest psychological support and policies necessary for domestic cyber sexual crime units to manage investigators' work stress and prevent mental illness under domestic circumstances.

Real-time wireless Audio/video Transmission Technique for Handheld Devices (휴대용 단말기를 위한 실시간 무선 영상 음성 전송 기술)

  • Yoon, Kyung-Seob
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.4
    • /
    • pp.111-117
    • /
    • 2009
  • Improvement of Wireless internet and handheld devices makes it possible that users can use various multimedia services. But, access point devices are needed while using handheld devices, and those devices use virtual network address for networking. For that reason, end-users hardly use the 1:1 voice or video chat, and messenger service that require direct communications between devices. Also, service providers need central server for relaying packets from terminals to others, the traffic and costs of relaying go high, so real-time massive data transmission services are restrictively provided. In this study, we apply TCP/UDP hole punching technique to those applications. And we implement service that supports real-time multimedia direct transmission between equipments that use virtual network addresses.

3-Factor Authentication Using HMAC-based One-Time Password (HMAC 기반의 일회용 패스워드를 이용한 3-Factor 인증)

  • Kim, Ji-Hong;Oh, Sei-Woong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.6
    • /
    • pp.27-32
    • /
    • 2009
  • Recently, most of information services are provided by the computer network, since the technology of computer communication is developing rapidly, and the worth of information over the network is also increasing with expensive cost. But various attacks to quietly intercept the informations is invoked with the technology of communication developed, and then most of the financial agency currently have used OTP, which is generated by a token at a number whenever a user authenticates to a server, rather than general static password for some services. A 2-Factor OTP generating method using the OTP token is mostly used by the financial agency. However, the method is vulnerable to real attacks and therefore the OTP token could be robbed and disappeared. In this paper, we propose a 3-Factor OTP way using HMAC to conquer the problems and analyze the security of the proposed scheme.