• Title/Summary/Keyword: 위치추적시스템

Search Result 1,295, Processing Time 0.027 seconds

An Interlace Test Tool Based on an Emulator for Improving Embedded Software Testing (임베디드 소프트웨어 테스트를 개선하기 위한 에뮬레이터 기반 인터페이스 테스트 도구)

  • Seo, Joo-Young;Choi, Byoung-Ju
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.14 no.6
    • /
    • pp.547-558
    • /
    • 2008
  • Embedded system is tightly coupled with heterogeneous layers such as application, as kernel, device driver, HAL and hardware. Embedded system is customized for the specific purpose and hardware. In addition, the product cycle is so fast that software and hardware, which are developed by several vendors, are integrated together under unstable status. Therefore, there are lots of possibilities of faults in all layers. Because embedded software developers test their codes integrated with faulty layers, they cannot confirm 'whether testing of every aspects was completed, their code was failed, or integrated software/hardware has some problems'. In this paper, we propose an embedded software interface test method and a test tool called Justitia for detecting faults and tracing causes in the interface among heterogeneous layers. The proposed technique is an automated method which improves debugging upto professional testing using an emulator for helping developer.

Improved RFID Authentication Protocol using Hash Lock (해쉬락을 이용한 개선된 RFID 인증 프로토콜)

  • Bae Woo-Sik;Jang Gun-Oh;Han Kun-Hee
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.4
    • /
    • pp.635-641
    • /
    • 2006
  • On the wireless-communication between Electronic Tag of RFID system and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash-lock related algorithm. This paper has presented the comparison and analysis of the established hash-lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real-time and every session. The algorithm suggested is able to make RFID wireless authentication system offer a several of usefulness and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses just the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' action with time based.

  • PDF

A Super-Resolution Time Delay Estimation Algorithm for Spread Spectrum Signals (대역 확산 신호를 위한 지연 시간 추정 알고리즘)

  • Shin, Joon-Ho;Myong, Seung-Il;Chang, Eun-Young;Park, Hyung-Rae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.2A
    • /
    • pp.119-127
    • /
    • 2012
  • In this paper a super-resolution time delay estimation algorithm is developed for real-time locating systems (RTLSs) that employ a direct-sequence spread spectrum technique, along with its performance analysis in multipath environments. The classical correlation method provides relatively good performance in line-of-sight (LOS) environments but its performance seriously degrades in multipath environments, especially when signals are spaced closer than a PN chip. Therefore we shall develop a super-resolution time delay estimation algorithm that may estimate the time delays of multipath signals even in closely spaced multipath environments using the MUSIC algorithm for direction-of-arrival estimation and analyze its performance by applying the algorithm to the ISO/IEC 24730-2.1 RTLS system. 

Image Tracking Based Lane Departure Warning and Forward Collision Warning Methods for Commercial Automotive Vehicle (이미지 트래킹 기반 상용차용 차선 이탈 및 전방 추돌 경고 방법)

  • Kim, Kwang Soo;Lee, Ju Hyoung;Kim, Su Kwol;Bae, Myung Won;Lee, Deok Jin
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.39 no.2
    • /
    • pp.235-240
    • /
    • 2015
  • Active Safety system is requested on the market of the medium and heavy duty commercial vehicle over 4.5ton beside the market of passenger car with advancement of the digital equipment proportionally. Unlike the passenger car, the mounting position of camera in case of the medium and heavy duty commercial vehicle is relatively high, it is disadvantaged conditions for lane recognition in contradiction to passenger car. In this work, we show the method of lane recognition through the Sobel edge, based on the spatial domain processing, Hough transform and color conversion correction. Also we suggest the low error method of front vehicles recognition in order to reduce the detection error through Haar-like, Adaboost, SVM and Template matching, etc., which are the object recognition methods by frontal camera vision. It is verified that the reliability over 98% on lane recognition is obtained through the vehicle test.

An Experimental Study on the Ventilation Performance to Enhance Removal Efficiency of Indoor Hamful Gases (실내 유해가스 제거효율 향상을 위한 환기성능에 관한 실험적 연구)

  • Ku, Jae-Hyun
    • Fire Science and Engineering
    • /
    • v.23 no.5
    • /
    • pp.117-124
    • /
    • 2009
  • The objective of this research is to analyze the ventilation performance of mechanical ventilation systems to enhance removal efficiency of indoor hamful gases. The ventilation performance is evaluated using a step-down method based on ASTM Standard E741-83. The ventilation performance is evaluated as a function of the ventilation rate and supply/extract locations using a tracer gas ($CO_2$) technique. As a result, the $CO_2$ concentration as a function of time is decayed exponentially and the ventilation performance is found to increase with increased the ventilation rate. The ventilation performance of the second type ventilation system is better than that of the first type or the third type. The ventilation performance without human occupancy increases up to 55% and the ventilation performance with one person increases up to 25% at the supply air of 570Lpm comparing with a natural reduction after one hour in the test chamber. The ventilation performance is better than 15% comparing with natural decay at the supply of 570Lpm in an office room.

An Extraction Method of Meaningful Hand Gesture for a Robot Control (로봇 제어를 위한 의미 있는 손동작 추출 방법)

  • Kim, Aram;Rhee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.27 no.2
    • /
    • pp.126-131
    • /
    • 2017
  • In this paper, we propose a method to extract meaningful motion among various kinds of hand gestures on giving commands to robots using hand gestures. On giving a command to the robot, the hand gestures of people can be divided into a preparation one, a main one, and a finishing one. The main motion is a meaningful one for transmitting a command to the robot in this process, and the other operation is a meaningless auxiliary operation to do the main motion. Therefore, it is necessary to extract only the main motion from the continuous hand gestures. In addition, people can move their hands unconsciously. These actions must also be judged by the robot with meaningless ones. In this study, we extract human skeleton data from a depth image obtained by using a Kinect v2 sensor and extract location data of hands data from them. By using the Kalman filter, we track the location of the hand and distinguish whether hand motion is meaningful or meaningless to recognize the hand gesture by using the hidden markov model.

RFID Security Authentication Protocol for the Ubiquitous Environment (유비쿼터스 환경을 위한 RFID 보안 인증 프로토콜)

  • Bae, Woo-Sik;Choi, Shin-Hyeong;Han, Kun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.4
    • /
    • pp.69-75
    • /
    • 2007
  • On the wireless communication between RFID Tag and Reader, there are some existing problems with weaknesses of security such as spoofing, replay, traffic analysis, position tracking, etc., in the established hash lock related algorithm. This paper has presented the comparison and analysis of the established hash lock related algorithm for privacy and in order to make up for this, also suggested a new security authentication algorithm based on hash which has an authentication protocol and creates hash function by using random numbers received from the reader on real time and every session. The algorithm suggested here can offer a several of usefulness for RFID authentication system and it has an advantage to reduce the amount of calculations compared to established algorithm. It also uses the tags needed among a lot of tags around which are expected later and it is expected to reduce a responsibility of the server by ending unnecessary tags' operation with time based.

  • PDF

Realistic 3D Scene Reconstruction from an Image Sequence (연속적인 이미지를 이용한 3차원 장면의 사실적인 복원)

  • Jun, Hee-Sung
    • The KIPS Transactions:PartB
    • /
    • v.17B no.3
    • /
    • pp.183-188
    • /
    • 2010
  • A factorization-based 3D reconstruction system is realized to recover 3D scene from an image sequence. The image sequence is captured from uncalibrated perspective camera from several views. Many matched feature points over all images are obtained by feature tracking method. Then, these data are supplied to the 3D reconstruction module to obtain the projective reconstruction. Projective reconstruction is converted to Euclidean reconstruction by enforcing several metric constraints. After many triangular meshes are obtained, realistic reconstruction of 3D models are finished by texture mapping. The developed system is implemented in C++, and Qt library is used to implement the system user interface. OpenGL graphics library is used to realize the texture mapping routine and the model visualization program. Experimental results using synthetic and real image data are included to demonstrate the effectiveness of the developed system.

Smart Harness for Preventing Pet Loss Outdoors (실외에서 애완견 분실 방지를 위한 스마트 어깨줄)

  • Lee, Jun-Hyeok;Ruy, Se-Hyun;Lim, Jong-Chan;Chou, Tea-Hyun;Han, Yeong-Oh
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.16 no.4
    • /
    • pp.709-718
    • /
    • 2021
  • In this paper, it can be seen that the number of abandoned dogs increases every year through the statistics on the occurrence of abandoned animals. With the goal of reducing the number of stray dogs, a smart pet dog shoulder strap is implemented based on a real-time location tracking system using the ESP32 module and GPS sensor. It is an ESP32 module with a built-in Bluetooth module. It is input to the MCU using various sensors, and finally outputs to a smart-phone application, and communicates through the built-in blue-tooth module. In addition, it uses Neopixels to compensate the weaknesses at night through LED light emission, and automatically sets the warning distance to design a music playback system through the LED flashing effect and MP3 module. In addition, a smart pet dog shoulder strap was designed to help pet dog health care by measuring the moving distance according to the amount of activity through the gyro sensor.

Deep Learning Based Emergency Response Traffic Signal Control System

  • Jeong-In, Park
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.2
    • /
    • pp.121-129
    • /
    • 2023
  • In this paper, we developed a traffic signal control system for emergency situations that can minimize loss of property and life by actively controlling traffic signals in a certain section in response to emergency situations. When the emergency vehicle terminal transmits an emergency signal including identification information and GPS information, the surrounding image is obtained from the camera, and the object is analyzed based on deep learning to output object information having information such as the location, type, and size of the object. After generating information tracking this object and detecting the signal system, the signal system is switched to emergency mode to identify and track the emergency vehicle based on the received GPS information, and to transmit emergency control signals based on the emergency vehicle's traveling route. It is a system that can be transmitted to a signal controller. This system prevents the emergency vehicle from being blocked by an emergency control signal that is applied first according to an emergency signal, thereby minimizing loss of life and property due to traffic obstacles.