• Title/Summary/Keyword: 응용 서비스

Search Result 4,275, Processing Time 0.033 seconds

MPEG-DASH based 3D Point Cloud Content Configuration Method (MPEG-DASH 기반 3차원 포인트 클라우드 콘텐츠 구성 방안)

  • Kim, Doohwan;Im, Jiheon;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.660-669
    • /
    • 2019
  • Recently, with the development of three-dimensional scanning devices and multi-dimensional array cameras, research is continuously conducted on techniques for handling three-dimensional data in application fields such as AR (Augmented Reality) / VR (Virtual Reality) and autonomous traveling. In particular, in the AR / VR field, content that expresses 3D video as point data has appeared, but this requires a larger amount of data than conventional 2D images. Therefore, in order to serve 3D point cloud content to users, various technological developments such as highly efficient encoding / decoding and storage, transfer, etc. are required. In this paper, V-PCC bit stream created using V-PCC encoder proposed in MPEG-I (MPEG-Immersive) V-PCC (Video based Point Cloud Compression) group, It is defined by the MPEG-DASH (Dynamic Adaptive Streaming over HTTP) standard, and provides to be composed of segments. Also, in order to provide the user with the information of the 3D coordinate system, the depth information parameter of the signaling message is additionally defined. Then, we design a verification platform to verify the technology proposed in this paper, and confirm it in terms of the algorithm of the proposed technology.

Design of Agricultural Machine Sharing System Based on Blockchain (블록체인 기반 농업기계 공유 시스템 설계)

  • Son, Yong-Bum;Kim, Young-Hak
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.11
    • /
    • pp.55-62
    • /
    • 2018
  • Many domestic and international countries recently apply the blockchain technology to its related application fields. Not the enterprise-centered economy, the concept of the sharing economy which is controlled by individuals has been expanded. However, the development of the necessary system to realize the sharing economy in the agricultural sector has still been insufficient. Because the agricultural machinery rental business in the recent agricultural policies is managed by the government and the local government keeps and provides limited quantities and resources, its operation system has several problems. In case of high-priced agricultural machines, the machines can not be supplied adequately at the right time due to the limited quantities during the busy farming season. This paper proposes the sharing system that individual owners rent their agricultural machinery to growers using the blockchain technology. Thus, the proposed system provides the distributed method to solve agricultural machines of a lack of resources and also gives the secure service to all the growers.

Countermeasure of an Application Attack Scenario Using Spring Server Remote Code Execution Vulnerability (CVE-2018-1270) (스프링 서버 원격코드 실행 취약점(CVE-2018-1270)을 이용한 응용 공격 시나리오의 대응 방안)

  • Jung, Byeong-Mun;Jang, Jae-Youl;Choi, Chul-Jae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.303-308
    • /
    • 2019
  • Spring framework is widely used as a base technology for e-government frameworks and to the extent it is a standard for web service development tools of Korean public institutions. However, recently, a remote code execution vulnerability(CVE-2018-1270) was found in an application using a spring framework. This paper proposes a method of analyzing the vulnerability experiment using a hacking scenario, Proof Of Concept(POC), in which the spring framework is a hazard to the server. We propose the patch to version 4.3.16 and version 5.0.5 or later as an ultimate response. It is also expected that the proposed experiment analysis on vulnerability of hacking scenario will be used as a data for improving performance of security programs and establishing a new authentication system.

Comparative Analysis of Methods to Support Dynamic Adaptive Streaming over HTTP (HTTP 기반 동적 적응형 스트리밍 연구의 비교·분석)

  • Jin, Feng;Kim, Mijung;Yoon, Ilchul
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.527-530
    • /
    • 2014
  • DASH is a well-known streaming technology, which was proposed in 2010 by MPEG and standardized in 2011. Major multimedia contents service providers, including Apple, Microsoft, and Adobe are all using this technology to support their media streaming services. Whenever a new service is requested to the server, the DASH technology helps servicing the multimedia streaming to client by recognizing the capacity of network and by adapting the quality of the multimedia contents. In DASH, the quality of multimedia contents will be automatically lowered to meet the fluctuating network status, when undesirable breaks interrupt the network. In this paper, we classified and analysed the advantages and disadvantages of DASH researches in three aspects: bit-rate measurement method, bandwidth aggregation method; rate adaptation metrics, algorithms and logics; user's experiences and QoE.

  • PDF

Migration Agent for Seamless Virtual Environment System in Cloud Computing Network (클라우드 컴퓨팅 네트워크에서 Seamless 가상 환경 시스템 구축을 위한 마이그레이션 에이전트)

  • Won, Dong Hyun;An, Dong Un
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.41-46
    • /
    • 2019
  • In a MMORPG, a typical application of virtual environment systems, it is a common desire to play in a more realistic environment. However, it is very difficult to provide a latency-free virtual environment to a large user base, mainly due to the fact that the real environment must be configured on multiple servers rather than on single server and that data must be shared on the real server when users move from one region to another. Experiencing response delays continuously in the process of information synchronization between servers greatly deteriorates the degree of immersion. In order to solve this problem, it is necessary to minimize the response delay occurring in the information synchronization process between the servers. In this paper, we propose Migration Agent for efficient information synchronization between field servers providing information of virtual environment and minimizing response delay between Field Server and PC(Player Character) and implement it in cloud computing network. In the proposed system, CPU utilization of field server increased by 6 ~ 13%, and response time decreased by 5 ~ 10 seconds over the existing system in 70,000 ~ 90,000 PCs

Recognition Performance Improvement of QR and Color Codes Posted on Curved Surfaces (곡면상에 부착된 QR 코드와 칼라 코드의 인식률 개선)

  • Kim, Jin-soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.3
    • /
    • pp.267-275
    • /
    • 2019
  • Currently, due to the widespread use of a smartphone, QR codes allow users to access a variety of added services. However, the QR codes posted on curved surfaces tend to be non-uniformly illuminated and bring about the decline of recognition rate. So, in this paper, the block-adaptive binarization policy is adopted to find an optimal threshold appropriate for bimodal image like QR codes. For a large block, its histogram distribution is found to get an initial threshold and then the block is partitioned to reflect the local characteristics of small blocks. Also, morphological operation is applied to their neighboring boundary at the discontinuous at the QR code junction. This paper proposes an authentication method based on the color code, uniquely painted within QR code. Through a variety of practical experiments, it is shown that the proposed algorithm outperforms the conventional method in detecting QR code and also maintains good recognition rate up to 40 degrees on curved surfaces.

Handwritten One-time Password Authentication System Based On Deep Learning (심층 학습 기반의 수기 일회성 암호 인증 시스템)

  • Li, Zhun;Lee, HyeYoung;Lee, Youngjun;Yoon, Sooji;Bae, Byeongil;Choi, Ho-Jin
    • Journal of Internet Computing and Services
    • /
    • v.20 no.1
    • /
    • pp.25-37
    • /
    • 2019
  • Inspired by the rapid development of deep learning and online biometrics-based authentication, we propose a handwritten one-time password authentication system which employs deep learning-based handwriting recognition and writer verification techniques. We design a convolutional neural network to recognize handwritten digits and a Siamese network to compute the similarity between the input handwriting and the genuine user's handwriting. We propose the first application of the second edition of NIST Special Database 19 for a writer verification task. Our system achieves 98.58% accuracy in the handwriting recognition task, and about 93% accuracy in the writer verification task based on four input images. We believe the proposed handwriting-based biometric technique has potential for use in a variety of online authentication services under the FIDO framework.

Online Snapshot Method based on Directory and File Change Tracking for Virtual File System (가상파일시스템에서 디렉토리 및 파일 변경 추적에 기반한 온라인 스냅샷 방법)

  • Kim, Jinsu;Song, Seokil;Shin, Jae Ryong
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.5
    • /
    • pp.417-425
    • /
    • 2019
  • Storage snapshot technology allows to preserve data at a specific point in time, and recover and access data at a desired point in time. It is an essential technology for storage protection application. Existing snapshot methods have some problems in that they dependent on storage hardware vendor, file system or virtual block device. In this paper, we propose a new snapshot method for solving the problems and creating snapshots on-line. The proposed snapshot method uses a method of extracting the log records of update operations at the virtual file system layer to enable the snapshot method to operate independently on file systems, virtual block devices, and storage hardwares. In addition, the proposed snapshot mehod creates and manages snapshots for directories and files without interruption to the storage service. Finally, through experiments we measure the snapshot creation time and the performance degradation caused by the snapshot.

Research Issues and Major Design Considerations on Video See-through HMDs (비디오 씨쓰루 HMD 연구 동향과 주요 설계 고려 요소)

  • Lee, Joong Ho
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.2
    • /
    • pp.345-353
    • /
    • 2019
  • The Video See-through HMD(VSHMD) captures real-world view through a camera set mounted in front of the HMD. The VSHMD outputs this visual information in real time through the display in the HMD, which technique can be used as mixed reality, augmented reality, and virtual reality device. Recently, there is growing interest in VSHMD due to the rapid development of camera and display technology. However, VSHMD is still not free from many technical huddles and human factor issues. This paper summarizes the VSHMD related researches so far, presents the major issues to be solved in advance, and suggests design considerations that should be beneficial to VSHMD development, focused on the human factors, that presents solutions to effectively overcome the limitations of VSHMD functionalities in current.

A Dynamic Investigation of iBeacon Adoption at Tourism Destination (관광지에서의 iBeacon 도입에 대한 동태적 분석)

  • Choedon, Tenzin;Lee, Young-Chan
    • Journal of Industrial Convergence
    • /
    • v.16 no.2
    • /
    • pp.1-14
    • /
    • 2018
  • The interconnectedness of all things is continuously expanding. For example, bluetooth low energy (BLE) beacons are wireless radio transmitters that can send an identifier to nearby receivers and trigger a number of applications, from proximity marketing to indoor location-based service. iBeacon technology which is one of the newest technologies in the smart tourism field, is reckoned as being very useful for travelers in enhancing the experience with visiting places. However, there is consequently not much existing research yet about the connection between iBeacon technology and tourism destination. Considering that, this study analyzes the adoption of iBeacon in tourism destination, this study examine the interrelationships and feedback structures of key factors in iBeacon adoption. To serve the purpose, this study used system dynamics approach to develop a model of iBeacon adoption in tourism destination. The analysis results showed that the concept of 'Social Influences' is one of the significant predictors for individual's intention behavior to accept iBeacon, and word of mouth (WOM), subjective norm, privacy concern, and perceived usefulness are key factors influencing the iBeacon adoption.