• Title/Summary/Keyword: 포인터

Search Result 308, Processing Time 0.027 seconds

Study on Safety Control of The Laser Equipment (레이저 기기의 국제표준 평가 방법 및 안전 관리 방안 연구)

  • Park, Chan-keun;Kim, Young-kil
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.419-422
    • /
    • 2016
  • Recently, there are a lot of report about the safety accident in laser equipment for example laser pointer, laser level, laser distance meter, temperature measurement equipment and so on. But most of people doesn't care of the safety, and some of the people were damaged by laser in the retina and skin. So in this reaserch So in this thesis, research the safety control rules in global and domestic regulations and international standard IEC 60825-1. From the above research, develop the safety control rules to improve the consumer safety.

  • PDF

Laser Pointer Interaction System Based on Image Processing (영상처리 기반의 레이저 포인터 인터랙션 시스템)

  • Kim, Nam-Woo;Lee, Seung-Jae;Lee, Joon-Jae;Lee, Byung-Gook
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.373-385
    • /
    • 2008
  • The evolution of input device for computer has pretty much slowed down after the introduction of mouse as feinting input device. Even though stylus and touch screen were invented later on which provide some alternatives, all these methods were designed to have close range interaction with computer. There are not many options available for user to interact with computer from afar, which is especially needed during presentation. Therefore, in this paper, we try to fill the gap by proposing a laser pointer interaction system to allow user to give pointing input command to the computer from some distance away using only laser pointer, which is cheap and readily available. With the combination of image processing based software, we could provide mouse-like pointing interaction with computer. The proposed system works well not only in currently plane screen, but also in flexible screen by incorporating the feature of non-linear coordinate mapping algorithm in our system so that our system can support non-linear environment, such as curved and flexible wall.

  • PDF

Computer Vision Based Efficient Control of Presentation Slides (컴퓨터비전에 기반한 효율적인 프리젠테이션 슬라이드 제어)

  • 박정우;석민수;이준호
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.4
    • /
    • pp.232-239
    • /
    • 2003
  • This paper discusses the design and implementation of a human-oriented interface based on computer vision that efficiently controls presentation slides. The user does not have to be confined to a keyboard or mouse any more, and can move around more freely because slides for presentation can be up and down using a general laser pointer that is used for presentation. Regions for virtual buttons are set on the slide so that the user can conveniently point the buttons using the laser pointer. We have proposed a simple and efficient method that computes the button areas in the image without complicated calibration. The proposed method has been implemented based on Microsoft PowerPoint ; moreover it can be applied to other PowerPoint-like presentation softwares. Our method for human-centered slide control enables the user to give audiences a more interactive presentation in a natural way.

CEM-PF: Cost-Effective Mobility Management Scheme Based on Pointer Forwarding in Proxy Mobile IPv6 Networks (프록시 모바일 IPv6 네트워크에서 포인터 포워딩에 기반한 비용효과적인 이동성관리 기법)

  • Park, Seung-Yoon;Jeong, Jong-Pil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.4
    • /
    • pp.81-93
    • /
    • 2012
  • We propose efficient mobility management schemes based on pointer forwarding for Proxy Mobile IPv6 Networks(PMIPv6) with the objective to reduce the overall network traffic incurred by mobility management and packet delivery. The proposed schemes are per-user-based, i.e., the optimal threshold of the forwarding chain length that minimizes the overall network traffic is dynamically determined for each individual mobile user, based on the user's specific mobility and service patterns. We demonstrate that there exists an optimal threshold of the forwarding chain length, given a set of parameters characterizing the specific mobility and service patterns of a mobile user. We also demonstrate that our schemes yield significantly better performance than schemes that apply a static threshold to all mobile users. A comparative analysis shows that our pointer forwarding schemes outperform routing-based mobility management protocols for PMIPv6.

Design and Evaluation of a Fault-Tolerant Distributed Location Management Method in Mobile Environments (이동 환경에서 결함 포용 분산 위치 관리 방법의 설계 및 평가)

  • Bae, Ihn-Han;Oh, Sun-Jin
    • Journal of Internet Computing and Services
    • /
    • v.1 no.1
    • /
    • pp.35-46
    • /
    • 2000
  • One of the main chalenges in personal communication services (PCS) is to locate many mobile terminals that may move frequently from place to place. Such a system operation is called location management. Many network signaling traffic, and database queries are required to achieve such a task. Several strategies have been proposed to improve the efficiency of location management. These strategies use location register databases to store the current location on mobile terminals, and are vulnerable to failure of the location registers. In this paper, we propose a fault-tolerant pointer forwarding with distributed home location register (FT-RFDHLR) to tolerate the failure of location registers. The performance of the proposed method is evaluated by an analytical model, and is compared with thew pointer forwarding with the single home location register (PFSHLR), the pointer forwarding with distributed home location register (PFDHLR), Biaz's bypass forwarding strategy (BFS) and two-path forwarding strategy (TPFS).

  • PDF

Fusion Matching According to Land Cover Property of High Resolution Images (고해상도 위성영상의 토지피복 특성에 따른 혼합정합)

  • Lee, Hyoseong;Park, Byunguk;Ahn, Kiweon
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.30 no.6_1
    • /
    • pp.583-590
    • /
    • 2012
  • This study proposes fusion image matching method according to land cover property to generate a detailed DEM using the high resolution IKONOS-2 stereo pair. A classified image, consists of building, crop-land, forest, road and shadow-water, is produced by color image with four bands. Edges and points are also extracted from panchromatic image. Matching is performed by the cross-correlation computing after five classes are automatically selected in a reference image. In each of building class, crop-land class, forest class and road class, matching was performed by the grid and edge, only grid, only grid, grid and point, respectively. Shadow-water class was excepted in the matching because this area causes excessive error of the DEM. As the results, edge line, building and residential area could be expressed more dense than DEM by the conventional method.

A Study on Multicast ATM Switch with Tandem Crosspoints (탠덤크로스포인터 멀티캐스트 ATM 스위치 연구)

  • Ryul, Kim-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.157-165
    • /
    • 2006
  • This paper proposes a new output-buffered multicast ATM switch with tandem crosspoints switching fabric, named the MTCOS(Multicast Tandem Crosspoint Output-buffered Switch). The MTCOS consists of multiple simple crosspoint switch fabrics, named TCSF(Tandem Crosspoint Switch Fabric) , and concentrated output buffers for efficient multicasting. The TCSF resolves the cell delay deviation problem which the self-routing crossbar switches inherently have. Further, it offers multiple concurrent pathes from one input to multiple output ports. It also provides multi-channel switching by easy software configuration and has several desirable characteristics such as scalability, high Performance, and modularity. A shared traffic concentration and output queuing strategies of the MTCOS results in lower cell loss as well as lower cell delay time over a wide range of multicast traffic. Furthermore, it has lower hardware complexity than that of the SCOQ and Knockout multicast switch to achieve the same Knockout concentration rate as the conventional switches. It is shown that the proposed switch can be easily applied to design high performance for any multicast traffic by analytic analysis and computer simulation.

  • PDF

Usability Comparative Testing of Pointing Input Devices on a Small-Sized Mobile Computing Device - Focused on Trackpoint and Touchpad - (이동형 컴퓨팅 기기에서의 포인팅 입력 장치의 사용성 비교연구 - 트랙포인터와 터치패드를 중심으로 -)

  • Jeong, Seong-Won;Lee, Kun-Pyo
    • Archives of design research
    • /
    • v.18 no.4 s.62
    • /
    • pp.175-184
    • /
    • 2005
  • PDA(Personal Digital Assistants) and laptop computer that are small sized mobile implements are typical devices which capable of using wireless internet. They seem to have a tendency to possess multi-function as well as to miniaturize in accordance with taking advantage of today's digital convergence circumstance. It should be considered that the pointing input device of these mobile computer that have PDA size and laptop's performance has to be added to something very small instead of 4-button, 5-button navigator and with the electric pen. The basic framework for this study is to investigate the usability of the two input devices Trackpoint and Touchpad which regarded as a alternative pointing device for small sized mobile computer. 14 novice subjects compared a Trackpoint to a Touchpad across five curser-control tasks. The study found that subjects executed not more slowly with a Trackpoint input device than with the Touchpad. Observation shows that learning for Trackpoint appears to have had more than for the Touchpad. Subjects expressed preference for the Trackpoint in general work.

  • PDF

An Expression Violating the Member Accessibility in C++ (C++에서 멤버의 접근성을 위반하는 연산)

  • Joo, Seong-Yong;Jo, Jang-Wu
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.3
    • /
    • pp.233-237
    • /
    • 2010
  • This paper addresses a problem of violating the member accessibility of a class in C++, which is not detected as an error by existing C++ compilers. The member access specifiers can be used to specify member accessibility. The C++ uses a private or protected specifier for specifying the members which cannot be accessed from outside of an object. However, the private or protected members can be accessed from outside of that object by the pointer arithmetic in C++. We show some violating examples that cannot be detected by existing C++ compilers. The contribution of this paper is to discover and define the new problem of the member accessibility.

Automated Unit-test Generation for Detecting Vulnerabilities of Android Kernel Modules (안드로이드 커널 모듈 취약점 탐지를 위한 자동화된 유닛 테스트 생성 기법)

  • Kim, Yunho;Kim, Moonzoo
    • Journal of KIISE
    • /
    • v.44 no.2
    • /
    • pp.171-178
    • /
    • 2017
  • In this study, we propose an automated unit test generation technique for detecting vulnerabilities of Android kernel modules. The technique automatically generates unit test drivers/stubs and unit test inputs for each function of Android kernel modules by utilizing dynamic symbolic execution. To reduce false alarms caused by function pointers and missing pre-conditions of automated unit test generation technique, we develop false alarm reduction techniques that match function pointers by utilizing static analysis and generate pre-conditions by utilizing def-use analysis. We showed that the proposed technique could detect all existing vulnerabilities in the three modules of Android kernel 3.4. Also, the false alarm reduction techniques removed 44.9% of false alarms on average.