• Title/Summary/Keyword: 핸들

Search Result 175, Processing Time 0.026 seconds

Cancellation of Moving Artifact in EDA Signal to Detect Drowsiness(II) (졸음 검출을 위한 EDA신호의 동잡음 제거법(II))

  • 고한우;김연호
    • Journal of Biomedical Engineering Research
    • /
    • v.20 no.3
    • /
    • pp.323-329
    • /
    • 1999
  • This paper proposed a method for the cancellation of the moving artifact which was produced during the detection of drowsiness usmg electrodermal activity signal. Two types of wrist electrode were developed to overcome the defect of the steering wheel type electrode which couldn't eliminate the moving artifacts due to driver's movements. Wrist type electrode II which has been modified from electrode type I was most effective for eliminating movmg artifacts compared to wheel type electrode and wrisL type electrode 1. The decIsion criteria(if IRI$\leq$10 and 1.1$\leq$dNz) for detecting moving artifact was determined from the virtual driving experiments. An algorithm which substituted past value of Nz for the current value of Nz whenever an EDA signal satisfied the criteria was developed. The experimental resulls of virtual driving and road test showed that the proposed algorithm had been successfully removed the most of the error due to the moving artifact Therefore, the developed system which use electrode type II and the algorithm might be less influenced by moving artifacts and could measure an accurate arousal state.

  • PDF

Human Operator Modeling of Target Tracking System for Improving Manual Control Command (표적추적장치의 수동제어명령 개선을 위한 운용자 모델링)

  • Lee, Seok-Jae;Lyou, Joon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.44 no.3
    • /
    • pp.51-57
    • /
    • 2007
  • Without human dynamics effects, the manually operated target tracking system has poor performance or instability in real environments. The tracking system is invalid when a human is added to the control loop as a real time delay, because input signals are generated by human operator to reduce the errors between target and gun. In this paper, we consider the human operator as a part of controller and modeling the human operator as a first-order model to generate the intentional force. But it is known that human modeling is not easy because of disturbance or noise of the vehicle while moving for the target. We performed a variety of experiments with real plant to identify the model's parameters and verify the proposed operator model's efficiency.

The user-friendly, ergonomic design aspect of recent intraoral scanners: a literature review (사용자 친화적 인체공학에 따른 구내스캐너 디자인에 대한 고찰)

  • Park, Hye-Nan;Kim, Won-Hee;Lim, Young-Jun;Lee, Won-Jin;Han, Jung-Suk;Lee, Seung-Pyo
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.31 no.3
    • /
    • pp.221-230
    • /
    • 2015
  • Recently, traditional impression has been rapidly replaced by digital impression using intraoral scanning. There are more than 7 types of intraoral scanners available in the dental market. It is difficult to make effective strategic choices due to a lack of standards and guidelines for optimal intraoral scanning devices. So far, little has been reported about evaluating the ergonomic aspect of these scanners. This literature review compares current intraoral scanning systems based on different types of handles and suggests the most comfortable, user-friendly intraoral scanners from an ergonomic standpoint.

Analyzing of connected car vulnerability and Design of Security System (커네티트 카의 취약점 분석 및 보안 시스템 설계)

  • Kim, Tae-Hyoung;Jang, Jong-Wook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.05a
    • /
    • pp.241-243
    • /
    • 2016
  • In the Past, Trend of car security was Physical Something like doorlock system, and The Generation did not have skills connecting External devices. Through Car Development is up, that trend of car security Changed Physical Security to Intelligence Security. This Changes give a chance to hackers to attack this system. This System use CAN(Controller Area Network) Protocol which have three vulnerabilities. First, ID Spoofing, Twice, D - Dos Attack, Third, Android Application Injected Modern cars have many ECU(Electronic Control Unit) to control devices like Engine ON/OFF, Door Lock Handling, and Controlling Handle. Because CAN Protocol spread signal using broadcast, Hackers can get the signal very easily, and Those often use Mobile devices like Android or IOS to attack this system. if bluetooth signal is spread wide, hackers get the signal, and analysis the bluetooth data, so then They makes certain data to attack ECU, they send the data to ECU, and control ECU installed car. so I suggest that I will prevent this attack to make Auth system and prevent this attack in end of Android.

  • PDF

Design and Implementation of SIP-based Presence Agent Server (SIP기반 Presence Agent 서버 기능 설계 및 구현)

  • Hyun, Wook;Huh, Mi-Young;Park, Sun-Ok;Kang, Shin-Gak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.585-588
    • /
    • 2005
  • The Presence Agent Server receives user's presence information via PUBLISH request message and let subscribers to know that information. IMPP client has a functions for PUA(presence user agent) as a base operational entity. In some circumstance, the client has both pua and pa logical entities. However presence agent server has take part only of PA. In this paper, we describes the design and implementation that contains modules based configurations and approaches for presence agent server. Also, we describe how we handle each events and database API instruction set.

  • PDF

Implementation Of Wireless Telephony Application Server (무선 텔레포니 에플리케이션 서버의 구현)

  • Choi, Chul-Oong;Jang, Ji-San;Lee, Jung-Eun;Kim, Min-Soo;Shin, Dong-Kyoo;Shin, Dong-Il
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04a
    • /
    • pp.561-564
    • /
    • 2001
  • 본 논문은 무선 에플리케이션 프로토콜 Specification에서 제시하고 있는 WTA(Wireless Telephony Application) 를 기초로 네트워크에서 발생한 실시간 Event를 처리할 수 있는 모바일 클라이언트 및 WTA서버에 대한 설계와 구현에 대해서 기술한다. 또한 네트워크 이벤트 및 사용자가 발생시킨 이벤트를 디바이스에 독립적으로 처리할 수 있는 WTA 라이브러리와 필요한 컨텐츠를 실시간으로 브라우징하기 위한 Repository 에 대해 기술한다. 전체적인 WTA 환경 구조는 크게 2개의 물리적 구조인 Mobile Client와 WTA Server로 구현되어있다. Mobile Client의 내부 모듈은 표준 WAE 사용자 에이전트(Standard WAE User Agent)의 확장인 WTA 사용자 에이전트 모듈(WTA User-Agent Module), 필요한 resource를 서버로 요청하고 저장하는 채널 인스톨 모듈(Channel Install Module), network로부터 발생한 Event를 처리하는 이벤트 핸들러 모듈(Event Handler Module), mobile network 기능들(e.g. setting up calls)과 device specific feature(e.g. manipulating the phonebook)를 다루는 WTA 스크립트 라이브러리(WTA Script Library), Phonebook 엑세스 모듈(Phonebook Access Module), 실시간으로 즉각 이벤트에 반응하기 위한 Repository로 구성되어있고, WTA Server는 Client가 요청한 Content(services)를 전달 해 주는 컨텐트 전달 모듈(Content Deliver Module)과 서버 Phonebook 엑세스 모들(Server Phonebook Access Module)로 구성되어 있다.

  • PDF

Automatic Generation Technique of Touch-Screen Interface for Mobile Game Contents (모바일 게임 콘텐츠의 터치스크린 인터페이스 자동 생성 기법)

  • Ko, Seok-Hoon;Son, Yun-Sik;Park, Ji-Woo;Oh, Se-Man
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.11
    • /
    • pp.866-870
    • /
    • 2009
  • As touch-screen mobile phones pour into the market, demands for reusing existing mobile game contents by adding a touch-screen interface are increasing. But, the contents which are developed in existing does not have touch-screen interface and in order not to be automatic is difficult with touch- screen contents to convert. From the present paper uses keyboard interface information about the mobile game contents which does not have touch-screen interface and creates touch-screen interface with automatic the method which proposes. This method analyzes the type of key events which are used from the contents the screen keyboard layout of optimum and construct. And, key event where is confronted with automatic occurs about touch screen event and creates the screen interface which executes the keyboard event handler. In the end, experiment leads and the screen interface which has become optimum anger to the contents creating, confirms.

A Study on the Reduction in VR Cybersickness using an Interactive Wind System (Interactive Wind System을 이용한 VR 사이버 멀미 개선 연구)

  • Lim, Dojeon;Lee, Yewon;Cho, Yesol;Ryoo, Taedong;Han, Daseong
    • Journal of the Korea Computer Graphics Society
    • /
    • v.27 no.3
    • /
    • pp.43-53
    • /
    • 2021
  • This paper presents an interactive wind system that generates artificial winds in a virtual reality (VR) environment according to online user inputs from a steering wheel and an acceleration pedal. Our system is composed of a head-mounted display (HMD) and three electric fans to make the user sense touch from the winds blowing from three different directions in a racing car VR application. To evaluate the effectiveness of the winds for reducing VR cybersickness, we employ the simulator sickness questionnaire (SSQ), which is one of the most common measures for cybersickness. We conducted experiments on 13 subjects for the racing car contents first with the winds and then without them or vice versa. Our results showed that the VR contents with the artificial winds clearly reduce cybersickness while providing a positive user experience.

CBD process applying for DEFACS (원자력 해체시설 특성관리 시스템을 위한 CBD 프로세스의 적용 방안)

  • Cho, Woonhyoung;Park, Seungkook;Choi, Yundong;Moon, Jeikwon
    • Journal of Software Engineering Society
    • /
    • v.25 no.1
    • /
    • pp.11-18
    • /
    • 2012
  • Characteristic of decommissioning target facility investigate and understand is very important. because radioactive materials occurs in the decommissioning and dismantling, so it is difficult to use a general dismantling method. Decommissioning nuclear facilities, the characteristics of the target of research to predict the amount of decommissioning waste, decommission projects costing is largely utilized. For this purpose, we developed DEFACS(Decommissioning Facility Characterization DB System) that manage characteristic of decommissioning target facility. But nuclear facility decommissioning takes long time. so we inevitably developed system during decommissioning works, it occurs many system changes. For this reason, it is difficult to apply general development process, so we take CBD process that divide CD(Component Development) and CBSD(Component Based Software Development) for handling change of requirement. it make Component of the overall system for changes to minimize changes by strengthening the independence of components and processes due to changes in requirements were to minimize stopping of the process.

  • PDF

Deep Learning based Vehicle AR Manual for Improving User Experience (사용자 경험 향상을 위한 딥러닝 기반 차량용 AR 매뉴얼)

  • Lee, Jeong-Min;Kim, Jun-Hak;Seok, Jung-Won;Park, Jinho
    • Journal of the Korea Computer Graphics Society
    • /
    • v.28 no.3
    • /
    • pp.125-134
    • /
    • 2022
  • This paper implements an AR manual for a vehicle that can be used even in the vehicle interior space where it is difficult to apply the augmentation method of AR content, which is mainly used, and applies a deep learning model to improve the augmentation matching between real space and virtual objects. Through deep learning, the logo of the steering wheel is recognized regardless of the position, angle, and inclination, and 3D interior space coordinates are generated based on this, and the virtual button is precisely augmented on the actual vehicle parts. Based on the same learning model, the function to recognize the main warning light symbols of the vehicle is also implemented to increase the functionality and usability as an AR manual for vehicles.