• Title/Summary/Keyword: Automatic Delete

Search Result 11, Processing Time 0.022 seconds

The Development of Community Website Using an Automatic Delete Posts (게시글 자동삭제를 이용한 커뮤니티 웹사이트 개발)

  • Jeong, Kil-Hyeon;Yoo, Ji-Hyun;Choi, Dong-Jun;Kim, Yeon-Un;Seo, Eun-Bok;Moon, Chan-Ho
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2016.07a
    • /
    • pp.233-234
    • /
    • 2016
  • 본 프로젝트는 편안하고 안전하게 세상과 소통하고 관심사를 공유할 수 있는 커뮤니티 사이트이다. 게시글에 수명을 설정하여 자동으로 글이 삭제되는 기능을 통해 사용자의 보안성을 향상시키며, 기본적으로 닉네임을 사용하여 안전한 익명성을 보장한다. 즉, 자동으로 게시글이 삭제되는 커뮤니티 웹 사이트로 사용자들의 일상, 관심사, 정보 공유 등을 게시글을 통해 공유하고 소통할 수 있고, 커뮤니티 활동에 따라 마일리지를 누적하여 게시글의 기본 수명을 연장 할 수도 있다.

  • PDF

Automatic Face Region Detection and Tracking for Robustness in Rotation using the Estimation Function (평가 함수를 사용하여 회전에 강건한 자동 얼굴 영역 검출과 추적)

  • Kim, Ki-Sang;Kim, Gye-Young;Choi, Hyung-Il
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.9
    • /
    • pp.1-9
    • /
    • 2008
  • In this paper, we proposed automatic face detection and tracking which is robustness in rotation. To detect a face image in complicated background and various illuminating conditions, we used face skin color detection. we used Harris corner detector for extract facial feature points. After that, we need to track these feature points. In traditional method, Lucas-Kanade feature tracker doesn't delete useless feature points by occlusion in current scene (face rotation or out of camera). So we proposed the estimation function, which delete useless feature points. The method of delete useless feature points is estimation value at each pyramidal level. When the face was occlusion, we deleted these feature points. This can be robustness to face rotation and out of camera. In experimental results, we assess that using estimation function is better than traditional feature tracker.

A Study on the Possibility of Pattern Design Using CAD System (With concentration on the change of coat basic pattern) (CAD System을 이용한 패턴디자인설계 활용가능성에 관한 연구(I)-Coat 원형을 중심으로-)

  • 김옥경
    • Journal of the Korean Society of Costume
    • /
    • v.20
    • /
    • pp.49-62
    • /
    • 1993
  • The purpose of this research was to utilize of Pattern Design System(P.D.S) by using AM-300 The conclusion were like these : 1. A coat of basic pattern was selected by design sketch. 2. The basic pattern was input into computer by digitizing. 3. The basic pattern was change into designed shape by using various skills. This system were enabled to draw straight lines, curves, delete lines, sections of lines, extend lines, cut pattern into sections, measure line or section reproduce whole pattern shape of section, rotate and mirror pattern and complete patterns. 4. Automatic grading of finished master pattern have been developed by creation and modification of grading rules of basic pattern. 5. Production pattern added seam allowance, not-ches was generated by P.D.S menu option. 6. Finished pattern design was plotted out 100% and 20% size by AM-300 Plotter. This results will be the basic materials to develop the CAD SYSTEM if some problems were improve. Furthermore, the utilization of P.D.S is expected to be developing in pattern making process.

  • PDF

Soccer Image Sequences Mosaicing Using Reverse Affine Transform

  • Yoon, Ho-Sub;Jung Soh;Min, Byung-Woo;Yang, Young-Kyu
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.877-880
    • /
    • 2000
  • In this paper, we develop an algorithm of soccer image sequences mosaicing using reverse affine transform. The continuous mosaic images of soccer ground field allows the user/viewer to view a “wide picture” of the player’s actions The first step of our algorithm is to automatic detection and tracking player, ball and some lines such as center circle, sideline, penalty line and so on. For this purpose, we use the ground field extraction algorithm using color information and player and line detection algorithm using four P-rules and two L-rules. The second step is Affine transform to map the points from image to model coordinate using predefined and pre-detected four points. General Affine transformation has many holes in target image. In order to delete these holes, we use reverse Affine transform. We tested our method in real image sequence and the experimental results are given.

  • PDF

Automatic SQL Test Grading System (SQL 시험 자동 채점 시스템)

  • Hur, Tai-Sung;Ko, Bo-Ram
    • Proceedings of the Korean Society of Computer Information Conference
    • /
    • 2015.07a
    • /
    • pp.147-148
    • /
    • 2015
  • 대학의 컴퓨터 관련 학과에서 데이터베이스에 대한 SQL(DML)을 학생들에게 숙지시키기 위한 시험(정기 시험, 퀴즈)은 필수이며, 이에 대한 채점을 수작업을 하고 있어 교수들에게 채점의 부담으로 작용하고 있다. 본 논문은 이런 부담을 덜기 위한 SQL 채점 자동화 시스템을 개발함으로써 학생들에게 채점의 부담 없이 시험을 통해 충분한 시험을 실시하도록 하는 시스템을 개발하였다. 대학에서 SQL은 SELECT, UPDATE, INSERT, DELETE 4개의 데이터 조작어로 구분되며, 기본적인 구문의 시험이 대부분이다, 이에 대한 채점 구문분석을 위한 파싱트리(parsing tree)을 만들어 자동 채점 시스템을 구현하였다.

  • PDF

File Signature's Automatic Calculation Algorithm Proposal for Digital Forensic

  • Jang, Eun-Jin;Shin, Seung-Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.3
    • /
    • pp.118-123
    • /
    • 2021
  • Recently, digital crime is becoming more intelligent, and efficient digital forensic techniques are required to collect evidence for this. In the case of important files related to crime, a specific person may intentionally delete the file. In such a situation, data recovery is a very important procedure that can prove criminal charges. Although there are various methods to recover deleted files, we focuses on the recovery technique using HxD editor. When recovering a deleted file using the HxD editor, check the file structure and access the file data area through calculation. However, there is a possibility that errors such as arithmetic errors may occur when a file approach through calculation is used. Therefore, in this paper, we propose an algorithm that automatically calculates the header and footer of a file after checking the file signature in the root directory for efficient file recovery. If the algorithm proposed in this paper is used, it is expected that the error rate of arithmetic errors in the file recovery process can be reduced.

A Study on Quantitative Security Assessment after Privacy Vulnerability Analysis of PC (PC의 개인정보보호 취약점 분석과 정량화된 보안진단 연구)

  • Seo, Mi-Sook;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.456-460
    • /
    • 2012
  • Privacy Protection Act of 30 March 2012 was performed. In general, personal information management to enhance security in the DB server has a security system but, PC for the protection of the privacy and security vulnerability analysis is needed to research on self-diagnosis. In this paper, from a PC to search information relating to privacy and enhance security by encrypting and for delete file delete recovery impossible. In pc found vulnerability analysis is Check user accounts, Checking shared folders ,Services firewall check, Screen savers, Automatic patch update Is checked. After the analysis and quantification of the vulnerability checks through the expression, enhanced security by creating a checklist for the show, PC security management, server management by semi-hwahayeo activates. In this paper the PC privacy and PC security enhancements a economic damage and of the and Will contribute to reduce complaints.

  • PDF

User based Smart Home Device Matching System (사용자 기반 스마트 홈 디바이스 매칭 시스템)

  • Lee, Hyeongseon;Yu, Donggyun;Lee, Jongwon;Chung, Jinmo;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.617-618
    • /
    • 2017
  • Recently, IoT can provide a service considering user's convenience by configuring the inside of the home as a smart environment. However, the existing system can not change the configuration of the home smart environment by the user, and there is a problem in compatibility between the server and the heterogeneous device. In this paper, we propose a system to reconfigure the relationship between the device and the server in the smart home environment to solve that. In a smart home environment, The user can add and delete devices through the application. In addition, when a new device is added, the server searches the schema for the device and establishes an automatic relationship. This makes it possible for the user to easily change the configuration of the smart home environment.

  • PDF

Features Reduction using Logistic Regression for Spam Filtering (로지스틱 회귀 분석을 이용한 스펨 필터링의 특징 축소)

  • Jung, Yong-Gyu;Lee, Bum-Joon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.10 no.2
    • /
    • pp.13-18
    • /
    • 2010
  • Today, The much amount of spam that occupies the mail server and network storage occurs the lack of negative issues, such as overload, and for users to delete the spam should spend time, resources have a problem. Automatic spam filtering on the incidence to solve the problem is essential. A lot of Spam filters have tried to solve the problem emerged as an essential element automatically. Unlike traditional method such as Naive Bayesian, PCA through the many-dimensional data set of spam with a few spindle-dimensional process that narrowed the operation to reduce the burden on certain groups for classification Logistic regression analysis method was used to filter the spam. Through the speed and performance, it was able to get the positive results.

Cards Automated Designed Research for Personal Information Leak Prevention (개인정보 유출 방지를 위한 명함 자동화 설계 연구)

  • Park, Jong-Youel;Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.275-277
    • /
    • 2015
  • This paper proposed have been the business card information to the computer when creating business card printing agency saved to a file, there is always the risk of personal information leakage. Application file organization information into the card, the name, phone number, email address information, such as is capable of easily accessible because it is not encrypted. This paper proposed it encrypts the information entered on the Business Card application file to automate the process of the card application and simplifying the business card application process minimizes the work of staff and linked directly to the print shop how to automatically delete the print file after the completion of business card printing and research.

  • PDF