• Title/Summary/Keyword: Computer Control System

Search Result 6,640, Processing Time 0.037 seconds

Implementation of Mobile Virtual Colored Overlay for People with Scotopic Sensitivity Syndrome (광과민성 증후군자를 위한 태블릿 PC와 스마트폰 용 가상 색 오버레이 구현)

  • Jang, Young Gun
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.2
    • /
    • pp.145-150
    • /
    • 2013
  • A film colored overlay has been used as an assistive device for dyslexics, Recently, several virtual colored overlays which can be used in computer were developed. But mobile virtual overlay has not been developed yet. In this paper, I implemented a mobile overlay application which is based android operating system and displays a colored overlay of screen all the time while user can freely interact with rest of apps in normal manner by using root window and service. A method is presented to determine the source color of a virtual overlays by estimating alpha value of alpha blending algorithm through measurement of the chromaticity and transmissivity of film overlays and I implemented all colors which are presented by using Intuitive Overlays. Test results of the developed virtual overlay show that all colors of the overlays are almost identical to the colors of Intuitive Overlay by using the chroma meter CS-200A.

Performance analysis of the Resource Reservation Schemes using Mobile Cluster based H-MRSVP in Wireless Mobile Networks (무선 이동망에서 이동 클러스터 기반의 H-MRVP를 이용한 자원관리 기법의 성능 분석)

  • Ma, Gyeong-Min;Won, Jeong-Jae;Lee, Hyeong-U;Jo, Chung-Ho
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.283-292
    • /
    • 2002
  • This paper develops a scheme of resource management for guaranteeing QoS of realtime traffic in wireless mobile internet environments Mobile terminal has significant impact on the QoS originating mobility provided to a real-time application. The currently proposed MRSVP is not clear the boundary of resource reservation tregion and also can give rise to signal overhead to maintain sessions. To solve above problem, we propose the new reservation protocol, mobile cluster based H-MRSVP to combine MRSVP with moving cluster concept. In this paper, we analytically design our model for guaranteeing the QoS of realtime traffic and compare the three schemes: guard channel allocation schemes, DCA and our model. The performance measures are the probabilities of new call blocking, handoff dropping, resource utilization and service completion versus the system offered Erlang load. Consequently, Simulation indicate our model is more flexible than DCA in a view pint of channel utilization and gains the advantage over guard channel scheme with respects to the mobility.

Handoff Control Scheme for IP Based Hybrid Mobile Data Network (IP 기반 흔합 무선데이터망에서의 핸드오프 제어방식 연구)

  • 권수근
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.680-688
    • /
    • 2004
  • In this paper, we propose a new handoff scheme which is efficient in hybrid mobile data network consists of cellular mobile network and wireless LAN. In this scheme, handoff is delayed until connections with wireless LAN and data rates are smoothly decreased according to becon signal strength of wireless LAN. By doing so, data transfer capacity is increased and required data buffer in handoff for mobile and network system can be decreased. We analyze new handoff scheme by computer simulation. The results show that 180Mbytes data can be transferred additionally in handoff processing and required buffer size can be decreased 1/2 with the conditions that mobile speed is 1Km/hr and the data rate of a original call is 2,048Kbps.

  • PDF

Polylactic Acid Coating Affects the Ring Crush Strength of Linerboards

  • Lee, Jun-Ho;Rhim, Jong-Whan
    • Journal of Korea Technical Association of The Pulp and Paper Industry
    • /
    • v.38 no.5 s.118
    • /
    • pp.54-59
    • /
    • 2006
  • Paperboards used for linerboard of corrugated fiberboard box were coated with different concentrations of polylactic acid (PLA) solution and the effects of harsh environmental conditions such as high humidity and temperature (96% RH at $30^{\circ}C$ for up to 5 days), and freeze-thaw ($-20^{\circ}C$ for a day and then thaw at room temperature for 30 min) conditions on the ring crush (RC) strength of the boards were investigated. One to five percent PLA solutions were coated onto SC manila linerboard ($20{\times}27cm$) using a No. 20 wire bar coater and the ring crush strength was measured using a computer-controlled Advanced Universal Testing System in accordance with TAPPI Test Method T 822 om-93. The RC strength increased significantly when the concentration of coating solution increased and appreciable changes were found when the concentration increased from 0 to 2% (P<0.05). Similar pattern of results was found after 5-day storage at $30^{\circ}C$ and 96% RH. Although such highly humid condition increased moisture content in the samples up to 3.95 from 0.97 times, the RC strength decreased in the range from 29.9 to 48.5%. The freeze-thaw treatment increased the moisture content only up to 1.27% and the reduction in the RC strength ranged from 21.1 to 28.1 %. The results were promising: the samples coated with 5% PLA solution showed 29.9% reduction in the RC strength while that of control was 48.5% during highly humid condition stated above.

Joint Transceiver Design for SWIPT in MIMO Interference Channel (MIMO 간섭채널에서 정보와 전력의 동시 전송 (SWIPT)을 위한 송수신기 설계)

  • Seo, Bangwon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.5
    • /
    • pp.55-62
    • /
    • 2019
  • In this paper, we consider K-user multiple-input multiple-output (MIMO) interference channel and present a transceiver design for simultaneous wireless information and power transfer (SWIPT) systems. In addition, we consider a SWIPT system where an information decoding receiver and an energy harvesting receiver are co-located at the same receiver. In the proposed scheme, signal-to-leakage plus noise ratio (SLNR) is used as a cost function and a transceiver is designed to satisfy the threshold of the harvested energy. More specifically, transmitter precoding vector, receiver filter vector, and power spitting factor are simultaneously designed to maximize SLNR with a constraint on the harvested energy. Through computer simulation, we compare the signal-to-interference plus noise ratio (SINR) performance of the proposed and conventional schemes. When a special condition among the number of transmit antennas, receive antennas, and users is satisfied, the proposed scheme showed better SINR performance than the conventional scheme at low signal-to-noise ratio (SNR) range. Also, when the condition is not satisfied, the proposed scheme showed better performance than the conventional scheme at all SNR range.

Equal Energy Consumption Routing Protocol Algorithm Based on Q-Learning for Extending the Lifespan of Ad-Hoc Sensor Network (애드혹 센서 네트워크 수명 연장을 위한 Q-러닝 기반 에너지 균등 소비 라우팅 프로토콜 기법)

  • Kim, Ki Sang;Kim, Sung Wook
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.10
    • /
    • pp.269-276
    • /
    • 2021
  • Recently, smart sensors are used in various environments, and the implementation of ad-hoc sensor networks (ASNs) is a hot research topic. Unfortunately, traditional sensor network routing algorithms focus on specific control issues, and they can't be directly applied to the ASN operation. In this paper, we propose a new routing protocol by using the Q-learning technology, Main challenge of proposed approach is to extend the life of ASNs through efficient energy allocation while obtaining the balanced system performance. The proposed method enhances the Q-learning effect by considering various environmental factors. When a transmission fails, node penalty is accumulated to increase the successful communication probability. Especially, each node stores the Q value of the adjacent node in its own Q table. Every time a data transfer is executed, the Q values are updated and accumulated to learn to select the optimal routing route. Simulation results confirm that the proposed method can choose an energy-efficient routing path, and gets an excellent network performance compared with the existing ASN routing protocols.

Clasification of Cyber Attack Group using Scikit Learn and Cyber Treat Datasets (싸이킷런과 사이버위협 데이터셋을 이용한 사이버 공격 그룹의 분류)

  • Kim, Kyungshin;Lee, Hojun;Kim, Sunghee;Kim, Byungik;Na, Wonshik;Kim, Donguk;Lee, Jeongwhan
    • Journal of Convergence for Information Technology
    • /
    • v.8 no.6
    • /
    • pp.165-171
    • /
    • 2018
  • The most threatening attack that has become a hot topic of recent IT security is APT Attack.. So far, there is no way to respond to APT attacks except by using artificial intelligence techniques. Here, we have implemented a machine learning algorithm for analyzing cyber threat data using machine learning method, using a data set that collects cyber attack cases using Scikit Learn, a big data machine learning framework. The result showed an attack classification accuracy close to 70%. This result can be developed into the algorithm of the security control system in the future.

Protection Plan of Trustee Personal Credit Information for Credit Card Company Using Cloud Computing (클라우드컴퓨팅 이용 신용카드사의 영세수탁자 개인신용정보 보호방안)

  • Kim, Shi-in;Kim, In-suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.885-895
    • /
    • 2019
  • As seen in recent cases of hacking in financial services, attackers are attempting to hacking trustee with poor security management, rather than directly hacking a financial company. As a result, the consignor is strengthening the security check and control of the trustee, but small trustee has difficulties to invest in information security with the lack of computer facilities and the excessive cost of security equipment. In this paper I investigate the vulnerability of personal information processing life cycle standards in order to enhance the security of small consignee that receive personal information form the credit card company. To solve the vulnerability the company should use litigation management system constructed on cloud computing service and install VPN to secure confidentiality and intergrity in data transfer section. Also, to enhance the security of users, it is suggested to protect personal credit information by installing PC firewall and output security on user PC.

Improvement of Cognitive Rehabilitation Method using K-means Algorithm (K-MEANS 알고리즘을 이용한 인지 재활 훈련 방법의 개선)

  • Cho, Ha-Yeon;Lee, Hyeok-Min;Moon, Ho-Sang;Shin, Sung-Wook;Chung, Sung-Taek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.6
    • /
    • pp.259-268
    • /
    • 2018
  • The purpose of this study is to propose a training method customized to the level of cognitive abilities to increase users' interest and engagement while using cognitive function training contents. The level of cognitive ability of the users was based on the clustering based on the users' information and Mini-Mental Statue Examination-Korea Child test score using the K-means algorithm applied collaborative filtering. The results were applied to the integrated cognitive function training system, and the contents order and difficulty level of the cognitive function training area were recommended to the user's cognitive ability level. Particularly, the contents difficulty control was designed to give a high immersion feeling by applying the 'flow theory' method that users can repeatedly feel tension and comfort. In conclusion, the user-customized cognitive function training method proposed in this paper can be expected to be more effective and rehabilitative results than existing therapists' subjective setting of contents order and difficulty level.

Reliability verification of cutting force experiment by the 3D-FEM analysis from reverse engineering design of milling tool (밀링 공구의 역 공학 설계에서 3D 유한요소 해석을 통한 절삭력 실험의 신뢰성 검증)

  • Jung, Sung-Taek;Wi, Eun-Chan;Kim, Hyun-Jeong;Song, Ki-Hyeok;Baek, Seung-Yub
    • Design & Manufacturing
    • /
    • v.13 no.2
    • /
    • pp.54-59
    • /
    • 2019
  • CNC(Computer Numerical Control) machine tools are being used in various industrial fields such as aircraft and automobiles. The machining conditions used in the mold industry are used, and the simulation and the experiment are compared. The tool used in the experiment was carried out to increase the reliability of the simulation of the cutting machining. The program used in the 3D-FEM (finite element method) was the AdvantEdge and predicted by down-milling. The tool model is used 3D-FEM simulation by using the cutting force, temperature prediction. In this study, we carried out the verification of cutting force by using a 3-axis tool dynamometer (Kistler 9257B) system when machining the plastic mold Steel machining of NAK-80. The cutting force experiment data using on the charge amplifier (5070A) is amplified, and the 3-axis cutting force data are saved as a TDMS file using the Lab-View based program using on NI-PXIe-1062Q. The machining condition 7 was the most similar to the simulation and the experimental results. The material properties of the NAK-80 material and the simulation trends reflected in the reverse design of the tool were derived similarly to the experimental results.