• Title/Summary/Keyword: Computer-control

Search Result 11,884, Processing Time 0.039 seconds

A Study of the Accessibility Evaluation of TTS-1 for the Screen Reader User (스크린리더 사용자를 위한 플러그인 가상악기 TTS-1의 접근성 평가 연구)

  • Seok, Yong-Hwan
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.513-522
    • /
    • 2022
  • The purpose of this study is to evaluate the accessibility of the Cakewalk TTS-1 for the screen reader users. An evaluation was performed by testing the accessibility of a editing virtual instrument that is a part of MIDI production based on the NCS(National Competency Standards) by using the TTS-1 and the Sense Reader. The results of this study are as follows. The TTS-1 itself can't provide enough accessibility for the screen users to do an above task. But the screen reader users can perform the above tasks if they use extended access functions like Sense Reader's Mouse Pointer function, Position Memory function and MIDI Control Signal function. Even if they use the extended access function, there are functions that is difficult to access. To solve this problem, several suggestions are proposed.

A Secure Subscription-Push Service Scheme Based on Blockchain and Edge Computing for IoT

  • Deng, Yinjuan;Wang, Shangping;Zhang, Qian;Zhang, Duo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.2
    • /
    • pp.445-466
    • /
    • 2022
  • As everything linking to the internet, people can subscribe to various services from a service provider to facilitate their lives through the Internet of Things (IoT). An obligatory thing for the service provider is that they should push the service data safely and timely to multiple IoT terminal devices regularly after the IoT devices accomplishing the service subscription. In order to control the service message received by the legal devices as while as keep the confidentiality of the data, the public key encryption algorithm is utilized. While the existing public encryption algorithms for push service are too complicated for IoT devices, and almost of the current subscription schemes based on push mode are relying on centralized organization which may suffer from centralized entity corruption or single point of failure. To address these issues, we design a secure subscription-push service scheme based on blockchain and edge computing in this article, which is decentralized with secure architecture for the subscription and push of service. Furthermore, inspired by broadcast encryption and multicast encryption, a new encryption algorithm is designed to manage the permissions of IoT devices together with smart contract, and to protect the confidentiality of push messages, which is suitable for IoT devices. The edge computing nodes, in the new system architecture, maintain the blockchain to ensure the impartiality and traceability of service subscriptions and push messages, meanwhile undertake some calculations for IoT devices with limited computing power. The legalities of subscription services are guaranteed by verifying subscription tags on the smart contract. Lastly, the analysis indicates that the scheme is reliable, and the proposed encryption algorithm is safe and efficient.

Low-Power-Consumption Repetitive Wake-up Scheme for IoT Systems (사물인터넷 시스템을 위한 저전력 반복 깨우기 기법)

  • Kang, Kai;Kim, Jinchun;Eun, Seongbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1596-1602
    • /
    • 2021
  • Battery-operated IoT devices in IoT systems require low power consumption. In general, IoT devices enter a sleep state synchronously to reduce power consumption. A problem arises when an IoT device has to handle asynchronous user requests, as the duty cycle must be reduced to enhance response time. In this paper, we propose a new low-power-consumption scheme, called Repetitive Wake-up scheme for IoT systems of asynchronous environments such as indoor lights control. The proposed scheme can reduce power consumption by sending wake-up signals from the smartphone repetitively and by retaining the IoT device in sleep state to the smallest possible duty cycle. In the various environments with IoT devices at home or office space, we showed that the proposed scheme can reduce power consumption by up to five times compared to the existing synchronous interlocking technique.

Channel Searching Sequence for Rendezvous in CR Using Sidel'nikov Sequence (시델니코프 수열을 활용한 인지통신의 Rendezvous를 위한 채널 탐색 수열)

  • Jang, Jiwoong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.11
    • /
    • pp.1566-1573
    • /
    • 2021
  • Rendezvous is a process that assists nodes in a Cognitive Radio Networks (CRNs) to discover each other. In CRNs where a common control channel is unknown and a number of channels are given, it is important how two nodes find each other in a known search region. In this paper, I have proposed and analyzed a channel hopping sequence using Sidel'nikov sequence by which each node visits an available number of channels. I analyze the expected time to-rendezvous (TTR) mathematically. I also verify the Rendezvous performance of proposed sequence in the view of TTR under 2 user environment compared with JS algorithm and GOS algorithm. The Rendezvous performance of proposed sequence is much better than GOS algorithm and similar with JS algorithm. But when M is much smaller than p, the performance of proposed sequence is better than JS algorithm.

Analysis of the Valuation Model for the state-of-the-art ICT Technology (첨단 ICT 기술에 대한 가치평가 모델 분석)

  • Oh, Sun-Jin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.4
    • /
    • pp.705-710
    • /
    • 2021
  • Nowadays, cutting-edge information communication technology is the genuine core technology of the fourth Industrial Revolution and is still making great progress rapidly among various technology fields. The biggest issue in ICT fields is the machine learning based Artificial Intelligence applications using big data in cloud computing environment on the basis of wireless network, and also the technology fields of autonomous control applications such as Autonomous Car or Mobile Robot. Since value of the high-tech ICT technology depends on the surrounded environmental factors and is very flexible, the precise technology valuation method is urgently needed in order to get successful technology transfer, transaction and commercialization. In this research, we analyze the characteristics of the high-tech ICT technology and the main factors in technology transfer or commercialization process, and propose the precise technology valuation method that reflects the characteristics of the ICT technology through phased analysis of the existing technology valuationmodel.

Power peaking factor prediction using ANFIS method

  • Ali, Nur Syazwani Mohd;Hamzah, Khaidzir;Idris, Faridah;Basri, Nor Afifah;Sarkawi, Muhammad Syahir;Sazali, Muhammad Arif;Rabir, Hairie;Minhat, Mohamad Sabri;Zainal, Jasman
    • Nuclear Engineering and Technology
    • /
    • v.54 no.2
    • /
    • pp.608-616
    • /
    • 2022
  • Power peaking factors (PPF) is an important parameter for safe and efficient reactor operation. There are several methods to calculate the PPF at TRIGA research reactors such as MCNP and TRIGLAV codes. However, these methods are time-consuming and required high specifications of a computer system. To overcome these limitations, artificial intelligence was introduced for parameter prediction. Previous studies applied the neural network method to predict the PPF, but the publications using the ANFIS method are not well developed yet. In this paper, the prediction of PPF using the ANFIS was conducted. Two input variables, control rod position, and neutron flux were collected while the PPF was calculated using TRIGLAV code as the data output. These input-output datasets were used for ANFIS model generation, training, and testing. In this study, four ANFIS model with two types of input space partitioning methods shows good predictive performances with R2 values in the range of 96%-97%, reveals the strong relationship between the predicted and actual PPF values. The RMSE calculated also near zero. From this statistical analysis, it is proven that the ANFIS could predict the PPF accurately and can be used as an alternative method to develop a real-time monitoring system at TRIGA research reactors.

A Study on Predictive Preservation of Equipment Management System with Integrated Intelligent IoT (지능형 IoT를 융합한 장비 운용 시스템의 예지 보전을 위한 연구)

  • Lee, Sang-Deok;Kim, Young-Gon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.6
    • /
    • pp.83-89
    • /
    • 2022
  • Internet of Things technology is rapidly developing due to the recent development of information and communication technology. IoT technology utilizes various sensors to generate unique data from each sensor, enabling diagnosis of system status. However, the equipment management system currently in effect is a post-preservation concept in which administrators must deal with the problem after the problem occurs, which could mean system reliability and availability problems due to system errors, and could result in economic losses due to negative productivity disruptions. Therefore, this study confirmed that edge controller control decision algorithms for more efficient operation of rectifiers in the factory by applying intelligent IoT (AIoT) technology and domain knowledge-based modeling for each sensor data collected based on this, outputting appropriate status messages for each scenario.

Development of an intelligent edge computing device equipped with on-device AI vision model (온디바이스 AI 비전 모델이 탑재된 지능형 엣지 컴퓨팅 기기 개발)

  • Kang, Namhi
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.5
    • /
    • pp.17-22
    • /
    • 2022
  • In this paper, we design a lightweight embedded device that can support intelligent edge computing, and show that the device quickly detects an object in an image input from a camera device in real time. The proposed system can be applied to environments without pre-installed infrastructure, such as an intelligent video control system for industrial sites or military areas, or video security systems mounted on autonomous vehicles such as drones. The On-Device AI(Artificial intelligence) technology is increasingly required for the widespread application of intelligent vision recognition systems. Computing offloading from an image data acquisition device to a nearby edge device enables fast service with less network and system resources than AI services performed in the cloud. In addition, it is expected to be safely applied to various industries as it can reduce the attack surface vulnerable to various hacking attacks and minimize the disclosure of sensitive data.

A study on liquid crystal-based electrical polarization control technology for polarized image monitoring device (편광 영상감시 장치를 위한 액정 기반 전기적 편광 조절 기술 연구)

  • Ahn, Hyeon-Sik;Lim, Seong-Min;Jang, Eun-Jeong;Choi, Yoonseuk
    • Journal of IKEEE
    • /
    • v.26 no.3
    • /
    • pp.416-421
    • /
    • 2022
  • In this study, we present a fully automated system that combines camera technology with liquid crystal technology to create a polarization camera capable of detecting the partial linear polarization of light reflected from an object. The use of twisted nematic (TN) liquid crystals that electro-optically modulate the polarization plane of light eliminates the need to mechanically rotate the polarizing filter in front of the camera lens. Images obtained using these techniques are imaged by computer software. In addition, liquid crystal panels have been produced in a square shape, but many camera lenses are usually round, and lighting or other driving units are installed around the lens, so space is optimized through the application of a circular liquid crystal display. Through the development of this technology, an electrically switchable and space-optimized liquid crystal polarizer is developed.

A Black Ice Recognition in Infrared Road Images Using Improved Lightweight Model Based on MobileNetV2 (MobileNetV2 기반의 개선된 Lightweight 모델을 이용한 열화도로 영상에서의 블랙 아이스 인식)

  • Li, Yu-Jie;Kang, Sun-Kyoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.12
    • /
    • pp.1835-1845
    • /
    • 2021
  • To accurately identify black ice and warn the drivers of information in advance so they can control speed and take preventive measures. In this paper, we propose a lightweight black ice detection network based on infrared road images. A black ice recognition network model based on CNN transfer learning has been developed. Additionally, to further improve the accuracy of black ice recognition, an enhanced lightweight network based on MobileNetV2 has been developed. To reduce the amount of calculation, linear bottlenecks and inverse residuals was used, and four bottleneck groups were used. At the same time, to improve the recognition rate of the model, each bottleneck group was connected to a 3×3 convolutional layer to enhance regional feature extraction and increase the number of feature maps. Finally, a black ice recognition experiment was performed on the constructed infrared road black ice dataset. The network model proposed in this paper had an accurate recognition rate of 99.07% for black ice.