• Title/Summary/Keyword: Electronic Companies

Search Result 629, Processing Time 0.028 seconds

Implementation of Stereoscopic 3D Video Player System Having Less Visual Fatigue and Its Computational Complexity Analysis for Real-Time Processing (시청피로 저감형 S3D 영상 재생 시스템 구현 및 실시간 처리를 위한 알고리즘 연산량 분석)

  • Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.12
    • /
    • pp.2865-2874
    • /
    • 2013
  • Recently, most of movies top-ranked in the box office are screening in Stereoscopic 3D, and the world's leading electronics companies such as Samsung and LG are getting the hots for 3DTV sales. However, each person has different binocular disparity and different viewing distance, and thus he or she feels the severe visual fatigue and headaches if he or she is watching 3D content with the same binocular disparity, which is very different from things he or she feels in the real world. To solve this problem, this paper proposes and implement a 3D rendering system that correct the disparity of 3D content by reflecting binocular distance and viewing distance. Then, the computational complexity is analyzed. Optical-flow and Warping algorithms turn out to consume 732 seconds and 5.7 seconds per frame, respectively. Therefore, a dedicated chip-set for both blocks is strongly required for real-time HD 3D display.

Comparing the Results of Big-Data with Questionnaire Survey (빅데이터 분석결과와 실증조사 결과의 비교)

  • Kim, Do-Goan;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2027-2032
    • /
    • 2016
  • The rapid diffusion of smart phones and the development of data storage and analysis technology have made the field of big-data a promising industry in the future. In the marketing field, big-data analysis on social data can be used for understanding the needs of consumers as an effective and efficient marketing tool. Before the age of big-data, companies had relied upon the traditional methods such as questionnaire survey and marketing test in which a small number of consumers had participated. The traditional methods have still been used. Although both of big-data analysis and traditional methods are useful to understand consumers. It is need to check whether the results from both include similar implications. In this point, this study attempts to compare the results of big-data analysis with that of questionnaire survey on some cosmetics brands methods. As the results of this study, both results of big-data analysis and questionnaire survey include similar implications.

A Study on the Technical Regulation of Weak Electric Filed Strength Radio Equipment about 58kHz Frequency Band (58kHz 대역 미약 전계강도 무선기기 기술 기준에 관한 연구)

  • Park, Hyoung-Keun;Kim, Sun-Youb;Ra, Yoo-Chan
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.9
    • /
    • pp.2319-2325
    • /
    • 2009
  • This paper compared the output limits value of the Korean weak electric field strength wireless device in the 58kHz band with the standard values of foreign countries. Through this, the study confirmed that the Korean regulation was lower by about 50dB than those of the USA or Europe. In order to prove this, the study measured outputs by entrusting the 58kHz EAS system to two measuring companies. As a result of these measurements, electric field strengths were shown to be $112dB{\mu}V/m$ and $08dB{\mu}V/m$ respectively, and these values were confirmed to exceed the current Korean standard of $102.7dB{\mu}V/m$. Accordingly, it is deemed necessary to review the specifications of the Korean standard in the 58kHz band.

IoT Environment and Security Countermeasures in 4th Industrial Revolution (4차 산업혁명 시대의 사물인터넷 현황 및 보안 대응책)

  • Hong, Sunghyuck
    • Journal of Digital Convergence
    • /
    • v.17 no.11
    • /
    • pp.195-200
    • /
    • 2019
  • The role of the Internet of Things in the Fourth Industrial Revolution is in the era of collecting data at the end and analyzing big data through technology to analyze the future or behavior. Therefore, due to the nature of the IoT, it is vulnerable to security and requires a lightweight security protocol. The spread of things Internet technology is changing our lives a lot. IT companies all over the world are already focusing on products and services based on things Internet, and they are going to the era of all things internet that can communicate not only with electronic devices but also with common objects. People, people, people and objects, things and things interact without limitation of time and space, collecting, analyzing and applying information. Life becomes more and more smart, but on the other hand, the possibility of leakage of personal information becomes greater. Therefore, this study proposed security threats that threaten the protection of personal information and countermeasures, and suggested countermeasures for building a secure IoT environment suitable for the Fourth Industrial Revolution.

A Study on Delivery Integration of UHD, Mobile HD, Digital Radio based on ATSC 3.0 (ATSC 3.0 기반 UHD, 이동HD, 디지털라디오 통합전송 연구)

  • Seo, Chang Ho;Im, Yoon Hyeock;Jeon, Sung Ho;Seo, Jae Hyun;Choi, Seong Jhin
    • Journal of Broadcast Engineering
    • /
    • v.24 no.4
    • /
    • pp.643-659
    • /
    • 2019
  • In this paper, the technology verification of next generation broadcasting technology and service suitable for domestic broadcasting environment was carried out to build and activate domestic terrestrial UHD broadcasting. ATSC 3.0-based mobile HD broadcasting is currently conducting experiments with various parameters from broadcasting companies, research institutes and others. However, experiments on integrated transmissions, including audio services, have not been carried out. Through this experiment, we first performed the theory and experiment on the maximum number of ATSC 3.0 based UHD broadcasting service, maximum service number of HD broadcasting considering mobility, and maximum service number of audio broadcasting within one channel (6MHz). Second, parameters for integrated transmission of each service (UHD broadcasting, mobile HD and audio broadcasting) in one channel were derived. Finally, we studied technical possibilities through field tests that we receive while moving directly in the field.

Study of Capturing Real-Time 360 VR 3D Game Video for 360 VR E-Sports Broadcast (360 VR E-Sports 중계를 위한 실시간 360 VR 3D Stereo 게임 영상 획득에 관한 연구)

  • Kim, Hyun Wook;Lee, Jun Suk;Yang, Sung Hyun
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.876-885
    • /
    • 2018
  • Although e-sports broadcasting market based on VR(Virtual Reality) is growing in these days, technology development for securing market competitiveness is quite inadequate in Korea. Global companies such as SLIVER and Facebook already developed and are trying to commercialize 360 VR broadcasting technology which is able to broadcast e-sports in 4K 30FPS VR video. However, 2D video is too poor to use for 360 VR video in that it brings less immersive experience and dizziness and has low resolution in the scene. this paper, we not only proposed and implemented virtual camera technology which is able to capture in-game space as 360 video with 4K 3D by 60FPS for e-sports VR broadcasting but also verified feasibleness of obtaining stereo 360 video up to 4K/60FPS by conducting experiment after setting up virtual camera in sample games from game engine and commercial games.

An RNN-based Fault Detection Scheme for Digital Sensor (RNN 기반 디지털 센서의 Rising time과 Falling time 고장 검출 기법)

  • Lee, Gyu-Hyung;Lee, Young-Doo;Koo, In-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.29-35
    • /
    • 2019
  • As the fourth industrial revolution is emerging, many companies are increasingly interested in smart factories and the importance of sensors is being emphasized. In the case that sensors for collecting sensing data fail, the plant could not be optimized and further it could not be operated properly, which may incur a financial loss. For this purpose, it is necessary to diagnose the status of sensors to prevent sensor' fault. In the paper, we propose a scheme to diagnose digital-sensor' fault by analyzing the rising time and falling time of digital sensors through the LSTM(Long Short Term Memory) of Deep Learning RNN algorithm. Experimental results of the proposed scheme are compared with those of rule-based fault diagnosis algorithm in terms of AUC(Area Under the Curve) of accuracy and ROC(Receiver Operating Characteristic) curve. Experimental results show that the proposed system has better and more stable performance than the rule-based fault diagnosis algorithm.

Smart Monitoring System to Improve Solar Power System Efficiency (태양광 발전시스템 효율향상을 위한 스마트 모니터링 시스템)

  • Yoon, Yongho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.219-224
    • /
    • 2019
  • The number of solar power installation companies including domestic small scale (50kW or less) is increasing rapidly, but the efficient operation system and management are insufficient. Therefore, a new type of operating system is needed as a maintenance management aspect to maximize the generation amount in the current state rather than the additional function which causes the increase of the generation cost. In this paper, we utilize Big Data and sensor network to maximize the operating efficiency of solar power plant and analyze the expert system to develop power generation prediction technology, module unit fault detection technology, life prediction of inverter components and report technology, maintenance optimization And to develop a smart monitoring system that enables optimal operation of photovoltaic power plants such as development of algorithms and economic analysis.

Implementation of Road Risk Information Notice Device (도로위험정보알림 디바이스 구현)

  • Kim, Jong-Duk;Han, Seung-Heon;Kim, Yong-Kil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.438-444
    • /
    • 2019
  • With the increasing supply of vehicles, construction of new roads and expansion of existing roads are growing and this is leading to a proportional rise in diverse hazards on a road. These hazards are classified into fixed hazards and variable hazards. Currently, drivers receive information of fixed hazards, such as overspeed, frequent accidents, and rock fall through navigations. However, variable hazards are more hazardous than fixed hazards. Map companies frequently enter information of variable hazards manually, but it is less real-time and hard to deal with unforseen hazards. This paper is intended to implement a road hazard warning system for making a contribution to pubic interests by improving this problem and delivering real-time information of hazards to drivers, and suggest a direction for using information of hazards on a road.

Design and Implementation of an Android Application for Protecting the Personal Information on Smart Phones (스마트폰의 개인 정보 보호를 위한 안드로이드용 어플리케이션 설계 및 구현)

  • Lim, Hun-Jin;Choi, Do-Jin;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.12
    • /
    • pp.266-277
    • /
    • 2020
  • As users' convenience increases, the issue of personal information leakage about smartphones is also becoming serious. Since all of the user's personal information needed to provide functions such as electronic banking services and personal file storage is stored in the smartphone, the user's important personal information may be exposed if the smartphone is lost or stolen. In order to protect this privacy, governments and telecommunications companies offer smartphone locking or initialization services, but there are many loopholes and problems. In this paper, we design and implement applications that prevent malicious use of a user's personal information stored on a smartphone when a smartphone is lost or stolen, and that automatically initializes the smartphone used after removing or altering the USIM chip and destroys the user's personal information stored within the phone. The proposed application prevents users from maliciously using their personal information when a smartphone is lost or stolen.