• Title/Summary/Keyword: Internet based class

Search Result 330, Processing Time 0.023 seconds

Development of an Internet Based POP System (인터넷 기반 POP시스템의 구현)

  • Kim, Seong-Hun;Han, Young-Geun
    • IE interfaces
    • /
    • v.12 no.4
    • /
    • pp.567-574
    • /
    • 1999
  • The use of POP(Point of Production) systems which help to report the realtime production information to the supervisor class and to send commands to the shop floor is increasing gradually. Future companies will need to break the limit of regions and to exchange information among remote-sited departments and companies located abroad. In order to achieve this goal, Internet which is growing remarkably nowadays will be the best tool. In this research, a prototype of the POP system based on Internet is developed using the Java language. The developed POP system can monitor production status by collecting information from shop floor through a web server and can control production equipments from remote sites.

  • PDF

The Use of System for Design Verification of PCI Express Endpoint RTL Core

  • Kim Sun-Wook;Kim Young-Woo;Park Kyoung
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.285-288
    • /
    • 2004
  • In this paper, we present a design and experiment of PCI Express core verification model. The model targeting Endpoint core based on Verilog HDL is designed by newly-emerging SystemC, which is a new C++ class library based system design approach. In the verification model, we designed and implemented a SystemC host system model which acted as Root Complex and device driver dedicated to the PCI Express Endpoint RTL core. The verification process is scheduled by scenarios which are implemented in host model. We show that the model is useful especially for verifying the RTL model which has dependencies on system software.

  • PDF

A Method to Design PBL Courseware Using ICT (ICT를 활용한 PBL 코스웨어 설계 방안 -중등 과학교과를 중심으로-)

  • Kim Jae-Hyoun;Lee Yun-Kyu
    • Journal of Internet Computing and Services
    • /
    • v.7 no.1
    • /
    • pp.101-110
    • /
    • 2006
  • Recently substantial learning model is strongly demanded through which ICT could be effectively used at PBL, teaching and learning method, based on constructivism putting an emphasis on learner centered education. This thesis is designed to introduce the way to make the most of ICT when teachers try to make teaching plan applying PBL to science class. PBL courseware is designed to make teacher and student use by applying traditional science class model to the model for problem solving of PBL. analysing class according to the degree of connecting ICT with contents of learning. This paper suggests 8 stages of PBL package development and 5 stages of teaching pattern to grasp whole procedure.

  • PDF

AR Anchor System Using Mobile Based 3D GNN Detection

  • Jeong, Chi-Seo;Kim, Jun-Sik;Kim, Dong-Kyun;Kwon, Soon-Chul;Jung, Kye-Dong
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.13 no.1
    • /
    • pp.54-60
    • /
    • 2021
  • AR (Augmented Reality) is a technology that provides virtual content to the real world and provides additional information to objects in real-time through 3D content. In the past, a high-performance device was required to experience AR, but it was possible to implement AR more easily by improving mobile performance and mounting various sensors such as ToF (Time-of-Flight). Also, the importance of mobile augmented reality is growing with the commercialization of high-speed wireless Internet such as 5G. Thus, this paper proposes a system that can provide AR services via GNN (Graph Neural Network) using cameras and sensors on mobile devices. ToF of mobile devices is used to capture depth maps. A 3D point cloud was created using RGB images to distinguish specific colors of objects. Point clouds created with RGB images and Depth Map perform downsampling for smooth communication between mobile and server. Point clouds sent to the server are used for 3D object detection. The detection process determines the class of objects and uses one point in the 3D bounding box as an anchor point. AR contents are provided through app and web through class and anchor of the detected object.

Design of n Forwarding Engine Supporting Application-based Differential Services in MPLS ATM System

  • Kim, Eung-Ha;Cho, Young-Jong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1855-1858
    • /
    • 2002
  • A number of MPLS ATM systems have been proposed to increase the access speed of current routers, which only support the best-effort service. However, the MPLS ATM systems have to support the so-called differential service, which discriminates the applications according to the service class because they do not be satisfied the Internet users who use diverse applications. In this paper, to support this differential service a detailed forwarding procedure based on a LSP control method and an application-based marking algorithm is suggested. The LSP control method establishes several different LSPs for each FEC according to the service class and the application-based marking algorithm chooses a proper differential service depending on the application category. Also, a design scheme of forwarding engine, which can be easily implemented with a minimum modification of existing MPLS ATM systems is proposed. And, the best simulation result of high priority application category is gained when the proposed forwarding algorithm is comparedwithexistingalgorithms.

  • PDF

Applying the Policy scheme to the IntServ

  • Song, Wang-Cheol
    • Journal of information and communication convergence engineering
    • /
    • v.1 no.3
    • /
    • pp.109-114
    • /
    • 2003
  • There is an emergence of Internet applications that have real-time requirements. These applications require IP to support guaranteed capacity, higher priority and lower packet loss rate. To address this, the Internet Engineering Task Force (IETF) is developing a set of protocols and standards for Integrated Services on the Internet. Using RSVP and policies to manage the allocation of network resources in order to provide different levels of service is a topic of great interest to service providers. Currently, it is not possible to dynamically reallocate resources during an application's session. This paper discusses how policies in conjunction with new service class can provide a more enhanced network resource allocation by allowing for this dynamic reallocation.

A Study on the Classification Schemes of Internet Resources for Agriculture (농학분야 인터넷자원의 분류체계에 관한 연구)

  • 김정현;문지현
    • Journal of Korean Library and Information Science Society
    • /
    • v.33 no.3
    • /
    • pp.393-413
    • /
    • 2002
  • This study is to suggest a classification system to classify the agricultural information resources on the internet. In the first part, I analyzes KDC's class 520(agriculture science). The second part compares the agricultural classes of Yahoo! Korea with those of Empas search engine. The third part compares the classes of AFFIS with Agri_Directory. Based on the comparative analysis, it proposes a classificatory system for the agricultural information resources on the internet.

  • PDF

Understanding the Internet of Things: Education and Experience

  • Yun, Jaeseok
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.12
    • /
    • pp.137-144
    • /
    • 2018
  • In this paper, we propose an well-organized lecture note for giving a better understanding on the Internet of Things (IoT) to people including non-computer majors without computing and communication knowledge. In recent years, the term 'IoT' has been popularized, and IoT will make a huge impact on our industries, societies, and environments. Although there are large amount of literature on presenting IoT from technological perspectives, few are published that are organized for teaching students having non-computer-related majors. Based on research and education experiences on IoT, we tried to make a lecture note focusing on the process of collecting data from everyday objects, transmitting and sharing data, and utilizing data to create new values for us. The proposed lecture note was employed in teaching a liberal arts class, and it was shown that students could have an understanding of what IoT really means and how IoT could change our world.

Classifier Combination Based Source Identification for Cell Phone Images

  • Wang, Bo;Tan, Yue;Zhao, Meijuan;Guo, Yanqing;Kong, Xiangwei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5087-5102
    • /
    • 2015
  • Rapid popularization of smart cell phone equipped with camera has led to a number of new legal and criminal problems related to multimedia such as digital image, which makes cell phone source identification an important branch of digital image forensics. This paper proposes a classifier combination based source identification strategy for cell phone images. To identify the outlier cell phone models of the training sets in multi-class classifier, a one-class classifier is orderly used in the framework. Feature vectors including color filter array (CFA) interpolation coefficients estimation and multi-feature fusion is employed to verify the effectiveness of the classifier combination strategy. Experimental results demonstrate that for different feature sets, our method presents high accuracy of source identification both for the cell phone in the training sets and the outliers.

Copyright Protection of E-books by Data Hiding Based on Integer Factorization

  • Wu, Da-Chun;Hsieh, Ping-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3421-3443
    • /
    • 2021
  • A data hiding method based on integer factorization via e-books in the EPUB format with XHTML and CSS files for copyright protection is proposed. Firstly, a fixed number m of leading bits in a message are transformed into an integer which is then factorized to yield k results. One of the k factorizations is chosen according to the decimal value of a number n of the subsequent message bits with n being decided as the binary logarithm of k. Next, the chosen factorization, denoted as a × b, is utilized to create a combined use of the

    and elements in the XHTML files to embed the m + n message bits by including into the two elements a class selector named according to the value of a as well as a text segment with b characters. The class selector is created by the use of a CSS pseudo-element. The resulting web pages are of no visual difference from the original, achieving a steganographic effect. The security of the embedded message is also considered by randomizing the message bits before they are embedded. Good experimental results and comparisons with exiting methods show the feasibility of the proposed method for copyright protection of e-books.