• Title/Summary/Keyword: Light environments

Search Result 573, Processing Time 0.027 seconds

Implementation of IFTTT-based Server for Controlling Internet Devices (사물인터넷 디바이스의 제어를 위한 IFTTT기반의 서버 구현)

  • Kim, Dong-min;Lim, Ji-yong;Oh, Am-suk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.544-546
    • /
    • 2018
  • Things Internet technology is rapidly becoming a reality in many parts of our lives through various product services. As the perception of Internet services for things has become more common and the intention to purchase Internet devices has begun to increase, various Internet devices have appeared and the need for a server to control them has been emphasized. In addition, IFTTT, a representative Internet automation service platform, is continuously diversifying related services such as home appliances, light bulbs, and smart homes, and has a variety of Internet information such as weather information and news, which can be utilized through IFTTT. And MQTT, which is designed for use in low-power, low-bandwidth environments. This paper implements a server for controlling and managing Internet devices and related services based on IFTTT and MQTT.

  • PDF

Implementation of Image Enhancement Algorithm for Embedded System (임베디드 시스템을 위한 영상 개선 알고리즘 구현)

  • An, Jeong-yeon;Rhee, Sang-Burm
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.473-480
    • /
    • 2009
  • This paper is to enhance a color image running in the PXA255 ARM processor based on embedded linux environments. Retinex is one of the representative algorithm for image enhancement in the previous research. However, retinex is not suitable the run on the embedded system because of its long processing time. So, we proposed the image enhancement algorithm for embedded system, with less quantity of operation and the effect equivalent to retinex. To achieve this goal, we propose and implement the image enhancement algorithm, which utilizes the image formation model and gamma correction to be effective in a back-light and dark image. The proposed algorithm converts the color space from RGB to HSV, and then V and S channels are processed. In order to optimize the proposed method in the PXA255 ARM processor, quantity of calculation is reduced. The performance of the proposed algorithm was evaluated through qualitative method and quantitative method. The results show that brightness and contrast are improved with less quantity of operation.

Addressing Mobile Agent Security through Agent Collaboration

  • Jean, Evens;Jiao, Yu;Hurson, Ali-R.
    • Journal of Information Processing Systems
    • /
    • v.3 no.2
    • /
    • pp.43-53
    • /
    • 2007
  • The use of agent paradigm in today's applications is hampered by the security concerns of agents and hosts alike. The agents require the presence of a secure and trusted execution environment; while hosts aim at preventing the execution of potentially malicious code. In general, hosts support the migration of agents through the provision of an agent server and managing the activities of arriving agents on the host. Numerous studies have been conducted to address the security concerns present in the mobile agent paradigm with a strong focus on the theoretical aspect of the problem. Various proposals in Intrusion Detection Systems aim at securing hosts in traditional client-server execution environments. The use of such proposals to address the security of agent hosts is not desirable since migrating agents typically execute on hosts as a separate thread of the agent server process. Agent servers are open to the execution of virtually any migrating agent; thus the intent or tasks of such agents cannot be known a priori. It is also conceivable that migrating agents may wish to hide their intentions from agent servers. In light of these observations, this work attempts to bridge the gap from theory to practice by analyzing the security mechanisms available in Aglet. We lay the foundation for implementation of application specific protocols dotted with access control, secured communication and ability to detect tampering of agent data. As agents exists in a distributed environment, our proposal also introduces a novel security framework to address the security concerns of hosts through collaboration and pattern matching even in the presence of differing views of the system. The introduced framework has been implemented on the Aglet platform and evaluated in terms of accuracy, false positive, and false negative rates along with its performance strain on the system.

A Novel Kinematic Design of a Knee Orthosis to Allow Independent Actuations During Swing and Stance Phases (회전기 및 착지기 분리 구동을 가능케 하는 새로운 무릎 보장구의 기구부 설계)

  • Pyo, Sang-Hun;Kim, Gab-Soon;Yoon, Jung-Won
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.17 no.8
    • /
    • pp.814-823
    • /
    • 2011
  • Nowadays many neurological diseases such as stroke and Parkinson diseases are continually increasing. Orthotic devices as well as exoskeletons have been widely developed for supporting movement assistance and therapy of patients. Robotic knee orthosis can compensate stiff-knee gait of the paralyzed limb and can provide patients consistent assistance at wearable environments. With keeping a robotic orthosis wearable, however, it is not easy to develop a compact and safe actuator with fast rotation and high torque for consistent supports of patients during walking. In this paper, we propose a novel kinematic model for a robotic knee orthosis to drive a knee joint with independent actuation during swing and stance phases, which can allow an actuator with fast rotation to control swing motions and an actuator with high torque to control stance motions, respectively. The suggested kinematic model is composed of a hamstring device with a slide-crank mechanism, a quadriceps device with five-bar/six-bar links, and a patella device for knee covering. The quadriceps device operates in five-bar links with 2-dof motions during swing phase and is changed to six-bar links during stance phase by the contact motion to the patella device. The hamstring device operates in a slider-crank mechanism for entire gait cycle. The kinematics and velocity/force relations are analyzed for the quadriceps and hamstring devices. Finally, the adequate actuators for the suggested kinematic model are designed based on normal gait requirements. The suggested kinematic model will allow a robotic knee orthosis to use compact and light actuators with full support during walking.

People Counting System by Facial Age Group (얼굴 나이 그룹별 피플 카운팅 시스템)

  • Ko, Ginam;Lee, YongSub;Moon, Nammee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.2
    • /
    • pp.69-75
    • /
    • 2014
  • Existing People Counting System using a single overhead mounted camera has limitation in object recognition and counting in various environments. Those limitations are attributable to overlapping, occlusion and external factors, such as over-sized belongings and dramatic light change. Thus, this paper proposes the new concept of People Counting System by Facial Age Group using two depth cameras, at overhead and frontal viewpoints, in order to improve object recognition accuracy and robust people counting to external factors. The proposed system is counting the pedestrians by five process such as overhead image processing, frontal image processing, identical object recognition, facial age group classification and in-coming/out-going counting. The proposed system developed by C++, OpenCV and Kinect SDK, and it target group of 40 people(10 people by each age group) was setup for People Counting and Facial Age Group classification performance evaluation. The experimental results indicated approximately 98% accuracy in People Counting and 74.23% accuracy in the Facial Age Group classification.

Night Time Leading Vehicle Detection Using Statistical Feature Based SVM (통계적 특징 기반 SVM을 이용한 야간 전방 차량 검출 기법)

  • Joung, Jung-Eun;Kim, Hyun-Koo;Park, Ju-Hyun;Jung, Ho-Youl
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.7 no.4
    • /
    • pp.163-172
    • /
    • 2012
  • A driver assistance system is critical to improve a convenience and stability of vehicle driving. Several systems have been already commercialized such as adaptive cruise control system and forward collision warning system. Efficient vehicle detection is very important to improve such driver assistance systems. Most existing vehicle detection systems are based on a radar system, which measures distance between a host and leading (or oncoming) vehicles under various weather conditions. However, it requires high deployment cost and complexity overload when there are many vehicles. A camera based vehicle detection technique is also good alternative method because of low cost and simple implementation. In general, night time vehicle detection is more complicated than day time vehicle detection, because it is much more difficult to distinguish the vehicle's features such as outline and color under the dim environment. This paper proposes a method to detect vehicles at night time using analysis of a captured color space with reduction of reflection and other light sources in images. Four colors spaces, namely RGB, YCbCr, normalized RGB and Ruta-RGB, are compared each other and evaluated. A suboptimal threshold value is determined by Otsu algorithm and applied to extract candidates of taillights of leading vehicles. Statistical features such as mean, variance, skewness, kurtosis, and entropy are extracted from the candidate regions and used as feature vector for SVM(Support Vector Machine) classifier. According to our simulation results, the proposed statistical feature based SVM provides relatively high performances of leading vehicle detection with various distances in variable nighttime environments.

Deducing environmentally conscious factors for apartment complex planning and weight evaluation (환경요소를 고려한 공동주택 단지계획요소 도출 및 가중치 평가)

  • Jung, Suk-Jin;Seo, Jung-Bum;Yoon, Seong-Hwan
    • KIEAE Journal
    • /
    • v.16 no.6
    • /
    • pp.51-56
    • /
    • 2016
  • Purpose: As declines in the quality of residential environments occur, such as urban heat island effect, tropical night phenomenon, and violations of right to light and privacy due to urban densification and high rise building, these problems are emerging as social issues. In order to improve these issues, design factors which consider environmental aspects must be selected when planning apartment complexes, and ways to reflect them in the planning phase must be explored. Method: In this study, the analytical hierarchy process(AHP) was used to deduce design factors that considered environmental elements during the planning of apartment complexes. Furthermore, the priority and weight for each evaluation index were assessed. The objective was to propose a guideline for planning apartment complexes by finding the best solution for each evaluation index using complex weight values. Result: Floor area ratio was selected as the most important evaluation criterion in the environmentally conscious evaluation index for apartment complex planning. The shape and placement of skylights were selected as the most important evaluation criteria in the sunshine environment for a pleasant residential environment. Ground surface cover design was selected as the most important criterion in the outdoor thermal environment index for improving the microclimate within cities and apartment complexes. Thus, the results of this study can serve as an investigation guideline that concerns policy and regulations, and as reference data that can be used in planning apartment complexes.

Side Channel Attacks on HIGHT and Its Countermeasures (HIGHT에 대한 부채널 분석 및 대응 방법)

  • Kim, Tae-Jong;Won, Yoo-Seung;Park, Jin-Hak;An, Hyun-Jin;Han, Dong-Guk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.25 no.2
    • /
    • pp.457-465
    • /
    • 2015
  • Internet of Things(IoT) technologies should be able to communication with various embedded platforms. We will need to select an appropriate cryptographic algorithm in various embedded environments because we should consider security elements in IoT communications. Therefore the lightweight block cryptographic algorithm is essential for secure communication between these kinds of embedded platforms. However, the lightweight block cryptographic algorithm has a vulnerability which can be leaked in side channel analysis. Thus we also have to consider side channel countermeasure. In this paper, we will propose the scenario of side channel analysis and confirm the vulnerability for HIGHT algorithm which is composed of ARX structure. Additionally, we will suggest countermeasure for HIGHT against side channel analysis. Finally, we will explain how much the effectiveness can be provided through comparison between countermeasure for AES and HIGHT.

A Study on Quantitative Models for Evaluating Interactivity in Cyber Learning (사이버 교수-학습과정에서 상호작용성 평가방법에 관한 탐색적 연구)

  • Kim, Mi-Ryang;Chang, Chung Moo;Han, Kwang-Hyun
    • The Journal of Korean Association of Computer Education
    • /
    • v.7 no.1
    • /
    • pp.79-88
    • /
    • 2004
  • Since computer integrated technology was introduced to the field of education, it has offered an expanding range of interactive possibilities which are remarkably powerful and helpful for the learners, especially constructing the cyber learning environments. Interactivity, the critical element in cyber learning, is categorized into three dimensions: student-to-contents, student-to-student and student-to-instructors. Six surrogate variables are introduced, and two quantitative model are developed for evaluating the degree of interactivity. The first model, which is called Data Envelopment Analysis model, is a linear programming based technique for measuring the relative performance of organizational units where the presence of multiple inputs and outputs makes comparison difficult. DEA model allows each unit to adopt a set of weight that shows it in the most favorable light in comparison to the other unit. The Second model employes the weighted average of standardized input variables for evaluation. Actual data have been collected from the Cyber IT university and these two models are applied for comparison. The analysis shows that the results from these two models are very much similar to each other, and are highly correlated to the level of class satisfaction.

  • PDF

Detection of Traffic Light using Color after Morphological Preprocessing (형태학적 전처리 후 색상을 이용한 교통 신호의 검출)

  • Kim, Chang-dae;Choi, Seo-hyuk;Kang, Ji-hun;Ryu, Sung-pil;Kim, Dong-woo;Ahn, Jae-hyeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.05a
    • /
    • pp.367-370
    • /
    • 2015
  • This paper proposes an improve method of the detection performance of traffic lights for autonomous driving cars. Earlier detection methods used to adopt color thresholding, template matching and based learning maching methods, but its have some problems such as recognition rate decreasing, slow processing time. The proposed method uses both detection mask and morphological preprocessing. Firstly, input color images are converted to YCbCr image in order to strengthen its illumination, and horizontal edge components are extracted in the Y Channel. Secondly, the region of interest is detected according to morphological characteristics of the traffic lights. Finally, the traffic signal is detected based on color distributions. The proposed method showed that the detection rate and processing time improved rather than the conventional algorithm about some surrounding environments.

  • PDF