• Title/Summary/Keyword: automatic design

Search Result 2,650, Processing Time 0.034 seconds

Remote Control System using Face and Gesture Recognition based on Deep Learning (딥러닝 기반의 얼굴과 제스처 인식을 활용한 원격 제어)

  • Hwang, Kitae;Lee, Jae-Moon;Jung, Inhwan
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.6
    • /
    • pp.115-121
    • /
    • 2020
  • With the spread of IoT technology, various IoT applications using facial recognition are emerging. This paper describes the design and implementation of a remote control system using deep learning-based face recognition and hand gesture recognition. In general, an application system using face recognition consists of a part that takes an image in real time from a camera, a part that recognizes a face from the image, and a part that utilizes the recognized result. Raspberry PI, a single board computer that can be mounted anywhere, has been used to shoot images in real time, and face recognition software has been developed using tensorflow's FaceNet model for server computers and hand gesture recognition software using OpenCV. We classified users into three groups: Known users, Danger users, and Unknown users, and designed and implemented an application that opens automatic door locks only for Known users who have passed both face recognition and hand gestures.

Plug-and-Play Framework for Connectivity Control and Self-Reconfiguration of Weapon System Components (무기체계 구성장치의 연결성 제어 및 자율 재구성을 위한 플러그앤플레이 프레임워크)

  • Chang, HyeMin;Kang, SukJong;Cho, YoungGeol;Yoon, JooHong;Yun, Jihyeok
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.24 no.3
    • /
    • pp.328-338
    • /
    • 2021
  • A study on common modular design based on open standards to reduce the life cycle cost of ground weapon system is underway. Since the ground weapon system includes major mission equipment such as fire control system, it is essential to apply the concept of fault tolerance through automatic reconfiguration and blocking unspecified equipment through connectivity control. However, it is difficult to generalize due to the difference in operating characteristics for each system. In this paper, we propose a plug-and-play framework, which includes plug-and-play architecture and mechanism. The proposed method can be used in common by the application of each component as it is divided into a common service layer. In addition, the proposed connectivity control and autonomous reconfiguration method facilitates reflection of operating characteristics for each system. We constructed a verification environment that can simulate ground weapon systems and components, and verified that the proposed framework works through scenario-based functional tests.

Design Implementation of Lightweight and High Speed Security Protocol Suitable for UHF Passive RFID Systems (UHF 수동형 RFID 시스템에 적합한 경량 고속의 보안 프로토콜 설계 및 구현)

  • Kang, You-Sung;Choi, Yong-Je;Choi, Doo-Ho;Lee, Sang-Yeoun;Lee, Heyung-Sup
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.117-134
    • /
    • 2010
  • A passive RFID tag which received attention as a future technology for automatic and quick identification faces some difficulties about security problems such as tag authentication, reader authentication, data protection, and untraceability in addition to cost and reliable identification. A representative passive RFID technology is the ISO/IEC 18000-6 Type C which is an international standard for 900 MHz UHF-band. This standard has some difficulties in applying to the security services such as originality verification, tag's internal information protection, and untraceability, because it does not provide high-level security solution. In this paper, we summarize security requirements of ISO/IEC ITC 1/SC 31 international standardization group, propose security protocols suitable for the UHF-band passive RFID system using a crypto engine, and analyze its security strength. In addition, we verify that it is possible to implement a tag conforming with the proposed security protocols by presenting concrete command/response pairs and cryptographic method.

Rectangular Microstrip Patch Antenna with Semicircular Structure for 5G Applications (5G 응용을 위한 반원형 구조를 가진 사각형 마이크로스트립 패치 안테나)

  • Kim, Yeong-Jin;Maharjan, Janam;Choi, Dong-You
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1269-1274
    • /
    • 2019
  • The paper presents a design of simple four-element microstrip-patch array antenna that is suitable for 5G applications. The proposed array consists of four rectangular microstrip patch elements with semicircular etches made on both sides of each elements. The antenna is fed using the combination of series and corporate feeding networks. The size of the ground is also changed to improve the antenna frequency. Finally, yagi elements are also added to improve the directive gain of the antenna. The presented microstrip patch array is able to achieve wide frequency bandwidth of 21.95-31.86 GHz. The antenna has also attained gain of 9.7 dB at 28 GHz and has maintained high gain and high directivity throughout the frequency band. The proposed array antenna fed by series-corporate feeding network, with low profile and simple structure is a good candidate for 5G applications.

Design and Implementation of Machine Learning-based Blockchain DApp System (머신러닝 기반 블록체인 DApp 시스템 설계 및 구현)

  • Lee, Hyung-Woo;Lee, HanSeong
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.4
    • /
    • pp.65-72
    • /
    • 2020
  • In this paper, we developed a web-based DApp system based on a private blockchain by applying machine learning techniques to automatically identify Android malicious apps that are continuously increasing rapidly. The optimal machine learning model that provides 96.2587% accuracy for Android malicious app identification was selected to the authorized experimental data, and automatic identification results for Android malicious apps were recorded/managed in the Hyperledger Fabric blockchain system. In addition, a web-based DApp system was developed so that users who have been granted the proper authority can use the blockchain system. Therefore, it is possible to further improve the security in the Android mobile app usage environment through the development of the machine learning-based Android malicious app identification block chain DApp system presented. In the future, it is expected to be able to develop enhanced security services that combine machine learning and blockchain for general-purpose data.

Study on Practical Use of Air Vehicle Test Equipment(AVTE) for UAV Operation Support (무인항공기 운용 지원을 위한 비행체 점검장비 활용에 관한 연구)

  • Song, Yong-Ha;Go, Eun-kyoung;Kwon, Sang-Eun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.2
    • /
    • pp.320-326
    • /
    • 2021
  • AVTE(Air Vehicle Test Equipment) is an equipment to inspect and check the status of on-board aircraft LRUs(Line Replacement Units) before and after flight for performing successful UAV(Unmanned Aerial Vehicle) missions. This paper suggests utilization of the AVTE as an operation support-equipment by implementing several critical functions for UAV-operation on the AVTE. The AVTE easily sets initialization(default) data and compensates for the installation and position errors of the LRUs which provide critical mission data and situation image with pilots without additional individual operation support-equipment. Major fault list and situation image data could be downloaded after flight using the AVTE in the event of UAV emergency situation or unusual occurrence on duty as well. We anticipate the suggested operational approach of the AVTE could dramatically reduce the cost and man power for design and manufacture of additional operation support equipment and effectively diminish workload of the operator.

Design of Phase Locked Loop (PLL) based Time to Digital Converter for LiDAR System with Measurement of Absolute Time Difference (LiDAR 시스템용 절대시간 측정을 위한 위상고정루프 기반 시간 디지털 변환기 설계)

  • Yoo, Sang-Sun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.677-684
    • /
    • 2021
  • This paper presents a time-to-digital converter for measuring absolute time differences. The time-to-digital converter was designed and fabricated in 0.18-um CMOS technology and it can be applied to Light Detection and Ranging system which requires long time-cover range and 50ps time resolution. Since designed time-to-digital converter adopted the reference clock of 625MHz generated by phase locked loop, it could have absolute time resolution of 50ps after automatic calibration and its cover range was over than 800ns. The time-to-digital converter adopted a counter and chain delay lines for time measurement. The counter is used for coarse time measurement and chain delay lines are used for fine time measurement. From many times experiments, fabricated time-to-digital converter has 50 ps time resolution with maximum INL of 0.8 LSB and its power consumption is about 70 mW.

A Study on Automatic Classification of Class Diagram Images (클래스 다이어그램 이미지의 자동 분류에 관한 연구)

  • Kim, Dong Kwan
    • Journal of the Korea Convergence Society
    • /
    • v.13 no.3
    • /
    • pp.1-9
    • /
    • 2022
  • UML class diagrams are used to visualize the static aspects of a software system and are involved from analysis and design to documentation and testing. Software modeling using class diagrams is essential for software development, but it may be not an easy activity for inexperienced modelers. The modeling productivity could be improved with a dataset of class diagrams which are classified by domain categories. To this end, this paper provides a classification method for a dataset of class diagram images. First, real class diagrams are selected from collected images. Then, class names are extracted from the real class diagram images and the class diagram images are classified according to domain categories. The proposed classification model has achieved 100.00%, 95.59%, 97.74%, and 97.77% in precision, recall, F1-score, and accuracy, respectively. The accuracy scores for the domain categorization are distributed between 81.1% and 95.2%. Although the number of class diagram images in the experiment is not large enough, the experimental results indicate that it is worth considering the proposed approach to class diagram image classification.

Is Text Mining on Trade Claim Studies Applicable? Focused on Chinese Cases of Arbitration and Litigation Applying the CISG

  • Yu, Cheon;Choi, DongOh;Hwang, Yun-Seop
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.171-188
    • /
    • 2020
  • Purpose - This is an exploratory study that aims to apply text mining techniques, which computationally extracts words from the large-scale text data, to legal documents to quantify trade claim contents and enables statistical analysis. Design/methodology - This is designed to verify the validity of the application of text mining techniques as a quantitative methodology for trade claim studies, that have relied mainly on a qualitative approach. The subjects are 81 cases of arbitration and court judgments from China published on the website of the UNCITRAL where the CISG was applied. Validation is performed by comparing the manually analyzed result with the automatically analyzed result. The manual analysis result is the cluster analysis wherein the researcher reads and codes the case. The automatic analysis result is an analysis applying text mining techniques to the result of the cluster analysis. Topic modeling and semantic network analysis are applied for the statistical approach. Findings - Results show that the results of cluster analysis and text mining results are consistent with each other and the internal validity is confirmed. And the degree centrality of words that play a key role in the topic is high as the between centrality of words that are useful for grasping the topic and the eigenvector centrality of the important words in the topic is high. This indicates that text mining techniques can be applied to research on content analysis of trade claims for statistical analysis. Originality/value - Firstly, the validity of the text mining technique in the study of trade claim cases is confirmed. Prior studies on trade claims have relied on traditional approach. Secondly, this study has an originality in that it is an attempt to quantitatively study the trade claim cases, whereas prior trade claim cases were mainly studied via qualitative methods. Lastly, this study shows that the use of the text mining can lower the barrier for acquiring information from a large amount of digitalized text.

Travel Route Recommendation Utilizing Social Big Data

  • Yu, Yang Woo;Kim, Seong Hyuck;Kim, Hyeon Gyu
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.5
    • /
    • pp.117-125
    • /
    • 2022
  • Recently, as users' interest for travel increases, research on a travel route recommendation service that replaces the cumbersome task of planning a travel itinerary with automatic scheduling has been actively conducted. The most important and common goal of the itinerary recommendations is to provide the shortest route including popular tour spots near the travel destination. A number of existing studies focused on providing personalized travel schedules, where there was a problem that a survey was required when there were no travel route histories or SNS reviews of users. In addition, implementation issues that need to be considered when calculating the shortest path were not clearly pointed out. Regarding this, this paper presents a quantified method to find out popular tourist destinations using social big data, and discusses problems that may occur when applying the shortest path algorithm and a heuristic algorithm to solve it. To verify the proposed method, 63,000 places information was collected from the Gyeongnam province and big data analysis was performed for the places, and it was confirmed through experiments that the proposed heuristic scheduling algorithm can provide a timely response over the real data.