• Title/Summary/Keyword: communication devices

Search Result 4,042, Processing Time 0.039 seconds

Automatic Extraction of Canine Cataract Area with Fuzzy Clustering (퍼지 클러스터링을 이용한 반려견의 백내장 영역 자동 추출)

  • Kim, Kwang Baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.11
    • /
    • pp.1428-1434
    • /
    • 2018
  • Canine cataract is developed with aging and can cause the blindness or surgical treatment if not treated timely. In this paper, we propose a method for extracting cataract suspicious areas automatically with FCM(Fuzzy C_Means) algorithm to overcome the weakness of previously attempted ART2 based method. The proposed method applies the fuzzy stretching technique and the Max-Min based average binarization technique to the dog eye images photographed by simple devices such as mobile phones. After applying the FCM algorithm in quantization, we apply the brightness average binarization method in the quantized region. The two binarization images - Max-Min basis and brightness average binarization - are ANDed, and small noises are removed to extract the final cataract suspicious areas. In the experiment with 45 dog eye images with canine cataract, the proposed method shows better performance in correct extraction rate than the ART2 based method.

Multiple Method Authentication System Using Embedded Device (임베디드 기기를 활용한 다중 방식 인증 시스템)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.7
    • /
    • pp.7-14
    • /
    • 2019
  • Users who use smartphone can using knowledge-based authentication, possession-based authentication, biometric-based authentication, and token-based authentication in order to access rights to systems requiring authentication. However, desktop computer users use method only ID and password, which are knowledge-based authentication factors, due to limitations of authentication devices, despite various authentication methods. In this paper, we designed and implemented a raspberry pi based authentication system that provides multiple authentication method of a user's desired type. The implementation system uses knowledge-based authentication, possessive-based authentication, biometric-based authentication, and token-based authentication. The proposed system can provide a security function that can be used by SMEs, which is difficult to hire a security officer due to the economic burden. The implemented system can be used not only for personal use but also for enterprise, and it can be applied to various fields such as finance and game.

A Study on the User Identification and Authentication in the Smart Mirror in Private (사적공간의 스마트미러에서 사용자 식별 및 인증 기법 연구)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.100-105
    • /
    • 2019
  • As IoT Technology develops and Era of Hyperconnectivity comes, various kinds of customized services became available. As a next-generation display, a smart mirror accesses multimedia devices and provides various services, so it can serve as a social learning tool for the children and the old ones, as well as adults who need information. Smart Mirror must be able to identify users for individualized services. However, since the Smart Mirror is an easily accessible device, there is a possibility that information such as an individual's pattern and habit stored in the smart mirror may be exposed to the outside. Also, the other possibility of leakage of personal location information is through personal schedule or appointment stored in the smart mirror, and another possibility that privacy can be violated is through checking the health state via personal photographs. In this research, we propose a system that identify users by the information the users registered about their physique just like their face, one that provides individually customized service to users after identifying them, and one which provides minimal information and service for unauthenticated users.

Multi-group Information Management Techniques to efficiently Protect User Privacy in Heterogeneous Environments of 5G (5G의 이질적인 환경에서 사용자 프라이버시를 효율적으로 보호하기 위한 다중 그룹 정보 관리 기법)

  • Kim, Kyoum-Sun;Yon, Yong-Ho;Jeong, Yoon-Su
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.7
    • /
    • pp.1-7
    • /
    • 2019
  • With the recent commercialization of the next generation of wireless 5G in everyday life, many changes have been made to organizations, industries and businesses of various sizes in various fields. However, although the improved speed and latency of 5G has improved, improvements in encryption, authentication and privacy are still required. In this paper, multiple groups of information management techniques are proposed to efficiently protect users' privacy in the heterogeneous environment of 5G. The proposed technique aims to allow distributed management of users' privacy links by clouding the privacy information generated by different heterogeneous devices to efficiently interface with different groups. Suggestion techniques process user-specific privacy information independently in a virtual space so that users can periodically synchronize their privacy information.

A Study of Integrated Digital Signage Management System Implementation (Digital Signage 통합관리시스템 구축에 관한 연구)

  • Kang, Hee-Yong;Lee, Jina;Shin, Yong-Tae;Kim, Jong-Bae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.82-85
    • /
    • 2014
  • With high speed communication network and supplement of high quality multimedia devices, large demand of multimedia service stimulates digital signing industry to step forward to new opportunities. But in order to provide competitive quality services, Integrated management system is required. Digital signs use technologies such as LCD, LED and Projection to display content such as digital images, video, streaming media, and information. Digital signs rely on a variety of hardware to deliver the contents. The components of a typical digital sign installation include one or more display screens, one or more media players, and a content management server for each player. To improve the existing high cost and less efficient management system, this paper suggest cost effective Integrated Digital Signage Management System with the results of analysis of existing system. Also this paper presents an actual implementation on entertainment company to evaluate the suitability, to prove the result of superior performance of proposed system.

  • PDF

Intelligent Sensor Technology Trend for Smart IT Convergence Platform (스마트 IT 융합 플랫폼을 위한 지능형 센서 기술 동향)

  • Kim, H.J.;Jin, H.B.;Youm, W.S.;Kim, Y.G.;Park, K.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.14-25
    • /
    • 2019
  • As the Internet of Things, artificial intelligence and big data have received a lot of attention as key growth engines in the era of the fourth industrial revolution, data acquisition and utilization in mobile, automotive, robotics, manufacturing, agriculture, health care and national defense are becoming more important. Due to numerous data-based industrial changes, demand for sensor technologies is exploding, especially for intelligent sensor technologies that combine control, judgement, storage and communication functions with the sensors's own functions. Intelligent sensor technology can be defined as a convergence component technology that combines intelligent sensor units, intelligent algorithms, modules with signal processing circuits, and integrated plaform technologies. Intelligent sensor technology, which can be applied to variety of smart IT convergence services such as smart devices, smart homes, smart cars, smart factory, smart cities, and others, is evolving towards intelligent and convergence technologies that produce new high-value information through recognition, reasoning, and judgement based on artificial intelligence. As a result, development of intelligent sensor units is accelerating with strategies for miniaturization, low-power consumption and convergence, new form factor such as flexible and stretchable form, and integration of high-resolution sensor arrays. In the future, these intelligent sensor technologies will lead explosive sensor industries in the era of data-based artificial intelligence and will greatly contribute to enhancing nation's competitiveness in the global sensor market. In this report, we analyze and summarize the recent trends in intelligent sensor technologies, especially those for four core technologies.

College student adoption of smart learning management system - Implementing Blackboard learn - (대학생의 스마트 학습관리시스템 수용에 대한 연구 - 블랙보드 도입과 활용 -)

  • Lee, Kyu-Hye;Kim, Ji-Yeon;Seo, Hyun-Jin
    • The Research Journal of the Costume Culture
    • /
    • v.27 no.5
    • /
    • pp.512-523
    • /
    • 2019
  • Contemporary University students are considered the Z generation who were born after 1995. They are more tech savvy than millennials. To target the generation, traditional class management platforms have evolved to smart LMS that is more customized and accessible for smart devices. Global level information search and collaboration can also be implemented using such smart LMS. However, switching from one LMS to another LMS requires great effort from teachers and support from staffs. This study measured the learners' perception of the system when they were exposed to a new smart-LMS. Blackboard Learn Ultra was used for 15 weeks and at the end of the semester, a questionnaire was administered to the students of these classes. Results indicated that experience with previous LMS discouraged students from adopting Blackboard Learn. Result of TAM modeling indicated that perceived usefulness, compared to perceived ease of use and attitude, was an effective aspect to bring positive acceptance of the system. A qualitative approach and network analysis were also conducted based on students' responses. Both positive and negative responses were detected. Inconvenience due to mechanical aspects was mentioned. Dissatisfaction compared to previous local LMS use was also mentioned. Mobile application and communication effectiveness were positive aspects. Revised course development and promoting how useful the system may help enhance the acceptance of the new system.

Salt and Pepper Noise Removal using Processed Pixels (전처리한 픽셀을 이용한 Salt and Pepper 잡음 제거)

  • Baek, Ji-Hyeon;Kim, Nam-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1076-1081
    • /
    • 2019
  • In response to the recent development of IT technologies, there are more demands for visual devices such as display. However, noise is generated in the process of sending video data due to various reasons. Noise is the representative noise which is commonly found. While A-TMF, CWMF, and AMF are the typical ways for removing Salt and Pepper noise, the noise is not removed well in high-density noise environment. To remove the noise in the high-density noise environment, this study suggested an algorithm which identifies whether it's noise or not. If it's not a noise, matches the original pixel. If it's a noise, divide the $3{\times}3$ local mask into the area of the element treated and the area of the element to be processed. Then, algorithm proposes to apply different weights for each element to treat it as an average filter. To analyze the performance of the algorithm, this study compared PSNR to compare the algorithm with other existing methods.

Pedestrian-Based Variational Bayesian Self-Calibration of Surveillance Cameras (보행자 기반의 변분 베이지안 감시 카메라 자가 보정)

  • Yim, Jong-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1060-1069
    • /
    • 2019
  • Pedestrian-based camera self-calibration methods are suitable for video surveillance systems since they do not require complex calibration devices or procedures. However, using arbitrary pedestrians as calibration targets may result in poor calibration accuracy due to the unknown height of each pedestrian. To solve this problem in the real surveillance environments, this paper proposes a novel Bayesian approach. By assuming known statistics on the height of pedestrians, we construct a probabilistic model that takes into account uncertainties in both the foot/head locations and the pedestrian heights, using foot-head homology. Since solving the model directly is infeasible, we use variational Bayesian inference, an approximate inference algorithm. Accordingly, this makes it possible to estimate the height of pedestrians and to obtain accurate camera parameters simultaneously. Experimental results show that the proposed algorithm is robust to noise and provides accurate confidence in the calibration.

Implementation of Ring Topology Interconnection Network with PCIe Non-Transparent Bridge Interface (PCIe Non-Transparent Bridge 인터페이스 기반 링 네트워크 인터커넥트 시스템 구현)

  • Kim, Sang-Gyum;Lee, Yang-Woo;Lim, Seung-Ho
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.3
    • /
    • pp.65-72
    • /
    • 2019
  • HPC(High Performance Computing) is the computing system that connects a number of computing nodes with high performance interconnect network. In the HPC, interconnect network technology is one of the key player to make high performance systems, and mainly, Infiniband or Ethernet are used for interconnect network technology. Nowadays, PCIe interface is main interface within computer system in that host CPU connects high performance peripheral devices through PCIe bridge interface. For connecting between two computing nodes, PCIe Non-Transparent Bridge(NTB) standard can be used, however it basically connects only two hosts with its original standards. To give cost-effective interconnect network interface with PCIe technology, we develop a prototype of interconnect network system with PCIe NTB. In the prototyped system, computing nodes are connected to each other via PCIe NTB interface constructing switchless interconnect network such as ring network. Also, we have implemented prototyped data sharing mechanism on the prototyped interconnect network system. The designed PCIe NTB-based interconnect network system is cost-effective as well as it provides competitive data transferring bandwidth within the interconnect network.