• Title/Summary/Keyword: desktop

Search Result 621, Processing Time 0.028 seconds

Improved Feature Descriptor Extraction and Matching Method for Efficient Image Stitching on Mobile Environment (모바일 환경에서 효율적인 영상 정합을 위한 향상된 특징점 기술자 추출 및 정합 기법)

  • Park, Jin-Yang;Ahn, Hyo Chang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.10
    • /
    • pp.39-46
    • /
    • 2013
  • Recently, the mobile industries grow up rapidly and their performances are improved. So the usage of mobile devices is increasing in our life. Also mobile devices equipped with a high-performance camera, so the image stitching can carry out on the mobile devices instead of the desktop. However the mobile devices have limited hardware to perform the image stitching which has a lot of computational complexity. In this paper, we have proposed improved feature descriptor extraction and matching method for efficient image stitching on mobile environment. Our method can reduce computational complexity using extension of orientation window and reduction of dimension feature descriptor when feature descriptor is generated. In addition, the computational complexity of image stitching is reduced through the classification of matching points. In our results, our method makes to improve the computational time of image stitching than the previous method. Therefore our method is suitable for the mobile environment and also that method can make natural-looking stitched image.

Application Areas for Cloud Computing Services using M2M and WoT (클라우드 컴퓨팅 서비스를 위한 M2M과 WoT 활용 방안)

  • Kim, Jangwon;Park, Dae-Ha;Baik, Doo-Kwon
    • Journal of Service Research and Studies
    • /
    • v.2 no.1
    • /
    • pp.61-68
    • /
    • 2012
  • Much technologies building cloud computing environment and supporting sevices on the cloud computing have been developing. Through the environment, accessing new services and sharing knowledge become easy. So far, they have just focused on companies which can support services and people who can use those services. In other words, the environment and models for cloud computing are the most important issue. However, the environment changes rapidly, mobile devices that are connected with each other not only will replace the computing environment based on desktop, but also can create Big data. Therefore, technologies and models are need to follow the trend including mobile based cloud computing environment. In this paper, we explain the cloud computing technologies and trend. Also we address Machine to Machine(M2M) technology and Web of things(WoT) in order to apply those into the cloud computing environment because these two concepts will enhance effectiveness and service reusability in the coming days.

  • PDF

Design and Implementation of SNS-linked Location based Mobile AR Systems using OpenAPI on Android (안드로이드 기반 OpenAPI를 이용한 SNS 연동 지역정보 서비스를 위한 모바일 증강현실 시스템 설계 및 구현)

  • Kim, Cheong-Ghil;Chung, Ji-Moon
    • Journal of Digital Convergence
    • /
    • v.9 no.2
    • /
    • pp.131-140
    • /
    • 2011
  • As the recent advances in network and wireless communications and semiconductor design and process technologies, our computing platform is rapidly shifting from desktop PCs to mobile devices such as UMPC (Ultra Mobile PC), Tablet PC, and Smartphone. Especially, wide-spreading Smartphones allow a new field of application based on location based services available with an user interface called augmented reality (AR). Therefore, this paper introduces an implementation of AR using various OpenAPls on Android Smartphones. In order to utilize enrich user data in real time, the system integrates with location based social network services also with OpenAPI. These APIs enable third-party developers to make use of rich contents of many portal web sites. The prototype was implemented on the real Android phone, Sky Sirius, and the result shows that it can provide an efficient location based service using AR technology without any constraints on mobile devices; in addition, it connects SNS to AR for sharing user data including photos, videos, and messages based on a specific location.

Internet Marketing Service Expansion Strategy through Focusing on One-Day Products (일일 품목 집중화를 통한 인터넷 마케팅 서비스 확대전략 연구)

  • Shin, Seong-Yoon;Suh, Jin-Hyung;Lee, Hyun-Chang
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.85-92
    • /
    • 2012
  • To the development of IT technologies, online shopping is implemented in various forms ranging from desktop environment to smartphone, and also variety of items are being sold. In addition, various type of online sales from that can not seen in offline like sales a one products per one day. In this type of sales, competition is extremely intensified and among those in the differentiated features are hold competitiveness. In this paper, we design and develop the site that adopts the online marketing technique - sale only one kind of product a day for increasing the sales revenue. To do this, in traditional commercial sites, we develop the marketing strategy, and information placement is emphasized site based on analysis of the daily product site planning and so that costumers are concentrated the products that did not interested. Though which customers to target specific items one day for some items and increasing publicity would help the sales increase is expected.

Daylight Assessment of Venetian Blind by Shading Heights and Slat Angles (베네시안 블라인드의 높이와 슬랫각도 조절에 따른 계절별 실내주광분포 분석)

  • Shin, Hwa-Young;Kim, Gon;Kim, Jeong Tai
    • KIEAE Journal
    • /
    • v.11 no.2
    • /
    • pp.105-111
    • /
    • 2011
  • Aims of this study is to investigate the daylighting control strategy of venetian blind system was performed as a function of ratio of shading height to window and slat angles in the preliminary stage of the parametric study. Floor-to-ceiling window walls of living spaces are used widely in apartment buildings since the Korean government has legally allowed elimination of the balcony area. Enlarging living area by balcony elimination, the larger glass area of window is exposed to the direct sunlight. As a common sunlight controlling device, blind system can be used in all orientations and all latitudes and it may obstruct, absorb, reflect and transmit solar radiation to building by proper adjusting. However, blind system can produce discomfort in occupant and less energy efficiency, if it has not been controlled optimally. The simulation model was based on the unit module of typical living space with balcony elimination. The room dimension was $6.0m(w){\times}6.9m(d){\times}2.7m(h)$ with floor to ceiling height of 2.5m. The blind system was simulated at five slat angles (horizontal, $30^{\circ}$, $45^{\circ}$ upward and downward tilted) and the four ratio of shading height to window (fully closed, partly opened, no-blind) using the Desktop RADIANCE 2.0 program. The series of simulation results indicates that the advantages of available daylight and outside of view can be improved by proper adjusting blind system.

The Study on the Delineation of the Busan Metropolitan Region, Korea (부산광역도시권 설정에 관한 연구)

  • Lee, Hee-Yul;Ju, Mee-Soon
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.10 no.2
    • /
    • pp.167-181
    • /
    • 2007
  • The newly adopted Korea Geodetic Datum (a.k.a. KGD2002) calls for massive reengineering work on geospatial dataset. The main focus of our study is placed on the strategy and system implementations of the required data reengineering with a keen attention to integrated approaches to interoperability, standardization, and database utilization. Our reengineering strategy includes file-to-file, file-to-DB, DB-to-file, and DB-to-DB conversion for the coordinate transformation of KGD2002. In addition to the map formats of existing standards such as DXF and Shapefile, the newly recommended standards such as GML and SVG are also accommodated in our reengineering environment. These four types of standard format may be imported into and exported from spatial database via KGD2002 transformation component. The DB-to-DB conversion, in particular, includes not only intra-database conversion but also inter-database conversion between SDE/Oracle and Oracle Spatial. All these implementations were carried out in multiple computing environments: desktop and the Web. The feasibility test of our system shows that the coordinate differences between Bessel and GRS80 ellipsoid agree with the criteria presented in the existing researches.

  • PDF

Performance Comparison of Virtualization Domain in User Level Virtualization (사용자 레벨 가상화에서 가상화 영역 성능 비교)

  • Jeong, Chan-Joo;Kang, Tae-Geun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.11
    • /
    • pp.1741-1748
    • /
    • 2013
  • In this paper, we proposed new virtualization technology that is more convenient and stable in local computing environment, then found technique elements need to desktop virtualization which is based on clients in various virtualization technologies. After running excution of process explorer utility in user level virtualization and VMWare, we found memory capacity that is used 30.1MB in VMWare and 16.6MB in user level virtualization respectively to compare private bytes each of process. We found no significant difference of CPU utilization which is executed application program in local computing environment and user domain with user level virtualization. In this result, proposed virtualization technology is able to minimize performance degradation of local computing environment.

Development of Tracking Equipment for Real­Time Multiple Face Detection (실시간 복합 얼굴 검출을 위한 추적 장치 개발)

  • 나상동;송선희;나하선;김천석;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.8
    • /
    • pp.1823-1830
    • /
    • 2003
  • This paper presents a multiple face detector based on a robust pupil detection technique. The pupil detector uses active illumination that exploits the retro­reflectivity property of eyes to facilitate detection. The detection range of this method is appropriate for interactive desktop and kiosk applications. Once the location of the pupil candidates are computed, the candidates are filtered and grouped into pairs that correspond to faces using heuristic rules. To demonstrate the robustness of the face detection technique, a dual mode face tracker was developed, which is initialized with the most salient detected face. Recursive estimators are used to guarantee the stability of the process and combine the measurements from the multi­face detector and a feature correlation tracker. The estimated position of the face is used to control a pan­tilt servo mechanism in real­time, that moves the camera to keep the tracked face always centered in the image.

An Analysis on Building Steps of LFS Linux System (LFS 리눅스 시스템 구축 과정 분석)

  • Lee, Kyesang
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.316-321
    • /
    • 2017
  • With the recent wide adoption of Linux in the fields of IoT, embedded, mobile, desktop and server industries, the importances of understanding the Linux system architecture as well as customizing the Linux system are increasing very steeply. Accordingly, the capabilities of building every component of Linux system from source code files have been important. The LFS (Linux From Scratch) site[1] guides the steps of building the basic Linux system from source files. The steps consist of build host preparation step, temporary system building step, final system building step, and system configuration and boot preparation step. However, the underlying concepts behind the steps used in building LFS are difficult to understand, particularly to the beginner. This paper analyzes the LFS build steps and reveal the core build concepts and principles used in each step. Additionally, this paper shows the measured package build times obtained from our build experience.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.