• Title/Summary/Keyword: future Internet

Search Result 2,267, Processing Time 0.024 seconds

A Method for Body Keypoint Localization based on Object Detection using the RGB-D information (RGB-D 정보를 이용한 객체 탐지 기반의 신체 키포인트 검출 방법)

  • Park, Seohee;Chun, Junchul
    • Journal of Internet Computing and Services
    • /
    • v.18 no.6
    • /
    • pp.85-92
    • /
    • 2017
  • Recently, in the field of video surveillance, a Deep Learning based learning method has been applied to a method of detecting a moving person in a video and analyzing the behavior of a detected person. The human activity recognition, which is one of the fields this intelligent image analysis technology, detects the object and goes through the process of detecting the body keypoint to recognize the behavior of the detected object. In this paper, we propose a method for Body Keypoint Localization based on Object Detection using RGB-D information. First, the moving object is segmented and detected from the background using color information and depth information generated by the two cameras. The input image generated by rescaling the detected object region using RGB-D information is applied to Convolutional Pose Machines for one person's pose estimation. CPM are used to generate Belief Maps for 14 body parts per person and to detect body keypoints based on Belief Maps. This method provides an accurate region for objects to detect keypoints an can be extended from single Body Keypoint Localization to multiple Body Keypoint Localization through the integration of individual Body Keypoint Localization. In the future, it is possible to generate a model for human pose estimation using the detected keypoints and contribute to the field of human activity recognition.

Multi-Level Prediction for Intelligent u-life Services (지능형 u-Life 서비스를 위한 단계적 예측)

  • Hong, In-Hwa;Kang, Myung-Seok
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.9 no.3
    • /
    • pp.123-129
    • /
    • 2009
  • Ubiquitous home is emerging as the future digital home environments that provide various ubiquitous home services like u-Life, u-Health, etc. It is composed of some home appliances and sensors which are connected through wired/wireless network. Ubiquitous home services become aware of user's context with the information gathered from sensors and make home appliances adapt to the current home situation for maximizing user convenience. In these context-aware home environments, it is the one of significant research topics to predict user behaviors in order to proactively control the home environment. In this paper, we propose Multi-Level prediction algorithm for context-aware services in ubiquitous home environment. The algorithm has two phases, prediction and execution. In the first prediction phase, the next location of user is predicted using tree algorithm with information on users, time, location, devices. In the second execution phase, our table matching method decides home appliances to run according to the prediction, device's location, and user requirement. Since usually home appliances operate together rather than separately, our approach introduces the concept of mode service, so that it is possible to control multiple devices as well as a single one. We also devised some scenarios for the conceptual verification and validated our algorithm through simulations.

  • PDF

Improvement of The National Technical Qualifications System from ICT point of view (ICT 관점에서 바라본 국가기술자격제도 개선)

  • Chang, Jin-Hyeon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.189-199
    • /
    • 2016
  • Pending issues present in the Nation Technical Qualifications System (NTQS) have been discussed to deal with the causes and improvements of the issues. The key present situations of the NTQS were investigated to analyze the problems of the NTQS. The acquisition distribution of the items of additional points in employment and the items applied to the laws and regulations of duty employment was revealed to be related with preferential items. The AHP analysis has been conducted based on issues for improvement of the NTQS raised till now. The urgency priority of the elements to be improved was ranked according to the AHP analysis result. The agendas for the improvement of the NTQS was suggested by consideration of the priority of the elements. First, a solution to raise discrimination of the NTQS was suggested by taking the view points of the experts into account. Second, an opinion was proposed that the preferential policies in employment should be directed toward expansion of qualification for duty employment. Third, two ideas were proposed to rectify problems embedded in the technician career handbook system. And four remedies have been made suggested, including the merger of similar events. The results of this research are expected to serve as a useful material for the future design of the NTQS.

A Study on Person Re-Identification System using Enhanced RNN (확장된 RNN을 활용한 사람재인식 시스템에 관한 연구)

  • Choi, Seok-Gyu;Xu, Wenjie
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.15-23
    • /
    • 2017
  • The person Re-identification is the most challenging part of computer vision due to the significant changes in human pose and background clutter with occlusions. The picture from non-overlapping cameras enhance the difficulty to distinguish some person from the other. To reach a better performance match, most methods use feature selection and distance metrics separately to get discriminative representations and proper distance to describe the similarity between person and kind of ignoring some significant features. This situation has encouraged us to consider a novel method to deal with this problem. In this paper, we proposed an enhanced recurrent neural network with three-tier hierarchical network for person re-identification. Specifically, the proposed recurrent neural network (RNN) model contain an iterative expectation maximum (EM) algorithm and three-tier Hierarchical network to jointly learn both the discriminative features and metrics distance. The iterative EM algorithm can fully use of the feature extraction ability of convolutional neural network (CNN) which is in series before the RNN. By unsupervised learning, the EM framework can change the labels of the patches and train larger datasets. Through the three-tier hierarchical network, the convolutional neural network, recurrent network and pooling layer can jointly be a feature extractor to better train the network. The experimental result shows that comparing with other researchers' approaches in this field, this method also can get a competitive accuracy. The influence of different component of this method will be analyzed and evaluated in the future research.

Research on the Methodology for Policy Deriving to active Artificial Intelligence (인공지능 활성화 정책 도출 방법 연구)

  • Yoo, Soonduck
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.5
    • /
    • pp.187-193
    • /
    • 2020
  • The purpose of this study is to study the methodology of deriving a policy that activates artificial intelligence from the governmental perspective in order to induce corporate growth by effectively grafting artificial intelligence technology into society and thereby improve individual and national competitiveness by creating new jobs. In order to derive activation plans, 1) detailed investigation of the domestic environment, 2) discovery of priority support fields and models that can be applied to artificial intelligence, 3) preparation of guidelines for activation and introduction, 4) specific methods for promoting and activating artificial intelligence Should be presented. The proposed artificial intelligence activation method performs a procedure to verify and confirm the effectiveness of artificial intelligence nurturing through a multi-faceted approach. The multi-faceted analysis approach includes business ecosystem aspects, industry-specific aspects including companies, technology fields, policy aspects, public and non-public services aspects, government-led and private-led aspects. Therefore, it can be reviewed as a method of inducing activation in various forms. In the future research field, it is necessary to prove the effectiveness of the proposed activation plan based on empirical data on artificial intelligence-based services. The expected effect of this study is to contribute to support the development of artificial intelligence technology and to establish related policies.

A Study on the IPTV Usage and Service Satisfaction (IPTV 수용자의 이용행태와 서비스 만족도에 대한 연구)

  • Seol, Jin-Ah;Bong, Mi-Sun
    • Korean journal of communication and information
    • /
    • v.46
    • /
    • pp.485-510
    • /
    • 2009
  • Since the inception of Internet Protocol TV's real-time service on January, 2009, technological challenges and lack of content diversity of IPTV have been cited as problem areas. While past researches focused on IPTV's technological, industrial and policy facets, this research surveyed the viewers' viewing and usage patterns, and the level of service satisfaction among actual audiences of MegaTV, SKBroadband, and LGTV since January. The results show that subscription fee and content types were the two dominant determinants in audience's choice of a particular IPTV company. The high users of IPTV were on average aged between 30-39, and women tended to be heavier users than men. The surveyed audience also regarded IPTV to be more similar to the Internet than any other medium such as Cable TV and Satellite TV. IPTV audience cited 'lifestyle service' and 'additional service' offerings to be highly relevant to their usage and satisfaction; interactive service and educational service also showed high correlation to usage and satisfaction. The most watched contents on IPTV were domestic TV series, followed by foreign movies and variety shows. 'Fees for additional features,' 'lack of real-time terrestrial TV service', and 'lack of content variety' were the major areas of concern for IPTV viewers. They answered that the monthly fee was the most important factor in the selection of IPTV. Use of pay-per-view contents and add-on interactive service fees were also seen as problematic. With regards to future usage, the IPTV audience revealed that they were very sensitive and reluctant to pay for additional services. While existing researches concentrated on IPTV's technological problems and lack of content diversity, this study illuminated the more pragmatical side of the viewers, namely, the importance of price in audience's selection of an IPTV service provider. From these results, it is recommended that, before doing anything else, the service providers try to meet the audience's expected price points in order to garner the full potential of IPTV and the attendant mass audience.

  • PDF

(A Study on the Control Mechanism for Network Survivability in OVPN over IP/GMPLS over DWDM) (DWDM기반의 OVPN에서 네트워크 생존성을 위한 제어 메커니즘 연구)

  • Cho Kwang-Hyun;Jeong Chang-Hyun;Hong Kyung-Dong;Kim Sung-Un
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.85-96
    • /
    • 2005
  • A ' Virtual Private Network (YPN) over Internet' has the benefits of being cost-effective and flexible. However, given the increasing demands for high bandwidth Internet and for reliable services in a 'VPN over Intemet,' an IP/GMPLS over DWDM backbone network is regarded as a very favorable approach for the future 'Optical VPN (OVPN)' due to the benefits of transparency and high data rate. Nevertheless, OVPN still has survivability issues such that a temporary fault can lose a large amount of data in seconds, moreover unauthorized physical attack can also be made on purpose to eavesdrop the network through physical components. Also, logical attacks can manipulate or stop the operation of GMPLS control messages and menace the network survivability of OVPN. Thus, network survivability in OVPN (i.e. fault/attack tolerant recovery mechanism considering physical structure and optical components, and secured transmission of GMPLS control messages) is rising as a critical issue. In this Paper, we propose a new path establishment scheme under shared risk link group (SRLG) constraint for physical network survivability. And we also suggest a new logical survivability management mechanism by extending resource reservation protocol-traffic engineering extension (RSVP-TE+) and link management protocol (LMP). Finally, according to the results of our simulation, the proposed algorithms are revealed more effective in the view point of survivability.

Design and Implement of Secure helper using Smart-phone Auto recording App (스마트폰 자동 녹음 앱을 이용한 생활 안전 도우미 설계 및 구현)

  • Moon, Jeong-Kyung;Hwang, Deuk-Young;Kim, Jin-Mook
    • Convergence Security Journal
    • /
    • v.15 no.7
    • /
    • pp.111-118
    • /
    • 2015
  • The violent crime has increased dramatically in our society. This is because our society has to change quickly. Strong police force, but this is not enough to solve the crime. And there are a lot of police to investigate the situation difficult to go out to the crime scene. So inevitably increase in the risk of crime. Researchers have conducted a number of studies to solve this problem. However, the proposed study how realistic are many points still lacking. herefore, we to take advantage of smartphones and high-speed Internet access technology to provide security services using the push service for rapid identification and crime situation in this study. Therefore, we would like to provide rapid service to identify criminal security situation using smart-phone app and push services on the high speed internet environments. The proposed system is to record the voice information received from the smart phone near the user presses the hot key is set in advance in real-time, and stores the audio information stored in the LBS information to the server through the authentication procedure. And the server uses the stored voice data and LBS Push service information to inform their families. We have completed the design of the proposed system. And it has implemented a smart phone app, the user authentication server. And using the state in which the push service from the authentication server by transmitting a message to a user to inform a family. But more must examine whether the proposed research is relevant in future studies.

Usefulness of Chlorine Dioxide to Airborne Bacteria at a Hospital Using Biological Information (생물학적 정보를 활용한 병원에서 존재하는 공기중 부유 세균에 대한 이산화염소의 유용성)

  • Jung, Suk-Yul
    • Journal of Internet of Things and Convergence
    • /
    • v.6 no.2
    • /
    • pp.19-24
    • /
    • 2020
  • In the present study, using biological information of bacteria and biochemical information of chlorine dioxide gas, Gram-positive bacteria, e.g., Alloiococcus otitis, Erysipelothrix rhusiopathiae, Staphylococcus caprae, Staphylococcus lentus, and gram-negative bacteria, e.g., Acinetobacter baumannii complex, Aeromonas salmonicida, Brucella melitensis, Oligella ureolytica were used whether a plastic kit to release ClO2 gas could inhibit their growth. Overall, chlorine dioxide gas showed about 99% inhibition of bacterial growth, with less than 10 CFU. However, it was found that Gram positive Alloiococcus otitis and Gram negative Aeromonas salmonicida had more than about 50 CFU. When comparing the results of experiments with several bacteria, it suggested that the concentration of chlorine dioxide gas would be at least 10 ppm to 400 ppm for the bacterial inhibition. The results of this study could be used as basic data to evaluate the clinical usefulness of chlorine dioxide gas. If this study helps with prior knowledge to help clinicians to recognize and prevent the presence of micro-organisms that cause infections in hospitals, it would be helpful for activities such as patient care as a convergence field. In the future, it is considered that the research results will be the basis for rapidly inhibiting the microbes infected with patients by utilizing data of the information of the microbes that are inhibited for chlorine dioxide gas.

Analysis and Forecasting for ICT Convergence Industries (ICT 융합 산업의 현황 및 전망)

  • Jang, Hee S.;Park, Jong T.
    • Journal of Service Research and Studies
    • /
    • v.5 no.2
    • /
    • pp.15-24
    • /
    • 2015
  • The trade balance for the information and communications technology (ICT) industries in 2014 have reached 863 hundred million dollars as the main export products such as smart phone and semi-conductor increase, since the ICT industries have played an important role in economic growth in Korea. Until now, the consistent supporting of government and investment of company have been doing with the growth of ICT industries, as a result, Korea marked as the first in the UN electronic government preparing index, and rank 12 in the network preparing index through the policy of national information and basic plan of inter-industry convergence. However, as the unstable international economic circumstances, ICT industries is faced with the stagnation, and then preemptive development of products and services for ICT convergence industries is needed to continually get definite ICT Korea image. In this paper, the ICT convergence industry is analyzed and forecasted. In specific, the international and domestic market for cloud, 3D convergence, and internet of things is diagnosed. The market for ICT convergence industries is predicted to be 3.6 trillion dollar in the world, and 110 trillion won in domestic. From the analytical results for technology and services development, the preemptive supporting of the technology development and policy for the internet of things and 3D convergence industries is required. In addition to, through the future forecasting by socio-tech matrix method, the policy supporting for the ICT convergence area of healthcare, fintech, artificial intelligence, body platform, and human security is needed.