• Title/Summary/Keyword: multi-purposes

Search Result 387, Processing Time 0.025 seconds

Development of 3D Holographic Multi-vision applying Wi-Fi Interlocking Technology

  • Park, Myeong-Chul;Kim, Soon-Hee;Hur, Hwa-La
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.47-53
    • /
    • 2021
  • In this paper, we propose a multi-vision based hologram display to improve the limited viewing angle problem of a single fan hologram display. Existing single fan type displays have a narrow viewing angle. And when the length of the fan becomes longer, there is a problem of low resolution. Also, it is difficult to change data due to the use of the SD card. So, we want to implement a dedicated app to transmit data via Wi-Fi. In this paper, we designed and implemented a display consisting of 3 REG LED fans. As a result of video transmission using the app, it was confirmed that it can be used for commercial purposes such as advertisements and demonstrations. The results of this study are thought to be of great help in the popularization of multi-vision holograms.

Multimodal layer surveillance map based on anomaly detection using multi-agents for smart city security

  • Shin, Hochul;Na, Ki-In;Chang, Jiho;Uhm, Taeyoung
    • ETRI Journal
    • /
    • v.44 no.2
    • /
    • pp.183-193
    • /
    • 2022
  • Smart cities are expected to provide residents with convenience via various agents such as CCTV, delivery robots, security robots, and unmanned shuttles. Environmental data collected by various agents can be used for various purposes, including advertising and security monitoring. This study suggests a surveillance map data framework for efficient and integrated multimodal data representation from multi-agents. The suggested surveillance map is a multilayered global information grid, which is integrated from the multimodal data of each agent. To confirm this, we collected surveillance map data for 4 months, and the behavior patterns of humans and vehicles, distribution changes of elevation, and temperature were analyzed. Moreover, we represent an anomaly detection algorithm based on a surveillance map for security service. A two-stage anomaly detection algorithm for unusual situations was developed. With this, abnormal situations such as unusual crowds and pedestrians, vehicle movement, unusual objects, and temperature change were detected. Because the surveillance map enables efficient and integrated processing of large multimodal data from a multi-agent, the suggested data framework can be used for various applications in the smart city.

The Effects of Ego Strength, Failure Tolerance, and Performance Anxiety on School-Age Children's School Class Adjustment: A Focus on Gender Differences (자아강도, 실패내성 및 수행불안이 학령기 아동의 학교수업적응에 미치는 영향: 성별에 따른 차이를 중심으로)

  • Kim, Se Young
    • Korean Journal of Child Studies
    • /
    • v.37 no.2
    • /
    • pp.13-25
    • /
    • 2016
  • Objective: The purposes of this study were to examine the effects of school-age children's ego strength, failure tolerance, and performance anxiety on their school class adjustment, and to model the relation structure of the variables. Method: For these purposes, a questionnaire survey was conducted with 562 6th graders. Results and Conclusion: The results of this study are summarized as follows. First, ego strength, failure tolerance, and performance anxiety were significantly different according to gender. Second, in male students, ego strength, failure tolerance, and performance anxiety had a significant direct effect on school class adjustment. In addition, ego strength and failure tolerance had a significant indirect effect on school class adjustment. Third, female students' paths to school class adjustment were similar to male students' but the effect of failure tolerance on performance anxiety and the effect of performance anxiety on school class adjustment were not significant. Fourth, in the results of multi-group analysis, the effect path from ego strength to school class adjustment was different between male and female students, and the effect was higher in female students than in male students.

A Simple Syntax for Complex Semantics

  • Lee, Kiyong
    • Proceedings of the Korean Society for Language and Information Conference
    • /
    • 2002.02a
    • /
    • pp.2-27
    • /
    • 2002
  • As pact of a long-ranged project that aims at establishing database-theoretic semantics as a model of computational semantics, this presentation focuses on the development of a syntactic component for processing strings of words or sentences to construct semantic data structures. For design arid modeling purposes, the present treatment will be restricted to the analysis of some problematic constructions of Korean involving semi-free word order, conjunction arid temporal anchoring, and adnominal modification and antecedent binding. The present work heavily relies on Hausser's (1999, 2000) SLIM theory for language that is based on surface compositionality, time-linearity arid two other conditions on natural language processing. Time-linear syntax for natural language has been shown to be conceptually simple and computationally efficient. The associated semantics is complex, however, because it must deal with situated language involving interactive multi-agents. Nevertheless, by processing input word strings in a time-linear mode, the syntax cart incrementally construct the necessary semantic structures for relevant queries and valid inferences. The fragment of Korean syntax will be implemented in Malaga, a C-type implementation language that was enriched for both programming and debugging purposes arid that was particluarly made suitable for implementing in Left-Associative Grammar. This presentation will show how the system of syntactic rules with constraining subrules processes Korean sentences in a step-by-step time-linear manner to incrementally construct semantic data structures that mainly specify relations with their argument, temporal, and binding structures.

  • PDF

Analysis for Stability for Passive Mechanisms of High Speed Mobile Robot on Rough Terrain (야지 고속 주행 로봇을 위한 패시브 메커니즘의 안정성 비교 분석)

  • Kim, Youngjin;Jeon, Bongsoo;Kim, Jayong;Lee, Jihong
    • The Journal of Korea Robotics Society
    • /
    • v.9 no.2
    • /
    • pp.124-131
    • /
    • 2014
  • The robot mechanisms that were previously researched had only been conducted for the purpose of overcoming the obstacles stably at low speed driving and enhancing the stability against high speed circuitous driving, and yet, the mechanism satisfying two purposes. However, in order to stably drive with high speed on rough terrain, there is a need for satisfying both of these purposes, as well as testing the efficiency of the mechanisms at high speed driving. There, this paper simulated some of the passive mechanisms and focused on checking the performances of passive mechanisms through simulations and analyzing each mechanism on the basis of an evaluation index. The simulation was conducted by Adams (The Multi-body Dynamics Simulation Solution) and used various types of passive mechanisms which were introduced in the robotics field. As a result, the study confirmed that passive mechanisms have a number of situations that affect the driving stability on each direction of roll and pitch. Further study is needed about active mechanism.

A plan for the development of botanic garden displays using local landscape resources (지역경관자원을 활용한 식물원 전시방식의 발전방안)

  • Park, Eun-Yeong
    • Korean Journal of Agricultural Science
    • /
    • v.39 no.4
    • /
    • pp.535-543
    • /
    • 2012
  • Botanic gardens are steadily increasing based on people's increased interests in environment and ecology, lengthened leisure hours and improved transportation. However, similar florae and undifferentiated display are considered as problems, while their functions, purposes and characteristics have been more diversified. This study aims to investigate the present conditions and problems of display at botanic gardens and to find out solutions to make them exhibit plants through various ways of display and have their own characteristic, through a case study of seven botanic gardens. As botanic gardens are being recognized as a cultural institution, they should have limitations in the aspect of places that simply collect and exhibit rare plants. The current problems are unclear setting of design goals and communication with visitors. The gardens should escape from the existing supplier-oriented view to a visitor-oriented view, thinking about what the visitors will be able to see and get there. In particular, their display lacks differency, aesthetics, eye-level display, and multi-layered display. In addition to the essential functions of collecting the world's plants, exhibiting them according to purposes and giving scientific learning, botanic gardens should also show a sense of seasons with plants, trigger interests and amusement through unique plants, make visitors more interested in florae and closer to plants, and include social functions. Botanic gardens should be capable of leaning resources display, speciated display, complex and convergent garden-type display, and display fit for local and cultural contexts.

A Test Wrapper Design to Reduce Test Time for Multi-Core SoC (멀티코어 SoC의 테스트 시간 감축을 위한 테스트 Wrapper 설계)

  • Kang, Woo-Jin;Hwang, Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.1
    • /
    • pp.1-7
    • /
    • 2014
  • This paper proposes an efficient test wrapper design that reduces overall test time in multi-core SoC. After initial local wrapper solution sets for all the cores are determined using well-known Combine algorithm, proposed algorithm selects a dominant core which consumes the longest test time in multi-core SoC. Then, the wrapper characteristics in the number of TAM wires and the test time for other cores are adjusted based on test time of the dominant core. For some specific cores, the number of TAM wires can be reduced by increasing its test time for design space exploration purposes. These modified wrapper characteristics are added to the previous wrapper solution set. By expanding previous local wrapper solution set to global wrapper solution set, overall test time for Multi-core SoC can be reduced by an efficient test scheduler. Effectiveness of the proposed wrapper is verified on ITC'02 benchmark circuits using $B^*$-tree based test scheduler. Our experimental results show that the test time is reduced by an average of 4.7% when compared to that of employing previous wrappers.

Multi-Source/Multi-Use Model of Storytelling Related to Patent (특허 연계 스토리텔링의 멀티소스/멀티유즈 모델)

  • Lee, Ga-Hee;Lee, Sang-Zee
    • The Journal of the Korea Contents Association
    • /
    • v.15 no.10
    • /
    • pp.447-456
    • /
    • 2015
  • In this paper a new model of storytelling related to patent in the field of business as a sort of Intellectual Property(IP) was proposed. The patent related storytelling is investigated in the view points of variety of customers, purposes and applications which is different from the conventional OSMU, transmedia or crossmedia storytelling. In business there are several stages related to patent such as the initial conceptualization and development of technology, apply for and registration of patent, legal conflict like patent invalidation trial and action for infringement of patent and damages, and the commercialization stage like development of product based on patent, advertisement and marketing. Multiple sources optimized to the purpose in each stage of patent related business as well as to multiple convergence application of a patent. Similarly, multi-use refers to the fact that storytelling can be applied in each stage of patent oriented business. The effectiveness and usefulness of proposed MSMU model is also investigated.

Smart table interface design based on multi-touch (멀티터치 기반 스마트 테이블 인터페이스 설계)

  • Han, Jeong-Ah;Seo, Laiwon
    • Journal of Digital Contents Society
    • /
    • v.15 no.3
    • /
    • pp.381-386
    • /
    • 2014
  • Multi-touch technology with the development of IT technology, various forms of recognition technology is positioned as the technology is one. A computer and a human action virtualization technology needed to design a natural interface while haneundedo influence. Human-computer interaction possible through intuitive to many users being able to reach without having to learn the sensory capabilities, will be useful if you could use. This paper presents the design of interfaces to the smart table environment to a conventional multi-touch touch-based, real so that you can use your finger to all the purposes. Growing day by day through the ubiquitous electronic blackboard, desk, furniture and electronics industry is actively being made by IT to incorporate multi-touch based interface because the design is expected to be important. Not far in the future, new ways of learning environment by combining modernization and smart table for meeting various IoT not only affect the environment looks anticipating.

Privacy Preserving and Relay Attack Preventing Multi-Context RFID Mutual Authentication Protocol (프라이버시를 제공하고 중계 공격에 안전한 다중-컨텍스트 RFID 상호 인증 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.8B
    • /
    • pp.1028-1037
    • /
    • 2011
  • Recently, Selim et al proposed public key cryptography based privacy preserving multi-context RFID authentication protocol. However Selim et al's proposed protocol not only doesn't fit into passive tag based RFID system because it uses public key based encryption algorithm to perform authentication between reader and tag, but also is insecure to an impersonation attack because it doesn't provide mutual authentication. In order to eliminate the above described efficiency problem and security vulnerabilities, this paper proposes a new multi-context RFID mutual authentication protocol that can prevent privacy invasion and tag impersonation attack through providing mutual authentication between single passive tag which is located different application space and readers which provide multi-context purposes and can secure against relay attack and denial-of-service attack. As a result, the proposed protocol performs secure mutual authentication based on the collected space and time information from the RFID reader and provides strong security and high computation efficiency because if performs secure one-way hash function and symmetric encryption operations suitable to the environments of passive RFID tags.