• Title/Summary/Keyword: non-user

Search Result 1,491, Processing Time 0.026 seconds

Welfare Interface using Multiple Facial Features Tracking (다중 얼굴 특징 추적을 이용한 복지형 인터페이스)

  • Ju, Jin-Sun;Shin, Yun-Hee;Kim, Eun-Yi
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.75-83
    • /
    • 2008
  • We propose a welfare interface using multiple fecial features tracking, which can efficiently implement various mouse operations. The proposed system consist of five modules: face detection, eye detection, mouth detection, facial feature tracking, and mouse control. The facial region is first obtained using skin-color model and connected-component analysis(CCs). Thereafter the eye regions are localized using neutral network(NN)-based texture classifier that discriminates the facial region into eye class and non-eye class, and then mouth region is localized using edge detector. Once eye and mouth regions are localized they are continuously and correctly tracking by mean-shift algorithm and template matching, respectively. Based on the tracking results, mouse operations such as movement or click are implemented. To assess the validity of the proposed system, it was applied to the interface system for web browser and was tested on a group of 25 users. The results show that our system have the accuracy of 99% and process more than 21 frame/sec on PC for the $320{\times}240$ size input image, as such it can supply a user-friendly and convenient access to a computer in real-time operation.

An Automatic Access Registration System using Beacon and Deep Learning Technology (비콘과 딥러닝 기술을 활용한 전자출입명부 자동등록시스템)

  • Huh, Ji-Won;Ohm, Seong-Yong
    • The Journal of the Convergence on Culture Technology
    • /
    • v.6 no.4
    • /
    • pp.807-812
    • /
    • 2020
  • In order to prevent the national wide spread of the COVID-19 virus, the government enforces to use an electronic access registration system for public facilities to effectively track and manage the spread. Initially, there was a lot of hassle to write a directory, but recently a system for creating an electronic access list using QR codes, what is called KI-Pass, is mainly used. However, the procedure for generating a QR code is somewhat cumbersome. In this paper, we propose a new electronic access registration system that does not require QR code. This system effectively controls the suspicious visitor by using a mask wearing discriminator which has been implemented using deep learning technology, and a non-contact thermometer package. In addition, by linking the beacon, a short-range wireless communication technology, and the visitor's smartphone application, basic information of the facility visitor is automatically registered to KDCA through the server. On the other hand, the user access information registered in the server is encrypted and stored, and is automatically destroyed after up to 4 weeks. This system is expected to be very effective in preventing the spread of other new infectious diseases as well as responding to the coronavirus which is recording a high spread worldwide.

The Study of Developing Korean SentiWordNet for Big Data Analytics : Focusing on Anger Emotion (빅데이터 분석을 위한 한국어 SentiWordNet 개발 방안 연구 : 분노 감정을 중심으로)

  • Choi, Sukjae;Kwon, Ohbyung
    • The Journal of Society for e-Business Studies
    • /
    • v.19 no.4
    • /
    • pp.1-19
    • /
    • 2014
  • Efforts to identify user's recognition which exists in the big data are being conducted actively. They try to measure scores of people's view about products, movies and social issues by analyzing statements raised on Internet bulletin boards or SNS. So this study deals with the problem of determining how to find the emotional vocabulary and the degree of these values. The survey methods are using the results of previous studies for the basic emotional vocabulary and degree, and inferring from the dictionary's glosses for the extended emotional vocabulary. The results were found to have the 4 emotional words lists (vocabularies) as basic emotional list, extended 1 stratum 1 level list from basic vocabulary's glosses, extended 2 stratum 1 level list from glosses of non-emotional words, and extended 2 stratum 2 level list from glosses' glosses. And we obtained the emotional degrees by applying the weight of the sentences and the emphasis multiplier values on the basis of basic emotional list. Experimental results have been identified as AND and OR sentence having a weight of average degree of included words. And MULTIPLY sentence having 1.2 to 1.5 weight depending on the type of adverb. It is also assumed that NOT sentence having a certain degree by reducing and reversing the original word's emotional degree. It is also considered that emphasis multiplier values have 2 for 1 stratum and 3 for 2 stratum.

Study on Extraction of Keywords Using TF-IDF and Text Structure of Novels (TF-IDF와 소설 텍스트의 구조를 이용한 주제어 추출 연구)

  • You, Eun-Soon;Choi, Gun-Hee;Kim, Seung-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.20 no.2
    • /
    • pp.121-129
    • /
    • 2015
  • With the explosive growth of information about books, there is a growing number of customers who find it difficult to pick a book. Against the backdrop, the importance of a book recommendation system becomes greater, through which appropriate information about books could be offered then to encourage customers to buy a book in the end. However, existing recommendation systems based on the bibliographical information or user data reveal the reliability issue found in their recommendation results. This is why it is necessary to reflect semantic information extracted from the texts of a book's main body in a recommendation system. Accordingly, this paper suggests a method for extracting keywords from the main body of novels, as a preceding research, by using TF-IDF method as well as the text structure. To this end, the texts of 100 novels have been collected then to divide them into four structural elements of preface, dialogue, non-dialogue and closing. Then, the TF-IDF weight of each keyword has been calculated. The calculation results show that the extraction accuracy of keywords improves by 42.1% in performance when more weight is given to dialogue while including preface and closing instead of using just the main body.

A Secure Micro-Payment Protocol based on Credit Card in Wireless Internet (무선인터넷에서 신용카드기반의 안전한 소액 지불 프로토콜)

  • Kim Seok mai;Kim Jang Hwan;Lee Chung sei
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1692-1706
    • /
    • 2004
  • Recently, there are rapid development of information and communication and rapid growth of e-business users. Therefore we try to solve security problem on the internet environment which charges from wire internet to wireless internet or wire/wireless internet. Since the wireless mobile environment is limited, researches such as small size, end-to-end and privacy security are performed by many people. Wireless e-business adopts credit card WPP protocol and AIP protocol proposed by ASPeCT. WAP, one of the protocol used by WPP has weakness of leaking out information from WG which conned wire and wireless communication. certification chain based AIP protocol requires a lot of computation time and user IDs are known to others. We propose a Micro-Payment protocol based on credit card. Our protocol use the encryption techniques of the public key with ID to ensure the secret of transaction in the step of session key generation. IDs are generated using ECC based Weil Paring. We also use the certification with hidden electronic sign to transmit the payment result. The proposed protocol solves the privacy protection and Non-repudiation p개blem. We solve not only the safety and efficiency problem but also independent of specific wireless platform. The protocol requires the certification organization attent the certification process of payment. Therefore, other domain provide also receive an efficient and safe service.

Evil-Twin Detection Scheme Using SVM with Multi-Factors (다중 요소를 가지는 SVM을 이용한 이블 트윈 탐지 방법)

  • Kang, SungBae;Nyang, DaeHun;Lee, KyungHee
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.2
    • /
    • pp.334-348
    • /
    • 2015
  • Widespread use of smart devices accompanies increase of use of access point (AP), which enables the connection to the wireless network. If the appropriate security is not served when a user tries to connect the wireless network through an AP, various security problems can arise due to the rogue APs. In this paper, we are going to examine the threat by evil-twin, which is a kind of rogue APs. Most of recent researches for detecting rogue APs utilize the measured time difference, such as round trip time (RTT), between the evil-twin and authorized APs. These methods, however, suffer from the low detection rate in the network congestion. Due to these reasons, in this paper, we suggest a new factor, packet inter-arrival time (PIAT), in order to detect evil-twins. By using both RTT and PIAT as the learning factors for the support vector machine (SVM), we determine the non-linear metric to classify evil-twins and authorized APs. As a result, we can detect evil-twins with the probability of up to 96.5% and at least 89.75% even when the network is congested.

Development of an Underwater Rope-cutter Device and Controller for Removal of Propeller and Shaft Foreign Material for Small Vessel (소형선박용 프로펠러 및 샤프트 이물질 제거를 위한 수중절단기 기구 설계 및 제어기 개발)

  • Lee, Hunseok;Oh, Jin-Seok;Choi, Sun-Hong
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.7
    • /
    • pp.927-935
    • /
    • 2019
  • Screw-failure accidents in small ships frequently occur in coastal waters. In particular, vessels' propulsion systems are frequently coiled due to objects such as fish-nets and ropes that float on the sea. The failure of the ship's propulsion system can cause primary accidents such as ship operation delays and drifting due to loss of power; furthermore, the possibility of secondary accidents such as those involving operators in the underwater removal of rope stuck in a propeller. Ships that do not have the proper tools to solve these problems must be either lifted onto land to be repaired or divers must dive directly under the ship to solve the problem. Accordingly, some small vessels have been equipped with rope-cutter devices on the propeller shaft to prevent ship propeller system accidents in recent years; however, they are not being applied efficiently due to the cost and time of installation. To solve these problems, this study develops an underwater rope-cutter device and controller for the removal of propeller and shaft foreign material in small vessels. This device has simple structures that use the principle of a saw. Meteor gears and crank pins were used for the straight-line rotation of saw blades of the underwater rope-cutters to allow for long strokes. Furthermore, the underwater rope-cutting machines can be operated by being connected to the ship battery. The user, a non-professional, can ensure convenience and stability by applying reverse current prevention and a speed control circuit so that it can be used more conveniently and safely.

Erlang Capacity for the Reverse Link of a IS-95 Cellular System According to Approximation Method in Shadowing Channel (전파음영 채널에서 근사방법에 따른 IS-95 셀룰라 시스템의 역방향 링크에 대한 얼랑 용량)

  • Park, Young;Kim, Hang-Rae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.10
    • /
    • pp.3210-3218
    • /
    • 2000
  • In a IS-95 cellular systm, blocking will occur when the reverse link user interference power reaches a predepermmed level which is set to maintam acceptable signal quality. In this paper, it is assumed that a mobile rdio channel is a shadowing channel and Erlang capacity is calculated for the reverse limk of an imperfect power controlled IS-95 cellular system. the blocking probability is derived using lognornal pproximation and the results according to guassian and lognormal approximation method are compared and analyzed respcctively. Assuming that blocking probability is 1% at the data rate of $R_b$=9.6kbps and $R_b$=14.4kbps, it is shown that Erlang capacity using Iognormal approximation is 13.68 Erlang and 7.08 Erlang and then the approximation erroris occurred about 24.4% and 40.4% inthe garssian approximation, respectively. It is also observed that if the power control becomes periect, the Erlang capacity is increased more 6.99 and 4.21 Erlang than that of the imperfect power control that the power contrl error is 2.5dB, and if voice activity is considered as 10%, the Erlang capacity is increased more 8.21 and 1.25 Erlang than that using non voice activity, respectively.

  • PDF

Real-time emotion recognition technology using individualization processemotional technology (개인화 프로세스를 적용한 실시간 감성인식 기술)

  • Ahn, Sang-Min;Whang, Min-Cheol;Kim, Dong-Keun;Kim, Jong-Hwa;Park, Sang-In
    • Science of Emotion and Sensibility
    • /
    • v.15 no.1
    • /
    • pp.133-140
    • /
    • 2012
  • We designed a novel individualization process for improving personal emotion recognitions in real time. The designed individualization process was performed by a neutralization algorithm of physiological signals, a subjective emotion reflection of a user updated by personal emotion rules in real time. The physiological signals such as PPG(Photoplethysmography), GSR(Galvanic skin reflex), and SKT(Skin temperature) were measured and analyzed to estimate an emotion states of users. Regulating the emotion status using by emotion rules was performed by reflecting subjective evaluations. The agreement of emotion recognition between of individualization and non-individualization method was estimated by 10 undergraduates (5 females, mean age: $22.1{\pm}2.2$) of Sangmyung University. During the emotion recognition test, 45 images were randomly presented to each participant five times. In results, the proposed individualization process showed the agreement of 71.67 % which was five times higher than when the process was not applied. Therefore, in this study, we demonstrated that the individualization process was significantly useful for customizing emotion recognitions of personal users in real time. The individualization process will be able to improve satisfactions in various emotion related applications and services in the nearer future.

  • PDF

A Study on the Structuring of Professional System for Design Business (전문적 체계정립을 위한 디자인비즈니스 유형구조화 연구)

  • 김보영
    • Archives of design research
    • /
    • v.17 no.3
    • /
    • pp.17-26
    • /
    • 2004
  • Those of the growth of e-business, the development of the cultural creative industry, the contents and knowledge industry have expanded and diversified the existing business models and created new ones. They are triggering new interpretations and discussions on business models. Such of changing business environment has paved the way for the expansion of design management within the design industry and opened new windows of opportunity for the traditionally small and non-specialized design business. Until now, the design business has not been distinguished from design industry or design service, and has not been viewed as an independent field. Rather, the design business has merely been part of a process. As such, the lack of dear definition and structured system had been a bottleneck for many design companies trying to achieve capital and social success and establish the foundation for growth and for companies striving to advance the design management in developing design business models or growth strategy in line with the changing environment. Against these sort of backdrops, this paper attempts to dearly define the design business. To this end, the paper tries to developed a design business model framework which classifies design business model into four types - customized, ready-made, provider and contract - according to the business activities between the producer and the end user, and business items into product, additional sonics, knowledge and promotion. The framework will expand the definition of design business and contribute to the expansion of design business activities and the development of diverse business models.

  • PDF