• Title/Summary/Keyword: personal computer communication

Search Result 480, Processing Time 0.032 seconds

Development of a Tiled Display Framework for Supporting Mixed-Focus Collaboration (혼합형 협업을 지원하는 타일드 디스플레이 프레임워크 기술 개발)

  • Kim, Min-Young;Cho, Yong-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.12
    • /
    • pp.2698-2706
    • /
    • 2010
  • Most tiled display systems supported a public workspace model where multiple users share the contents and work together on a large public screen. In this research, we developed ICE Display Framework, designed for supporting easy construction of tiled display applications allowing mixed-focus collaboration. Mixed-focus collaboration is a model that allows a number of users to work together as a group or individually on the large workspace. ICE Framework allows users to add personal contents on the tiled display without interrupting other users as well as to put shared works. In this paper, we compare ICE framework with previous research and explain the detail implementation. Then, we introduce the applications built with this framework and discuss the evaluation and analysis of the performance of the new framework.

Offline Object Tracking for Private Information Masking in CCTV Data (CCTV 개인영상 정보보호를 위한 오프라인 객체추적)

  • Lee, Suk-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.12
    • /
    • pp.2961-2967
    • /
    • 2014
  • Nowadays, a private protection act has come into effect which demands for the protection of personal image information obtained by the CCTV. According to this act, the object out of interest has to be mosaicked such that it can not be identified before the image is sent to the investigation office. Meanwhile, the demand for digital videos obtained by CCTV is also increasing for digital forensic. Therefore, due to the two conflicting demands, the demand for a solution which can automatically mask an object in the CCTV video is increasing and related IT industry is expected to grow. The core technology in developing a target masking solution is the object tracking technique. In this paper, we propose an object tracking technique which suits for the application of CCTV video object masking as a postprocess. The proposed method simultaneously uses the motion and the color information to produce a stable tracking result. Furthermore, the proposed method is based on the centroid shifting method, which is a fast color based tracking method, and thus the overall tracking becomes fast.

Development of a Robot for Automation of a Callus Inoculation (식물조직배양 자동화를 위한 로봇개발 - 엔드이펙터 및 시스템의 성능시험 -)

  • Chung, Suk-Hyun;No, Dae-Hyun
    • Journal of Bio-Environment Control
    • /
    • v.18 no.2
    • /
    • pp.87-94
    • /
    • 2009
  • This study was conducted to develop an automation system of inoculation processing of a lily callus. The results are summarized as followings: The end-effector was manufactured as suction and machine type. And these end-effectors can separate the callus from the mediums and divide the separated callus and then inoculate the divided callus to new mediums. Using the machine type end-effect0r, the results of the experiment showed the success rate in the division process was 100% while the separation and inoculation process was 92%. To develop the automation controller of inoculation process, the system was developed to control an external device and the manipulator. The data communication program between a robot and a personal computer was also developed using CAsyncsocket and Ethernet Interface.

EBG Resonator Antenna with a Stripline Type FSS Superstrate for PCS-band Base Station Antennas (스트립라인 형태의 주파수 선택적 표면 덮개층을 이용한 PCS대역 기지국용 EBG 공진기 안테나)

  • Yeo, Jun-Ho;Kim, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.8
    • /
    • pp.15-27
    • /
    • 2008
  • In this paper, an EBG(Electromagnetic BandGap) resonator antenna with a stripline type FSS(Frequency Selective Surface) superstrate for PCS-band base station antennas is proposed. The characteristics of resonant frequency and -3dB bandwidth of a unit cell of a superstrate are first analyzed by varing several design parameters such as a strip width and a unit cell width in order to design an EBG resonator antenna satisfying the required antenna gain and bandwidth for PCS-band base station antennas. Among various unit cell shapes, strip dipole and stripline are considered and their characteristics are compared. It was found that a resonant length of the EBG resonator antenna becomes smaller when the stripline shape is used and the control of the bandwidth is also much easier. By using the unit cell simulation results, planar and cylindrical EBG resonator antennas at PCS-band are designed.

Enhanced Segmentized Clear Channel Assessment Method for IEEE 802.15.4 Network (IEEE 802.15.4 Network의 전송효율 향상을 위한 Enhanced Semgentized Clear Channel Assessment 기법)

  • Son, Kyou Jung;Chang, Tae Gyu
    • Journal of IKEEE
    • /
    • v.20 no.3
    • /
    • pp.322-325
    • /
    • 2016
  • This paper proposed Enhanced Segmentized Clear Channel Assesment(ESCCA) for the IEEE 802.15.4 networks. This method divides original CCA into two groups to check precise channel status and perform additional CCA to increase throughput performance. Through the proposed method, the device can access the channel more often, so the transmission efficiency of the IEEE 802.15.4 network improves. To confirm the feasibility and usability of the proposed method, computer simulation has been performed. In the simulation, a star topology with one coordinator and a lot of devices is considered and the traffic flows are all one way, with the communication directed to the coordinator. Simulation results_ show the proposed method is improving maximum 10 kbps of throughput and decreasing maximum 15 of the average number of total CCA than IEEE 802.15.4 CCA method.

Maritime Casualties Occurred Onboard Ships Registered under the Central American Region Flag States

  • Rojas, Oscar Porras;Imazu, Hayama;Fujisaka, Takahiko
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • v.1
    • /
    • pp.59-66
    • /
    • 2006
  • This research is based on the information compiled on the occurrence of maritime casualties onboard ships registered under Central American Region (CAR) flag States. Due to nonexistence of writing reports in anyone of the countries that are integrating this Region, the information was compiled by the author through personal communication with the people involved in the casualties. The information was compiled by typing up the text and digitizing on the computer for the respective data base. For each casualty occurred, the following information was compiled, date and type of the casualty, position of the ship at the time of the casualty, dimension of the ship, number of people affected by the casualty, and cause and consequences of the casualty. Based on the number of people affected (death and disappear) by the casualties occurred was calculated the mortality rate by 100,000 persons and then compared with the Japanese mortality rate. Furthermore were analyzed the CAR maritime authorities competences and then were compared to that the Japanese counter part. In addition, the implementation rate of the International Maritime Organization (IMO) and International Labor Organization (ILO) conventions ratified by the CAR countries were analyzed. The objective of this research was to compiled and analyze the occurrences of maritime casualties happened on board the ships registered under the CAR Flag States, in order to determine the causes of these accidents. The results of the analysis enable us to better understand of the maritime safety situation of the ships that are registered under the CAR flag States. In order to reduce the occurrence of maritime casualties are proposed a series of measures based on the differences found then the comparison between CAR and Japan. Based on the results of this research, is possible to conclude that the inaccessibility of atmospheric information and the lack of safety measures onboard has been the main cause of the maritime casualties happened in the Pacific side of the CAR.

  • PDF

Relay Transmission Protocol for Mobility Support in WiMedia Distributed MAC Systems (WiMedia Distributed MAC 통신 시스템에서 이동성 지원을 위한 릴레이 통신 프로토콜)

  • Hur, Kyeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.526-534
    • /
    • 2014
  • In this paper, for the WiMedia Distributed Medium Access Control (D-MAC) protocol based on UWB. performance degradation due to the Distributed Reservation Protocol (DRP) conflict problem caused by devices' mobility is analyzed. And a DRP relay protocol and a DRP conflict resolution (CR) are proposed to overcome the performance degradation at DRP conflicts. In order to give the loser device at DRP conflicts a chance to maintain resources, the proposed DRP relay protocol executed at each device helps the loser device reserve an indirect link maintaining the required resources via a relay node. Simulation results considering the mobile environment have indicated that the DRP relay combined with the CR prevent the throughput decrease even though mobility of devices increases.

User Authentication Mechanism using Smartphone (스마트폰을 이용한 사용자 인증 메커니즘)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.2
    • /
    • pp.301-308
    • /
    • 2017
  • With the popularization of smart phones and the development of the Internet, many people use smart phones to conduct identity verification procedures. smart phones are easier and faster to authenticate than personal desktop computers. However, as Internet hacking technology and malicious code distribution technology rapidly evolve and attack types become more diverse, authentication methods suitable for mobile environment are required. As authentication methods, there are methods such as possessive-based authentication, knowledge-based authentication, biometric-based authentication, pattern-based authentication, and multi-element authentication. In this paper, we propose a user authentication mechanism that uses collected information as authentication factor using smart phone. Using the proposed authentication mechanism, it is possible to use the smart phone information and environment information of the user as a hidden authentication factor, so that the authentication process can be performed without being exposed to others. We implemented the user authentication system using the proposed authentication mechanism and evaluated the effectiveness based on applicability, convenience, and security.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Design of Worker's Safety Management System by Monitoring Work Location and Sensing Danger Zones (위험구역 접근 센싱 및 작업위치 모니터링을 이용한 작업자 안전관리 시스템 설계)

  • Min, So-Yeon;Lee, Kwang-Hyoung;Park, Jeong-Hyo;Lee, Keun-Wang
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.7
    • /
    • pp.3236-3244
    • /
    • 2011
  • Negligent accidents are often caused by risk factors of working environment at most construction sites and construction schedules are delayed as the workers' work location and construction progress are not figured out accurately, and this leads to a lot of loss. In this paper, with the object of solving the problems at construction sites, RFID portable device, active tag and wireless RFID reader to provide the status of workers which is based on location are designed in order to send information about the location of workers and work progress in real time to a personal RFID device. Also an application system to monitor workers' approaching to prevent accidents from vehicles and danger zones and to manage the real time location of workers is designed.