• Title/Summary/Keyword: software implementation

Search Result 2,900, Processing Time 0.034 seconds

A Implementation of User Exercise Motion Recognition System Using Smart-Phone (스마트폰을 이용한 사용자 운동 모션 인식 시스템 구현)

  • Kwon, Seung-Hyun;Choi, Yue-Soon;Lim, Soon-Ja;Joung, Suck-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.10
    • /
    • pp.396-402
    • /
    • 2016
  • Recently, as the performance of smart phones has advanced and their distribution has increased, various functions in existing devices are accumulated. In particular, functions in smart devices have matured through improvement of diverse sensors. Various applications with the development of smart phones get fleshed out. As a result, services from applications promoting physical activity in users have gotten attention from the public. However, these services are about diet alone, and because these have no exercise motion recognition capability to detect movement in the correct position, the user has difficulty obtaining the benefits of exercise. In this paper, we develop exercise motion-recognition software that can sense the user's motion using a sensor built into a smart phone. In addition, we implement a system to offer exercise with friends who are connected via web server. The exercise motion recognition utilizes a Kalman filter algorithm to correct the user's motion data, and compared to data that exist in sampling, determines whether the user moves in the correct position by using a DTW algorithm.

A Design of Mobile e-Book Viewer interface for the Reading Disabled People (독서장애인용 모바일 전자책뷰어 인터페이스 설계)

  • Lee, KyungHee;Kim, TaeEun;Lee, Jongwoo;Lim, Soon-Bum
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.1
    • /
    • pp.100-107
    • /
    • 2013
  • As the eBook market grows fast recently, various eBook viewer solutions such as hardware viewers and software readers came out to the market. We can, however, hardly find mobile eBook interfaces for the reading disabled people who have difficulties in reading for their visual impairment or learning disabilities, or dyslexia. An eBook viewer interfaces for the reading disabled people should be carefully and distinctively designed because the reading disabled people cannot use normal versions of eBook viewer. In this paper, we suggest a eBook viewer interface model to make the reading disabled people read eBooks easily. Depending on the type of the reading disabled people: the full blind, the almost blind, the just learning disabled, our model provides an adaptive interface to make them read eBooks effectively. In addition, unlike the existing simple audio books, we also support annotation systems to make the reading disabled people interact with eBook viewer. To show the effectiveness of our model, we implemented an eBook viewer prototype on an android-based mobile device. We are sure that our model and implementation can make the reading disabled people, who is 10% of all the domestic people, read eBooks effectively.

Design and Implementation of a Protocol for Interworking Open Web Application Store (개방형 웹 애플리케이션 스토어 연동을 위한 프로토콜의 설계 및 구현)

  • Baek, Jihun;Kim, Jihun;Nam, Yongwoo;Lee, HyungUk;Park, Sangwon;Jeon, Jonghong;Lee, Seungyoon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.669-678
    • /
    • 2013
  • Recently, because the portable devices became popular, it is easily to see that each person carries more than just one portable device and the use of the smartphone stretches as time goes by. After the smartphone has propagated rapidly, the total usage of the smartphone applications has also increased. But still, each application store has a different platform to develop and to apply an application. The application store is divided into two big markets, the Android and the Apple. So the developers have to develop their application by using these two different platforms. Developing into two different platforms almost makes a double development cost. And for the other platforms, the weakness is, which still have a small market breadth like Bada is not about the cost, but about drawing the proper developers for the given platform application development. The web application is rising up as the solution to solve these problems, reducing the cost and time in developing applications for every platform. For web applications don't need to make a vassal relationship with application markets platform. Which makes it possible for an application to operate properly in every portable devices and reduces the time and cost in developing. Therefore, all of the application markets could be united into one big market through a protocol which will connect each web applications market. But, still there is no standard for the web application store and no current web application store is possible to interlock with other web application stores. In this paper, we are trying to suggest a protocol by developing a prototype and prove that this protocol can supplement the current weakness.

Implementation of GLCM/GLDV-based Texture Algorithm and Its Application to High Resolution Imagery Analysis (GLCM/GLDV 기반 Texture 알고리즘 구현과 고 해상도 영상분석 적용)

  • Lee Kiwon;Jeon So-Hee;Kwon Byung-Doo
    • Korean Journal of Remote Sensing
    • /
    • v.21 no.2
    • /
    • pp.121-133
    • /
    • 2005
  • Texture imaging, which means texture image creation by co-occurrence relation, has been known as one of the useful image analysis methodologies. For this purpose, most commercial remote sensing software provides texture analysis function named GLCM (Grey Level Co-occurrence Matrix). In this study, texture-imaging program based on GLCM algorithm is newly implemented. As well, texture imaging modules for GLDV (Grey Level Difference Vector) are contained in this program. As for GLCM/GLDV Texture imaging parameters, it composed of six types of second order texture functions such as Homogeneity, Dissimilarity, Energy, Entropy, Angular Second Moment, and Contrast. As for co-occurrence directionality in GLCM/GLDV, two direction modes such as Omni-mode and Circular mode newly implemented in this program are provided with basic eight-direction mode. Omni-mode is to compute all direction to avoid directionality complexity in the practical level, and circular direction is to compute texture parameters by circular direction surrounding a target pixel in a kernel. At the second phase of this study, some case studies with artificial image and actual satellite imagery are carried out to analyze texture images in different parameters and modes by correlation matrix analysis. It is concluded that selection of texture parameters and modes is the critical issues in an application based on texture image fusion.

Implementation of Efficient Container Number Recognition System at Automatic Transfer Crane in Container Terminal Yard (항만 야드 자동화크레인(ATC)에서 효율적인 컨테이너번호 인식시스템 개발)

  • Hong, Dong-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.9
    • /
    • pp.57-65
    • /
    • 2010
  • This paper describes the method of efficient container number recognition in colored container image with number plate at ATC(Automatic Transfer Crane) in container terminal yard. At the Sinseondae terminal gate in Busan, the container number recognition system is installed by "intelligent port-logistics system technology development", that is government research and development project. It is the method that it sets up the tunnel structure inside camera on the gate and it recognizes the container number in order to recognize the export container cargo automatically. However, as the automation equipment is introduced to the container terminal and the unmanned of a task is gradually accomplished, the container number recognition system for the confirmation of the object of work is required at ATC in container terminal yard. Therefore, the container number recognition system fitted for it is necessary for ATC in container terminal yard in which there are many intrusive of the character recognition through image including a sunlight, rain, snow, shadow, and etc. unlike the gate. In this paper, hardware components of the camera, illumination, and sensor lamp were altered and software elements of an algorithm were changed. that is, the difference of the brightness of the surrounding environment, and etc. were regulated for recognize a container number. Through this, a shadow problem, and etc. that it is thickly below hung with the sunlight or the cargo equipment were solved and the recognition time was shortened and the recognition rate was raised.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

An Empirical Study on the Characteristic Influences of the Rules of Origin on the Implementation of Preferential Tariffs and Trade Performance

  • Park, Se-Hyun;Pak, Myong-Sop
    • Journal of Korea Trade
    • /
    • v.25 no.8
    • /
    • pp.1-24
    • /
    • 2021
  • Purpose - This study categorizes factors that influence the utilization of preferential tariffs based on the characteristics of rules of origin (RoO) and identifies and analyzes the influence of these characteristics on the utilization of preferential tariffs and the trade performance of companies. Design/methodology - In this study, we categorized factors that have an influence on the utilization of preferential tariffs based on the characteristics of RoO and investigated and tested the influence of these characteristics on the utilization of preferential tariffs and the trade performance of companies. For empirical analysis, we categorized the characteristics of RoO into restrictiveness, complexity, and uncertainty. We then developed a research model and formulated hypotheses based on previous studies, and tested the hypotheses using statistical software-(SPSS 25.0 and AMOS 18.0.) Findings - Previous studies suggested that each characteristic of RoO is determined by unique features of a Regional Trade Agreement (RTA). This study conducted an empirical analysis on the influence of the characteristics of RoO on the utilization of preferential tariffs and trade performance. The results confirmed that, overall, the characteristics of preferential rules of origin (PRoO) are related to and influence Korean companies' utilization of preferential tariffs and trade performance. As for the degree of the influence, the characteristics were in the order of uncertainty> restrictiveness> complexity. Nevertheless, complexity turned out not to have an influence large enough to change a company's decision on the utilization of preferential tariffs. Based on these results, this study identified unique features of PRoO and related problems for Korean companies that want to utilize preferential tariffs and suggested countermeasures for their effective utilization of preferential tariffs in the future. Originality/value - Companies that want to use preferential tariffs in international trade have to satisfy PRoO. The issue of origin can be regarded as an essential part of an RTA and RoO, are a crucial criterion in using preferential tariffs. The rules are requirements to claim benefits of preferential trade agreements and are the primary reasons companies have trouble in utilizing preferential tariffs. In this sense, this study categorized the characteristics of RoO, which are a key part of an RTA, and surveyed working-level professionals in charge of international trade at Korean companies to investigate the relationship between these characteristics and the utilizations of preferential tariffs and trade performance of the companies.

Design and Implementation of Crime Prevention System Targeting Women by Using Public BigData (공공 빅데이터를 이용한 여성 대상 범죄 예방 시스템의 설계 및 구현)

  • Ko, Sung-Wook;Oh, Su-Bin;Baek, Se-In;Park, Hyeok-Ju;Park, Mee-Hwa;Lee, Kang-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.561-564
    • /
    • 2016
  • If using crime map which represents criminal section that violent crimes targeting women frequently happened, the police could prevent additional crimes by positioning themselves intensively in expected crime zones and each individual could avoid being damaged by referring information of criminal zones. In this paper, by analyzing crimes targeting women and offender information which is provided in public-opened datum portal, we suppose a system which prevents crimes that calculates locational danger and, by considering location and age group of users, provides user-customized information of danger. By crawling the criminals datum which is provided in public-opened datum portal, It collects them. About the areas which happened sexual crimes, calculating danger of crime based on statistical crime information including criminal information, residence of offenders, areas which happened sexual crimes, sentences and the number of crime, this system is able to visualize the areas which sexual crimes happened based on information of danger grade representing on user's location. The score of danger calculated in location unit can provide criminal information according to location and ages of users by interacting GIS.

  • PDF

A Study on the Implementation and Modeling of 20kW Scale ESS Load Test Device for Emergency Generator (소방용 비상발전기의 현장부하시험을 위한 20 kW급 ESS 부하시험장치 모델링과 구현에 관한 연구)

  • Choi, Seung-Kyou;Lee, Hu-Dong;Choi, Sung-Sik;Ferreira, Marito;Rho, Dae-Seok
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.20 no.9
    • /
    • pp.541-550
    • /
    • 2019
  • An emergency generator is key equipment for fire-fighting to supply power to fire-fighting facilities, which protect property and people in cases of fire accidents. A rated load test for emergency generators must be carried out by connecting an emergency load to the generator in accordance with related regulations. However, a no-load test has been performed for emergency generators in general since serious problems can occur when the main power is cut off, including the damage of customer devices and shut down of critical loads. Therefore, this paper proposes a load test method for an emergency generator using energy storage system (ESS) without the interruption of main power. The emergency power system was also modeled based on PSCAD/EMTDC software, and a 200-kW scale ESS load test device was implemented. The simulation and test results show that the load test method is useful and practical for an emergency power supply system.

Speech Visualization of Korean Vowels Based on the Distances Among Acoustic Features (음성특징의 거리 개념에 기반한 한국어 모음 음성의 시각화)

  • Pok, Gouchol
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.5
    • /
    • pp.512-520
    • /
    • 2019
  • It is quite useful to represent speeches visually for learners who study foreign languages as well as the hearing impaired who cannot directly hear speeches, and a number of researches have been presented in the literature. They remain, however, at the level of representing the characteristics of speeches using colors or showing the changing shape of lips and mouth using the animation-based representation. As a result of such approaches, those methods cannot tell the users how far their pronunciations are away from the standard ones, and moreover they make it technically difficult to develop such a system in which users can correct their pronunciation in an interactive manner. In order to address these kind of drawbacks, this paper proposes a speech visualization model based on the relative distance between the user's speech and the standard one, furthermore suggests actual implementation directions by applying the proposed model to the visualization of Korean vowels. The method extract three formants F1, F2, and F3 from speech signals and feed them into the Kohonen's SOM to map the results into 2-D screen and represent each speech as a pint on the screen. We have presented a real system implemented using the open source formant analysis software on the speech of a Korean instructor and several foreign students studying Korean language, in which the user interface was built using the Javascript for the screen display.