• Title/Summary/Keyword: user-tracing

Search Result 90, Processing Time 0.022 seconds

Magnetic Particle Separation by an Optimized Coil: A Graphical User Interface

  • Rouhi, Kasra;Hajiaghajani, Amirhossein;Abdolali, Ali
    • Journal of Magnetics
    • /
    • v.22 no.2
    • /
    • pp.214-219
    • /
    • 2017
  • Magnetic separators that clean the fluid stream from impurities, protect the installations in numerous industries. This paper introduces a graphical user interface (GUI) which proposes an optimized coil separating magnetic particles with a radius from 1 up to 500 µm. High gradient magnetic fields are employed in an arbitrary user defined fluidic channel which is made of a nonmetallic material. The effects of coil parameters are studied and adjusted to design an optimum coil with a minimum Ohmic loss. In addition, to design the coil scheme based on the particle movements, a mathematical particle-tracing model within the fluid channels has been utilized. In comparison to conventional magnetic separators, this model is reconfigurable by the user, produces a weaker magnetic field, allows for continuous purifying and is easy to install, with high separation efficiency. The presented GUI is simple to use, where the coil's manufacturing limitations can be specified.

User Visit Certification System using Inaudible Frequency

  • Chung, Myoungbeom
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.7
    • /
    • pp.57-64
    • /
    • 2021
  • In this paper, we propose and test the efficacy of an easy-to-use user location certification system for public places that relies on frequencies outside the audible range for humans. The inaudible frequencies come in signal frequency between 18-20 kHz and are generated by general audio speaker. After an individual's smart device detects the signal frequency, it sends the frequency value, user's personal ID, and user's location to a system server that certifies the user's visit location currently. The system server then saves a user visit record and categorizes it by individual. To show the usefulness of this proposed system, we developed a user visit certification application for smart devices linked to a system server. We then conducted a user visit certification experiment using the proposed system, with the result showing 99.6% accuracy. For a comparison, we then held a user visit certification experiment using a QR code, which confirmed that our proposed system performs better than QR code location certification. This proposed system can thus provide restaurants and other facilities reliable user contact tracing and electronic visitor access lists in the age of COVID-19.

Development of OPAC and theories on online subject access (OPAC의 발전과정과 주제접근방법론)

  • 최달현
    • Journal of Korean Library and Information Science Society
    • /
    • v.20
    • /
    • pp.155-186
    • /
    • 1993
  • This study aims at defining the concept of OPAC, tracing of research trends and development of it, and clarifying various methods of subject access and patterns of bibliographic searching in OPAC as well as strategies for improving to implement online catalogs. Although OPAC is so far the most user-friendly bibliographic searching method, there are still a lot of issues including online subject access in particular. Therefore a more effective and useful method for computer end-users have to be developed, for instance, improvement of an indexing system, a n.0, pplication of the classification system as a searching tool, a new design and construction of standardized thesaurus, betterment of user interface, introducing of expert system into bibliographic searching, establishment of subject authority file. Those would raise the success-rate of users seeking bibliographic information in the library catalogs. Korean libraries are in very early stage of OPAC implementation so that every efforts and concerns to improve strategies and techniques for subject access to OPAC have been strongly asked.

  • PDF

Recognition of Virtual Written Characters Based on Convolutional Neural Network

  • Leem, Seungmin;Kim, Sungyoung
    • Journal of Platform Technology
    • /
    • v.6 no.1
    • /
    • pp.3-8
    • /
    • 2018
  • This paper proposes a technique for recognizing online handwritten cursive data obtained by tracing a motion trajectory while a user is in the 3D space based on a convolution neural network (CNN) algorithm. There is a difficulty in recognizing the virtual character input by the user in the 3D space because it includes both the character stroke and the movement stroke. In this paper, we divide syllable into consonant and vowel units by using labeling technique in addition to the result of localizing letter stroke and movement stroke in the previous study. The coordinate information of the separated consonants and vowels are converted into image data, and Korean handwriting recognition was performed using a convolutional neural network. After learning the neural network using 1,680 syllables written by five hand writers, the accuracy is calculated by using the new hand writers who did not participate in the writing of training data. The accuracy of phoneme-based recognition is 98.9% based on convolutional neural network. The proposed method has the advantage of drastically reducing learning data compared to syllable-based learning.

An Log Visualization Method of Network Security Equipment for Private Information Security (개인정보 보호를 위한 네트워크 보안장비의 로그 가시화 방법 연구)

  • Sim, Hee-Youn;Kim, Hyung-Jong
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.31-40
    • /
    • 2008
  • Recently, network forensic research which analyzes intrusion-related information for tracing of attackers, has been becoming more popular than disk forensic which analyzes remaining evidences in a system. Analysis and correlation of logs from firewall, IDS(Intrusion Detect System) and web server are important part in network forensic procedures. This work suggests integrated graphical user interface of network forensic for private information leakage detection. This paper shows the necessity of various log information for network forensic and a design of graphical user interface for security managers who need to monitor the leakage of private information.

  • PDF

Electronic Pen-based Cognitive Dysfunction Assessment System (전자펜을 활용한 인지기능장애 환자 검사 시스템)

  • Shin, Sangho;Jee, Haemi;Park, Jaehyun
    • KIISE Transactions on Computing Practices
    • /
    • v.24 no.1
    • /
    • pp.17-23
    • /
    • 2018
  • The assessment and rehabilitation of patients with cognitive dysfunction is a field that currently requires assistive technology. While the paper-and-pencil test, such as the line tracing test (LTT), is one of the most commonly used assessment methods for cognitive dysfunction, it has become time-consuming due to its manual characteristic. The aim of this study was therefore to establish a computer-based real-time assessment system for patients without compromising the usefulness of the conventional paper-and-pencil based user tools. A digital pen-based assessment and rehabilitation system, the ePen System, could eliminate the time required for manual assessment while maintaining the measurement accuracy. The proposed system may assist rehabilitation specialists to assess and diagnose patients with unilateral visual neglect. This system can be applied to a range of assessment and rehabilitation modalities based on pen and paper. It can also be used for various patients such as those with Parkinson's disease, stroke, or different forms of brain lesions.

Finger-Gesture Recognition Using Concentric-Circle Tracing Algorithm (동심원 추적 알고리즘을 사용한 손가락 동작 인식)

  • Hwang, Dong-Hyun;Jang, Kyung-Sik
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.12
    • /
    • pp.2956-2962
    • /
    • 2015
  • In this paper, we propose a novel algorithm, Concentric-Circle Tracing algorithm, which recognizes finger's shape and counts the number of fingers of hand using low-cost web-camera. We improve algorithm's usability by using low-price web-camera and also enhance user's comfortability by not using a additional marker or sensor. As well as counting the number of fingers, it is possible to extract finger's shape information whether finger is straight or folded, efficiently. The experimental result shows that the finger gesture can be recognized with an average accuracy of 95.48%. It is confirmed that the hand-gesture is an useful method for HCI input and remote control command.

Efficient and Secure Member Deletion in Group Signature Scheme (그룹 서명 기법에서의 효율적이고 안전한 구성원 탈퇴 방법)

  • 김현정;임종인;이동훈
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.6
    • /
    • pp.41-51
    • /
    • 2001
  • Group signature schemes allow a group member to sign messages anonymously on behalf of the group. In case of dispute, only a designated group manager can reveal the identity of the member. During last decade, group signature schemes have been intensively investigated in the literature and applied to various applications. However, there has been no scheme properly handling the situation that a group member wants to leave a group or is excluded by a group manager. As noted in[3], the complexity of member deletion stands in the way of real world applications of group signatures and the member deletion problem has been a pressing open problem. In this paper we propose an efficient group signature scheme that allows member deletion. The length of the group public key and the size of signatures all independent of the size of the group and the security of the scheme relies on the RSA assumption. In addition, the method of tracing all signatures of a specific member is introduced.

Educational Simulator for Transmission Network Use of System Charge (송전망 이용요금산정을 위한 교육용 시뮬레이터 개발)

  • Kim, H.H.;Song, H.Y.;Lee, C.J.;Park, J.B.;Shin, J.R.
    • Proceedings of the KIEE Conference
    • /
    • 2006.11a
    • /
    • pp.201-203
    • /
    • 2006
  • This paper presents a graphical windows-based software for the education and training of the transmission network use of system charge. The developed simulator consist of the main module(MMI,GUI), the power flow module(PF), the power flow tracing module(PFT) and management of usage cost DB module(UCD). Each module has a separate graphical and interactive interfacing window. To have effective education for transmission network use of system charge, the developed simulator are provided with two power system analysis methods. Input data of power system can use the format of PSS/E input data. Also calculation of power flow tracing are provided with four methods such as "Felix Wu","Modified Felix Wu", "DCLF ICRP" and "Reverse MW mile". Results of calculation for usage cost are shown on the window through the table or chart. Therefore user can confirm the detailed differences of results from each calculation method.

  • PDF

Odyssey: a new GPU-based ray-tracing code for the Kerr Spacetime

  • Pu, Hung-Yi;Yun, Kiyun;Yoon, Suk-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.39 no.2
    • /
    • pp.86.2-86.2
    • /
    • 2014
  • We present a new ray-tracing code, "Odyssey", for the Kerr spacetime accelerated by the Graphics Processing Unit (GPU). Taking advantage of the ability of nVidia graphic cards to evaluate trajectories of a large amount of photon simultaneously, the code is two orders of magnitude as fast as the previous CPU-based code corresponding to the speed of few nanoseconds per photon per time step. In the light of the Graphic User Interface (GUI) powered by the GPU-enhanced 2D/3D displaying technique, DirectX, it is feasible for users to manipulate diverse results such as rotating and zooming in/out the trajectories of photon instantly near the black hole. Thus the Odyssey can serve as a tool not only for scientific but also for the educational purpose. We discuss possible applications in detail in light of several results such as the shape of the silhouette of a black hole, the shape of a hot spot orbiting a black hole, and 3D photon trajectories.

  • PDF