Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.21
Yoon Bae Lee, V. Mariappan, Juphil Cho, S. Lee
Recent development in multi-channel surround is emerging in various formats to provide better stereoscopic and sound effects to consumers in recent broadcasting. The ability sound localize the sound sources in space is most considerable design factor on multi-channel surround system for human earing perception model. However, this paper propose the change of the sound localization according to the spacing of the speakers, which is not covered in the existing research focus on sound system design. Presently the sound system uses the position and number of the speakers to localize the sound. In the multi-channel surround environment, the proposed design uses the sound localization is caused by the directional characteristics of the speaker, the distance between the speakers and the distance between the listener and the speaker according to the directivity is required. The proposed design is simulated using virtual measurement with MATLAB simulation environment and performances are measured.
{"title":"Environment Adaptive Sound Localization for Multi-Channel Surround Sound System","authors":"Yoon Bae Lee, V. Mariappan, Juphil Cho, S. Lee","doi":"10.7236/IJASC.2016.5.4.21","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.21","url":null,"abstract":"Recent development in multi-channel surround is emerging in various formats to provide better stereoscopic and sound effects to consumers in recent broadcasting. The ability sound localize the sound sources in space is most considerable design factor on multi-channel surround system for human earing perception model. However, this paper propose the change of the sound localization according to the spacing of the speakers, which is not covered in the existing research focus on sound system design. Presently the sound system uses the position and number of the speakers to localize the sound. In the multi-channel surround environment, the proposed design uses the sound localization is caused by the directional characteristics of the speaker, the distance between the speakers and the distance between the listener and the speaker according to the directivity is required. The proposed design is simulated using virtual measurement with MATLAB simulation environment and performances are measured.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125858734","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.54
J. Ho
Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.
{"title":"Code-Reuse Attack Detection Using Kullback-Leibler Divergence in IoT","authors":"J. Ho","doi":"10.7236/IJASC.2016.5.4.54","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.54","url":null,"abstract":"Code-reuse attacks are very dangerous in various systems. This is because they do not inject malicious codes into target systems, but reuse the instruction sequences in executable files or libraries of target systems. Moreover, code-reuse attacks could be more harmful to IoT systems in the sense that it may not be easy to devise efficient and effective mechanism for code-reuse attack detection in resource-restricted IoT devices. In this paper, we propose a detection scheme with using Kullback-Leibler (KL) divergence to combat against code-reuse attacks in IoT. Specifically, we detect code-reuse attacks by calculating KL divergence between the probability distributions of the packets that generate from IoT devices and contain code region addresses in memory system and the probability distributions of the packets that come to IoT devices and contain code region addresses in memory system, checking if the computed KL divergence is abnormal.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"57 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"122892355","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.40
Darius Sim, S. Shin
{"title":"Implementation of Algorithm to Write Articles by Stock Robot","authors":"Darius Sim, S. Shin","doi":"10.7236/IJASC.2016.5.4.40","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.40","url":null,"abstract":"","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"83 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115758351","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.26
Kibong Jung, S. Shin
In a cloud computing environment, a cryptographic service allows an information owner to encrypt the information and send it to a cloud server as well as to receive and decode encrypted data from the server which guarantees the confidentiality of shared information. However, if an attacker gains a coded data and has access to an encryption key via cloud server, then the server will be unable to prevent data leaks by a cloud service provider. In this paper, we proposed a key management server which does not allow an attacker to access to a coded key of the owners and prevents data leaks by a cloud service provider. A key management server provides a service where a server receives a coded public key of an information user from an owner and delivers a coded key to a user. Using a key management server proposed in this paper, we validated that the server can secure the confidentiality of an encryption key of data owners and efficiently distribute keys to data users
{"title":"Key Management Server Design for Providing Cryptographic Service in Cloud Computing Environment (Services in a Cloud Environment)","authors":"Kibong Jung, S. Shin","doi":"10.7236/IJASC.2016.5.4.26","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.26","url":null,"abstract":"In a cloud computing environment, a cryptographic service allows an information owner to encrypt the information and send it to a cloud server as well as to receive and decode encrypted data from the server which guarantees the confidentiality of shared information. However, if an attacker gains a coded data and has access to an encryption key via cloud server, then the server will be unable to prevent data leaks by a cloud service provider. In this paper, we proposed a key management server which does not allow an attacker to access to a coded key of the owners and prevents data leaks by a cloud service provider. A key management server provides a service where a server receives a coded public key of an information user from an owner and delivers a coded key to a user. Using a key management server proposed in this paper, we validated that the server can secure the confidentiality of an encryption key of data owners and efficiently distribute keys to data users","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"118 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134066365","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.66
H. Yeom
When tooth grinding occurs, electrical stimulation is given at the same time, and tooth grinding stops on such stimulation. Electromyography signals are used as control signals of electrical stimulation to disturb tooth grinding. However because of the electrical stimulation, the M-waves are generated and mixed with spontaneous electromyogram. In this study, we designed an optimal filter to remove M-wave and conserve spontaneous electromyogram simultaneously. The inverse power method (IPM) showed that the optimal filter coefficient is the eigenvector corresponding to the minimum eigenvalue of the input covariance matrix. In order to evaluate the performance of the optimal filter, we compared using a conventional band pass filter and adaptive filter using least mean square algorithm. The experimental results show that the optimal filter can effectively remove the M-wave compared to the previously studied prediction error filter it in practice because of cost and difficulties in the examination method. We can define the EMG signal generated at the beginning of ejaculation as a voluntary EMG signal. There is a signals. It is shown that the optimization process with two constraints is the same as that of a typical eigenfilter design. Finally, the optimal filter has an eigenvector corresponding to the minimum eigenvalue of the input covariance matrix as a coefficient. We also propose a method for adaptively implementing the proposed optimal filter using inverse power method (IPM). And we verify the optimization of the proposed method through experimental process using simulation data.
{"title":"Optimal Adaptive Filter Design of M-wave Elimination for Treating Tooth Grinding","authors":"H. Yeom","doi":"10.7236/IJASC.2016.5.4.66","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.66","url":null,"abstract":"When tooth grinding occurs, electrical stimulation is given at the same time, and tooth grinding stops on such stimulation. Electromyography signals are used as control signals of electrical stimulation to disturb tooth grinding. However because of the electrical stimulation, the M-waves are generated and mixed with spontaneous electromyogram. In this study, we designed an optimal filter to remove M-wave and conserve spontaneous electromyogram simultaneously. The inverse power method (IPM) showed that the optimal filter coefficient is the eigenvector corresponding to the minimum eigenvalue of the input covariance matrix. In order to evaluate the performance of the optimal filter, we compared using a conventional band pass filter and adaptive filter using least mean square algorithm. The experimental results show that the optimal filter can effectively remove the M-wave compared to the previously studied prediction error filter it in practice because of cost and difficulties in the examination method. We can define the EMG signal generated at the beginning of ejaculation as a voluntary EMG signal. There is a signals. It is shown that the optimization process with two constraints is the same as that of a typical eigenfilter design. Finally, the optimal filter has an eigenvector corresponding to the minimum eigenvalue of the input covariance matrix as a coefficient. We also propose a method for adaptively implementing the proposed optimal filter using inverse power method (IPM). And we verify the optimization of the proposed method through experimental process using simulation data.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"133845509","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.10
Jaeung Lee, H. Yeom
Among the methods of treating tinnitus, the transcutaneous clectrical nerve stimulation (TENS) method of treating by electrical stimulation is common. However, there is a problem that surgical operation is required to stimulate the vagus nerve (VN) main trunk near most of the bronchus. Alternatively, we found that the same effect could be achieved by electrically stimulating the vagus nerve VN branch (Arnold's nerve) distributed in the outer ear. The TENS system for stimulation of vagus nerve has been developed, but it has not been able to implement to stimulate as a parameter optimized for the patient by simultaneously playing the sound of eliminating the tinnitus frequency. Therefore, in this paper, it is important to develop a safe and practical TENS device for tinnitus treatment based on a 32-bit microprocessor that simultaneously applies non-invasive and notched sounds and to develop optimal treatment methods for treating tinnitus.
{"title":"Transcutaneous Electrical Nerve Stimulation System for Treating Tinnitus based on the Cortex-M4 Microcontroller","authors":"Jaeung Lee, H. Yeom","doi":"10.7236/IJASC.2016.5.4.10","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.10","url":null,"abstract":"Among the methods of treating tinnitus, the transcutaneous clectrical nerve stimulation (TENS) method of treating by electrical stimulation is common. However, there is a problem that surgical operation is required to stimulate the vagus nerve (VN) main trunk near most of the bronchus. Alternatively, we found that the same effect could be achieved by electrically stimulating the vagus nerve VN branch (Arnold's nerve) distributed in the outer ear. The TENS system for stimulation of vagus nerve has been developed, but it has not been able to implement to stimulate as a parameter optimized for the patient by simultaneously playing the sound of eliminating the tinnitus frequency. Therefore, in this paper, it is important to develop a safe and practical TENS device for tinnitus treatment based on a 32-bit microprocessor that simultaneously applies non-invasive and notched sounds and to develop optimal treatment methods for treating tinnitus.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"15 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115371439","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
In order to reconstruct a 3D model in video sequences, to select key frames that are easy to estimate a geometric model is essential. This paper proposes a method to easily extract informative frames from a handheld video. The method combines selection criteria based on appropriate-baseline determination between frames, frame jumping for fast searching in the video, geometric robust information criterion (GRIC) scores for the frame-to-frame homography and fundamental matrix, and blurry-frame removal. Through experiments with videos taken in indoor space, the proposed method shows creating a more robust 3D point cloud than existing methods, even in the presence of motion blur and degenerate motions.
{"title":"Fast key-frame extraction for 3D reconstruction from a handheld video","authors":"Jongho Choi, Soon-chul Kwon, Kwang-Chul Son, Jisang Yoo","doi":"10.7236/IJASC.2016.5.4.1","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.1","url":null,"abstract":"In order to reconstruct a 3D model in video sequences, to select key frames that are easy to estimate a geometric model is essential. This paper proposes a method to easily extract informative frames from a handheld video. The method combines selection criteria based on appropriate-baseline determination between frames, frame jumping for fast searching in the video, geometric robust information criterion (GRIC) scores for the frame-to-frame homography and fundamental matrix, and blurry-frame removal. Through experiments with videos taken in indoor space, the proposed method shows creating a more robust 3D point cloud than existing methods, even in the presence of motion blur and degenerate motions.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"6 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"115497342","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.32
Seung Ho Lee, S. Shin
Machine learning is a field of artificial intelligence (AI), and a technology that collects, forecasts, and analyzes securities data is developed upon machine learning. The difference between using machine learning and not using machine learning is that machine learning—seems similar to big data—studies and collects data by itself which big data cannot do. Machine learning can be utilized, for example, to recognize a certain pattern of an object and find a criminal or a vehicle used in a crime. To achieve similar intelligent tasks, data must be more effectively collected than before. In this paper, we propose a method of effectively collecting data. The study suggested web crawling and a tool to do web crawling for securities data extraction. This method develops a mechanism of securities data extraction using a tool, effectively manages individual stock data, and helps an individual investor to make an investment. Big data has been in use very widely, and securities data will be converted into big data and used as widely as big data for data extraction. Investors can create data of wanted items and verify the wanted items using past data. This mechanism enables past data extraction to support a decision making process during an actual trade based on data of proper prices of buy, sell, trading volume, and closing price.
{"title":"An Effective Data Model for Forecasting and Analyzing Securities Data","authors":"Seung Ho Lee, S. Shin","doi":"10.7236/IJASC.2016.5.4.32","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.32","url":null,"abstract":"Machine learning is a field of artificial intelligence (AI), and a technology that collects, forecasts, and analyzes securities data is developed upon machine learning. The difference between using machine learning and not using machine learning is that machine learning—seems similar to big data—studies and collects data by itself which big data cannot do. Machine learning can be utilized, for example, to recognize a certain pattern of an object and find a criminal or a vehicle used in a crime. To achieve similar intelligent tasks, data must be more effectively collected than before. In this paper, we propose a method of effectively collecting data. The study suggested web crawling and a tool to do web crawling for securities data extraction. This method develops a mechanism of securities data extraction using a tool, effectively manages individual stock data, and helps an individual investor to make an investment. Big data has been in use very widely, and securities data will be converted into big data and used as widely as big data for data extraction. Investors can create data of wanted items and verify the wanted items using past data. This mechanism enables past data extraction to support a decision making process during an actual trade based on data of proper prices of buy, sell, trading volume, and closing price.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"173 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"124238989","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.15
Cheolyong Kang, V. Mariappan, Juphil Cho, S. Lee
When a virtual sound source for 3D auditory system is reproduced by a linear loudspeaker array, listeners can perceive not only the direction of the source, but also its distance. Control over perceived distance has often been implemented via the adjustment of various acoustic parameters, such as loudness, spectrum change, and the direct-to-reverberant energy ratio; however, there is a neglected yet powerful cue to the distance of a nearby virtual sound source that can be manipulated for sources that are positioned away from the listener's median plane. This paper address the problem of generating binaural signals for moving sources in closed or in open environments. The proposed perceptual enhancement algorithm composed of three main parts is developed: propagation, reverberation and the effect of the head, torso and pinna. For propagation the effect of attenuation due to distance and molecular air-absorption is considered. Related to the interaction of sounds with the environment, especially in closed environments is reverberation. The effects of the head, torso and pinna on signals that arrive at the listener are also objectives of the consideration. The set of HRTF that have been used to simulate the virtual sound source environment for 3D auditory system. Special attention has been given to the modelling and interpolation of HRTFs for the generation of new transfer functions and definition of trajectories, definition of closed environment, etc. also be considered for their inclusion in the program to achieve realistic binaural renderings. The evaluation is implemented in MATLAB.
{"title":"Listener Auditory Perception Enhancement using Virtual Sound Source Design for 3D Auditory System","authors":"Cheolyong Kang, V. Mariappan, Juphil Cho, S. Lee","doi":"10.7236/IJASC.2016.5.4.15","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.15","url":null,"abstract":"When a virtual sound source for 3D auditory system is reproduced by a linear loudspeaker array, listeners can perceive not only the direction of the source, but also its distance. Control over perceived distance has often been implemented via the adjustment of various acoustic parameters, such as loudness, spectrum change, and the direct-to-reverberant energy ratio; however, there is a neglected yet powerful cue to the distance of a nearby virtual sound source that can be manipulated for sources that are positioned away from the listener's median plane. This paper address the problem of generating binaural signals for moving sources in closed or in open environments. The proposed perceptual enhancement algorithm composed of three main parts is developed: propagation, reverberation and the effect of the head, torso and pinna. For propagation the effect of attenuation due to distance and molecular air-absorption is considered. Related to the interaction of sounds with the environment, especially in closed environments is reverberation. The effects of the head, torso and pinna on signals that arrive at the listener are also objectives of the consideration. The set of HRTF that have been used to simulate the virtual sound source environment for 3D auditory system. Special attention has been given to the modelling and interpolation of HRTFs for the generation of new transfer functions and definition of trajectories, definition of closed environment, etc. also be considered for their inclusion in the program to achieve realistic binaural renderings. The evaluation is implemented in MATLAB.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"23 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125571160","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Pub Date : 2016-12-31DOI: 10.7236/IJASC.2016.5.4.57
H. Kang, Dae-Won Park, Sang-Hyun Lee
This paper aims to improve the quality of cultural experience by providing a three - dimensional guide service that enables users to experience themselves without additional guides and cultural commentators using the latest mobile IT technology to enhance understanding of cultural heritage. In this paper, we propose a method of constructing cultural contents based on location information such as user / cultural heritage using markerless tracking based augmented reality and GPS. We use marker detection technology and markerless tracking technology to recognize smart augmented reality object accurately and accurate recognition according to the state of cultural heritage, and also use Android 's Google map to locate the user. The purpose of this paper is to produce content for introducing cultural heritage using GPS and augmented reality based on Android. It can be used in combination with various objects beyond the limitation of existing augmented reality contents.
{"title":"Development of Cultural Contents using Auger Reality Based Markerless Tracking","authors":"H. Kang, Dae-Won Park, Sang-Hyun Lee","doi":"10.7236/IJASC.2016.5.4.57","DOIUrl":"https://doi.org/10.7236/IJASC.2016.5.4.57","url":null,"abstract":"This paper aims to improve the quality of cultural experience by providing a three - dimensional guide service that enables users to experience themselves without additional guides and cultural commentators using the latest mobile IT technology to enhance understanding of cultural heritage. In this paper, we propose a method of constructing cultural contents based on location information such as user / cultural heritage using markerless tracking based augmented reality and GPS. We use marker detection technology and markerless tracking technology to recognize smart augmented reality object accurately and accurate recognition according to the state of cultural heritage, and also use Android 's Google map to locate the user. The purpose of this paper is to produce content for introducing cultural heritage using GPS and augmented reality based on Android. It can be used in combination with various objects beyond the limitation of existing augmented reality contents.","PeriodicalId":297506,"journal":{"name":"The International Journal of Advanced Smart Convergence","volume":"321 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2016-12-31","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123199209","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}