• Title/Summary/Keyword: 객체사전

Search Result 195, Processing Time 0.028 seconds

3-Dimensional Simulation for the Design of Automated Container Terminal (자동화 컨테이너터미널의 설계를 위한 3차원 시뮬레이션)

  • 최용석;하태영;양창호
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2004.04a
    • /
    • pp.471-477
    • /
    • 2004
  • In this study, we introduce a 3-dimensional simulation to support the Design on ACT(Automated Container Terminal). This simulation system developed to simulate virtual operations of ACT using 3-dimensional simulation and animate the simulated results with real time. And the developed system applied an object-oriented design and C++ programming to increase the reusability and extensibility. We select several items of performance evaluation for objects used in ACT in terms of problem detection, problem forecast, and logic feasibility, and provide evaluation points for the design of ACT.

  • PDF

The Design of the Verification Tool of the XML based Object Model Description based on Plug-in Framework (플러그인 프레임워크 환경에서의 XML 기반 객체 모델 명세서 검증 도구 설계)

  • You, Han-Kyul;Lee, Yong-Heon;Shim, Jun-Yong;Kim, Sae-Hwan
    • Annual Conference of KIPS
    • /
    • 2011.04a
    • /
    • pp.1466-1469
    • /
    • 2011
  • 플러그인 프레임워크는 기존 M&S 프레임워크에서의 문제점인 구성요소 간 높은 종속관계 및 낮은 유연성을 해결하고자 개발된 프레임워크 설계 방식으로, 프레임워크를 구성하는 컴포넌트를 플러그인으로 제공하여 구성요소의 추가 및 변경이 동적으로 이루어질 수 있게 한다. 또한 플러그인 컴포넌트간 통신을 위한 메시지 구조 정의가 실행 시점에 동적으로 결정되어, 컴포넌트 간 상호 독립적인 인터페이스를 보장해준다. 하지만, 플러그인 컴포넌트들의 조합이 이뤄진 상태에서 전체적인 메시지 연결 흐름이 원활하기 위해서는 각 컴포넌트에서 개별적으로 작성된 인터페이스에 대한 검증이 사전에 이뤄줘야 한다. 이에 본 논문에서는 XML 기반으로 작성된 객체 모델 명세서에 대한 무결성과 중복성을 검증할 수 있는 객체 모델 명세서 검증 도구에 대해 제안하고 이에 대한 설계내용을 설명하도록 한다.

Auto Labelling System using Object Segmentation Technology (객체 분할 기법을 활용한 자동 라벨링 구축)

  • Moon, Jun-hwi;Park, Seong-hyeon;Choi, Jiyoung;Shin, Wonsun;Jung, Heokyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.222-224
    • /
    • 2022
  • Deep learning-based computer vision applications in the field of object segmentation take a transfer learning method using hyperparameters and models pretrained and distributed by STOA techniques to improve performance. Custom datasets used in this process require a lot of resources, such as time and labeling, in labeling tasks to generate Ground Truth information. In this paper, we present an automatic labeling construction method using object segmentation techniques so that resources such as time and labeling can be used less to build custom datasets used in deep learning neural networks.

  • PDF

High-resolution 3D Object Reconstruction using Multiple Cameras (다수의 카메라를 활용한 고해상도 3차원 객체 복원 시스템)

  • Hwang, Sung Soo;Yoo, Jisung;Kim, Hee-Dong;Kim, Sujung;Paeng, Kyunghyun;Kim, Seong Dae
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.10
    • /
    • pp.150-161
    • /
    • 2013
  • This paper presents a new system which produces high resolution 3D contents by capturing multiview images of an object using multiple cameras, and estimating geometric and texture information of the object from the captured images. Even though a variety of multiview image-based 3D reconstruction systems have been proposed, it was difficult to generate high resolution 3D contents because multiview image-based 3D reconstruction requires a large amount of memory and computation. In order to reduce computational complexity and memory size for 3D reconstruction, the proposed system predetermines the regions in input images where an object can exist to extract object boundaries fast. And for fast computation of a visual hull, the system represents silhouettes and 3D-2D projection/back-projection relations by chain codes and 1D homographies, respectively. The geometric data of the reconstructed object is compactly represented by a 3D segment-based data format which is called DoCube, and the 3D object is finally reconstructed after 3D mesh generation and texture mapping are performed. Experimental results show that the proposed system produces 3D object contents of $800{\times}800{\times}800$ resolution with a rate of 2.2 seconds per frame.

A Study on Building Object Change Detection using Spatial Information - Building DB based on Road Name Address - (기구축 공간정보를 활용한 건물객체 변화 탐지 연구 - 도로명주소건물DB 중심으로 -)

  • Lee, Insu;Yeon, Sunghyun;Jeong, Hohyun
    • Journal of Cadastre & Land InformatiX
    • /
    • v.52 no.1
    • /
    • pp.105-118
    • /
    • 2022
  • The demand for information related to 3D spatial objects model in metaverse, smart cities, digital twins, autonomous vehicles, urban air mobility will be increased. 3D model construction for spatial objects is possible with various equipments such as satellite-, aerial-, ground platforms and technologies such as modeling, artificial intelligence, image matching. However, it is not easy to quickly detect and convert spatial objects that need updating. In this study, based on spatial information (features) and attributes, using matching elements such as address code, number of floors, building name, and area, the converged building DB and the detected building DB are constructed. Both to support above and to verify the suitability of object selection that needs to be updated, one system prototype was developed. When constructing the converged building DB, the convergence of spatial information and attributes was impossible or failed in some buildings, and the matching rate was low at about 80%. It is believed that this is due to omitting of attributes about many building objects, especially in the pilot test area. This system prototype will support the establishment of an efficient drone shooting plan for the rapid update of 3D spatial objects, thereby preventing duplication and unnecessary construction of spatial objects, thereby greatly contributing to object improvement and cost reduction.

Architecture of Collision Avoidance System between Bicycle and Moving Object by Using V2V(X) Network (V2V(X) 네트워크를 이용한 자전거와 이동 객체간 충돌 회피 시스템 구조)

  • Gu, Bon-gen
    • Journal of Platform Technology
    • /
    • v.6 no.3
    • /
    • pp.10-16
    • /
    • 2018
  • Bicycle shares road with various traffic elements like car, pedestrian and, the number of bicycle user is increasing in recent. Therefore, bicycle accident continuously increases. Especially in complex traffic environment, bicycle accident which collides with moving object such as pedestrian occupies many parts of bicycle accident in the reason that the cyclist does not recognize moving object. In this paper, to reduce or avoid the bicycle accident, we propose the architecture of bicycle collision avoidance system in which that cyclist can get the information about moving object by connecting bicycle to network of vehicles and does some action for avoiding collision. In our architecture, when traffic element such as car recognizes moving object, it decides the moving direction of object, and transfers information about moving direction via vehicles network. Bicycle collision avoidance system from our proposed architecture receives this information, and alerts to cyclist when the moving object influences the safety of bicycle.

The Processing of Spatial Joins using a Bit-map Approximation (비트맵 근사 표현을 이용한 효율적인 공간 조인)

  • 홍남희;김희수
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.2
    • /
    • pp.157-164
    • /
    • 2001
  • This paper studies on the processing of spatial joins. The spatial join operation is divided into filters and refinement steps in general. The processing of spatial joins can be greatly improved by the use of filters that reduce the polygons in order to find the intersecting ones. As a result, three possible sets of answers are identified: the positive one, the negative one and the inconclusive one. To identify all the interesting pairs of polygons with inconclusive answers, it is necessary to have access to the representation of polygons so that an exact geometry test can take place. We introduce a bit-map approximation technique to drastically reduce the computation required by the refinement step during refinement processing. Bit-map representation are used for the description of the internal, the external and the boundary regions of the polygon objects. The proposed scheme increases the chance of trivial acceptance and rejection of data objects, and reduces unnecessary disk accesses in query processing. It has been shown that the reference to the object data file can be cut down by as much as 60%.

  • PDF

An Interface Sharing Service based on Jini (Jini 기반의 인터페이스 공유 서비스)

  • 문창주;문석현;백두권
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.9 no.3
    • /
    • pp.227-240
    • /
    • 2003
  • When we develop and use the java-based distributed object system, the system developer must deploy distributed object, which is implemented to predefined interface, to network and the system user acquires reference about distributed object and changes reference to interface type. Sharing of interface is essential for these works In this paper, we propose the IRSJ(interface repository service based on jim) to improve efficiency of interface sharing at the JINI system development. the IRSJ is consisted of the java classes for JINI system and interface sharing service. If development teams perform collaborative work in short distance, the IRSJ can search interface file without information of lookup server or interface writer If development teams perform collaborative work in long distance, the IRJS can search interface with only an address of server that executes lookup service. Although the interface object not requires additional search, the interface object that failed search interface can download interface and use interface using remote event model. When the message service fails in interface search, the message service sends interface request message to a development team member who use the IRSJ automatically, so that interface sharing may be possible in short time.

Study on abnormal behavior prediction models using flexible multi-level regression (유연성 다중 회귀 모델을 활용한 보행자 이상 행동 예측 모델 연구)

  • Jung, Yu Jin;Yoon, Yong Ik
    • Journal of the Korean Data and Information Science Society
    • /
    • v.27 no.1
    • /
    • pp.1-8
    • /
    • 2016
  • In the recently, violent crime and accidental crime has been generated continuously. Consequently, people anxiety has been heightened. The Closed Circuit Television (CCTV) has been used to ensure the security and evidence for the crimes. However, the video captured from CCTV has being used in the post-processing to apply to the evidence. In this paper, we propose a flexible multi-level models for estimating whether dangerous behavior and the environment and context for pedestrians. The situation analysis builds the knowledge for the pedestrians tracking. Finally, the decision step decides and notifies the threat situation when the behavior observed object is determined to abnormal behavior. Thereby, tracking the behavior of objects in a multi-region, it can be seen that the risk of the object behavior. It can be predicted by the behavior prediction of crime.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF