• Title/Summary/Keyword: 경계선 기법

Search Result 249, Processing Time 0.023 seconds

Recognition of Tactilie Image Dependent on Imposed Force Using Fuzzy Fusion Algorithm (접촉력에 따라 변하는 Tactile 영상의 퍼지 융합을 통한 인식기법)

  • 고동환;한헌수
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.3
    • /
    • pp.95-103
    • /
    • 1998
  • This paper deals with a problem occuring in recognition of tactile images due to the effects of imposed force at a me urement moment. Tactile image of a contact surface, used for recognition of the surface type, varies depending on the forces imposed so that a false recognition may result in. This paper fuzzifies two parameters of the contour of a tactile image with the membership function formed by considering the imposed force. Two fuzzifed paramenters are fused by the average Minkowski's dist; lnce. The proposed algorithm was implemented on the multisensor system cnmposed of an optical tact le sensor and a 6 axes forceltorque sensor. By the experiments, the proposed algorithm has shown average recognition ratio greater than 869% over all imposed force ranges and object models which is about 14% enhancement comparing to the case where only the contour information is used. The pro- ~oseda lgorithm can be used for end-effectors manipulating a deformable or fragile objects or for recognition of 3D objects by implementing on multi-fingered robot hand.

  • PDF

Automatic Matching of Multi-Sensor Images Using Edge Detection Based on Thinning Algorithm (세선화 알고리즘 기반의 에지검출을 이용한 멀티센서 영상의 자동매칭)

  • Shin, Sung-Woong;Kim, Jun-Chul;Oh, Kum-Hui;Lee, Young-Ran
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.26 no.4
    • /
    • pp.407-414
    • /
    • 2008
  • This study introduces an automatic image matching algorithm that can be applied for the scale different image pairs consisting of the satellite pushbroom images and the aerial frame images. The proposed method is based on several image processing techniques such as pre-processing, filtering, edge thinning, interest point extraction, and key-descriptor matching, in order to enhance the matching accuracy and the processing speed. The proposed method utilizes various characteristics, such as the different geometry of image acquisition and the different radiometric characteristics, of the multi-sensor images. In addition, the suggested method uses the sensor model to minimize search area and eliminate false-matching points automatically.

Automatic Extraction of 3-Dimensional Road Information Using Road Pavement Markings (도로 노면표지를 이용한 3차원 도로정보 자동추출)

  • Kim, Jin-Gon;Han, Dong-Yeub;Yu, Ki-Yun;Kim, Yong-Il
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.12 no.4 s.31
    • /
    • pp.61-68
    • /
    • 2004
  • In this paper, we suggest an automatic technique to obtain 3-D road information in complex urban areas using road pavement markings. This method is composed of following three main steps. The first step is extracting the pavement markings from aerial images, the second one is matching the same pavement markings in two aerial images, and the last one is obtaining the 3-D coordinates of those using EOP(exterior orientation parameters) of aerial images. Here, we focus on the first and second step because the last step can be performed by using the well hewn collinearity condition equation. We used geometric properties and spatial relationships of the pavement markings to extract the lane line markings on the images and extracted arrow lane markings additionally using template matching. And then, we obtained 3-D coordinates of the road using relational matching for the pavement markings. In order to evaluate the accuracy of extraction, we did a visual inspection and compared the result of this technique with those measured by digital photogrammetric system.

  • PDF

Nonlinear Dynamic Behaviors of Offshore Guyed Towers (해양구조물 Guyed Tower의 비선형 동적거동)

  • Park, Woo-Sun;Pyen, Chong-Kun;Park, Young-Suk
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.3 no.3
    • /
    • pp.126-136
    • /
    • 1991
  • This study is concerned with the nonlinear dynamic behaviors of guyed towers for wave loadings. In order to analyze the nonlinear responses of guyed towers efficiently, the main tower is modeled as an equivalent stick, the guyline system is idealized as a spring with nonlinear stiffness in the horizontal direction. and the pile foundation system is represented as a linear spring in the rotational direction. The wave forces on the main tower are evaluated by using Morison's equation. In order to consider adequately the nonlinearities of the guying system and drag forces due to fluid viscosity. the analyses are performed in the time domain. The mode superposition method is adopted for solving the nonlinear equation of motion efficiently. which is based on the Newmark integration scheme. Numerical analyses are carried out to investigate the sensitivity of two major design parameters for guyed towers. i.e., the clump weight conditions and the base renditions of the tower.

  • PDF

A Study on Threat Detection Model using Cyber Strongholds (사이버 거점을 활용한 위협탐지모델 연구)

  • Inhwan Kim;Jiwon Kang;Hoonsang An;Byungkook Jeon
    • Convergence Security Journal
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2022
  • With the innovative development of ICT technology, hacking techniques of hackers are also evolving into sophisticated and intelligent hacking techniques. Threat detection research to counter these cyber threats was mainly conducted in a passive way through hacking damage investigation and analysis, but recently, the importance of cyber threat information collection and analysis is increasing. A bot-type automation program is a rather active method of extracting malicious code by visiting a website to collect threat information or detect threats. However, this method also has a limitation in that it cannot prevent hacking damage because it is a method to identify hacking damage because malicious code has already been distributed or after being hacked. Therefore, to overcome these limitations, we propose a model that detects actual threats by acquiring and analyzing threat information while identifying and managing cyber bases. This model is an active and proactive method of collecting threat information or detecting threats outside the boundary such as a firewall. We designed a model for detecting threats using cyber strongholds and validated them in the defense environment.

A Numerical Method for Analysis of the Sound and Vibration of Waveguides Coupled with External Fluid (외부 유체와 연성된 도파관의 진동 및 소음 해석 기법)

  • Ryue, Jung-Soo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.7
    • /
    • pp.448-457
    • /
    • 2010
  • Vibrations and wave propagations in waveguide structures can be analysed efficiently by using waveguide finite element (WFE) method. The WFE method only models the 2-dimensional cross-section of the waveguide with finite elements so that the size of the model and computing time are much less than those of the 3-dimensional FE models. For cylindrical shells or pipes which have simple cross-sections, the external coupling with fluids can be treated theoretically. For waveguides of complex cross-sectional geometries, however, numerical methods are required to deal with external fluids. In this numerical approach, the external fluid is modelled by the boundary elements (BEs) and connected to WFEs. In order to validate this WFE/BE method, a pipe submerged in water is considered in this study. The dispersion diagrams and point mobilities of the pipe simulated are compared to those that theoretically obtained. Also the acoustic powers radiated from the pipe are predicted and compared in both cases of air and water as an external medium.

A Stress-Based Gradient Elasticity in the Smoothed Finite Element Framework (평활화 유한요소법을 도입한 응력기반 구배 탄성론)

  • Changkye Lee;Sundararajan Natarajan
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.37 no.3
    • /
    • pp.187-195
    • /
    • 2024
  • This paper presents two-dimensional boundary value problems of the stress-based gradient elasticity within the smoothed finite element method (S-FEM) framework. Gradient elasticity is introduced to address the limitations of classical elasticity, particularly its struggle to capture size-dependent mechanical behavior at the micro/nano scale. The Ru-Aifantis theorem is employed to overcome the challenges of high-order differential equations in gradient elasticity. This theorem effectively splits the original equation into two solvable second-order differential equations, enabling its incorporation into the S-FEM framework. The present method utilizes a staggered scheme to solve the boundary value problems. This approach efficiently separates the calculation of the local displacement field (obtained over each smoothing domain) from the non-local stress field (computed element-wise). A series of numerical tests are conducted to investigate the influence of the internal length scale, a key parameter in gradient elasticity. The results demonstrate the effectiveness of the proposed approach in smoothing stress concentrations typically observed at crack tips and dislocation lines.

A Technique Getting Fast Masks Using Rough Division in Dynamic ROI Coding of JPEG2000 (JPEG2000의 동적 ROI 코딩에서 개략적인 분할을 이용한 빠른 마스크 생성 기법)

  • Park, Jae-Heung;Lee, Jum-Sook;Seo, Yeong-Geon;Hong, Do-Soon;Kim, Hyun-Joo
    • The KIPS Transactions:PartB
    • /
    • v.17B no.6
    • /
    • pp.421-428
    • /
    • 2010
  • It takes a long time for the users to view a whole image from the image server under the low-bandwidth internet environments or in case of a big sized image. In this case, as there needs a technique that preferentially transfers a part of image, JPEG2000 offers a ROI(Region-of-Interest) coding. In ROI coding, the users see the thumbnail of image from the server and specifies some regions that they want to see first. And then if an information about the regions are informed to the server, the server preferentially transfers the regions of the image. The existing methods requested a huge time to compute the mask information, but this thesis approximately computes the regions and reduces the creating time of the ROI masks. If each code block is a mixed block which ROI and background are mixed, the proper boundary points should be acquired. Searching the edges of the block, getting the two points on the edge, to get the boundary point inside the code block, the method searches a mid point between the two edge points. The proposed method doesn't have a big difference compared to the existing methods in quality, but the processing time is more speedy than the ones.

Parafovea Information Processing of Adults and Adolescents in Reading: Diffusion Model Analysis on Distributions of Eye Fixation Durations (글읽기에서 나타난 성인과 청소년의 중심와주변 정보처리: 고정시간 분포에 대한 확산모형 분석)

  • Choo, Hyeree;Koh, Sungryong
    • Korean Journal of Cognitive Science
    • /
    • v.31 no.4
    • /
    • pp.103-136
    • /
    • 2020
  • This study compares the parafovea preview effect of adolescent group and adult group with different ages using eye tracking experiment. Also, this study confirms that the starting point parameter of the one boundary diffusion model can explain the data obtained through eye tracking experiments. In two experiments, parafoveal information processing was examined using the boundary technique. In Experiment 1, reading times were compared between the conditions given high frequency words preview versus masking preview. In Experiment 2, the condition in which low frequency words were given to parafovea preview information and the condition in which parafovea preview was masked were compared. We found that both the adolescent group and the adult group showed a parafovea preview effect. Also, first fixation, single fixation, and gaze duration of the two groups were different based on the word property shown in the parafovea. The first fixation data obtained in the two experiments were divided into quantiles and fitted into one boundary diffusion model. From the results, we argue that the parafovea preview information processing in the reading was described as the starting point parameter of the one boundary diffusion model.

A Study of Production Techniques of Bronze and Gilt Bronze Buttons Excavated from Seogam-ri Tomb No. 9 (석암리 9호분 출토 청동 및 금동단추의 제작기법 연구)

  • Park, Jihye;Kwon, Yoonmi
    • Conservation Science in Museum
    • /
    • v.17
    • /
    • pp.55-68
    • /
    • 2016
  • Conservation and research efforts are currently underway at the National Museum of Korea on a series of artifacts excavated from Tomb No. 9 at Seogam-ri nearly a century ago by an archaeology team from the institution's colonialera predecessor. Among these objects are a number of bronze and gilt bronze buttons. The present study explores the production techniques used in making such buttons. Both bronze and gilt bronze buttons are hemispherical in shape and are similar in external appearance. However, their shanks differ significantly in size and cross-sectional shape, some with a round cross-section while others are square. The buttons, first sorted into two groups by each type of shank, were further subdivided by size. Analysis of round shanks has found variations in design and location as well as in shank thickness. In addition, the location where round shanks attach to buttons are usually irregular in surface. Square shanks, on the other hand, are more uniform in design and location. The shanks are typically located on the backs of buttons and attach to a groove which ostensibly serves to mark the correct position. X-ray imaging has revealed that round shanks have thick borders made from metal rather than dirt or other material. The buttons themselves appear to been cast using lost-wax technique. The ways in which each shank attaches to its respective button varies based on its cross-sectional shape.