• Title/Summary/Keyword: C 프레임

Search Result 716, Processing Time 0.029 seconds

Facial Expression Control of 3D Avatar using Motion Data (모션 데이터를 이용한 3차원 아바타 얼굴 표정 제어)

  • Kim Sung-Ho;Jung Moon-Ryul
    • The KIPS Transactions:PartA
    • /
    • v.11A no.5
    • /
    • pp.383-390
    • /
    • 2004
  • This paper propose a method that controls facial expression of 3D avatar by having the user select a sequence of facial expressions in the space of facial expressions. And we setup its system. The space of expression is created from about 2400 frames consist of motion captured data of facial expressions. To represent the state of each expression, we use the distance matrix that represents the distances between pairs of feature points on the face. The set of distance matrices is used as the space of expressions. But this space is not such a space where one state can go to another state via the straight trajectory between them. We derive trajectories between two states from the captured set of expressions in an approximate manner. First, two states are regarded adjacent if the distance between their distance matrices is below a given threshold. Any two states are considered to have a trajectory between them If there is a sequence of adjacent states between them. It is assumed . that one states goes to another state via the shortest trajectory between them. The shortest trajectories are found by dynamic programming. The space of facial expressions, as the set of distance matrices, is multidimensional. Facial expression of 3D avatar Is controled in real time as the user navigates the space. To help this process, we visualized the space of expressions in 2D space by using the multidimensional scaling(MDS). To see how effective this system is, we had users control facial expressions of 3D avatar by using the system. As a result of that, users estimate that system is very useful to control facial expression of 3D avatar in real-time.

Experimental activation of cryptosporidiosis in mice by immunosuppression (면역억제에 의한 마우스의 Cryptosporidium 발현 실험)

  • 채종일;신손문
    • Parasites, Hosts and Diseases
    • /
    • v.28 no.1
    • /
    • pp.31-38
    • /
    • 1990
  • Cryptosporidium, a coccidian parasite first described by Tyzzer (1907) from a laboratory mouse, has become an important human enteric pathogen causing overwhelming diarrhea especially in immunocompromised patients such as AIDS. This parasite has been reported from over 20 countries and is recognized as a cosmopolitan species. In Korea, however, thEre has been no report on human as well as animal cryptosporidiosis. This study was performed so as to verify the presence of Cryptosporidium in Korea by activating the parasite from laboratory mice by immunosuppression. Total 65 conventionally.bred ICR mice including a control (5 mice) and 3 experimental groups (20 each) were used for this study. Group I was immunosuppressed with Prednisolone injection (1 mg IM, every other day) for 7 weeks. Group II (prednisolone injection and tetracycline administration) and Group III. (prednisolone injection and trimethoprim-sulfamethoxazole administration) were prepared to observe the effect of antibacterial agents on the activation of cryptosporidiosis. In fecal examinations of mice Cryptosporidium oocysts($4-6{\mu\textrm{m}}$ in size) were detected from 1 week after the start of immunosuppression and the mice began to die. In H-E stained tissue sections of the lower jejunum, numerous very small ($2~4{\;}{\mu\textrm{m}}$), dense, ovoid or spherical, slightly basophilic bodies were seen attached on the free border of mucosal epithelial cells. In scanning and transmission electron microscopic observations, these organisms were identified as various developmental stages of Cryptosperidium. The species is considered to be C. parvum. Cryptosporidiosis was activated not only in Group I but also in Group II and III, indicating no protective effects of the antibacterial agents used, although the mice in Group II and III lived longer than those in Group I. The present study confirmed that Cryptosporidium exists in laboratory mice bred in Korea, and predicts possible occurrence of human cryptosporidiosis in Korea.

  • PDF

Flexible Body Dynamics Analysis of Agricultural Tractor Using 4-Post Road Simulator (4-Post Road Simulator 를 이용한 농용 트랙터의 유연 다물체 동역학 해석)

  • Park, Ji Soo;Lee, Kang Wook;Cho, Chong Youn;Yoon, Ji Won;Shin, Jai Yoon
    • Transactions of the KSME C: Technology and Education
    • /
    • v.3 no.2
    • /
    • pp.83-88
    • /
    • 2015
  • Agricultural tractors are utilized on rough road such as rice paddy field. Therefore, static and dynamic load should be considered when simulating structural analysis with finite element analysis (FEA). But it consumes a lot of time and effort to measure dynamic load because of difficulty and complexity in modeling various field working load conditions and kinematics of machinery. In this paper, to reduce the efforts, 4-post road simulator is developed for agricultural tractor like modeling commercial vehicle. In proving ground test in our facility, I measured acceleration of front/rare axle and strain of body frame to validate input loads. The acceleration is used for defining input loads. And strain is validated with dynamics analysis including mode superposition method. As a result, I was able to calculate 4-post input road profiles, which represent similar proving ground profile with good reliability.

Secure Jini Service Architecture Providing Ubiquitous Services Having Persistent States (유비쿼터스 서비스 상태지속을 지원하는 안전한 Jini 서비스 구조)

  • Kim, Sung-Ki;Jung, Jin-Chul;Park, Kyung-No;Min, Byoung-Joon
    • The KIPS Transactions:PartC
    • /
    • v.15C no.3
    • /
    • pp.157-166
    • /
    • 2008
  • The ubiquitous service environment is poor in reliability of connection and also has a high probability that the intrusion against a system and the failure of the services may happen. Therefore, It is very important to guarantee that the legitimate users make use of trustable services from the viewpoint of security without discontinuance or obstacle of the services. In this paper, we point out the problems in the standard Jini service environment and analyze the Jgroup/ARM framework that has been developed in order to help fault tolerance of Jini services. In addition, we propose a secure Jini service architecture to satisfy the security, availability and quality of services on the basis of the analysis. The secure Jini service architecture we propose in this paper is able to protect a Jini system not only from faults such as network partition or server crash, but also from attacks exploiting flaws. It provides security mechanism for dynamic trust establishment among the service entities. Moreover, our secure Jini service architecture does not incur high computation costs to merge the user service states because of allocation of the replica based on each session of a user. Through the experiment on a test-bed, we have confirmed that proposed secure Jini service architecture is able to guarantee the persistence of the user service states at the level that the degradation of services quality is ignorable.

Vulnerability Analysis and Detection Mechanism against Denial of Sleep Attacks in Sensor Network based on IEEE 802.15.4 (IEEE 802.15.4기반 센서 네트워크에서 슬립거부 공격의 취약성 분석 및 탐지 메커니즘)

  • Kim, A-Reum;Kim, Mi-Hui;Chae, Ki-Joon
    • The KIPS Transactions:PartC
    • /
    • v.17C no.1
    • /
    • pp.1-14
    • /
    • 2010
  • IEEE 802.15.4[1] has been standardized for the physical layer and MAC layer of LR-PANs(Low Rate-Wireless Personal Area Networks) as a technology for operations with low power on sensor networks. The standardization is applied to the variety of applications in the shortrange wireless communication with limited output and performance, for example wireless sensor or virtual wire, but it includes vulnerabilities for various attacks because of the lack of security researches. In this paper, we analyze the vulnerabilities against the denial of sleep attacks on the MAC layer of IEEE 802.15.4, and propose a detection mechanism against it. In results, we analyzed the possibilities of denial of sleep attacks by the modification of superframe, the modification of CW(Contention Window), the process of channel scan or PAN association, and so on. Moreover, we comprehended that some of these attacks can mount even though the standardized security services such as encryption or authentication are performed. In addition to, we model for denial of sleep attacks by Beacon/Association Request messages, and propose a detection mechanism against them. This detection mechanism utilizes the management table consisting of the interval and node ID of request messages, and signal strength. In simulation results, we can show the effect of attacks, the detection possibility and performance superiorities of proposed mechanism.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.

A Research on RC3(RMF-CMMC Common Compliance) meta-model development in preparation for Defense Cybersecurity (국방 사이버보안을 위한 RMF-CMMC 공통규정준수 메타모델 개발방안 연구)

  • Jae-yoon Hwang;Hyuk-jin Kwon
    • Journal of Internet Computing and Services
    • /
    • v.25 no.1
    • /
    • pp.123-136
    • /
    • 2024
  • The U.S. Department of Defense, leading global cybersecurity policies, has two main cybersecurity frameworks: the Cybersecurity Maturity Model Certification (CMMC) for external defense industry certification, and the Risk Management Framework (RMF) for internal organizational security assessments. For Republic of Korea military, starting from 2026, the Korean version of RMF (K-RMF) will be fully implemented. Domestic defense industry companies participating in projects commissioned by the U.S. Department of Defense must obtain CMMC certification by October 2025. In this paper, a new standard compliance meta-model (R3C) development methodology that can simultaneously support CMMC and RMF security audit readiness tasks is introduced, along with the implementation results of a compliance solution based on the R3C meta-model. This research is based on practical experience with the U.S. Department of Defense's cybersecurity regulations gained during the joint project by the South Korean and U.S. defense ministries' joint chiefs of staff since 2022. The developed compliance solution functions are being utilized in joint South Korean-U.S. military exercises. The compliance solution developed through this research is expected to be available for sale in the private sector and is anticipated to be highly valuable for domestic defense industry companies that need immediate CMMC certification.

Measurement of the Movement Speed and Density of People on a Building Corridor (건물 복도에서의 밀도와 이동속도 측정)

  • Kim, Woon Hyung;Lee, Gyu Hong;Kim, Jong Hoon
    • Fire Science and Engineering
    • /
    • v.31 no.1
    • /
    • pp.36-41
    • /
    • 2017
  • In this study, the experimental measurements from a one-way moving experiment showed that the average movement speed was 0.55 m/s with an average crowd density of $2.36P/m^2$ in a corridor. The cCalculation result of the correlations between the crowd density and movement speed from the SFPE Handbook showed an average of 0.53 m/s. The difference between the calculation and experiment was 0.02 m/s. A comparison of each data set showed that the maximum difference was 0.38 m/s. Some experimental results showed that the crowd density increased with increasing movement speed and the average data from the entire experiment time was used for the analysis. When the short time interval for frame by frame analysis for video files was conducted, the experimental data was expected to be more reliable.

Thermal Vacuum Test and Thermal Analysis for a Qualification Model of Cube-satellite STEP Cube Lab. (큐브위성 STEP Cube Lab.의 임무 탑재체 인증모델의 열진공시험 및 열모델 보정을 통한 궤도 열해석)

  • Kang, Soo-Jin;Ha, Heon-Woo;Han, Sung-Hyun;Seo, Joung-Ki;Oh, Hyun-Ung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.44 no.2
    • /
    • pp.156-164
    • /
    • 2016
  • Qualification model(QM) of main payloads including concentrating photovoltaic system using fresnel lens, heating wire cutting type shockless holding and release mechanism, and MEMS-based solid propellant thruster have been developed for the STEP Cube Lab.(Cube Laboratory for Space Technology Experimental Project), which is a pico-class satellite for verification of core space technologies. In this study, we have verified structural safety and functionality of the developed payloads under a qualification temperature range through the QM thermal vacuum test. Additionally, a reliability of thermal model of the payloads has been confirmed by performing a thermal correlation based on the thermal balance test results.

Multidisciplinary Design Optimization of Vehicle Front Suspension System Using PIDO Technology (PIDO 기술을 이용한 차량 전륜 현가계의 다분야통합최적설계)

  • Lee, Gab-Seong;Park, Jung-Min;Choi, Byung-Lyul;Choi, Dong-Hoon;Nam, Chan-Hyuk;Kim, Gi-Hoon
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.20 no.6
    • /
    • pp.1-8
    • /
    • 2012
  • Multidisciplinary design optimization (MDO) for a suspension component of the vehicle front suspension was performed in this research. Shapes and thicknesses of the subframe were optimized to satisfy multi-disciplinary design requirements; weight, fatigue, crash, noise, vibration, and harshness (NVH), and kinematic and compliance (K&C). Analyses procedures of the performance disciplines were integrated and automated by using the process integration and design optimization (PIDO) technique, and the integrated and automated analyses environments enabled various types of analytic design methodologies for solving the MDO problem. We applied an approximate optimization technique which involves sequential sampling and metamodeling. Since the design variables for thicknesses should be dealt as discrete variables. the evolutionary algorithm is selected as optimization technique. The MDO problem was formulated three types of problems according to the order of priorities among the performance disciplines, and the results of MDO provided design alternatives for various design situations.