• Title/Summary/Keyword: Combat Experiments

Search Result 42, Processing Time 0.024 seconds

게임의 근접전투에서 카메라 샷을 적용한 오클루젼 해결 기법 (An Occlusion Resolution Technique Applying Camera Shots in Close Quater Combat of the Game)

  • 김방울;조경은;엄기현
    • 한국게임학회 논문지
    • /
    • 제11권2호
    • /
    • pp.105-114
    • /
    • 2011
  • MMORPG와 같은 게임에서 근접전투가 벌어지는 샷에서 프라이머리 액터들간의 오클루젼이 종종 발생한다. 본 논문은 미디엄 샷(medium shot) 기법으로 오클루젼을 해결하고 오버-숄더 샷(over-shoulder shot) 기법으로 대결구도를 강화하는 미디엄 오버-숄더(Medium and Oversholder, MOS) 기법을 제안한다. 미디엄 샷 기법은 4개의 기준점을 설정하고. 오버-숄더 샷 기법은 측면의 기준점을 가변적으로 위치시키며 오클루더는 두 개의 스피어로 대체한다. 레이와 스피어가 교차하는지 여부로 잠재적 오클루젼 상태가 판별되면 오클루더의 우측 또는 좌측으로 카메라를 이동시키고, 오클루젼이 해결되면 이동을 멈춘다. 실험결과 MOS 기법은 샷당 평균 $13.7{\mu}s$ 의 연산시간의 성능을 보였으며, 오클루젼은 평균 9.26% 비율로 뷰어의 시선 장애에 영향을 주진 않았다.

휴먼 제어시스템의 입력형성기 설계 (Input Shaping Design for Human Control System)

  • 이석재;유준
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2006년도 심포지엄 논문집 정보 및 제어부문
    • /
    • pp.54-56
    • /
    • 2006
  • To get the robust and reliable input command, we designed shaping function for target tracking system with commander's handle. Input signals of the commander's handle are generated by human operator. It is response of the human to reduce the error between target and gun. But, tracking error while operator aim a moving target manually gives poor system performance. Input noise, particularly, affects hit accuracy as the system performance. We proposed the design method of input command shaping to reduce the Input noise and to improve the operation ability and convenience. We performed the experiments with combat vehicle, example of Target Tracking System, to show the proposed method is efficient and practical.

  • PDF

A Simple Fingerprint Fuzzy Vault for FIDO

  • Cho, Dongil
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제10권11호
    • /
    • pp.5674-5691
    • /
    • 2016
  • Fast IDentity Online(FIDO) supports biometric authentications in an online environment without transmitting biometric templates over the network. For a given FIDO client, the "Fuzzy Vault" securely stores biometric templates, houses additional biometric templates, and unlocks private keys via biometrics. The Fuzzy Vault has been extensively researched and some vulnerabilities have been discovered, such as brute force, correlation, and key inversions attacks. In this paper, we propose a simple fingerprint Fuzzy Vault for FIDO clients. By using the FIDO feature, a simple minutiae alignment, and point-to-point matching, our Fuzzy Vault provides a secure algorithm to combat a variety of attacks, such as brute force, correlation, and key inversions. Using a case study, we verified our Fuzzy Vault by using a publicly available fingerprint database. The results of our experiments show that the Genuine Acceptance Rate and the False Acceptance Rate range from 48.89% to 80% and from 0.02% to 0%, respectively. In addition, our Fuzzy Vault, compared to existing similar technologies, needed fewer attempts.

Drug Target Identification and Elucidation of Natural Inhibitors for Bordetella petrii: An In Silico Study

  • Rath, Surya Narayan;Ray, Manisha;Pattnaik, Animesh;Pradhan, Sukanta Kumar
    • Genomics & Informatics
    • /
    • 제14권4호
    • /
    • pp.241-254
    • /
    • 2016
  • Environmental microbes like Bordetella petrii has been established as a causative agent for various infectious diseases in human. Again, development of drug resistance in B. petrii challenged to combat against the infection. Identification of potential drug target and proposing a novel lead compound against the pathogen has a great aid and value. In this study, bioinformatics tools and technology have been applied to suggest a potential drug target by screening the proteome information of B. petrii DSM 12804 (accession No. PRJNA28135) from genome database of National Centre for Biotechnology information. In this regards, the inhibitory effect of nine natural compounds like ajoene (Allium sativum), allicin (A. sativum), cinnamaldehyde (Cinnamomum cassia), curcumin (Curcuma longa), gallotannin (active component of green tea and red wine), isoorientin (Anthopterus wardii), isovitexin (A. wardii), neral (Melissa officinalis), and vitexin (A. wardii) have been acknowledged with anti-bacterial properties and hence tested against identified drug target of B. petrii by implicating computational approach. The in silico studies revealed the hypothesis that lpxD could be a potential drug target and with recommendation of a strong inhibitory effect of selected natural compounds against infection caused due to B. petrii, would be further validated through in vitro experiments.

Ferutinin, an Apoptosis Inducing Terpenoid from Ferula ovina

  • Matin, Maryam Moghaddam;Nakhaeizadeh, Hossein;Bahrami, Ahamd Reza;Iranshahi, Mehrdad;Arghiani, Nahid;Rassouli, Fatemeh Behnam
    • Asian Pacific Journal of Cancer Prevention
    • /
    • 제15권5호
    • /
    • pp.2123-2128
    • /
    • 2014
  • A current hurdle in cancer management is the intrinsic or acquired resistance of cancer cells to chemical agents that restricts the efficacy of therapeutic strategies. Accordingly, there is an increasing desire to discover new natural compounds with selective toxicity to combat malignancies. In present study, the cytotoxic and apoptosis-inducing activities of ferutinin, a terpenoid derivative from Ferula ovina, were investigated on human breast (MCF7) and bladder (TCC) cancer cells as well as normal fibroblasts (HFF3).The toxicity and DNA damage inducing effects of ferutinin were studied by MTT and comet assays, DAPI and PI staining and DNA laddering. The $IC_{50}$ values of ferutinin were identified and compared with routine prescribed drugs, doxorubicin and vincristine, by MTT test. Alkaline comet assay and DAPI staining revealed DNA damage due to ferutinin, which was significantly (p<0.001) higher in MCF7 and TCC than HFF3 cells. Apoptosis induction was evidenced by PI staining and DNA laddering. Our results suggest that ferutinin could be considered as an effective anticancer agent for future in vivo and clinical experiments.

Studies of the Non-Mevalonate Pathway I. Biosynthesis of Menaquinone-7 in Bacillus subtilis II. Synthesis of Analogs of Fosmidomycin as Potential Antibacterial Agents

  • Kim, Dojung;Phillip J. Proteau
    • 한국응용약물학회:학술대회논문집
    • /
    • 한국응용약물학회 1998년도 Proceedings of UNESCO-internetwork Cooperative Regional Seminar and Workshop on Bioassay Guided Isolation of Bioactive Substances from Natural Products and Microbial Products
    • /
    • pp.158-158
    • /
    • 1998
  • The non-mevalonate pathway is a newly discovered isoprenoid biosynthetic pathway in some bacteria, cyanobacteria, algae and plants. Because isoprenoid metabolites (ubiquinone, menaquinone, undecaprenol) are essential for bacterial growth, this pathway may represent a novel target for antibacterial agents. Antibiotics with a unique mechanism of action are needed to combat the risk of antibiotic resistance that is a current worldwide problem. In order to study this pathway as viable target, it was necessary to verify use of the pathway in our model system, the bacterium Bacillus subtilis. Incubation experiments with [6,6-$^2$H$_2$]-D-glucose and [l-$^2$H$_3$]-deoxy-D-xylulose were conducted to provide labeled menaquinone-7 (MK -7), the most abundant isoprenoid in B. subtilis. $^2$H-NMR analysis of the MK-7 revealed labeling patterns that strongly support utilization of the non-mevalonate pathway. Another approach to study the pathway is by structure activity relationships of proposed inhibitors of the pathway. Fosmidomycin is a phosphonic acid with antibacterial activity known to inhibit isoprenoid biosynthesis in susceptible bacteria and may act by inhibiting the non-mevalonate pathway. Fosmidomycin and an N-methyl analog were synthesized and tested for antibacterial activity. Fosmidomycin was active against Escherichia coli and B. subtilis, while N-formyl-N-methyl-3-amino-propylphosphonic acid was inactive.

  • PDF

수동표적추적장치의 휴먼운용자 모델링 및 입력명령형성기 설계 (Human Operator Modeling and Input Command Shaping Design for Manual Target Tracking System)

  • 이석재;유준
    • 한국군사과학기술학회지
    • /
    • 제10권2호
    • /
    • pp.21-30
    • /
    • 2007
  • A practical method to design the input shaping which generates control command is proposed in this paper, We suggest an experimental technique considering human operator's target tracking error to improve aiming accuracy which significantly affects hit probability. It is known that stabilization performance is one of the most important factors for ground combat vehicle system. In particular, stabilization error of the manual target tracking system mounted on moving vehicle directly affects hit probability. To reduce this error, we applied input command shaping method using preprocessing filtering and functional curve fitting. First of all, we construct the human operator model to consider effects of human operator on our system. Input shaping curve is divided into several regions to get rid of the above problems and to improve the system performance. At example design part, we chose three steps of functional command curve and determine the parameters of the function by the proposed design method. In order to verify the proposed design method, we carried out the experiments with real plant of a fighting vehicle.

M&S를 활용한 북 소형무인기 위협에 대한 대응방안 연구 (A Study on the Countermeasures against the Threats of Small-Scale Inertia Using the M&S)

  • 김세일;신진
    • 융합보안논문지
    • /
    • 제20권1호
    • /
    • pp.77-84
    • /
    • 2020
  • 북한은 소형무인기를 2014년부터 여러 차례 침투시켰으나, 우리는 탐지/식별, 타격을 할 수 있는 시스템의 부재로 인하여 즉각적인 대응을 하지 못하였다. 지금까지 북한의 항공기는 지형추적 및 지형회피를 통해 레이더와 초병의 육안에 관측되지 않기 위해서 능선을 따라 회피 침투하여 목표물을 타격하고 복귀하는 것으로 인식되었으나 북 소형무인기는 교리적인 요소를 완전히 벗어나서 예상치 못한 고도로 레이더의 탐지를 회피하여 침투함으로서 대공방어의 문제를 야기 시켰다. 북 소형무인기 대응의 문제점 해결을 위해 M&S를 활용한 전투실험을 통해 소형무인기 탐지레이더와 식별 시 즉각 타격할 수 있는 신개념의 무기체계 개발과 탐지/식별과 타격을 동시에 할 수 있는 C2A체계를 활용하여 위협을 최소화하고, 장비 전력화와 연구를 위한 전문 연구 조직 편성으로 위협을 대비하여야 하겠다.

Transaction Mining for Fraud Detection in ERP Systems

  • Khan, Roheena;Corney, Malcolm;Clark, Andrew;Mohay, George
    • Industrial Engineering and Management Systems
    • /
    • 제9권2호
    • /
    • pp.141-156
    • /
    • 2010
  • Despite all attempts to prevent fraud, it continues to be a major threat to industry and government. Traditionally, organizations have focused on fraud prevention rather than detection, to combat fraud. In this paper we present a role mining inspired approach to represent user behaviour in Enterprise Resource Planning (ERP) systems, primarily aimed at detecting opportunities to commit fraud or potentially suspicious activities. We have adapted an approach which uses set theory to create transaction profiles based on analysis of user activity records. Based on these transaction profiles, we propose a set of (1) anomaly types to detect potentially suspicious user behaviour, and (2) scenarios to identify inadequate segregation of duties in an ERP environment. In addition, we present two algorithms to construct a directed acyclic graph to represent relationships between transaction profiles. Experiments were conducted using a real dataset obtained from a teaching environment and a demonstration dataset, both using SAP R/3, presently the predominant ERP system. The results of this empirical research demonstrate the effectiveness of the proposed approach.

Face Recognition Based on the Combination of Enhanced Local Texture Feature and DBN under Complex Illumination Conditions

  • Li, Chen;Zhao, Shuai;Xiao, Ke;Wang, Yanjie
    • Journal of Information Processing Systems
    • /
    • 제14권1호
    • /
    • pp.191-204
    • /
    • 2018
  • To combat the adverse impact imposed by illumination variation in the face recognition process, an effective and feasible algorithm is proposed in this paper. Firstly, an enhanced local texture feature is presented by applying the central symmetric encode principle on the fused component images acquired from the wavelet decomposition. Then the proposed local texture features are combined with Deep Belief Network (DBN) to gain robust deep features of face images under severe illumination conditions. Abundant experiments with different test schemes are conducted on both CMU-PIE and Extended Yale-B databases which contain face images under various illumination condition. Compared with the DBN, LBP combined with DBN and CSLBP combined with DBN, our proposed method achieves the most satisfying recognition rate regardless of the database used, the test scheme adopted or the illumination condition encountered, especially for the face recognition under severe illumination variation.