• 제목/요약/키워드: Command Pattern

Search Result 71, Processing Time 0.023 seconds

Dynamic Manipulation of a Virtual Object in Marker-less AR system Based on Both Human Hands

  • Chun, Jun-Chul;Lee, Byung-Sung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.4
    • /
    • pp.618-632
    • /
    • 2010
  • This paper presents a novel approach to control the augmented reality (AR) objects robustly in a marker-less AR system by fingertip tracking and hand pattern recognition. It is known that one of the promising ways to develop a marker-less AR system is using human's body such as hand or face for replacing traditional fiducial markers. This paper introduces a real-time method to manipulate the overlaid virtual objects dynamically in a marker-less AR system using both hands with a single camera. The left bare hand is considered as a virtual marker in the marker-less AR system and the right hand is used as a hand mouse. To build the marker-less system, we utilize a skin-color model for hand shape detection and curvature-based fingertip detection from an input video image. Using the detected fingertips the camera pose are estimated to overlay virtual objects on the hand coordinate system. In order to manipulate the virtual objects rendered on the marker-less AR system dynamically, a vision-based hand control interface, which exploits the fingertip tracking for the movement of the objects and pattern matching for the hand command initiation, is developed. From the experiments, we can prove that the proposed and developed system can control the objects dynamically in a convenient fashion.

Application of Contract Net Protocol to the Design and Simulation of Network Security Model (계약망 프로토콜을 적용한 네트워크 보안 모델의 설계와 시뮬레이션)

  • 서경진;조대호
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.4
    • /
    • pp.25-40
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the general simulation environment of network security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls the execution of agents or a contractee, who performs intrusion detection. In the network security model, each model of simulation environment is hierarchically designed by DEVS(Discrete Event system Specification) formalism. The purpose of this simulation is that the application of rete pattern-matching algorithm speeds up the inference cycle phases of the intrusion detection expert system and we evaluate the characteristics and performance of CNP architecture with rete pattern-matching algorithm.

  • PDF

Application of Contract Net Protocol to the Design and Simulation of Network Security Model

  • Suh, Kyong-jin;Cho, Tae-ho
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.197-206
    • /
    • 2003
  • With the growing usage of the networks, the world-wide Internet has become the main means to exchange data and carry out transactions. It has also become the main means to attack hosts. To solve the security problems which occur in the network such as Internet, we import software products of network security elements like an IDS (Intrusion Detection System) and a firewall. In this paper, we have designed and constructed the General Simulation Environment of Network Security model composed of multiple IDSes and a firewall which coordinate by CNP (Contract Net Protocol) for the effective detection of the intrusion. The CNP, the methodology for efficient integration of computer systems on heterogeneous environment such as distributed systems, is essentially a collection of agents, which cooperate to resolve a problem. Command console in the CNP is a manager who controls tie execution of agents or a contractee, who performs intrusion detection. In the Network Security model, each model of simulation environment is hierarchically designed by DEVS (Discrete EVent system Specification) formalism. The purpose of this simulation is to evaluate the characteristics and performance of CNP architecture with rete pattern matching algorithm and the application of rete pattern matching algorithm for the speeding up the inference cycle phases of the intrusion detection expert system.

  • PDF

A Design and Implementation of JiKU/XML Object-oriented Code Generator Using for Design Pattern (디자인 패턴을 이용한 JiKU/XML 객체지향코드 생성기 설계 및 구현)

  • Sun, Su-Kyun
    • The KIPS Transactions:PartD
    • /
    • v.11D no.4
    • /
    • pp.907-916
    • /
    • 2004
  • The present code generation system, developing based on single system, Is not easy for developers or maintenance men to share pattern design information in distribution environment. So in this paper, we design and implement XML as basis of web environment, and JiKU/XML object-oriented code generator using pattern design. We use UML to change pattern design to XML code, and create code, suitable to PIML command, to generate design information designed by UML into XML code. This JiKU/XML Object-oriented Code Generator makes 10-step codes, and can be easily applied to web environment. It complements the disadvantage of present generator, F77/J++, and makes standardization of design because it uses UML and design pattern information. We compare it with present system by implement Eases, and as a result, generator suggested in this study gives more effective function.

A Study on Maternal Verbal Control Pattens and Children's Recognition against those (어머니의 언어통제유형과 그에 대한 아동의 인지 연구)

  • 이희자
    • Journal of the Korean Home Economics Association
    • /
    • v.30 no.4
    • /
    • pp.231-247
    • /
    • 1992
  • A Study on Maternal Verbal Control Patterns and Children's Recognition against those. The primary objective of the material presented in this dissertation is the analysis of the maternal verbal control patterns. The major focus is given to the differences between maternal verbal control patterns and children's recognition against those. The purspoe of this study were; 1) to investigate the maternal verbal control patterns recognized by children according to their family and personal surroundings; 2) to investigate the verbal control patterns in mother's response according to the differences of family and personal surroundings; 3) to find the differences between children's recognition and maternal verbal control patterns; 4) How the maternal verbal control patterns recognized by children are? The materials of this study were 81(37; boys, 44; girl)) from kindergarten in Seou. The sample of age used in this study was 5 to 7 years old. The test about maternal verbal environment used the question sheet for reaction between mother and children by Gumperz. The kids got interviews with same questions as mothers with question sheet. The statistical tools used is the analysis of the data were frequency, crosstab, and t-test. The result of the study were summarized as follows; 1) The maternal verbal control patterns recognized by children had differences according to whether living with grand-parent or not. Living with grand-parent are more person-oriented than without grand-parent group. 2) The maternal verbal control patterns of mother response show the differences within mother's academic background, present situation of child, and parent's expection to child. The imperative verbal control pattern was more frequently used of low academic background who just fraduate the middle or high school. The personal verbal control pattern was more frequently used of high educational background's like university graduate or more educated group. 3) The differences between maternal verbal control patterns with children's recognition and with mother response is that mother responseis more person-oriented than children's. 4) The imperative verbal control pattern used command, verbal purnishment, and physical purnishment. the status-oriented verbal control pattern used univesal positional appeals and limited positional appeals. The person-oriented verbal control pattern used child-oriented cognitive affective appeals.

  • PDF

Development of a Modular-type Knee-assistive Wearable System (무릎근력 지원용 모듈식 웨어러블 시스템 개발)

  • Yu, Seung-Nam;Han, Jung-Soo;Han, Chang-Soo
    • Journal of the Ergonomics Society of Korea
    • /
    • v.29 no.3
    • /
    • pp.357-364
    • /
    • 2010
  • This study proposes a lower-limb exoskeleton system that is controlled by a wearer's muscle activity. This system is designed by following procedure. First, analyze the muscle activation patterns of human leg while walking. Second, select the adequate actuator to support the human walking based on calculation of required force of knee joint for step walking. Third, unit type knee and ankle orthotics are integrated with selected actuator. Finally, using this knee-assistive system (KAS) and developed muscle stiffness sensors (MSS), the muscle activity pattern of the subject is analyzed while he is walking on the stair. This study proposes an operating algorithm of KAS based on command signal of MSS which is generated by motion intent of human. A healthy and normal subject walked while wearing the developed powered-knee exoskeleton on his/her knees, and measured effectively assisted plantar flexor strength of the subject's knees and those neighboring muscles. Finally, capabilities and feasibility of the KAS are evaluated by testing the adapted motor pattern and the EMG signal variance while walking with exoskeleton. These results shows that developed exoskeleton which controlled by muscle activity could help human's walking acceptably.

HAS-Analyzer: Detecting HTTP-based C&C based on the Analysis of HTTP Activity Sets

  • Kim, Sung-Jin;Lee, Sungryoul;Bae, Byungchul
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1801-1816
    • /
    • 2014
  • Because HTTP-related ports are allowed through firewalls, they are an obvious point for launching cyber attacks. In particular, malware uses HTTP protocols to communicate with their master servers. We call this an HTTP-based command and control (C&C) server. Most previous studies concentrated on the behavioral pattern of C&Cs. However, these approaches need a well-defined white list to reduce the false positive rate because there are many benign applications, such as automatic update checks and web refreshes, that have a periodic access pattern. In this paper, we focus on finding new discriminative features of HTTP-based C&Cs by analyzing HTTP activity sets. First, a C&C shows a few connections at a time (low density). Second, the content of a request or a response is changed frequently among consecutive C&Cs (high content variability). Based on these two features, we propose a novel C&C analysis mechanism that detects the HTTP-based C&C. The HAS-Analyzer can classify the HTTP-based C&C with an accuracy of more than 96% and a false positive rate of 1.3% without using any white list.

The Trace Algorithm of Mobile Robot Using Neural Network (신경 회로망을 이용한 Mobile Robot의 추종 알고리즘)

  • 남선진;김성현;김성주;김용민;전홍태
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.267-270
    • /
    • 2001
  • In this paper, we propose the self-autonomous algorithm for mobile robot system. The proposed mobile robot system which is teamed by learning with the neural networks can trace the target at the same distances. The mobile robot can evaluate the distance between robot and target with ultrasonic sensors. By teaming the setup distance, current distance and command velocity, the robot can do intelligent self-autonomous drive. We use the neural network and back-propagation algorithm as a tool of learning. As a result, we confirm the ability of tracing the target with proposed mobile robot.

  • PDF

Performance Improvement of a Deep Learning-based Object Recognition using Imitated Red-green Color Blindness of Camouflaged Soldier Images (적록색맹 모사 영상 데이터를 이용한 딥러닝 기반의 위장군인 객체 인식 성능 향상)

  • Choi, Keun Ha
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.139-146
    • /
    • 2020
  • The camouflage pattern was difficult to distinguish from the surrounding background, so it was difficult to classify the object and the background image when the color image is used as the training data of deep-learning. In this paper, we proposed a red-green color blindness image transformation method using the principle that people of red-green blindness distinguish green color better than ordinary people. Experimental results show that the camouflage soldier's recognition performance improved by proposed a deep learning model of the ensemble technique using the imitated red-green-blind image data and the original color image data.

Numerical and Experimental Evaluation of Tensile Failure in Continuous Fiber Reinforced Ceramic Composite

  • Kwon, Oh Heon;Park, Keyoung Dong;Watanabe, Katsuhiko
    • International Journal of Safety
    • /
    • v.2 no.1
    • /
    • pp.23-27
    • /
    • 2003
  • Recently, continuous fiber reinforced ceramic composite(CFCC) has attracted attention to a number of engineers because of its significant benefit for several industrial area. This work was conducted to provide a basic characteristic of CFCC for tensile loading condition. The numerical analysis by general purpose finite element program was accomplished and compared with an experimental tensile test. The stress strain curves were expressed well by the numerical analysis and the first matrix cracking stress was in accordance with that of the experimental result. Moreover, fracture pattern was shown by kill command graphically.