• Title/Summary/Keyword: Guide Block

Search Result 91, Processing Time 0.029 seconds

Navigation System Using Drone for Visitors (드론을 활용한 방문객 길 안내 시스템)

  • Seo, Yeji;Jin, Youngseo;Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.18 no.1
    • /
    • pp.109-114
    • /
    • 2017
  • In our modern society, the utilization of the advanced drone which is capable of performing variety of tasks has been gradually increasing. In this paper, we present an application, similar to the prototype "Skycall" that had been introduced in the MIT Senseable City. To assess this concept, we have implemented a prototype of drone-based pedestrian navigation depending on the Android smartphone. Our system is not only able to guide the user in a very complicated place, where buildings are compacted, but also to block unauthorized visitors from accessing the facilities. And we discuss some problems we found and suggest the direction to address them.

CMAC (Cerebellar Model Arithmetic Controller)

  • Hwang, Heon;Choi, Dong-Y.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 1989.10a
    • /
    • pp.675-681
    • /
    • 1989
  • As an adaptive control function generator, the CMAC (Cerebellar Model Arithmetic or Articulated Controller) based learning control has drawn a great attention to realize a rather robust real-time manipulator control under the various uncertainties. There remain, however, inherent problems to be solved in the CMAC application to robot motion control or perception of sensory information. To apply the CMAC to the various unmodeled or modeled systems more efficiently, It is necessary to analyze the effects of the CMAC control parameters an the trained net. Although the CMAC control parameters such as size of the quantizing block, learning gain, input offset, and ranges of input variables play a key role in the learning performance and system memory requirement, these have not been fully investigated yet. These parameters should be determined, of course, considering the shape of the desired function to be trained and learning algorithms applied. In this paper, the interrelation of these parameters with learning performance is investigated under the basic learning schemes presented by authors. Since an analytic approach only seems to be very difficult and even impossible for this purpose, various simulations have been performed with prespecified functions and their results were analyzed. A general step following design guide was set up according to the various simulation results.

  • PDF

Automatic Hand Measurement System from 2D Hand Image for Customized Glove Production

  • Han, Hyun Sook;Park, Chang Kyu
    • Fashion & Textile Research Journal
    • /
    • v.18 no.4
    • /
    • pp.468-476
    • /
    • 2016
  • Recent advancements in optics technology enable us to realize fast scans of hands using two-dimensional (2D) image scanners. In this paper, we propose an automatic hand measurement system using 2D image scanners for customized glove production. To develop the automatic hand measurement system, firstly hand scanning devices has been constructed. The devices are designed to block external lights and have user interface to guide hand posture during scanning. After hands are scanned, hand contour is extracted using binary image processing, noise elimination and outline tracing. And then, 19 hand landmarks are automatically detected using an automatic hand landmark detection algorithm based on geometric feature analysis. Then, automatic hand measurement program is executed based on the automatically extracted landmarks and measurement algorithms. The automatic hand measurement algorithms have been developed for 18 hand measurements required for custom-made glove pattern making. The program has been coded using the C++ programming language. We have implemented experiments to demonstrate the validity of the system using 11 subjects (8 males, 3 females) by comparing automatic 2D scan measurements with manual measurements. The result shows that the automatic 2D scan measurements are acceptable in the customized glove making industry. Our evaluation results confirm its effectiveness and robustness.

Cytologic Features of Endodermal Sinus Tumor of Ovary in the Ascitic Fluid - Report of a Case - (난소에서 발생한 내배엽동 종양의 복수의 세포학적 소견 - 1례 보고 -)

  • Jeong, Eun-Sun;Kim, Young-Shin;Kang, Chang-Suk;Shim, Sang-In
    • The Korean Journal of Cytopathology
    • /
    • v.6 no.2
    • /
    • pp.204-208
    • /
    • 1995
  • The cytologic findings of endodermal sinus tumor of the ovary are reported. The cytologic preperations were obtained from ascitic specimens. The findings on Papanicolaou-stained smears included a clean background and poorly preserved atypical cells loosely arranged in irregular or papillary groups. At high magnification, the cells had ill-defined and microvacuolated cytoplasms, with an increased nuclear-cytoplasmic ratio and prominent nucleoli. Hyaline globules characteristic of the alpha-fetoprotein (AFP)-synthesizing cells of endodermal sinus tumor were observed within the cells with periodic-acid-Schiff(PAS) stain. The presence of PAS-positive hyaline globules can be regarded, therefore, as a diagnostic clue to endodermal sinus tumor in an appropriate clinical setting and in the presence of AFP production. The cytologic findings in a cell block is important, in addition to smears, to obtain more diagnostic clues. A preliminary cytomorphologic diagnosis of this highly malignant tumor is valuable as a guide in planning further immunocytochemical and serologic studies.

  • PDF

LEARNING PERFORMANCE AND DESIGN OF AN ADAPTIVE CONTROL FUCTION GENERATOR: CMAC(Cerebellar Model Arithmetic Controller)

  • Choe, Dong-Yeop;Hwang, Hyeon
    • 한국기계연구소 소보
    • /
    • s.19
    • /
    • pp.125-139
    • /
    • 1989
  • As an adaptive control function generator, the CMAC (Cerebellar Model Arithmetic or Articulated Controller) based learning control has drawn a great attention to realize a rather robust real-time manipulator control under the various uncertainties. There remain, however, inherent problems to be solved in the CMAC application to robot motion control or perception of sensory information. To apply the CMAC to the various unmodeled or modeled systems more efficiently, it is necessary to analyze the effects of the CMAC control parameters on the trained net. Although the CMAC control parameters such as size of the quantizing block, learning gain, input offset, and ranges of input variables play a key role in the learning performance and system memory requirement, these have not been fully investigated yet. These parameters should be determined, of course, considering the shape of the desired function to be trained and learning algorithms applied. In this paper, the interrelation of these parameters with learning performance is investigated under the basic learning schemes presented by authors. Since an analytic approach only seems to be very difficult and even impossible for this purpose, various simulations have been performed with pre specified functions and their results were analyzed. A general step following design guide was set up according to the various simulation results.

  • PDF

Research on the Effects of MAAB Style Guidelines for Weapon System Embedded Software Reliability Improvement (무기체계 내장형 소프트웨어 신뢰성 향상을 위한 MAAB 스타일 가이드라인 영향성 연구)

  • Kim, Yeon-Gyun;Yoon, Hyung-Sik
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.17 no.2
    • /
    • pp.213-222
    • /
    • 2014
  • In this paper, we introduce that MAAB style guideline has effects on the codes generated from Simulink models for static and dynamic software testing, when weapon system embedded software design and implementation are performed using the model based method. As showing the effects, MAAB guideline is helpful for defect prevention related with coding rules and run time errors associated with the DAPA weapon system embedded software guide. Thus, we check related items between MAAB and DAPA software reliability testing including static and dynamic analysis. And then we propose the criterion to select proper items from MAAB for DAPA guideline and show how to verify the relationship and the effects on reliability of models in Simulink. In addition, we show the needs for clear logics in conditional block models or statements and simple complexity models for Simulink model based design.

Mathematical model and sensitivity analysis for describing emulsification in ASP flooding

  • Zhang, Chengli;Wang, Peng;Song, Guoliang
    • Geosystem Engineering
    • /
    • v.21 no.6
    • /
    • pp.335-343
    • /
    • 2018
  • Alkali-surfactant polymer flooding has become an important technique to improve oil recovery following the development of oil fields while the function of emulsification in enhanced oil recovery is rarely considered in the existing mathematical model for numerical simulation. In this paper, the mechanism of improving the recovery of the emulsification was analyzed in ASP flooding, and a relatively perfect mathematical model with deep filtration-theory was established, in which oil-water volume equation, saturation equation, viscosity equation, and permeability reduction equation are included. The new model is used to simulate the actual block of an oil field; the simulated results of the new model and an old model without considering the emulsification are compared with the actual well history. It is found that new model which is easy to be realized in numerical simulation has a high precision fitting, and the effect of adding oil and decreasing water is obvious. The sensitivity of emulsification was analyzed, and the results show that the water reducing funnel becomes wider and the rate of water cut decreases rapidly with the increase of emulsifying capacity, and then the rate of recovery slows down. The effect of increasing oil and decreasing water is better, and the degree of recovery increases. The emulsification of the ASP flooding is maintained at a moderate level, which corresponds to ${\Phi}=0.2$ in the new model, and the emulsification is applied to realize the general mathematical quantitative description, so as to better guide the oilfield development.

Smart contract research for efficient learner problem recommendation in online education environment (온라인 교육 환경에서 효율적 학습자 문제추천을 위한 스마트 컨트랙트 연구)

  • Min, Youn-A
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.22 no.4
    • /
    • pp.195-201
    • /
    • 2022
  • For a efficient distance education environment, the need for correct problem recommendation guides considering the learner's exact learning pattern is increasing. In this paper, we study block chain based smart contract technology to suggest a method for presenting the optimal problem recommendation path for individual learners based on the data given by situational weights to the problem patterns of learners collected in the distance education environment. For the performance evaluation of this study, the learning satisfaction with the existing similar learning environment, the usefulness of the problem recommendation guide, and the learner data processing speed were analyzed. Through this study, it was confirmed that the learning satisfaction improved by more than 15% and the learning data processing speed was improved by more than 20% compared to the existing learning environment.

Adaptive High-order Variation De-noising Method for Edge Detection with Wavelet Coefficients

  • Chenghua Liu;Anhong Wang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.17 no.2
    • /
    • pp.412-434
    • /
    • 2023
  • This study discusses the high-order diffusion method in the wavelet domain. It aims to improve the edge protection capability of the high-order diffusion method using wavelet coefficients that can reflect image information. During the first step of the proposed diffusion method, the wavelet packet decomposition is a more refined decomposition method that can extract the texture and structure information of the image at different resolution levels. The high-frequency wavelet coefficients are then used to construct the edge detection function. Subsequently, because accurate wavelet coefficients can more accurately reflect the edges and details of the image information, by introducing the idea of state weight, a scheme for recovering wavelet coefficients is proposed. Finally, the edge detection function is constructed by the module of the wavelet coefficients to guide high-order diffusion, the denoised image is obtained. The experimental results showed that the method presented in this study improves the denoising ability of the high-order diffusion model, and the edge protection index (SSIM) outperforms the main methods, including the block matching and 3D collaborative filtering (BM3D) and the deep learning-based image processing methods. For images with rich textural details, the present method improves the clarity of the obtained images and the completeness of the edges, demonstrating its advantages in denoising and edge protection.

Metaverse Technology and Security Threats and Countermeasures (메타버스 기술과 보안 위협 및 대응방안)

  • Woo, SungHee;Lee, HyoJeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2022.10a
    • /
    • pp.328-330
    • /
    • 2022
  • Currently, the Metaverse is introduced in various fields, and a virtual convergence economy that uses NFTs for content or item transactions is expected to develop into a 'metaverse environment'. The 'metaverse environment' will lead the changes in our society in the future and it will be fused with AI, big data, cloud, IoT, block chain, and next-generation network technology. However, personal information, device information, and behavior information provided by Metaverse users to use the service are subject to major attacks. Therefore, in order to provide a safe environment for users to use and to expand the business base of related companies, building a public-private cooperation system and developing a security guide are the leading tasks. Therefore, in this study, we compare and analyze metaverse features and technologies, and examine possible security threats and countermeasures.

  • PDF