• Title/Summary/Keyword: Information manipulation

Search Result 562, Processing Time 0.027 seconds

Development of Biological Cell Manipulation System using Visual Tracking Method

  • Lee, Geunho;Kang, Hyun-Jae;Kwon, Sang-Joo;Park, Gwi-Tae;Kim, Byungkyu
    • Proceedings of the IEEK Conference
    • /
    • 2003.07c
    • /
    • pp.2911-2914
    • /
    • 2003
  • Conventionally, biological manipulations have been performed manually with long training and pretty low success rates. To overcome this problem, a novel biological manipulation system has been developed to manipulate biological cells without any interference of a human operator, In this paper, we demonstrate a development of tole-autonomous Cell Manipulation System (CMS) using an image processing at a remote site. The CMS consists of two manipulators, a plane stage, and an optical microscope. We developed deformable template-model-matching algorithm for micro objects and pattern matching algorithm of end effect for these manipulators in order to control manipulators and the stage. Through manipulation of biological cells using these algorithms, the performance of the CMS is verified experimentally.

  • PDF

The Effect of Focus Representation and Intonational Manipulation in Phoneme Detecting (초점 실현과 운율 조작에 대한 음소지각)

  • Kim, Hee-Seung;Shin, Ji-Young;Kim, Kee-Ho
    • MALSORI
    • /
    • no.60
    • /
    • pp.97-108
    • /
    • 2006
  • The purpose of this study is to observe how Korean listeners detect a target phoneme with 'Focus' represented by prosodic prominence and question-induced semantic emphasis, and with intonational manipulation. According to the automated phoneme detection task using E-Prime, the Korean listeners detected phoneme targets more rapidly when the target-bearing words were in prominence position and in question-induced position. However, the presence of question-induced semantic emphasis reduced the prominence effect, so two effects interacted: when question-induced emphasis were primarily given as a cue, prominence which was given as secondary cue affected less to fine the new information. Besides, the intonation with manipulation was responded to faster than without manipulation.

  • PDF

A Sweep Surface Based on Bivariate B-spline Motion

  • Yoon, Seung-Hyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.1026-1039
    • /
    • 2014
  • We present a new method for generating sweep surfaces using bivariate B-spline motion. The sweep surface is defined as the trace of a single point under bivariate B-spline motion. Direct manipulation of the sweep surface is achieved by controlling its motion components while producing various editing effects. We demonstrate the effectiveness of our technique by modeling and deforming various three-dimensional shapes.

Software Architecture of Contents-based Control for Co-operative Remote Manipulation of Multi-Robots

  • Thuy, Dinh Trong;Kang, Soon-Ju
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.508-511
    • /
    • 2008
  • In this paper, we propose software architecture for conveying contents-based OpenSound Control (OSC) packet from manipulation user interface to cooperative remote multi-robots. The Flash application is used as a controlling user interface and the physical prototyping of multi-robots were developed using physical prototyping toolkit.

Microfluidic Control for Biological Cell Orientation

  • Namkung, Young-Woo;Park, Jung-Yul;Kim, Byung-Kyu;Park, Jong-Oh;Kim, Jin-Oh
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2457-2460
    • /
    • 2003
  • There is a great demand to manipulate biological cell autonomously since biologist should spend much time to obtain skillful manipulation techniques. For this purpose, we propose a cell chip to control, carry, fix and locate the cell. In this paper, we focus on the cell rotator to rotate individual biological cell based on a micro fluidics technology. The cell rotator consists of injection hole and rotation well to rotate a biological cell properly. Under the variation of flow rate in injection hole, the angular velocity of a biological cell is evaluated to find the feasibility of the proposed rotation method. As a practical experiment, Zebrafish egg is employed. Based on this research, we find the possibility of non-contact rotation way that can highly reduce the damage of the biological cell during manipulation. To realize an autonomous biological cell manipulation, a cell chip with manipulation well and micro channel in this research will be utilized effectively in near future.

  • PDF

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

Legal liability of the management firm on hacked Robo-Advisor's stock price manipulation (해킹에 따른 로보어드바이저의 시세조종 행위와 운용사의 법적 책임)

  • Kim, Dong Ju;Kwon, Hun Yeong;Lim, Jong In
    • Journal of the Korea Convergence Society
    • /
    • v.8 no.9
    • /
    • pp.41-47
    • /
    • 2017
  • This study is a preceding research designed to deduct an institutional supplementary measure that minimizes any inevitable side effects from the improvement of artificial intelligence (AI) technology, which is the core element of the Fourth Industrial Revolution. In this specific case in which the Robo-Advisor, the representative type of AI-applied technology, was hacked by a third party and ended up manipulating prices, the study was intended to examine the responsibility relationship of the current legal framework. Although the current legal framework strictly prohibits acts such as hacking and manipulation, it was confirmed that if the Robo-Advisor management firm acts in compliance with protection measures regarding hacking, the firm is free from any legal liabilities and there is insufficient legal protection available for ordinary investors with grand-scale damage from price manipulation Based on this study, further studies are needed to derive more institutional supplementary measures on overcoming these problems.

A Multiple Servers Conference Service System by Media Control Channel/Distributed Conference Manipulation Architecture (미디어 제어 채널/분산 컨퍼런스 매니퓰레이션 구조에 의한 다중 서버 컨퍼런스 서비스 시스템)

  • Jang, Choonseo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.12 no.3
    • /
    • pp.224-230
    • /
    • 2019
  • In this paper, a new multiple servers conference service system using media control channel/distributed conference manipulation architecture has been presented. This conference service system can handle loads effectively from many conference participants. In this suggested architecture, media control channels are established between conference server, and distributed conference manipulation messages for distributing system loads are exchanged through this channels. These messages are transported between servers using media control channel created after stable transport sessions, and can be used to process server loads according to participants effectively. So this method can be used to implement large scale conference service system. For these purposes, formats of distributed conference manipulation messages which transmitted through media control channels are designed. and messages exchange procedures between conference servers are also presented. The performance of the proposed conference service system has been analysed by experiments, and the results show that the performances are improved according to participants.

Short term Sensor's Drift Compensation by using Three Drift Correction Techniques (세 가지 드리프트 보정 기법을 이용한 단기 센서 드리프트 보정)

  • Jeon, Jin-Young;Choi, Jang-Sik;Byun, Hyung-Gi
    • Journal of Sensor Science and Technology
    • /
    • v.25 no.4
    • /
    • pp.291-296
    • /
    • 2016
  • The ideal chemical sensor must show the similar result under the same condition for accurate measurement of gases regardless of time. However, the actual responses of chemical sensors have been shown the lacks of repeatability and reproducibility because of the drift which has been caused by aging and pollution of the sensor and the environment change such as temperature and humidity. If the problems are not properly taken into considerations, the stability and reliability of the system using chemical sensors would be decreased. In this paper, we analyzed the sensor's drift and applied the three different compensation methods(DWT( Discrete Wavelets Transform), Baseline Manipulation, Internal Normalization) for reducing the effects of the drift in order to improve the stability and the reliability of short term of the chemical sensors. And in order to compare the results of the methods, the standard deviation was used as a criterion. The sensor drift was analyzed by a trend line graph. We applied the three methods to the successive data measured for three days and compared the results. As a result of comparison, the standard deviation of DWT showed lowest value. (Before compensation: 7.1219, DWT: 1.3644, Baseline Manipulation: 2.5209, Internal Normalization: 3.1425).

Comparison of Image Duplication Detection Using the Polar Coordinates System and Histogram of Oriented Gradients Methods

  • Gunadi, Kartika;Adipranata, Rudy;Suryajaya, Ivan
    • Journal of information and communication convergence engineering
    • /
    • v.17 no.1
    • /
    • pp.67-73
    • /
    • 2019
  • In the current era of digital technology, and with the help of existing software, digital photo manipulation is becoming easier and faster. One example of this is the development of powerful image processing software that makes it easy for a digital image to be manipulated and edited. It is therefore very important to protect and maintain public trust in digital images. Several methods have been developed to detect image manipulation. In this paper, we compare two methods for detecting image duplication due to copy-move actions, namely the polar coordinate system and the histogram of oriented gradients methods. The former is a method based on the transfer of a Cartesian image to a polar form, making it easy to tell whether there are objects that have undergone a copy/move in an image, while the latter is a method for retrieving information related to the distribution, which uses a target in the local area as a tool to represent the shape of the target. We compare the accuracy, speed and memory usage of these two methods.