• Title/Summary/Keyword: Mobile Manipulation

Search Result 64, Processing Time 0.029 seconds

A Forensic Methodology for Detecting Image Manipulations (이미지 조작 탐지를 위한 포렌식 방법론)

  • Jiwon Lee;Seungjae Jeon;Yunji Park;Jaehyun Chung;Doowon Jeong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.4
    • /
    • pp.671-685
    • /
    • 2023
  • By applying artificial intelligence to image editing technology, it has become possible to generate high-quality images with minimal traces of manipulation. However, since these technologies can be misused for criminal activities such as dissemination of false information, destruction of evidence, and denial of facts, it is crucial to implement strong countermeasures. In this study, image file and mobile forensic artifacts analysis were conducted for detecting image manipulation. Image file analysis involves parsing the metadata of manipulated images and comparing them with a Reference DB to detect manipulation. The Reference DB is a database that collects manipulation-related traces left in image metadata, which serves as a criterion for detecting image manipulation. In the mobile forensic artifacts analysis, packages related to image editing tools were extracted and analyzed to aid the detection of image manipulation. The proposed methodology overcomes the limitations of existing graphic feature-based analysis and combines with image processing techniques, providing the advantage of reducing false positives. The research results demonstrate the significant role of such methodology in digital forensic investigation and analysis. Additionally, We provide the code for parsing image metadata and the Reference DB along with the dataset of manipulated images, aiming to contribute to related research.

A Simple Control Method for Opening a Door with Mobile Manipulator

  • Kang, Ju-Hyun;Hwang, Chang-Soon;Park, Gwi-Tae
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1593-1597
    • /
    • 2003
  • The home service robot supports human beings by performing various kinds of works at home. This paper presents a simple control method for opening a door from the viewpoint of the mobile manipulation. The simulation shows various results of path planning and motion planning for opening a door. The joint trajectories were generated by the simulation system. In general, a six-axis force/torque sensor at an end-effector is needed in order to maintain the static equilibrium of the manipulator. But we show another method. From three components of applied forces which was directly obtained by the three-axis force sensor and three components of applied forces which was indirectly estimated by the joint-torque sensors, all of joint torques that will exactly balance forces at the end-effector in the static situation can be found. It is more practical method than using a six-axis force sensor in a wrist. Experimental results have shown that the opening a door can be realized more effectively from the suggested control method of mobile manipulation.

  • PDF

Design and implementation of the focusable table component for mobile application using the WFC (모바일 GUI를 지원하는 WFC에서 포커싱 가능한 테이블 컴포넌트의 설계 및 구현)

  • Jun, Jong-Chan;Kim, Jeong-Ik;Kang, Young-Man;Han, Soon-Hee
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.485-492
    • /
    • 2010
  • In this paper, we propose a focusable table component for mobile application to support table form representation of various contents and manipulation such as focusing on the contents using the WFC which is a software module to support components of the window based GUI package. It is not easy for us to express contents with table attributes on mobile devices. Java provides several table components, but these are not suitable on the mobile environment. So we design and develop the extended table component to provide properly table form representation and manipulation on the mobile devices. Also, we provide a performance comparison between th supposed table component and Java Swing's JTable.

Motion Planning for a Mobile Manipulator using Directional Manipulability (방향성 매니퓰러빌리티를 이용한 주행 매니퓰레이터의 운동 계획)

  • Shin Dong Hun
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.22 no.5 s.170
    • /
    • pp.95-102
    • /
    • 2005
  • The coordination of locomotion and manipulation has been the typical and main issue for a mobile manipulator. This is particularly because the solution for the control parameters is redundant and the accuracies of controlling the each joints are different. This paper presents a motion planning method for which the mobile base locomotion is less precise than the manipulator control. In such a case, it is appropriate to move the mobile base to discrete poses and then to move the manipulator to track a prescribed path of the end effector, while the base is stationary. It uses a variant of the conventional manipulability measure that is developed for the trajectory control of the end effector of the mobile manipulator along an arbitrary path in the three dimensional space. The proposed method was implemented on the simulation and the experiments of a mobile manipulator and showed its effectiveness.

Development of Map Building Algorithm for Mobile Robot by Using RFID (모바일 로봇에서 RFID를 이용한 지도작성 알고리즘 개발)

  • Kim, Si-Seup;Seon, Jeong-An;Kee, Chang-Doo
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.20 no.2
    • /
    • pp.133-138
    • /
    • 2011
  • RFID system can be used to improve object recognition, map building and localization for robot area. A novel method of indoor navigation system for a mobile robot is proposed using RFID technology. The mobile robot With a RFID reader and antenna is able to find what obstacles are located where in circumstance and can build the map similar to indoor circumstance by combining RFID information and distance data obtained from sensors. Using the map obtained, the mobile robot can avoid obstacles and finally reach the desired goal by $A^*$ algorithm. 3D map which has the advantage of robot navigation and manipulation is able to be built using z dimension of products. The proposed robot navigation system is proved to apply for SLAM and path planning in unknown circumstance through numerous experiments.

Problems of Mobile Voting and System Requirements for the Solutions: Literature Review and Internet Survey (모바일 투표의 문제점 및 이를 극복하기 위한 모바일 투표 시스템 요구사항 - 문헌 사례 연구와 인터넷 설문 중심으로)

  • Choi, Jong Myung;Kim, Na Young;Ha, Sang Bok;Im, Yang June;Son, Young Woo;Kho, Hyung Dae
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.1
    • /
    • pp.33-42
    • /
    • 2013
  • Mobile voting has been considered as a promising technology, but it has not been used widely or popular enough in the world. We think this situation is caused by immature technologies of mobile voting and no agreement among people in our society. In this paper, we reviewed literature on electronic voting systems in order to find out technical issues on mobile voting system, and we also surveyed people's opinions via the Internet in order to understand what they worry about mobile voting. From the literature review, we understand that the existing electronic voting systems did not consider security, robustness, and reliability issues enough. From the survey, we also get to know that people worry about "manipulation of the result of mobile voting" mostly. Our work can help researchers on mobile voting to consider the ways or technologies that convince people of the reliability of mobile voting.

Preventing Mobile Game Client Memory Manipulation Based on Event Sourcing Patterns and Blockchain (이벤트 소싱 패턴과 블록 체인을 활용한 모바일 게임 클라이언트 메모리 조작 방지 방안)

  • Park, Jihun;Park, Young-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.3
    • /
    • pp.477-486
    • /
    • 2022
  • This study aims to present a method using event sourcing patterns and blockchain as a way to cope with vulnerabilities in memory manipulation at the client level. To verify the plan, the method of running the memory operation application was analyzed, and the performance was compared and analyzed when the memory operation prevention plan was applied by fabricating a test application. As a result of the analysis, the usage of memory increased compared to the method of XOR operation by storing major data in one memory, but it was possible to prevent the operation of the memory operation program without significantly affecting the performance of the game.

A Study on User Interface Design According to 3D Menu Type and Control Type for 3D Displays

  • Kim, Jae-Ho;Jung, Sung-Wook;Choe, Jae-Ho;Jung, Eui-S.
    • Journal of the Ergonomics Society of Korea
    • /
    • v.30 no.4
    • /
    • pp.551-562
    • /
    • 2011
  • Objective: We proposed an effective 3D menu manipulation alternative with a usability test. This was performed in a 3D environment with 3D menu and control manipulation methods. Background: As 3D stereoscopic displays became generalized, various 3D applications were being used not just movies, games, but also mobile contents and advertisements. However, when a user interface was designed in a 3D environment, it was lacked that a clear standard and result of an efficiency and usability as like a 2D environment. Method: We implemented 9 kinds of 3D menu types based on 3D menu hierarchies, menu layouts and dimensions. And we extracted 3 representative control types in a 3D environment. We performed usability evaluation with full factorial design for 27 menu alternatives with 2 types of menu manipulation tasks. In this condition, we measured the performance time, subjective discomfort and eye-fatigue. Results: A control type had the significant effect, and the effect of menu types had the different result depending on given tasks. Conclusion: This experiment showed the interaction of menu and control types depended on 3D menu manipulation tasks were significant in a 3D user interface design. Therefore, as a purpose of a 3D menu manipulation task, 3D menu types and control types were should be considered. Application: We supposed this result was should be applied in a 3D menu contents design.

Inertia Property-Based Redundancy Resolution in Posture Control of Mobile Manipulator

  • Kang, Sungchul;Komoriya, Kiyoshi;Yokoi, Kazuhito;Koutoku, Tetsuo;Tanie, Kazuo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.155.4-155
    • /
    • 2001
  • This paper deals with the inertia property-based redundancy resolution in posture control of a mobile manipulator. As a measure for the redundancy resolution of a mobile manipulator, an effective inertia at the end effector in the operational space is proposed and investigated. The reduced effective inertia has a significant effect on reducing the impulse force in collision with environment. To find a posture satisfying both the reduced inertia and joint limit constraints, we propose a combined potential function method that can deal with multiple constraints. The proposed reduced inertia property algorithm is integrated into a damping controller to reduce the impulse force at collision and to regulate the contact force in mobile manipulation ...

  • PDF

A Study on the Processing of Timestamps in the Creation of Multimedia Files on Mobile Devices

  • Han, Jaehyeok;Lee, Sangjin
    • Journal of Information Processing Systems
    • /
    • v.18 no.3
    • /
    • pp.402-410
    • /
    • 2022
  • Digital data can be manipulated easily, so information related to the timestamp is important in establishing the reliability of the data. The time values for a certain file can be extracted following the analysis of the filesystem metadata or file internals, and the information can be utilized to organize a timeline for a digital investigation. Suppose the reversal of a timestamp is found on a mobile device during this process. In this case, a more detailed analysis is required due to the possibility of anti-forensic activity, but little previous research has investigated the handling and possible manipulation of timestamps on mobile devices. Therefore, in this study, we determine how time values for multimedia files are handled according to the operating system or filesystem on mobile devices. We also discuss five types of timestamps-file created (C), last modified (M), last accessed (A), digitalized (Di), and filename (FN) of multimedia files, and experimented with their operational features across multiple devices such as smartphones and cameras.