• Title/Summary/Keyword: Model Objects

Search Result 2,118, Processing Time 0.03 seconds

IMPRESSION-DRIVEN DESIGN SCHEME FOR A CLASS OF 3D OBJECTS BASED ON MORPHABLE 3D SHAPE MODEL, AND ITS AUTOMATIC BUILDUP BY SUPPLEMENTARY FEATURE SAMPLING

  • Inaba, Yoshinori;Kochi, Jumpei;Ishi, Hanae;Gyoba, Jiro;Akamatsu, Shigeru
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.01a
    • /
    • pp.606-611
    • /
    • 2009
  • This paper describes a method for achieving a novel design within a class of 3D objects that would create a preferred impression on users. Physical parameters of the 3D objects that might strongly contribute to their visual impressions are sought through computational investigation of the impression ratings obtained for learning samples. "Car body" was selected as the class of 3D objects to be investigated. A morphable 3D model of car bodies that describes the variations in appearance using a smaller number of parameters was obtained. Based on each car body's rating for the impression of speediness obtained by paired comparison, the visual impression was transformed by manipulating the parameters defined in the morphable 3D model. The validity of the proposed method was confirmed by psychological experiments. A new scheme is also proposed to properly re-sample a novel object of a peculiar shape so that such an object could also be represented by the morphable 3D model.

  • PDF

Dust Disks Around Young Stellar Objects

  • Suh, Kyung-Won
    • Journal of Astronomy and Space Sciences
    • /
    • v.33 no.2
    • /
    • pp.119-126
    • /
    • 2016
  • To reproduce the spectral energy distributions (SEDs) of young stellar objects (YSOs), we perform radiative transfer model calculations for the circumstellar dust disks with various shapes and many dust species. For eight sample objects of T Tauri and Herbig Ae/Be stars, we compare the theoretical model SEDs with the observed SEDs described by the infrared space observatory and Spitzer space telescope spectral data. We use the model, CGPLUS, for a passive irradiated circumstellar dust disk with an inner hole and an inner rim for the eight sample YSOs. We present model parameters for the dust disk, which reproduce the observed SEDs. We find that the model requires a higher mass, luminosity, and temperature for the central star for the Herbig Ae/Be stars than those for the T Tauri stars. Generally, the outer radius, total mass, thickness, and rim height of the theoretical dust disk for the Herbig Ae/Be stars are larger than those for the T Tauri stars.

A Study for Controllability, Stability by Optimal Control of Load and Angular Velocity of Flying Objects using the Spiral Predictive Model(SPM) (나선 예측 모델에서의 비행체 하중수 및 각속도 최적 제어에 의한 제어성과 안정성 성능에 관한 연구)

  • Wang, Hyun-Min
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.3
    • /
    • pp.268-272
    • /
    • 2007
  • These days many scientists make studies of feedback control system for stability on non-linear state and for the maneuver of flying objects. These feedback control systems have to satisfy trajectory condition and angular conditions, that is to say, controllability and stability simultaneously to achieve mission. In this paper, a design methods using model based control system which consists of spiral predictive model, Q-function included into generalized-work function is shown. It is made a clear that the proposed algorithm using SPM maneuvers for controllability and stability at the same time is successful in attaining our purpose. The feature of the proposed algorithm is illustrated by simulation results. As a conclusion, the proposed algorithm is useful for the control of moving objects.

Java Object Modeling Using EER Model and the Implementation of Object Parser (EER 모델을 이용한 Java Object 모델링과 Object 파서의 구현)

  • 김경식;김창화
    • The Journal of Information Technology and Database
    • /
    • v.6 no.1
    • /
    • pp.1-13
    • /
    • 1999
  • The modeling components in the object-oriented paradigm are based on the object, not the structured function or procedure. That is, in the past, when one wanted to solve problems, he would describe the solution procedure. However, the object-oriented paradigm includes the concepts that solve problems through interaction between objects. The object-oriented model is constructed by describing the relationship between object to represent the real world. As in object-oriented model the relationships between objects increase, the control of objects caused by their insertions, deletions, and modifications comes to be very complex and difficult. Because the loss of the referential integrity happens and the object reusability is reduced. For these reasons, the necessity of the control of objects and the visualization of the relationships between them is required. In order that we design a database necessary to implement Object Browser that has functionalities to visualize Java objects and to perform the query processing in Java object modeling, in this paper we show the processes for EER modeling on Java object and its transformation into relational database schema. In addition we implement Java Object Parser that parses Java object and inserts the parsed results into the implemented database.

  • PDF

STUDY ON THERMAL MODELING METHODS OF A CYLINDRICAL GROUND OBJECT CONSIDERING THE SPECTRAL SOLAR RADIATION THROUGH THE ATMOSPHERE

  • Choi Jun-Hyuk;Choi Mi-Na;Gil Tae-Jun;Kim Tae-Kuk
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.205-208
    • /
    • 2005
  • This research is aimed at the development of a software that predicts the surface temperature profiles of three-dimensional objects on the ground considering the spectral solar radiation through the atmosphere. The thermal modelling is essential for identifying the objects on the scenes obtained from the satellites. And the temperature distribution on the objects is necessary to obtain their infrared images in contrast to the background. We developed a software that could be used to model the thermal problems of the ground objects irradiated by the spectral solar radiation. This software can be used to handle the conduction within the object as a one-dimensional mode into the depth or as a three-dimensional mode through the media. LOWTRAN7 is used to model the spectral solar radiation including the direct and diffuse solar radiances. In this paper, temperature distributions on the objects obtained by using the one-dimensional and the three-dimensional thermal models are compared with each other to examine the applicability of the relatively easy-to-apply one-dimensional model.

  • PDF

Active Contour Model for Boundary Detection of Multiple Objects (복수 객체의 윤곽 검출 방법에 대한 능동윤곽모델)

  • Jang, Jong-Whan
    • The KIPS Transactions:PartB
    • /
    • v.17B no.5
    • /
    • pp.375-380
    • /
    • 2010
  • Most of previous algorithms of object boundary extraction have been studied for extracting the boundary of single object. However, multiple objects are much common in the real image. The proposed algorithm of extracting the boundary of each of multiple objects has two steps. In the first step, we propose the fast method using the outer and inner products; the initial contour including multiple objects is split and connected and each of new contours includes only one object. In the second step, an improved active contour model is studied to extract the boundary of each object included each of contours. Experimental results with various test images have shown that our algorithm produces much better results than the previous algorithms.

Petri Net Model for Moving Objects Database (이동물체 데이터베이스의 페트리 넷 모형)

  • 임재걸;이계영
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.41 no.3
    • /
    • pp.1-10
    • /
    • 2004
  • Quite many papers about moving objects database (MOD) have been Published. Most of them are concerning of improving efficiency of updating policy, but none of them talks about verification of system's requirements. No matter how efficient updating policy is employed, a system designer still has to verify if the MOD satisfies user's requirement at the beginning of system lifestyle. For example, if a MOD serves n moving objects, then the designer must verity if it can update information for n moving objects and provide new information to moving objects within specified time limit. For the purpose of requirement analysis of MODs, we build a Petri net model for MOD using Design/CPN, and then we show how to verify whether the MOD satisfies user's requirements by simulation. The contribution of this paper is providing a simulation model for requirement analysis of MOD for the first time. The model is expansion of our previous fuzzy-timing Petri net model. The distance-based updating policy, and distributed database management system are reflected in this model and system analysis for moving objects is considered. It is built in Design/CPN so that the simulation can be automatically performed. The application of our model is not limited to requirement analysis, it is useful to study other MOD design issues, such as the trade-offs between update cost and information accuracy, and between the tim interval needed for updating database and MOD system resources, etc.

A Study on Integrated Binding Service Strategy Based on Name/property in Wide-Area Object Computing Environments (광역 객체 컴퓨팅 환경에서 이름/속성기반의 통합 바이딩 서비스 방안)

  • Jeong, Chang-Won;Oh, Sung-Kwun;Joo, Su-Chong
    • The KIPS Transactions:PartA
    • /
    • v.9A no.2
    • /
    • pp.241-248
    • /
    • 2002
  • With the structure of tilde-area computing system which Is specified by a researching team in Vrije University, Netherlands, lots of researchers and developers have been progressing the studies of global location and interconnection services of distributed objects existing in global sites. Most of them halve focused on binding services of only non-duplicated computational objects existing wide-area computing sites without any consideration of duplication problems. But all of objects existing on the earth rave the duplicated characteristics according to how to categorize their own names or properties. These objects with the same property can define as duplicated computational objects. Up to now, the existing naming or trading mechanism has not supported the binding services of duplicated objects, because of deficiency of independent location service. For this reason, we suggest a new model that can not only manages locations of duplicated objects In wide-area computing environments, but also provide minimum binding time by considering both the optimal selection of one of duplicated objects and load balance among distributed systems. Our model is functionally divided into 2 parts, one part to obtain an unique object handle of duplicated objects with same property as a naming and trading service, and the other to search one or more contact addresses by a node manager using a liven object handle, as a location service For location transparency, these services are independently executing each other. Based on our model, we described structure of wide-area integrated tree and algorithms for searching and updating contact address of distributed object on this tree. finally, we showed a federation structure that can globally bind distributed objects located on different regions from an arbitrary client object.

Prediction of Human Performance Time to Find Objects on Multi-display Monitors using ACT-R Cognitive Architecture

  • Oh, Hyungseok;Myung, Rohae;Kim, Sang-Hyeob;Jang, Eun-Hye;Park, Byoung-Jun
    • Journal of the Ergonomics Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.159-165
    • /
    • 2013
  • Objective: The aim of this study was to predict human performance time in finding objects on multi-display monitors using ACT-R cognitive architecture. Background: Display monitors are one of the representative interfaces for interaction between people and the system. Nowadays, the use of multi-display monitors is increasing so that it is necessary to research about the interaction between users and the system on multi-display monitors. Method: A cognitive model using ACT-R cognitive architecture was developed for the model-based evaluation on multi-display monitors. To develop the cognitive model, first, an experiment was performed to extract the latency about the where system of ACT-R. Then, a menu selection experiment was performed to develop a human performance model to find objects on multi-display monitors. The validation of the cognitive model was also carried out between the developed ACT-R model and empirical data. Results: As a result, no significant difference on performance time was found between the model and empirical data. Conclusion: The ACT-R cognitive architecture could be extended to model human behavior in the search of objects on multi-display monitors.. Application: This model can help predicting performance time for the model-based usability evaluation in the area of multi-display work environments.

Realtime Theft Detection of Registered and Unregistered Objects in Surveillance Video (감시 비디오에서 등록 및 미등록 물체의 실시간 도난 탐지)

  • Park, Hyeseung;Park, Seungchul;Joo, Youngbok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.10
    • /
    • pp.1262-1270
    • /
    • 2020
  • Recently, the smart video surveillance research, which has been receiving increasing attention, has mainly focused on the intruder detection and tracking, and abandoned object detection. On the other hand, research on real-time detection of stolen objects is relatively insufficient compared to its importance. Considering various smart surveillance video application environments, this paper presents two different types of stolen object detection algorithms. We first propose an algorithm that detects theft of statically and dynamically registered surveillance objects using a dual background subtraction model. In addition, we propose another algorithm that detects theft of general surveillance objects by applying the dual background subtraction model and Mask R-CNN-based object segmentation technology. The former algorithm can provide economical theft detection service for pre-registered surveillance objects in low computational power environments, and the latter algorithm can be applied to the theft detection of a wider range of general surveillance objects in environments capable of providing sufficient computational power.