• Title/Summary/Keyword: Object model

Search Result 4,036, Processing Time 0.032 seconds

Development of Simulator for Analyzing Intercept Performance of Surface-to-air Missile (지대공미사일 요격 성능 분석 시뮬레이터 개발)

  • Kim, Ki-Hwan;Seo, Yoon-Ho
    • Journal of the Korea Society for Simulation
    • /
    • v.19 no.1
    • /
    • pp.63-71
    • /
    • 2010
  • In modern war, Intercept Performance of SAM(Surface to Air Missile) is gaining importance as range and precision of Missile and Guided Weapon on information warfare have been improved. An aerial defence system using Surface-to-air Radar and Guided Missile is needed to be built for prediction and defense from threatening aerial attack. When developing SAM, M&S is used to free from a time limit and a space restriction. M&S is widely applied to education, training, and design of newest Weapon System. This study was conducted to develop simulator for evaluation of Intercept Performance of SAM. In this study, architecture of Intercept Performance of SAM analysis simulator for estimation of Intercept Performance of various SAM was suggested and developed. The developed Intercept Performance of SAM analysis simulator was developed by C++ and Direct3D, and through 3D visualization using the Direct3D, it shows procedures of the simulation on a user animation window. Information about design and operation of Fighting model is entered through input window of the simulator, and simulation engine consisted of Object Manager, Operation Manager, and Integrated Manager conducts modeling and simulation automatically using the information, so the simulator gives user feedback in a short time.

A Study on Practical Implications in the Contract for International Transfer of Technology -Focused on Character of the Technology compared with Goods- (국제기술이전계약 체결시 실무상 유의점에 관한 연구 - 물품과 비교하여 기술이 가지는 성격을 중심으로 -)

  • Jeong, Hee-Jin
    • Korea Trade Review
    • /
    • v.42 no.1
    • /
    • pp.27-45
    • /
    • 2017
  • A new phenomenon in recent trade is the rising interest in the trade of product production and manufacturing methods themselves, unlike in the past, when the interest was focused on the trade of tangible goods. That is, technology is considered as the object of trade instead of a simple element of production as "technology itself is commercialized". The broad meaning of technology encompasses all the property of knowledge with economic value. Its narrow meaning refers to technology used to produce and manufacture goods. Technologies have features such as no forms, heterogeneity, accumulation of value and extinction of right. The trade of technology commands different styles and content from that of tangible goods due to their unique characteristics; and accordingly, has various risk factors. In other words, technology can be traded in various ways according to commercial objectives including licensing, technical partnership, and joint investment in addition to general trading. The specific forms of technology transfer strategies depend on the purposes and situations between corporations. In case of technical trade with any form, the parties should be cautious about the following practical aspects: First, the contract should clearly define the scope and transfer method of technology. It is a very important matter how the provider of technology will provide the user of technology with abstract technology with no substantiality. Second, a monopoly on technology recognized as intellectual property rights is granted to their inventors for some periods of time, but anyone can have access to that technology after the term of existence. Thus, it is important to check the terms of existence of a patent as well as the terms of contract. Third, the user of technology should fulfill his confidentiality obligation to prevent the technology of the provider from being leaked to a third party unjustly. Fourth, the provider of technology should make a contribution to the successful implementation of the technology by the user as well as provide the licensed technology. Finally, a model contract is recommended to minimizing the legal hiatus of complex technology transfer trade when concluding a contract.

  • PDF

Context-Dependent Video Data Augmentation for Human Instance Segmentation (인물 개체 분할을 위한 맥락-의존적 비디오 데이터 보강)

  • HyunJin Chun;JongHun Lee;InCheol Kim
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.5
    • /
    • pp.217-228
    • /
    • 2023
  • Video instance segmentation is an intelligent visual task with high complexity because it not only requires object instance segmentation for each image frame constituting a video, but also requires accurate tracking of instances throughout the frame sequence of the video. In special, human instance segmentation in drama videos has an unique characteristic that requires accurate tracking of several main characters interacting in various places and times. Also, it is also characterized by a kind of the class imbalance problem because there is a significant difference between the frequency of main characters and that of supporting or auxiliary characters in drama videos. In this paper, we introduce a new human instance datatset called MHIS, which is built upon drama videos, Miseang, and then propose a novel video data augmentation method, CDVA, in order to overcome the data imbalance problem between character classes. Different from the previous video data augmentation methods, the proposed CDVA generates more realistic augmented videos by deciding the optimal location within the background clip for a target human instance to be inserted with taking rich spatio-temporal context embedded in videos into account. Therefore, the proposed augmentation method, CDVA, can improve the performance of a deep neural network model for video instance segmentation. Conducting both quantitative and qualitative experiments using the MHIS dataset, we prove the usefulness and effectiveness of the proposed video data augmentation method.

Detecting Vehicles That Are Illegally Driving on Road Shoulders Using Faster R-CNN (Faster R-CNN을 이용한 갓길 차로 위반 차량 검출)

  • Go, MyungJin;Park, Minju;Yeo, Jiho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.21 no.1
    • /
    • pp.105-122
    • /
    • 2022
  • According to the statistics about the fatal crashes that have occurred on the expressways for the last 5 years, those who died on the shoulders of the road has been as 3 times high as the others who died on the expressways. It suggests that the crashes on the shoulders of the road should be fatal, and that it would be important to prevent the traffic crashes by cracking down on the vehicles intruding the shoulders of the road. Therefore, this study proposed a method to detect a vehicle that violates the shoulder lane by using the Faster R-CNN. The vehicle was detected based on the Faster R-CNN, and an additional reading module was configured to determine whether there was a shoulder violation. For experiments and evaluations, GTAV, a simulation game that can reproduce situations similar to the real world, was used. 1,800 images of training data and 800 evaluation data were processed and generated, and the performance according to the change of the threshold value was measured in ZFNet and VGG16. As a result, the detection rate of ZFNet was 99.2% based on Threshold 0.8 and VGG16 93.9% based on Threshold 0.7, and the average detection speed for each model was 0.0468 seconds for ZFNet and 0.16 seconds for VGG16, so the detection rate of ZFNet was about 7% higher. The speed was also confirmed to be about 3.4 times faster. These results show that even in a relatively uncomplicated network, it is possible to detect a vehicle that violates the shoulder lane at a high speed without pre-processing the input image. It suggests that this algorithm can be used to detect violations of designated lanes if sufficient training datasets based on actual video data are obtained.

Rendezvous Mission to Apophis: IV. Investigation of the internal structure - A lesson from an analogical asteroid Itokawa

  • Jin, Sunho;Kim, Yaeji;Jo, Hangbin;Yang, Hongu;Kwon, Yuna G.;Ishiguro, Masateru;Jeong, Minsup;Moon, Hong-Kyu;Choi, Young-Jun;Kim, Myung-Jin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.58.1-59
    • /
    • 2021
  • Exploration of asteroids' internal structure is essential for understanding their evolutional history. It also provides a fundamental information about the history of coalescence and collision of the solar system. Among several models of the internal structures, the rubble-pile model, confirmed by the near-Earth asteroid (25143) Itokawa by Hayabusa mission [1], is now widely regarded as the most common to asteroids with size ranging from 200 m to 10 km [2]. On the contrary, monolithic and core-mantle structures are also possible for small asteroids [3]. It is, however, still challenging to look through the interior of a target object using remote-sensing devices. In this presentation, we introduce our ongoing research conducted at Seoul National and propose an idea to infer the internal structure of Apophis using available instruments. Itokawa's research provides an important benchmark for Apophis exploration because both asteroids have similar size and composition [4][5]. We have conducted research on Itokawa's evolution in terms of collision and space weathering. Space weathering is the surface alteration process caused by solar wind implantation and micrometeorite bombardment [6]. Meanwhile, resurfacing via a collision acts as a counter-process of space weathering by exposing fresh materials under the matured layer and lower the overall degree of space weathering. Therefore, the balance of these two processes determine the space weathering degrees of the asteroid. We focus on the impact evidence on the boulder surface and found that space weathering progresses in only 100-10,000 years and modifies the surface optical properties (Jin & Ishiguro, KAS 2020 Fall Meeting). It is important to note that the timescale is significantly shorter than the Itokawa's age, suggesting that the asteroid can be totally processed by space weathering. Accordingly, our result triggers a further discussion about why Itokawa indicates a moderately fresh spectrum (Sq-type denotes less matured than S-type). For example, Itokawa's smooth terrains show a weaker degree of space weathering than other S-type asteroids [7]. We conjecture that the global seismic shaking caused by collisions with >1 mm-sized interplanetary dust particles induces granular convection, which hinders the progression of space weathering [8]. Note that the efficiency of seismic wave propagation is strongly dependent on the internal structure of the asteroid. Finally, we consider possible approaches to investigate Apophis's internal structure. The first idea is studying the space weathering age, as conducted for Itokawa. If Apophis indicates a younger age, the internal structure would have more voids [9]. In addition, the 2029 close encounter with Earth provides a rare natural opportunity to witness the contrast between before and after the event. If the asteroid exhibits a slight change in shape and space weathering degree, one can determine the physical structure of the internal materials (e.g., rubble-pile monolithic, thick or thin regolith layer, the cohesion of the materials). We will also consider a possible science using a seismometer.

  • PDF

AI-Based Object Recognition Research for Augmented Reality Character Implementation (증강현실 캐릭터 구현을 위한 AI기반 객체인식 연구)

  • Seok-Hwan Lee;Jung-Keum Lee;Hyun Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1321-1330
    • /
    • 2023
  • This study attempts to address the problem of 3D pose estimation for multiple human objects through a single image generated during the character development process that can be used in augmented reality. In the existing top-down method, all objects in the image are first detected, and then each is reconstructed independently. The problem is that inconsistent results may occur due to overlap or depth order mismatch between the reconstructed objects. The goal of this study is to solve these problems and develop a single network that provides consistent 3D reconstruction of all humans in a scene. Integrating a human body model based on the SMPL parametric system into a top-down framework became an important choice. Through this, two types of collision loss based on distance field and loss that considers depth order were introduced. The first loss prevents overlap between reconstructed people, and the second loss adjusts the depth ordering of people to render occlusion inference and annotated instance segmentation consistently. This method allows depth information to be provided to the network without explicit 3D annotation of the image. Experimental results show that this study's methodology performs better than existing methods on standard 3D pose benchmarks, and the proposed losses enable more consistent reconstruction from natural images.

An Intelligent CCTV-Based Emergency Detection System for Rooftop Access Control Problems (옥상 출입 통제 문제 해결을 위한 지능형 CCTV 기반 비상 상황 감지 시스템 제안)

  • Yeeun Kang;Soyoung Ham;Seungchae Joa;Hani Lee;Seongmin Kim;Hakkyong Kim
    • Convergence Security Journal
    • /
    • v.24 no.1
    • /
    • pp.59-68
    • /
    • 2024
  • With advancements in artificial intelligence technology, intelligent CCTV systems are being deployed across various environments, such as river bridges and construction sites. However, a conflict arises regarding the opening and closing of rooftop access points due to concerns over potential accidents and crime incidents and their role as emergency evacuation spaces. While the relevant law typically mandates the constant opening of designated rooftop access points, closures are often tacitly permitted in practice for security reasons, with a lack of appropriate legal measures. In this context, this study proposes a detection system utilizing intelligent CCTV to respond to emergencies that may occur on rooftops. We develop a system based on the YOLOv5 object detection model to detect assault and suicide attempts by jumping, introducing a new metric to assess them. Experimental results demonstrate that the proposed system rapidly detects assault and suicide attempts with high accuracy. Additionally, through a legal analysis of rooftop access point management, deficiencies in the legal framework regarding rooftop access and CCTV installation are identified, and improvement measures are proposed. With technological and legal improvements, we believe that crime and accident incidents in rooftop environments will decrease.

Digital Library Interface Research Based on EEG, Eye-Tracking, and Artificial Intelligence Technologies: Focusing on the Utilization of Implicit Relevance Feedback (뇌파, 시선추적 및 인공지능 기술에 기반한 디지털 도서관 인터페이스 연구: 암묵적 적합성 피드백 활용을 중심으로)

  • Hyun-Hee Kim;Yong-Ho Kim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.261-282
    • /
    • 2024
  • This study proposed and evaluated electroencephalography (EEG)-based and eye-tracking-based methods to determine relevance by utilizing users' implicit relevance feedback while navigating content in a digital library. For this, EEG/eye-tracking experiments were conducted on 32 participants using video, image, and text data. To assess the usefulness of the proposed methods, deep learning-based artificial intelligence (AI) techniques were used as a competitive benchmark. The evaluation results showed that EEG component-based methods (av_P600 and f_P3b components) demonstrated high classification accuracy in selecting relevant videos and images (faces/emotions). In contrast, AI-based methods, specifically object recognition and natural language processing, showed high classification accuracy for selecting images (objects) and texts (newspaper articles). Finally, guidelines for implementing a digital library interface based on EEG, eye-tracking, and artificial intelligence technologies have been proposed. Specifically, a system model based on implicit relevance feedback has been presented. Moreover, to enhance classification accuracy, methods suitable for each media type have been suggested, including EEG-based, eye-tracking-based, and AI-based approaches.

Automation of Online to Offline Stores: Extremely Small Depth-Yolov8 and Feature-Based Product Recognition (Online to Offline 상점의 자동화 : 초소형 깊이의 Yolov8과 특징점 기반의 상품 인식)

  • Jongwook Si;Daemin Kim;Sungyoung Kim
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.17 no.3
    • /
    • pp.121-129
    • /
    • 2024
  • The rapid advancement of digital technology and the COVID-19 pandemic have significantly accelerated the growth of online commerce, highlighting the need for support mechanisms that enable small business owners to effectively respond to these market changes. In response, this paper presents a foundational technology leveraging the Online to Offline (O2O) strategy to automatically capture products displayed on retail shelves and utilize these images to create virtual stores. The essence of this research lies in precisely identifying and recognizing the location and names of displayed products, for which a single-class-targeted, lightweight model based on YOLOv8, named ESD-YOLOv8, is proposed. The detected products are identified by their names through feature-point-based technology, equipped with the capability to swiftly update the system by simply adding photos of new products. Through experiments, product name recognition demonstrated an accuracy of 74.0%, and position detection achieved a performance with an F2-Score of 92.8% using only 0.3M parameters. These results confirm that the proposed method possesses high performance and optimized efficiency.

An Empirical Study on Perceived Value and Continuous Intention to Use of Smart Phone, and the Moderating Effect of Personal Innovativeness (스마트폰의 지각된 가치와 지속적 사용의도, 그리고 개인 혁신성의 조절효과)

  • Han, Joonhyoung;Kang, Sungbae;Moon, Taesoo
    • Asia pacific journal of information systems
    • /
    • v.23 no.4
    • /
    • pp.53-84
    • /
    • 2013
  • With rapid development of ICT (Information and Communications Technology), new services by the convergence of mobile network and application technology began to appear. Today, smart phone with new ICT convergence network capabilities is exceedingly popular and very useful as a new tool for the development of business opportunities. Previous studies based on Technology Acceptance Model (TAM) suggested critical factors, which should be considered for acquiring new customers and maintaining existing users in smart phone market. However, they had a limitation to focus on technology acceptance, not value based approach. Prior studies on customer's adoption of electronic utilities like smart phone product showed that the antecedents such as the perceived benefit and the perceived sacrifice could explain the causality between what is perceived and what is acquired over diverse contexts. So, this research conceptualizes perceived value as a trade-off between perceived benefit and perceived sacrifice, and we need to research the perceived value to grasp user's continuous intention to use of smart phone. The purpose of this study is to investigate the structured relationship between benefit (quality, usefulness, playfulness) and sacrifice (technicality, cost, security risk) of smart phone users, perceived value, and continuous intention to use. In addition, this study intends to analyze the differences between two subgroups of smart phone users by the degree of personal innovativeness. Personal innovativeness could help us to understand the moderating effect between how perceptions are formed and continuous intention to use smart phone. This study conducted survey through e-mail, direct mail, and interview with smart phone users. Empirical analysis based on 330 respondents was conducted in order to test the hypotheses. First, the result of hypotheses testing showed that perceived usefulness among three factors of perceived benefit has the highest positive impact on perceived value, and then followed by perceived playfulness and perceived quality. Second, the result of hypotheses testing showed that perceived cost among three factors of perceived sacrifice has significantly negative impact on perceived value, however, technicality and security risk have no significant impact on perceived value. Also, the result of hypotheses testing showed that perceived value has significant direct impact on continuous intention to use of smart phone. In this regard, marketing managers of smart phone company should pay more attention to improve task efficiency and performance of smart phone, including rate systems of smart phone. Additionally, to test the moderating effect of personal innovativeness, this research conducted multi-group analysis by the degree of personal innovativeness of smart phone users. In a group with high level of innovativeness, perceived usefulness has the highest positive influence on perceived value than other factors. Instead, the analysis for a group with low level of innovativeness showed that perceived playfulness was the highest positive factor to influence perceived value than others. This result of the group with high level of innovativeness explains that innovators and early adopters are able to cope with higher level of cost and risk, and they expect to develop more positive intentions toward higher performance through the use of an innovation. Also, hedonic behavior in the case of the group with low level of innovativeness aims to provide self-fulfilling value to the users, in contrast to utilitarian perspective, which aims to provide instrumental value to the users. However, with regard to perceived sacrifice, both groups in general showed negative impact on perceived value. Also, the group with high level of innovativeness had less overall negative impact on perceived value compared to the group with low level of innovativeness across all factors. In both group with high level of innovativeness and with low level of innovativeness, perceived cost has the highest negative influence on perceived value than other factors. Instead, the analysis for a group with high level of innovativeness showed that perceived technicality was the positive factor to influence perceived value than others. However, the analysis for a group with low level of innovativeness showed that perceived security risk was the second high negative factor to influence perceived value than others. Unlike previous studies, this study focuses on influencing factors on continuous intention to use of smart phone, rather than considering initial purchase and adoption of smart phone. First, perceived value, which was used to identify user's adoption behavior, has a mediating effect among perceived benefit, perceived sacrifice, and continuous intention to use smart phone. Second, perceived usefulness has the highest positive influence on perceived value, while perceived cost has significant negative influence on perceived value. Third, perceived value, like prior studies, has high level of positive influence on continuous intention to use smart phone. Fourth, in multi-group analysis by the degree of personal innovativeness of smart phone users, perceived usefulness, in a group with high level of innovativeness, has the highest positive influence on perceived value than other factors. Instead, perceived playfulness, in a group with low level of innovativeness, has the highest positive factor to influence perceived value than others. This result shows that early adopters intend to adopt smart phone as a tool to make their job useful, instead market followers intend to adopt smart phone as a tool to make their time enjoyable. In terms of marketing strategy for smart phone company, marketing managers should pay more attention to identify their customers' lifetime value by the phase of smart phone adoption, as well as to understand their behavior intention to accept the risk and uncertainty positively. The academic contribution of this study primarily is to employ the VAM (Value-based Adoption Model) as a conceptual foundation, compared to TAM (Technology Acceptance Model) used widely by previous studies. VAM is useful for understanding continuous intention to use smart phone in comparison with TAM as a new IT utility by individual adoption. Perceived value dominantly influences continuous intention to use smart phone. The results of this study justify our research model adoption on each antecedent of perceived value as a benefit and a sacrifice component. While TAM could be widely used in user acceptance of new technology, it has a limitation to explain the new IT adoption like smart phone, because of customer behavior intention to choose the value of the object. In terms of theoretical approach, this study provides theoretical contribution to the development, design, and marketing of smart phone. The practical contribution of this study is to suggest useful decision alternatives concerned to marketing strategy formulation for acquiring and retaining long-term customers related to smart phone business. Since potential customers are interested in both benefit and sacrifice when evaluating the value of smart phone, marketing managers in smart phone company has to put more effort into creating customer's value of low sacrifice and high benefit so that customers will continuously have higher adoption on smart phone. Especially, this study shows that innovators and early adopters with high level of innovativeness have higher adoption than market followers with low level of innovativeness, in terms of perceived usefulness and perceived cost. To formulate marketing strategy for smart phone diffusion, marketing managers have to pay more attention to identify not only their customers' benefit and sacrifice components but also their customers' lifetime value to adopt smart phone.