• 제목/요약/키워드: Overlay View

검색결과 33건 처리시간 0.018초

An Evaluation Model for Analyzing the Overlay Error of Computer-generated Holograms

  • Gan, Zihao;Peng, Xiaoqiang;Hong, Huajie
    • Current Optics and Photonics
    • /
    • 제4권4호
    • /
    • pp.277-285
    • /
    • 2020
  • Computer-generated holograms (CGH) are the core devices to solve the problem of freeform surface measurement. In view of the overlay error introduced in the manufacturing process of CGH, this paper proposes an evaluation model for analyzing the overlay error of CGH. The detection method of extracting CGH profile information by an ultra-depth of field micro-measurement system is presented. Furthermore, based on the detection method and technical scheme, the effect of overlay error on the wavefront accuracy of CGH can be evaluated.

2차원 지형정보와 격자형 고도자료의 중첩도시 기법 연구 (A Study on Perspective Display Using 3D Elevation Data with 2D Information Overlay)

  • 이병길;이상지
    • 방송공학회논문지
    • /
    • 제2권1호
    • /
    • pp.36-44
    • /
    • 1997
  • 2차원 지형정보의 고속 중첩 도시에 적합한 효율적인 3차원 지형 입체 도시 방안을 제안하였으며 벡터지도를 소프트웨어로 복원 도시 후 래스터화한 VRRG(Vector Restored Raster Graphics)의 지형 속성별 고유칼라인덱스를 이용하여 벡터 지도와 같이 지형 지물을 선택 도시하는 기능과 함께 선명한 2차원 래스터 지도를 3차원 지형 고도 위에 중첩 도시를 할 수 있게 되었으며 각종 상황 정보, 지형 분석 결과 둥의 중첩도시를 효율적으로 수행할 수 있게 되었다.

  • PDF

GIS를 이용한 3차원도로시뮬레이션에 관한 연구 (A Study on the Three Dimensional Road Design Technique Based on GIS Technique)

  • 권혁춘;이병걸
    • 한국환경과학회지
    • /
    • 제13권6호
    • /
    • pp.489-495
    • /
    • 2004
  • The purpose of this research is to apply GIS(Geographic Information System) for the road simulation and find some benefits analysis for the design processes. The northern Jeju island was selected as a case study. The 1/5,000 digital map and GIS technique were used for optimum road design of the island based on Arc View software. Using this software we can get an overlay map by combination of hill shade map, slope map, aspect map, and building buffer map. Based on the overlay map, we designed the optimum road line and performed three dimensional simulation. From the results, we found that the developed three dimensional road simulation technique using GIS technique that was very useful tool to estimate the reasonable road design before the real road construction works.

오버레이 멀티캐스트 기술 분석 (Study on Overlay Multicast Mechanisms)

  • 박주영;정옥조;강신각
    • 한국정보통신학회:학술대회논문집
    • /
    • 한국해양정보통신학회 2003년도 추계종합학술대회
    • /
    • pp.912-915
    • /
    • 2003
  • 최근 대두되는 네트워크 게임이나 인터넷 생방송 둥의 각종 그룹 통신응용을 지원하기 위해선 IP 멀티캐스트가 지원되어야 한다. 하지만 IP 멀티캐스트를 적용하기 위해선 해결되어야 할 문제점들로 인하여 현재의 인터넷에서는 적용되지 못하고 있다. 오버레이 멀티캐스트 기술은 IP 멀티캐스트가 도입되지 않은 현재의 유니캐스트 기반 인터넷 환경에서 그룹 통신을 보다 효율적으로 제공해 줄 수 있는 메커니즘으로, 최근 많은 연구가 진행되고 있다. 본 고에서는 이들 오버레이 멀티캐스트 기술을 보다 체계적으로 분석한다.

  • PDF

산악지역에서의 수치사진측량에 의한 DEM추출과 GIS를 이용한 3차원 도로시뮬레이션에 관한 연구 (A Study On Choosing The Most Suitable Roadline Using Digital Photogrammetry and GIS in Mountain Area)

  • 권혁춘;이병걸
    • 한국측량학회지
    • /
    • 제24권1호
    • /
    • pp.123-130
    • /
    • 2006
  • 본 연구에서는 기존의 수치지도를 이용한 3차원 도로설계를 이용한 방법대신에 수치지도에서 뚜렷하게 나타나지는 않는 지역을 수치사진측량방법으로 항공사진을 이용하여 DEM을 추출하여 3차원 도로설계에 적용하였다. 이를 위하여 한 쌍의 입체항공사진으로부터 수치표고모델을 생성하고 정사사진을 추출한 다음 GIS기법을 적용하여 도로설계를 위한 최적노선을 선정하였다. GIS 프로그램인 Arc View 및 MGE module 소프트웨어를 이용하여 음영기복도, 경사도. 방향도 및 지형지물의 위치도등을 결합시켜 Overlay map을 형성하여 최적노선을 선정하고 이 노선에 따라 3차원 시뮬레이션을 진행하여 그 효과를 검토하고자 하였다. 그 결과 항공사진으로부터 얻어낸 수치표고모델과 정사사진은 최적노선선정에 매우 유효하였으며, 3차원 시뮬레이션을 진행함으로서 그 효과를 충분히 확인할 수 있었다.

부산항에 있어서 묘박을 위한 랜드마크 체험에 관한 연구 (A Study on the Landmark Experience for Anchorage in Pusan port)

  • 이동화;강영조
    • 한국조경학회지
    • /
    • 제27권4호
    • /
    • pp.59-64
    • /
    • 1999
  • This study is about gaining orientation through anchorage act of a group of ferryman. In addition, a point acquisition and character of landmark that is closely realated to a point acquisition would be clarified by studying the form of configuration of the earth and object which is used landmark for anchorage. There are 13 anchorage points in the north part of Pusan harbor. 12 anchorage points are used to anchor. A ferryman let a ship which is temporarily anchoring move safely and speedily at the anchorage point. At that time, he uses landmarks by a technique of Overlay View. Between landmarks and viewer would be formed exquisite location combination. A mountain peak, a peak of island, nature configuration of land such as intermitent rock and location, size and form of buildings or structures of a city were variously appeared as landscape elements which were used landmarks. Looking at conditions to be easily captured as a target object, 1. A particular point of a mountain ridge line which was not shield by buildings. 2. In case objects have similar form, the building which was located in the front or the highest. 3. In case of a singular object, whatever there is physical elements, that would be a target object. Through this study a configuration of the ground such as a mountain peak which is become the background of harbor landscape is very important element to find anchorage point in configuration of the ground and object. So, the continuous preservation of the contour line of mountain is needed to do safe and effective anchorage act.

  • PDF

Overlay Multicast Update Strategy Based on Perturbation Theory

  • Shen, Ye;Feng, Jing;Ma, Weijun;Jiang, Lei;Yin, Min
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제11권1호
    • /
    • pp.171-192
    • /
    • 2017
  • The change of any element in the network is possible to cause performance degradation of the multicast network. So it is necessary to optimize the topology path through the multicast update strategy, which directly affects the performance and user experience of the overlay multicast. In view of the above, a new multicast tree update strategy based on perturbation theory Musp (Multicast Update Strategy based on Perturbation theory) is proposed, which reduces the data transmission interruption caused by the multicast tree update and improves user experiences. According to the multicast tree's elements performance and the topology structure, the Musp strategy defines the multicast metric matrix and based on the matrix perturbation theory it also defines the multicast fluctuation factor. Besides it also demonstrates the calculability of the multicast fluctuation factor presents the steps of the Musp algorithm and calculates the complexity. The experimental results show that compared with other update strategies, as for the sensitivity of the multicast fluctuation factor's energized multicast tree to the network disturbance, the maximum delay of the Musp update strategy is minimal in the case of the local degradation of network performance.

무안경 완전시차 입체 재현을 위한 서브픽셀 다중화 (Sub-pixel Multiplexing for Autostereoscopic Full Parallax 3D)

  • 음호민;이광순
    • 한국멀티미디어학회논문지
    • /
    • 제20권12호
    • /
    • pp.2009-2015
    • /
    • 2017
  • A two-dimensional lens is required to reproduce both the horizontal and vertical parallax through an autostereoscopic 3D display. Among the two-dimensional lenses, a hexagonal micro lens array (MLA) having good optical efficiency is mainly used. However, the hexagonal MLA has complex geometric features. The first feature is that the lens cells are zigzagged in the vertical direction, which should be reflected in the view number calculation for each sub-pixel. The second feature is that the four sides of a hexagonal lens cell are tilted, requiring a more careful view index assignment to the lens cell. In this paper, we propose a sub-pixel multiplexing scheme suitable for the features of the hexagonal MLA. We also propose a view-overlay algorithm based on a two-dimensional lens and compare subjective image quality with existing view-selection through autostereoscopic 3D display implementation.

RGB-D 센서, AR 마커, 색수정 알고리즘을 활용한 매니퓰레이터 투명화 (Transparent Manipulators Accomplished with RGB-D Sensor, AR Marker, and Color Correction Algorithm)

  • 김동엽;김영지;손현식;황정훈
    • 로봇학회논문지
    • /
    • 제15권3호
    • /
    • pp.293-300
    • /
    • 2020
  • The purpose of our sensor system is to transparentize the large hydraulic manipulators of a six-ton dual arm excavator from the operator camera view. Almost 40% of the camera view is blocked by the manipulators. In other words, the operator loses 40% of visual information which might be useful for many manipulator control scenarios such as clearing debris on a disaster site. The proposed method is based on a 3D reconstruction technology. By overlaying the camera image from front top of the cabin with the point cloud data from RGB-D (red, green, blue and depth) cameras placed at the outer side of each manipulator, the manipulator-free camera image can be obtained. Two additional algorithms are proposed to further enhance the productivity of dual arm excavators. First, a color correction algorithm is proposed to cope with the different color distribution of the RGB and RGB-D sensors used on the system. Also, the edge overlay algorithm is proposed. Although the manipulators often limit the operator's view, the visual feedback of the manipulator's configurations or states may be useful to the operator. Thus, the overlay algorithm is proposed to show the edge of the manipulators on the camera image. The experimental results show that the proposed transparentization algorithm helps the operator get information about the environment and objects around the excavator.

Security in Network Virtualization: A Survey

  • Jee, Seung Hun;Park, Ji Su;Shon, Jin Gon
    • Journal of Information Processing Systems
    • /
    • 제17권4호
    • /
    • pp.801-817
    • /
    • 2021
  • Network virtualization technologies have played efficient roles in deploying cloud, Internet of Things (IoT), big data, and 5G network. We have conducted a survey on network virtualization technologies, such as software-defined networking (SDN), network functions virtualization (NFV), and network virtualization overlay (NVO). For each of technologies, we have explained the comprehensive architectures, applied technologies, and the advantages and disadvantages. Furthermore, this paper has provided a summarized view of the latest research works on challenges and solutions of security issues mainly focused on DDoS attack and encryption.