• Title/Summary/Keyword: Recovered paper

Search Result 603, Processing Time 0.033 seconds

An algorithm for the multi-view image improvement with the restricted number of images in texture extraction (텍스쳐 추출시 제한된 수의 참여 영상을 이용한 multi-view 영상 개선 알고리즘)

  • 김도현;양영일
    • Proceedings of the IEEK Conference
    • /
    • 1998.06a
    • /
    • pp.773-776
    • /
    • 1998
  • In this paper, we propose an efficient multi-view images coding algorithm which finds the optimal texture from the restricted number of multi-view images. The X-Y plane of the normalized object space is divided into triangular patches. The depth value of the node is determined by applying the block based disparity compensation method and then the texture of the each patch is extracted by applying the affine transformation patch is extracted by applying the affine transformation based disparity compensation method to the multi-view images. We restricted the number of images contributed to determining the texture comapred to traditional methods which use all the multi-view images in the texture extraction. Experimental results show that the SNR of images encoded by the proposed algorithm is better than that of imaes encoded by the traditional method by the amount about 0.2dB for the test sets of multi-view images called dragon, kid, city and santa. The recovered images from the encoded data by the proposed method show the better visual images than the recovered images from the encoded data by the traditional methods.

  • PDF

An unusual over-gravid female of Enterobiw uemicularis recovered from a child (소아에서 검출한 특이한 과수태 요충)

  • 채종일;한은택
    • Parasites, Hosts and Diseases
    • /
    • v.35 no.3
    • /
    • pp.215-218
    • /
    • 1997
  • An unusual over-gravid female of Enterobiw uemiculcris was recovered from a 15-month old child by cello-tape anal swab. The patient resided in Inchon and complained of severe anal itching. The worm measured 7.8 mm in length and 0.5 mm in width, and retained typical morphologic features of E. uemiculnris such as cephalic alas and a sharply pointed posterior end. In this gravid female, peculiarly. the uterus was tremendously distended, and about 99% of the whole body length was completely packed with a great number of eggs. Other internal organs were difficult to observe. This paper describes a peculiar over-gravid female of E. vemiculcyis.

  • PDF

Safe Disposal of the 35mm CS Gas Grenades Launcher Set (35mm CS 가스탄 발사셋의 안전처리)

  • Lee, Jong-Chol
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.13 no.6
    • /
    • pp.1147-1152
    • /
    • 2010
  • This paper reports a safe and environmentally-benign demilitarization method for the K305 35mm CS gas grenades launcher set(also known as E-8 launcher). The launcher system was disposed by a two-step process; complete recovery of the explosive cords and the gas grenades from the launcher followed by incineration of the recovered items in the APE-1236 Flashing Furnace. All of the 64 grenades within the 16 tubes of the E-8 launcher were safely recovered and incinerated. In this study, 32 sets of the launcher were used to make a standard operating procedure for the safe demilitarization of the launcher system and the 35mm CS cartridges were all safely destroyed in the experimental burning tests meeting the related environmental regulations.

Development of Drone Racing Simulator using SLAM Technology and Reconstruction of Simulated Environments (SLAM 기술을 활용한 가상 환경 복원 및 드론 레이싱 시뮬레이션 제작)

  • Park, Yonghee;Yu, Seunghyun;Lee, Jaegwang;Jeong, Jonghyeon;Jo, Junhyeong;Kim, Soyeon;Oh, Hyejun;Moon, Hyungpil
    • The Journal of Korea Robotics Society
    • /
    • v.16 no.3
    • /
    • pp.245-249
    • /
    • 2021
  • In this paper, we present novel simulation contents for drone racing and autonomous flight of drone. With Depth camera and SLAM, we conducted mapping 3 dimensional environment through RTAB-map. The 3 dimensional map is represented by point cloud data. After that we recovered this data in Unreal Engine. This recovered raw data reflects real data that includes noise and outlier. Also we built drone racing contents like gate and obstacles for evaluating drone flight in Unreal Engine. Then we implemented both HITL and SITL by using AirSim which offers flight controller and ROS api. Finally we show autonomous flight of drone with ROS and AirSim. Drone can fly in real place and sensor property so drone experiences real flight even in the simulation world. Our simulation framework increases practicality than other common simulation that ignore real environment and sensor.

A posteriori error estimation via mode-based finite element formulation using deep learning

  • Jung, Jaeho;Park, Seunghwan;Lee, Chaemin
    • Structural Engineering and Mechanics
    • /
    • v.83 no.2
    • /
    • pp.273-282
    • /
    • 2022
  • In this paper, we propose a new concept for error estimation in finite element solutions, which we call mode-based error estimation. The proposed error estimation predicts a posteriori error calculated by the difference between the direct finite element (FE) approximation and the recovered FE approximation. The mode-based FE formulation for the recently developed self-updated finite element is employed to calculate the recovered solution. The formulation is constructed by searching for optimal bending directions for each element, and deep learning is adopted to help find the optimal bending directions. Through various numerical examples using four-node quadrilateral finite elements, we demonstrate the improved predictive capability of the proposed error estimator compared with other competitive methods.

Design of the Kernel Hardening Function for Stability the Linux Operating System (리눅스 운영체제 안정화를 위한 커널 하드닝 기능 설계)

  • Jang Seung-Ju
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.6
    • /
    • pp.1333-1340
    • /
    • 2005
  • This paper is based on the study to reduce a system panic state. A panic state could be caused by a programmer or an administrator's careless mistake. The proposed hardening Operating System of this paper stops the process which is running in the kernel with an error. The error process for the value type and the address type of a certain variable have to be restored. Installed with kernel hardening, Operating System checks the recovery possibility of the process first and then restores the process which can be recovered. When it is possible to recover the kernel code with an error, it is to be recovered in ASSERT() function.

Conservation of the Lacquer Artifacts Excavated from Suchon-ri, Gongju, Korea

  • Song, Ji Ae;Jeong, Ah-reum;Kwon, Hyeok-nam;Han, Woo-rim;Lee, Hyun-sang
    • Journal of Conservation Science
    • /
    • v.34 no.6
    • /
    • pp.549-556
    • /
    • 2018
  • In November 2011, various artifacts were excavated from the No. 8 stone-lined tomb in Suchon-ri, Gongju by the Chungnam Institute of History and Culture. These included artifacts with lacquered mainframe and silvery metal ornament. These were recovered together with soil and underwent conservation treatment. In this paper, we discuss the scientific analysis and conservation treatment of the lacquered artifacts excavated from the Suchon-ri site. Among our findings is that the artifacts have three layers of lacquer coating and the metal parts are primarily composed of Ag. As the artifacts were recovered with soil from the site, the soil was removed from underneath and inside the artifacts. The inside of the lacquerware was reinforced with rayon paper using 3% funori, and the metal was treated with acrylic resin after removing the acrylic resin previously used to recover the artifact, followed by cleaning. The metal was also internally reinforced with gauze. Finally, the interior reinforcement was made using PVA and resin in pulp and attached with funori to preserve the shape of the lacquerware, and the exposed rayon was finished with acrylic paint. The main advantages of this study are its review of conservation treatment strategies for lacquer artifacts whose numbers have recently increased, and the application of new conservation treatment methods.

Analysis and Recovery of CIH virus (CIH 바이러스 분석 및 대책)

  • 김광조
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.4
    • /
    • pp.49-60
    • /
    • 1999
  • In this paper we introduce the definition and historical overviews of computer virus program and review their side-effect and ways of infections. We describe the feature of CIH virus which damaged lots of PC systems in Asian countries recently and propose new methods how to rescue against destruction under the operating system of the Microsoft's Windows 95/98. Our experiment results can fix hard disk having FAT32 file system structure and show some popular program cases of having recovered by commercial vaccine program.

Correlation-Based Watermarking Scheme Using Wavelet Transform and Extended Sequences

  • Kanai, Ryota;Kondo, Shozo;Atsuta, Kiyoaki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2004.08a
    • /
    • pp.1717-1720
    • /
    • 2004
  • In this paper we propose a new scheme of watermarking using the discrete wavelet transform, the discrete cosine transform, and the performance evaluation function, which does not deteriorate image quality and have robustness to attacks such as compression and scaling. moreover even if a detected watermark, which is a bit sequence in this paper, has some error bits, it can be correctly recovered using correlation-based determination scheme.

  • PDF

Recovery of Indium from Scrap

  • Han, Kenneth N.
    • Resources Recycling
    • /
    • v.10 no.5
    • /
    • pp.3-7
    • /
    • 2001
  • Indium frequently associated with the semiconductor industry is becoming an important metal element widely used in industry. In this paper, its properties especially in relation to its recovery from scrap are reviewed and discussed. Also presented in this paper is how best indium can be recovered by the hydrometallurgical means.

  • PDF