• 제목/요약/키워드: Technology and Technique

검색결과 12,911건 처리시간 0.047초

Producing a Virtual Object with Realistic Motion for a Mixed Reality Space

  • Daisuke Hirohashi;Tan, Joo-Kooi;Kim, Hyoung-Seop;Seiji Ishikawa
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.153.2-153
    • /
    • 2001
  • A technique is described for producing a virtual object with realistic motion. A 3-D human motion model is obtained by applying a developed motion capturing technique to a real human in motion. Factorization method is a technique for recovering 3-D shape of a rigid object from a single video image stream without using camera parameters. The technique is extended for recovering 3-D human motions. The proposed system is composed of three fixed cameras which take video images of a human motion. Three obtained image sequences are analyzed to yield measurement matrices at individual sampling times, and they are merged into a single measurement matrix to which the factorization is applied and the 3-D human motion is recovered ...

  • PDF

계층분석과정을 통한 절토사면 조사항목의 정량화 (The AHP Method to Quantitate Investigation Items of Cut Slope)

  • 이종영;신창건;김용수;안상로
    • 한국지반공학회:학술대회논문집
    • /
    • 한국지반공학회 2006년도 춘계 학술발표회 논문집
    • /
    • pp.732-737
    • /
    • 2006
  • The facility diagnosis technique of past subjective judged the technical expert and interpreted stably mainly. The facility the periodical civil official becomes indispensability consequently with the law and the system and objectivity inspection which relates with a this and development of diagnosis technique were necessary. Currently the evaluation elements which relate with an inspection and diagnosis technique depended to the subjectivity of each facility quality, data statistics, diagnosis know-how, various circumstance and the technical expert and the evaluation item came to decide. But the evaluation score distribution of marks of each item depended plentifully in data analysis result and experience. The past method is weak in logically because the objection theoretical background and basis are insufficiency. Consequently in order to apply a data analysis result and an experience logically, it used AHP(Analytic Hierarchy Process) method from this research. It is visible with the fact that the application result reconfirmation and complement process will be necessary the technique which is suitable in the multi facility management. Also it is expected with the fact that the application characteristic from the next relation technique will be excellent.

  • PDF

An Iterative Technique for Real-Time Tracking of Power System Harmonics

  • Sidhu, T.S.;Zadeh, M.R.D.;Pooranalingam, P.J.;Oh, Yong-Taek
    • Journal of Electrical Engineering and Technology
    • /
    • 제6권3호
    • /
    • pp.319-327
    • /
    • 2011
  • An iterative technique based on orthogonal filters and frequency tracking is proposed to estimate harmonic components in power systems. The technique uses frequency interpolation to estimate fundamental frequency and harmonics when the nominal frequency of the signal is a non-integer value. Due to the number of computations involved during the generation of filter coefficients, an offline computation is suggested. Beneficial features of the proposed technique include fixed sampling rate and fixed data window size. The performance of the proposed technique is examined by simulating different power system operating conditions and evaluating the data from these simulations. A technique based on Fast Fourier Transform is also used to estimate the harmonic components for all the simulated signals. These estimates are compared with those obtained from the proposed technique. Results show that the proposed technique can converge to the accurate fundamental frequency and therefore, provide accurate harmonic components even when the fundamental frequency is not equal to the nominal frequency.

Realizing a Mixed Reality Space Guided by a Virtual Human;Creating a Virtual Human from Incomplete 3-D Motion Data

  • Abe, Shinsuke;Yamaguti, Iku;Tan, Joo Kooi;Ishikawa, Seiji
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2003년도 ICCAS
    • /
    • pp.1625-1628
    • /
    • 2003
  • Recently the VR technique has evolved into a mixed reality (MR) technique, in which a user can observe a real world in front of him/her as well as virtual objects displayed. This has been realized by the employment of a see-through type HMD (S-HMD). We have been developing a mixed reality space employing the MR technique. The objective of our study is to realize a virtual human that acts as a man-machine interface in the real space. It is important in the study to create a virtual human acting naturally in front of a user. In order to give natural motions to the virtual human, we employ a developed motion capture technique. We have already created various 3-D human motion models by the motion capture technique. In this paper, we present a technique for creating a virtual human using a human model provided by a computer graphics software, 3D Studio Max(C). The main difficulty of this issue is that 3D Studio Max(C) claims 28 feature points for describing a human motion, but the used motion capture system assumes less number of feature points. Therefore a technique is proposed in the paper for producing motion data of 28 feature points from the motion data of less number of feature points or from incomplete motion data. Performance of the proposed technique was examined by observing visually the demonstration of some motions of a created virtual human and overall natural motions were realized.

  • PDF

A Novel Jamming Detection Technique for Wireless Sensor Networks

  • Vijayakumar, K.P.;Ganeshkumar, P.;Anandaraj, M.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권10호
    • /
    • pp.4223-4249
    • /
    • 2015
  • A novel jamming detection technique to detect the presence of jamming in the downstream direction for cluster based wireless sensor networks is proposed in this paper. The proposed technique is deployed in base station and in cluster heads. The proposed technique is novel in two aspects: Firstly, whenever a cluster head receives a packet it verifies whether the source node is legitimate node or new node. Secondly if a source node is declared as new node in the first step, then this technique observes the behavior of the new node to find whether the new node is legitimate node or jammed node. In order to monitor the behavior of the existing node and new node, the second step uses two metrics namely packet delivery ratio (PDR) and received signal strength indicator (RSSI). The rationality of using PDR and RSSI is presented by performing statistical test. PDR and RSSI of every member in the cluster is measured and assessed by the cluster head. And finally the cluster head determines whether the members of the cluster are jammed or not. The CH can detect the presence of jamming in the cluster at member level. The base station can detect the presence of jamming in the wireless sensor network at CH level. The simulation result shows that the proposed technique performs extremely well and achieves jamming detection rate as high as 99.85%.

A Noise Re-radiation Calibration Technique in Interferometric Synthetic Aperture Radiometer for Sub-Y-type Array at Ka-Band

  • Seo Seungwon;Kim Sunghyun;Choi Junho;Park Hyuk;Lee Hojin;Kim Yonghoon;Kang Gumsil
    • 대한원격탐사학회:학술대회논문집
    • /
    • 대한원격탐사학회 2004년도 Proceedings of ISRS 2004
    • /
    • pp.577-580
    • /
    • 2004
  • To overcome with large size noise source distribution network design difficulty in interferometric radiometer system, especially for sub-Y-type array, a new on-board calibration technique using noise re-radiation is proposed in this paper. The suggested calibration technique is using noise re-radiation effect of center antenna after noise source injection from matched load. This approach is especially proper to sub-Y-type array interferometric synthetic aperture radiometer in mm-wave frequency band. Compared with noise injection network of a conventional synthetic aperture radiometer, the system mass, volume, and hardware complexity is reduced and cost-effective. Only one internal noise source, matched load, is used for injection using noise re-radiation technique a small set of sub-Y receiver channels is calibrated. Detailed calibration scenario is discussed and simulation results about noise re­radiation effect are presented.

  • PDF

복합재료 적층판의 유한요소 해석을 위한 효율적 경계조건 (Effective Boundary Conditions for FEM Analysis of Composite Laminates)

  • 김택현
    • 한국생산제조학회지
    • /
    • 제7권3호
    • /
    • pp.92-98
    • /
    • 1998
  • This paper presents three boundary techniques which are useful for FEM analysis of composite laminates: 1) a rotational symmetric boundary technique . 2) a quasi three-dimensional boundary technique and 3) a contact boundary technique. The use of the rotational symmetric boundary technique is possible for a smaller FEM model. With the use of the quasi three-dimensional boundary tecnique. quasi three dimensional analysis of composite laminates can be performed on the conventional 3-D FEM program These techniques can readily be adopted to FEM programs.

  • PDF

적정기술 관점에서 보는 근관 충전 (Root Canal Obturation from the Viewpoint of Appropriate Technology)

  • 김선일
    • 대한치과의사협회지
    • /
    • 제56권10호
    • /
    • pp.567-571
    • /
    • 2018
  • Obturation is a important procedure of root canal treatment. Canal filling should be both provide a hermetic seal for the root canal system and eliminate leakage channel from the oral cavity. Gutta-percha have been the standard material of choice for root canal obturation. Canal filling has been aimed at maximizing the amount of gutta-percha and minimizing the amount of sealer. However recently, single cone technique has been introduced that include calcium silicate-based sealer and single gutta-percha cone. It is important to select an obturation technique that offers consistency and is easy to use. From the standpoint of appropriate technology, the single cone technique is thought to be useful for general dentist.

  • PDF

Enhanced technique for Arabic handwriting recognition using deep belief network and a morphological algorithm for solving ligature segmentation

  • Essa, Nada;El-Daydamony, Eman;Mohamed, Ahmed Atwan
    • ETRI Journal
    • /
    • 제40권6호
    • /
    • pp.774-787
    • /
    • 2018
  • Arabic handwriting segmentation and recognition is an area of research that has not yet been fully understood. Dealing with Arabic ligature segmentation, where the Arabic characters are connected and unconstrained naturally, is one of the fundamental problems when dealing with the Arabic script. Arabic character-recognition techniques consider ligatures as new classes in addition to the classes of the Arabic characters. This paper introduces an enhanced technique for Arabic handwriting recognition using the deep belief network (DBN) and a new morphological algorithm for ligature segmentation. There are two main stages for the implementation of this technique. The first stage involves an enhanced technique of the Sari segmentation algorithm, where a new ligature segmentation algorithm is developed. The second stage involves the Arabic character recognition using DBNs and support vector machines (SVMs). The two stages are tested on the IFN/ENIT and HACDB databases, and the results obtained proved the effectiveness of the proposed algorithm compared with other existing systems.

Steganography: A Flexible Embedded Randomization Technique

  • Khaled H., Abuhmaidan;Ahmad K., Kayed;Maryam, Alrisia
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제17권1호
    • /
    • pp.120-144
    • /
    • 2023
  • With the expansion of digital communication networks, a considerable number of randomization techniques have been invented and implemented to enhance the different data transmission algorithms' levels of security. Steganography is among the data transmissions techniques used to hide secret data. Nowadays, several randomization techniques have been used in steganography to elevate the security of transmitted data. Unfortunately, the majority of these techniques lack some simplicity, efficiency, and flexibility, in addition to other limitations. This research presents a new randomization technique called Rand-Stego. Rand-Stego could be applied/practiced over any steganography technique. It provides simplicity and efficiency and elevates the security level. Examples of implementing the proposed technique on some steganography algorithms will be explored. The proposed and current techniques will be compared. The obtained results show Rand-Stego's superiority in terms of efficiency and flexibility when compared to the current techniques.