• Title/Summary/Keyword: Video observation

Search Result 260, Processing Time 0.027 seconds

A BINARY OBSERVING PROJECT ON THE NCUO SPECKLE INTERFEROMETER

  • TSAY WEAN-SHUN;KUO HUI-JEAN;CHAN PEI-CHING
    • Journal of The Korean Astronomical Society
    • /
    • v.29 no.spc1
    • /
    • pp.409-410
    • /
    • 1996
  • Speckle Interferometer equipped with an ITT intensified CCD have been used on the NCUO ( National Central University Observatory, Taiwan) 24-inch telescope for studying the orbits of bright binary systems selected from the Yale's Bright Star Catalogue. The high resolution and high sensitivity ITT intensified solid state video camera ( F4577 ) has external gain and gate control functions which will simplify the design of the speckle camera and allow us to do precise speckle photometry. The goal of this project is trying to study the bright binary systems with separations between the average size of seeing disk and the diffraction limit of the 24-inch telescope. Recently some observing data have been reduced and compared with the other teams' results. We are now improving the data reduction technology and trying to use real time observing mode on the monthly routine observation.

  • PDF

A Case Study of Procedural and Conceptual Knowledge Construction in the Computer Environments

  • Lee, Joong-Kwoen
    • Research in Mathematical Education
    • /
    • v.8 no.2
    • /
    • pp.81-93
    • /
    • 2004
  • This study investigated three preservice teachers' mathematical problem solving among hand-in-write-ups and final projects for each subject. All participants' activities and computer explorations were observed and video taped. If it was possible, an open-ended individual interview was performed before, during, and after each exploration. The method of data collection was observation, interviewing, field notes, students' written assignments, computer works, and audio and videotapes of preservice teachers' mathematical problem solving activities. At the beginning of the mathematical problem solving activities, all participants did not have strong procedural and conceptual knowledge of the graph, making a model by using data, and general concept of a sine function, but they built strong procedural and conceptual knowledge and connected them appropriately through mathematical problem solving activities by using the computer technology.

  • PDF

A Qualitative Research of Relational Aggression of 4-year-olds' Play (만4세 유아의 놀이에 나타난 관계적 공격성에 관한 질적연구)

  • JUNG, Eun-Hee
    • Journal of Fisheries and Marine Sciences Education
    • /
    • v.29 no.1
    • /
    • pp.242-256
    • /
    • 2017
  • The purpose of this study was to describe and understand the characteristics of morphological, contextual as relational aggression among 4-year old children during free play periods. The ethnographic methods included participants observation of children's play interaction behaviors, field notes, video taping and analysis of transcribed date. The results are as exclusion occurred by group power taking the relational attribute, including direct language, while the other would not be revealed easily other than being in line with real relation. Also as follows; proactive relational aggression was more frequently observed in girls, and their major strategies employed against someone they disliked were ignoring them, distorting play-rules, and so on. Major strategies of reactive relational aggression in girls were largely manipulative in nature, for example, 'threatrning their friend' and 'withdrawal of friendship'.

Preprocessing for High Quality Real-time Imaging Systems by Low-light Stretch Algorithm

  • Ngo, Dat;Kang, Bongsoon
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.585-589
    • /
    • 2018
  • Consumer demand for high quality image/video services led to growing trend in image quality enhancement study. Therefore, recent years was a period of substantial progress in this research field. Through careful observation of the image quality after processing by image enhancement algorithms, we perceived that the dark region in the image usually suffered loss of contrast to a certain extent. In this paper, the low-light stretch preprocessing algorithm is, hence, proposed to resolve the aforementioned issue. The proposed approach is evaluated qualitatively and quantitatively against the well-known histogram equalization and Photoshop curve adjustment. The evaluation results validate the efficiency and superiority of the low-light stretch over the benchmarking methods. In addition, we also propose the 255MHz-capable hardware implementation to ease the process of incorporating low-light stretch into real-time imaging systems, such as aerial surveillance and monitoring with drones and driving aiding systems.

A Qualitative Study on Pansori Learning Using Voice Bulletin Board System (음성 게시판을 활용한 판소리 학습 효과에 대한 질적 연구)

  • Kang, Eui-Sung;Jung, Yoo-Hwa
    • Journal of The Korean Association of Information Education
    • /
    • v.6 no.3
    • /
    • pp.308-316
    • /
    • 2002
  • In this paper, a learning method of Pansori using voice bulletin board system is introduced. Also, the influence of the proposed approach on learners is analyzed by qualitative methods such as participatory observation, interview and video recording. The results of the qualitative analysis shows that the proposed approach can be effectively applied to Pansori learning. Futhermore, it can be seen that learners have a great interest in Korean traditional folk music.

  • PDF

The Design of Multicase Key distribution Protocol based CBT(Core Based Tree) (CBT(Core Based Tree)를 기반으로 한 멀티캐스트 키 분배 프로토콜 설계)

  • Kim, Bong-Han;Lee, Jae-Gwang
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1184-1192
    • /
    • 2000
  • Multicast has communication mechanism that is able to transfer voice, video for only the specific user group. As compared to unicast, multicast is more susceptive to attack such as masquerading, malicious replay, denial of service, repudiation and traffic observation, because of the multicast has much more communication links than unicast communication. Multicast-specific security threats can affect not only a group's receivers, but a potentially large proportion of the internet. In this paper, we proposed the multicast security model that is able to secure multi-group communication in CBT(Core Based Tree), which is multicast routing. And designed the multicast key distribution protocol that can offer authentication, user privacy using core (be does as Authentication Server) in the proposed model.

  • PDF

A Study on Optical Changes and Sequence Discrimination of Toner-printed Text and Writing Text (토너 출력문자와 필기구류 기재문자 간 광학적 변화와 선후관계에 관한 연구)

  • Lee, Ka Young;Yoon, Do-Young;Lee, Joong
    • Korean Chemical Engineering Research
    • /
    • v.55 no.1
    • /
    • pp.135-140
    • /
    • 2017
  • This paper is on a study for discrimination on relative sequence as a most actively discussed topic in forensic document fields. This paper describes the application of the visual spectral comparator and infinite focus microscope as observation methods for overlapping region of printing and writing lines. As a result, we could categorize overlapping region images and identify the sequence of printing and writing lines by various inks.

The Characteristics of Formative Assessment in Elementary School Science Teaching (초등학교 과학수업에서 형성평가의 실제)

  • 엄재호;남정희;최병순
    • Journal of Korean Elementary Science Education
    • /
    • v.19 no.2
    • /
    • pp.83-92
    • /
    • 2000
  • The purpose of this study was to investigate the characteristics of formative assessment in elementary school science teaching. In order to examine the practices of formative assessment in science teaching, 8 science classes were observed and video-taped for each of two instructions. We also interviewed the teachers and students with semi-structured questions. The result indicated that the teachers used planned formative assessment and interactive formative assessment. Teachers assessed three aspects of student loaming in science classroom: the student's personal, social and science development. However, the majority assessed in science teaching was science development. Teachers used observation, question and answer, dialogue, reports, and presentation as the formative assessment methods. The process of formative assessment was categorized as to get information, to judge and to give feedback. These three aspects were interrelated and interdependent. The type of question and feedback was influenced on the extent of the interaction between teachers and students.

  • PDF

A Study on Development of Intelligent CCTV Security System based on BIM (건물정보모델 기반 지능형 CCTV 보안감시 시스템 개발)

  • Kim, Ik-Soon;Shin, Hyun-Shik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.6 no.5
    • /
    • pp.789-795
    • /
    • 2011
  • This paper aims to develop authoring tools and services platform that can be Immediate response through supervisor's intuitive understanding based 3d-Building Information mode about overall security situation of building by mapping many CCTV images on 3D space information from traditional observation way that make simply visualize CCTV images on the Situation Board.

A Study of Relay Efficiency in WCDMA Core Networks Using BICC Signaling Protocol (BICC 적용을 통한 WCDMA 교환망 중계 효율성 제고방안 연구)

  • Cho, Jeong-Je;Kim, Nak-Po
    • Proceedings of the IEEK Conference
    • /
    • 2007.07a
    • /
    • pp.147-148
    • /
    • 2007
  • BICC protocol is a relay protocol adaptable to ATM and IP based core networks compared to ISUP protocol to TDM networks. Using BICC protocol, multi-rate bearer traffic such as voice and video can flow in the relay core networks. BICC protocol is standardized as WCDMA circuit switching networks in 3GPP Release 4. Thus KTF is now operating core networks using BICC protocol. In this paper, we describe the background and characteristics of BICC protocol. We also provide the status of KTF WCDMA core networks using BICC. To show the efficiency of BICC protocol an analytical simulation is given in which the results can be expected by intuitive observation.

  • PDF