• Title/Summary/Keyword: Virtual methods

Search Result 1,426, Processing Time 0.033 seconds

Linear Interpolation Transition of Character Animation for Immediate 3D Response to User Motion

  • Lim, Sooyeon
    • International Journal of Contents
    • /
    • v.11 no.1
    • /
    • pp.15-20
    • /
    • 2015
  • The purpose of this research is to study methods for performing transition that have visual representation of corresponding animations with no bounce in subsequently recognized user information when attempting to interact with a virtual 3D character in real-time using user motion. If the transitions of the animation are needed owing to a variety of external environments, continuous recognition of user information is required to correspond to the motion. The proposed method includes linear interpolation of the transition using cross-fades and blending techniques. The normalized playing time of the source animation was utilized for automatically calculating the transition interpolation length of the target animation and also as the criteria in selecting the crossfades and blending techniques. In particular, in the case of blending, the weighting value based on the degree of similarity between two animations is used as a blending parameter. Accordingly, transitions for visually excellent animation are performed on interactive holographic projection systems.

Secure Password-based Authentication Method for Mobile Banking Services

  • Choi, Dongmin;Tak, Dongkil;Chung, Ilyong
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.1
    • /
    • pp.41-50
    • /
    • 2016
  • Moblie device based financial services are vulnerable to social engineering attacks because of the display screen of mobile devices. In other words, in the case of shoulder surfing, attackers can easily look over a user's shoulder and expose his/her password. To resolve this problem, a colour-based secure keyboard solution has been proposed. However, it is inconvenient for genuine users to verify their password using this method. Furthermore, password colours can be exposed because of fixed keyboard colours. Therefore, we propose a secure mobile authentication method to provide advanced functionality and strong privacy. Our authentication method is robust to social engineering attacks, especially keylogger and shoulder surfing attacks. According to the evaluation results, our method offers increased security and improved usability compared with existing methods.

A Tor Security Policy using Exit Relay Methodology (출구 릴레이 방법론을 이용한 Tor 보안 정책)

  • Jang, Duk-Sung;Park, So-Yeon;Choi, Du-Young
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.6
    • /
    • pp.911-917
    • /
    • 2017
  • Tor proxy tool is studied which is most frequently used for ransomeware to penetrate into sensitive information. It will be researched for the malicious methods to spread virus by using Tor and considered a countermeasure to prevent them. We present exit relay methodology for Tor security policy, simulate it, and get a probability to detect the ransomeware. And we compare it with TSS technology which is able to protect the attack via virtual server on exit relay.

An Optimal Thresholding Method for the Voxel Coloring in the 3D Shape Reconstruction

  • Ye, Soo-Young;Kim, Hyo-Sung;Yi, Young-Youl;Nam, Ki-Gon
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2005.06a
    • /
    • pp.1695-1700
    • /
    • 2005
  • In this paper, we propose an optimal thresholding method for the voxel coloring in the reconstruction of a 3D shape. Our purposed method is a new approach to resolve the trade-off error of the threshold value on determining the photo-consistency in the conventional method. Optimal thresholding value is decided to compare the surface voxel of photo-consistency with inside voxel on the optic ray of the center camera. As iterating the process of the voxels, the threshold value is approached to the optimal value for the individual surface voxel. And also, graph cut method is reduced to the surface noise on eliminating neighboring voxel. To verify the proposed algorithm, we simulated in the virtual and real environment. It is advantaged to speed up and accuracy of a 3D face reconstruction by applying the methods of optimal threshold and graph cut as compare with conventional algorithms.

  • PDF

A Survey of Augmented Reality on Handheld Devices (휴대단말기 기반 증강현실 시스템 연구 및 개발 동향)

  • Awan, Muhammad Arshad;Kim, Cheong Ghil;Hong, Chung-Pyo;Lee, Jung-Hoon;Kim, Shin-Dug
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.5 no.4
    • /
    • pp.195-205
    • /
    • 2010
  • The popularity of Smartphones makes new fields of applications based on location based service easily feasible with a new user interface called augmented reality (AR). It presents a particularly powerful user interface to context-aware computing environments. AR on Smartphones integrates virtual information into a person's physical environment by overlaying information on an image taken through Smartphone's camera and motion sensors. Mobile augmented reality systems provide this service without constraining the individual's whereabouts to a specially equipped area. This work presents an overview of handheld augmented reality focusing on applications with introducing the basic issues of them. For this purpose, an example system, Studierstube ES (embedded system), is cited, which introduces the most significant problems and various methods of solving them through the experience of converting existing PC-based AR system into handheld AR.

Forging Process with Al6061 Alloy Rheology Material by Electromagnetic Stirring System (전자교반을 응용한 Al6061 레오로지 소재의 단조공정)

  • Kang, S.S.;Oh, S.W.;Kang, C.G.
    • Transactions of Materials Processing
    • /
    • v.16 no.6
    • /
    • pp.443-446
    • /
    • 2007
  • The semi-solid process has been developed near net-shape components for kinds of methods. Thixo-forming with reheating prepared billet and rheo-forming with cooled melt until semi-solid state. Material is applied electromagnetic stirring system to slurry with aluminum 6061 alloy. An experiment has variation factors which are pressure, solid-fraction, stirring current and stirring time. The mechanical properties are compared to forge sample with to apply heat treatment T6. This study is researched function a virtual pressure and fine shape zone. Optimum pressure is found to prevent defect of porosity.

A Study on Intelligent Contents for Virtual University

  • Sik, Hong-You;Son, Jeong-Kwang;Park, Chong-Kug
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2004.04a
    • /
    • pp.422-425
    • /
    • 2004
  • Many believe that electronic distance teaming education transform higher education, saving money and improving learning qualify So, the open University, which teaches around 280,000 students at a distance, is examining the adaption of its distance teaching methods for the internet. But, there are only one type of distance learning education of one way direction. To understand all of a student which selected some of e teaming course, teacher must check that how many student to understand and what is the difficult problems. Without checking this condition, It will be a very difficult and boring distance learning course. In this paper, we introduce of intelligent learning contents of full duplex direction that teach understanding student and not understanding student. The computer simulation results confirms that full duplex e learning system has been proven to be much more efficient than one way direction which not considering about understanding problems.

  • PDF

Three-Dimensional Data Visualization Program Combined with Position Tracking System Using Stereo Cameras (스테레오 카메라에 의한 위치 추적과 3차원 데이터 후처리 프로그램의 연동)

  • Kim, Byoung-Soo;Seo, Jin-Won;Lee, Bong-Ju
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.9 no.4
    • /
    • pp.114-119
    • /
    • 2006
  • Data post-processing programs are used for analysis and visualization of the data obtained from computational fluid methods or flow field experiments. In this paper 3D data visualization system which combines a data visualization program with position tracking system using stereo cameras is introduced. This system offers virtual environment for visualization and analysis of three dimensional data.

Application SVD-Least Square Algorithm for solving astronomical ship position basing on circle of equal altitude equation

  • Nguyen, Van Suong;Im, Namkyun
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2013.10a
    • /
    • pp.130-132
    • /
    • 2013
  • This paper presents an improvement for calculating method of astronomical vessel position with circle of equal altitude equation based on using a virtual object in sun and two stars observation. In addition, to enhance the accuracy of ship position achieved from solving linear matrix system, and surmount the disadvantages on rank deficient matrices situation, the authors used singular value decomposition (SVD) in least square method instead of normal equation and QR decomposition, so, the solution of matrix system will be available in all situation. As proposal algorithm, astronomical ship position will give more accuracy than previous methods.

  • PDF

Analysis of Dynamic bandwidth allocation scheme for ATM/LAN interworking unit (ATM/LAN 연동장치의 동적대역할당 방식에 대한 성능해석)

  • 이은준;우상철;윤종호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3132-3143
    • /
    • 1996
  • In the evaluation of Broadband-ISDN, the main issue is to interconnect existing LANs and MANs to B-ISDN based on Asynchrous Transfer Mode. However, LANs provide connectionless services, whereas the ATM network provides connection-oriented services. So some problem arises from accessing ATM switchs to transparently transmit connectionless data via B-ISDN. Two methods then were recommended by ITU-TS to support the connectionaless services. In the paper, we do the numerical analysis, using the stochastic fluid flow method, of dynamic bandwidth allocation sheme with two class traffics in the virtual path established between Interworking Units(JWUS) interconnecting LANs to an ATM network and Connectionless Servers(CLSs). The loss mechanism of each traffic is controlled by the contents of buffer. The vandwidth which the IWU requests the CLS is estimated by the number of On-Off sources in the On state. We use the stochsastic fluide flow method which is to find the steady-state joint probability in each level of the IWU buffer. The length of the IWU buffer as the real random variable is changed by traffics entering the IWU.

  • PDF