• Title/Summary/Keyword: chain code

Search Result 218, Processing Time 0.02 seconds

Virtual Block Game Interface based on the Hand Gesture Recognition (손 제스처 인식에 기반한 Virtual Block 게임 인터페이스)

  • Yoon, Min-Ho;Kim, Yoon-Jae;Kim, Tae-Young
    • Journal of Korea Game Society
    • /
    • v.17 no.6
    • /
    • pp.113-120
    • /
    • 2017
  • With the development of virtual reality technology, in recent years, user-friendly hand gesture interface has been more studied for natural interaction with a virtual 3D object. Most earlier studies on the hand-gesture interface are using relatively simple hand gestures. In this paper, we suggest an intuitive hand gesture interface for interaction with 3D object in the virtual reality applications. For hand gesture recognition, first of all, we preprocess various hand data and classify the data through the binary decision tree. The classified data is re-sampled and converted to the chain-code, and then constructed to the hand feature data with the histograms of the chain code. Finally, the input gesture is recognized by MCSVM-based machine learning from the feature data. To test our proposed hand gesture interface we implemented a 'Virtual Block' game. Our experiments showed about 99.2% recognition ratio of 16 kinds of command gestures and more intuitive and user friendly than conventional mouse interface.

A Scheme of Extracting Forward Vehicle Area Using the Acquired Lane and Road Area Information (차선과 도로영역 정보를 이용한 전방 차량 영역의 추출 기법)

  • Yu, Jae-Hyung;Han, Young-Joon;Hahn, Hern-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.6
    • /
    • pp.797-807
    • /
    • 2008
  • This paper proposes a new algorithm of extracting forward vehicle areas using the acquired lanes and road area information on road images with complex background to improve the efficiency of the vehicle detection. In the first stage, lanes are detected by taking into account the connectivity among the edges which are determined from a method of chain code. Once the lanes proceeding to the same direction with the running vehicle are detected, neighborhood roadways are found from the width and vanishing point of the acquired roadway of the running vehicle. And finally, vehicle areas, where forward vehicles are located on the road area including the center and neighborhood roadways, are extracted. Therefore, the proposed scheme of extracting forward vehicle area improves the rate of vehicle detection on the road images with complex background, and is highly efficient because of detecting vehicles within the confines of the acquired vehicle area. The superiority of the proposed algorithm is verified from experiments of the vehicle detection on road images with complex background.

Time dependent finite element analysis of steel-concrete composite beams considering partial interaction

  • Dias, Maiga M.;Tamayo, Jorge L.P.;Morsch, Inacio B.;Awruch, Armando M.
    • Computers and Concrete
    • /
    • v.15 no.4
    • /
    • pp.687-707
    • /
    • 2015
  • A finite element computer code for short-term analysis of steel-concrete composite structures is extended to study long-term effects under service loads, in the present work. Long-term effects are important in engineering design because they influence stress and strain distribution of the structural system and therefore contribute to the increment of deflections in these structures. For creep analysis, a rheological model based on a Kelvin chain, with elements placed in series, was employed. The parameters of the Kelvin chain were obtained using Dirichlet series. Creep and shrinkage models, proposed by the CEB FIP 90, were used. The shear-lag phenomenon that takes place at the concrete slab is usually neglected or not properly taken into account in the formulation of beam-column finite elements. Therefore, in this work, a three-dimensional numerical model based on the assemblage of shell finite elements for representing the steel beam and the concrete slab is used. Stud shear connectors are represented for special beam-column elements to simulate the partial interaction at the slab-beam interface. The two-dimensional representation of the concrete slab permits to capture the non-uniform shear stress distribution in the horizontal plane of the slab due to shear-lag phenomenon. The model is validated with experimental results of two full-scale continuous composite beams previously studied by other authors. Results are given in terms of displacements, bending moments and cracking patterns in order to shown the influence of long-term effects in the structural response and also the potentiality of the present numerical code.

Effective Image Retrieval for the M-Learning System (모바일 교육 시스템을 위한 효율적인 영상 검색 구축)

  • Han Eun-Jung;Park An-Jin;Jung Kee-Chul
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.5
    • /
    • pp.658-670
    • /
    • 2006
  • As the educational media tends to be more digitalized and individualized, the learning paradigm is dramatically changing into e-learning. Existing on-line courseware gives a learner more chances to learn when they are home with their own PCs. However, it is of little use when they are away from their digital media. Also, it is very labor-intensive to convert the original off-line contents to on-line contents. This paper proposes education mobile contents(EMC) that can supply the learners with dynamic interactions using various multimedia information by recognizing real images of off-line contents using mobile devices. Content-based image retrieval based on object shapes is used to recognize the real image, and shapes are represented by differential chain code with estimated new starting points to obtain rotation-invariant representation, which is fitted to computational resources of mobile devices with low resolution camera. Moreover we use a dynamic time warping method to recognize the object shape, which compensates scale variations of an object. The EMC can provide learners with quick and accurate on-line contents on off-line ones using mobile devices without limitations of space.

  • PDF

Chaincode-based File Integrity Verification Model (체인코드 기반의 파일 무결성 검증 모델)

  • Kim, Hyo-Jong;Han, Kun-Hee;Shin, Seung-Soo
    • Journal of the Korea Convergence Society
    • /
    • v.12 no.4
    • /
    • pp.51-60
    • /
    • 2021
  • Recent advances in network and hardware technologies have led to active research and multiple network technologies that fuse blockchain technologies with security. We propose a system model that analyzes technologies using existing blockchain and verifies the integrity of files using private blockchain in a limited environment. The proposed model can be written as a chain code of Hyperleisure Fabric, a private blockchain platform, and verified for integrity of files through Hyperleisure Explorer, a private blockchain integrated management platform. The system performance of the proposed model was analyzed from a developer perspective and from a user perspective. As a result of the analysis, there are compatibility problems according to the version of various modules to run the blockchain platform, and only limited elements such as chain code status and groups can be checked.

A Study on Prediction of Mass SQL Injection Worm Propagation Using The Markov Chain (마코브 체인을 이용한 Mass SQL Injection 웜 확산 예측에 관한 연구)

  • Park, Won-Hyung;Kim, Young-Jin;Lee, Dong-Hwi;Kim, Kui-Nam J.
    • Convergence Security Journal
    • /
    • v.8 no.4
    • /
    • pp.173-181
    • /
    • 2008
  • Recently, Worm epidemic models have been developed in response to the cyber threats posed by worms in order to analyze their propagation and predict their spread. Some of the most important ones involve mathematical model techniques such as Epidemic(SI), KM (Kermack-MeKendrick), Two-Factor and AAWP(Analytical Active Worm Propagation). However, most models have several inherent limitations. For instance, they target worms that employ random scanning in the network such as CodeRed worm and it was able to be applied to the specified threats. Therefore, we propose the probabilistic of worm propagation based on the Markov Chain, which can be applied to cyber threats such as Mass SQL Injection worm. Using the proposed method in this paper, we can predict the occurrence probability and occurrence frequency for each threats in the entire system.

  • PDF

APOLLO2 YEAR 2010

  • Sanchez, Richard;Zmijarevi, Igor;Coste-Delclaux, M.;Masiello, Emiliano;Santandrea, Simone;Martinolli, Emanuele;Villate, Laurence;Schwartz, Nadine;Guler, Nathalie
    • Nuclear Engineering and Technology
    • /
    • v.42 no.5
    • /
    • pp.474-499
    • /
    • 2010
  • This paper presents the mostortant developments implemented in the APOLLO2 spectral code since its last general presentation at the 1999 M&C conference in Madrid. APOLLO2 has been provided with new capabilities in the domain of cross section self-shielding, including mixture effects and transfer matrix self-shielding, new or improved flux solvers (CPM for RZ geometry, heterogeneous cells for short MOC and the linear-surface scheme for long MOC), improved acceleration techniques ($DP_1$), that are also applied to thermal and external iterations, and a number of sophisticated modules and tools to help user calculations. The method of characteristics, which took over the collision probability method as the main flux solver of the code, allows for whole core two-dimensional heterogeneous calculations. A flux reconstruction technique leads to fast albeit accurate solutions used for industrial applications. The APOLLO2 code has been integrated (APOLLO2-A) within the $ARCADIA^{(R)}$ reactor code system of AREVA as cross section generator for PWR and BWR fuel assemblies. APOLLO2 is also extensively used by Electricite de France within its reactor calculation chain. A number of numerical examples are presented to illustrate APOLLO2 accuracy by comparison to Monte Carlo reference calculations. Results of the validation program are compared to the measured values on power plants and critical experiments.

Design and Implementation of a C-to-SystemC Synthesizer (C-to-SystemC 합성기의 설계 및 구현)

  • You, Myoung-Keun;Song, Gi-Yong
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.2
    • /
    • pp.141-145
    • /
    • 2009
  • A C-to-SystemC synthesizer which processes the input behavior according to high-level synthesis, and then transforms the synthesis result into SystemC module code is implemented in this paper. In the synthesis process, the input behavioral description in C source code is scheduled using list scheduling algorithm and register allocation is performed using left-edge algorithm on the result of scheduling. In the SystemC process, the output from high-level synthesis process is transformed into SystemC module code by combining it with SystemC features such as channels and ports. The operation of the implemented C-to-SystemC synthesizer is validated through simulating the synthesis of elliptic wave filter in SystemC code. C-to-SystemC synthesizer can be used as a part of tool-chain which helps to implement SystemC design methodology covering from modeling to synthesis.

  • PDF

ON A CLASS OF CONSTACYCLIC CODES OF LENGTH 2ps OVER $\frac{\mathbb{F}_{p^m}[u]}{{\langle}u^a{\rangle}}$

  • Dinh, Hai Q.;Nguyen, Bac Trong;Sriboonchitta, Songsak
    • Bulletin of the Korean Mathematical Society
    • /
    • v.55 no.4
    • /
    • pp.1189-1208
    • /
    • 2018
  • The aim of this paper is to study the class of ${\Lambda}$-constacyclic codes of length $2p^s$ over the finite commutative chain ring ${\mathcal{R}}_a=\frac{{\mathbb{F}_{p^m}}[u]}{{\langle}u^a{\rangle}}={\mathbb{F}}_{p^m}+u{\mathbb{F}}_{p^m}+{\cdots}+u^{a-1}{\mathbb{F}}_{p^m}$, for all units ${\Lambda}$ of ${\mathcal{R}}_a$ that have the form ${\Lambda}={\Lambda}_0+u{\Lambda}_1+{\cdots}+u^{a-1}{\Lambda}_{a-1}$, where ${\Lambda}_0,{\Lambda}_1,{\cdots},{\Lambda}_{a-1}{\in}{\mathbb{F}}_{p^m}$, ${\Lambda}_0{\neq}0$, ${\Lambda}_1{\neq}0$. The algebraic structure of all ${\Lambda}$-constacyclic codes of length $2p^s$ over ${\mathcal{R}}_a$ and their duals are established. As an application, this structure is used to determine the Rosenbloom-Tsfasman (RT) distance and weight distributions of all such codes. Among such constacyclic codes, the unique MDS code with respect to the RT distance is obtained.

A Supply Chain Management based on Mobile Agents with Flexible Reply Scheme (유연한 응답 기능을 가지는 이동 에이전트에 기반을 둔 공급 체인 관리)

  • Jeong, Won-Ho;Nam, Hui-Jeong
    • The KIPS Transactions:PartD
    • /
    • v.8D no.4
    • /
    • pp.439-450
    • /
    • 2001
  • Mobile agent is one of the promising ways of overcoming network load and latency. It is also a new software paradigm including those concepts of client/server, applet/servelet, and code-on-demand. In this paper, a new mobile agent concept with flexible replay scheme is proposed, which can deal with embarrassing situation when replying results should be accomplished in various distributed applications. For example, they are 1) a burden of bulky result, 2) a need of different replay scheme dependent on work type, 3) connection failure to the target node, and 4) a need of fast migration to next node to keep the itinerary. Regarding the source node, there may be another situation that it wants to be aware of whether its wi가 is completed or not. Three kinds of reply schemes are proposed for dealing flexibly with such situations. They are based on priority reply list where nodes to be replied are stored according to their priorities. An experimental supply chain management model using the proposed reply schemes is designed and implemented. It is one of good distributed applications appropriate for our reply schemes, because it requires different reply schemes according to work types and it is important to gather required information in time.

  • PDF