• Title/Summary/Keyword: hit problem

Search Result 92, Processing Time 0.029 seconds

Improved Progressive Photon Mapping Using Photon Probing (포톤 탐사법을 이용한 개선된 점진적 포톤 매핑)

  • Lee, Sang-Gil;Shin, Byeong-Seok
    • Journal of the Korea Computer Graphics Society
    • /
    • v.16 no.3
    • /
    • pp.41-48
    • /
    • 2010
  • Photon mapping is a traditional global illumination method using many photons emitted from the light source for photo-realistic rendering. However, this method needs a lot of resources to perform tracing of millions of photons. Progressive photon mapping solves this problem. Typical progressive photon mapping performs ray tracing at first to find the hit points on diffuse surface of objects. Next, light source repeatedly emits a small number of photons in photon tracing pass, and power of photons in each sphere that has a fixed radius with the hit points in the center is accumulated. This method requires less resources than previous photon mapping, but it spends much time for gathering enough photons since each of photons progresses through a random direction and rendering high quality image. To improve the method, we propose photon probing that calculates variance of photons in the sphere and controls radius of sphere. In addition, we apply cone filter in radiance estimation step for reducing aliasing at the edges in result image.

Comparison of Smartphone Addiction, Anterior Head Posture, Quality of Life, and Headache Impact according to the Presence or Absence of Tension Headaches in College Students (대학생들의 긴장성 두통 유무에 따른 스마트폰 중독, 전방 머리 자세, 삶의 질, 두통 영향 및 두통 장애 지수 비교)

  • Kim, Chihwan;Lee, Donggeon
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.8 no.4
    • /
    • pp.117-123
    • /
    • 2020
  • Purpose : VDT (visual display terminal syndrome) can affect individuals who monitor or who work or play using video screens, including those of smartphones. In general, headache symptoms from overuse of these screens can appear due to eye fatigue, muscle pain in the joints of wrists or fingers, and muscle pain in the neck or shoulders. Many studies in the literature have supported standards that seek to prevent these symptoms. The incidence of musculoskeletal diseases caused by the use of smartphones is expected to increase rapidly, particularly among children and young adults, and these diseases are expected to develop into a societal problem. Therefore, in this study we investigate whether tension headaches that develop from smartphone usage can affect forward neck posture, neck pain, and quality of life. Methods : A total of 93 students from University participated in this study. We divided participants into two groups, those with tension headaches (n = 25) and those without (n = 68) and took forward neck measurements. Headaches were classified according to criteria from the International Headache Society and involved bilateral headache position, quality of pressing or tightening pain, mild or moderate pain intensity, and none due to daily physical activity. We surveyed participants using the smartphone addiction diagnosis questionnaire, the Neck Disability Index (NDI), the Headache Impact Test (HIT-6), and the Quality of Life Questionnaire. Results : Although we found no significant differences in tension headaches due to smartphone addiction diagnosis (p = 0.25), SF-36 life quality assessment (p = 0.06), and cranio-vertebral angle (p = 0.07), we found significant differences from the HIT-6 and the NDI (p <.05). Conclusion : Tension headaches are not correlated with smartphone addiction, quality of life, and forward neck angle but do have a correlation with the degree of cervical dysfunction and the effects of the headaches.

Distortion invariant pattern recognition using Modified synthetic HMT (수정 합성 HMT를 이용한 왜곡불변 패턴 인식)

  • 현영길;김종찬;김정우;도양회;김수중
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.7B
    • /
    • pp.1361-1369
    • /
    • 1999
  • A hit-miss transform(HMT) using modified synthetic structuring elements(SEs) for distortion-invariant recognition of multiple objects is proposed. A fundamental problem in an HMT is the determination of the optimal SE needed to improve the false alarm rate, and detect distorted objects with various shapes. The proposed synthetic methods of SE provide good solutions against this problem. One is the multistage synthesis of each true class SE using only set theory, and the other is the multistage synthesis of each true class and false class SE using set theory and SDF(synthetic discriminant function) synthesis method. Simulation results show the proposed methods can be used for the recognition of distorted intraclass objects and the discrimination of similar interclass objects.

  • PDF

Analysis on the Actual Conditions of Suicide in Korea (우리나라의 자살 실태 분석)

  • Sin, Seong-Won
    • The Journal of the Korea Contents Association
    • /
    • v.8 no.3
    • /
    • pp.190-196
    • /
    • 2008
  • In these days we can often see examples of suicide. Nowaday suicide becomes a serious social problem in Korean society. The number of suicides increased continuously from 3,157 in 1990 to 10,688 in 2006. The suicide rate per 100,000 person increased progressively from 9.1 in 1991 to 26.1 in 2005 and hit the highest level in 2005. In 2006, The suicide rate decreased after the lapse of 6 years. However, It is still high actual condition with 23.0.

On an Optimal Artillery Deployment Plan (포대의 적정배치 방안)

  • Yun, Yun-Sang;Kim, Seong-Sik
    • Journal of the military operations research society of Korea
    • /
    • v.8 no.2
    • /
    • pp.17-30
    • /
    • 1982
  • This paper offers an optimal artillery deployment scheme for the defending unit when two forces are confronted at a military front line. When proposed gun sites, types and number of guns as well as targets are given, the solutions of the two models in this paper direct each (unit of) guns to a certain location. The aim of the models is to maximize the number of guns which can hit important targets. Unlike widely used target assignment models, these models are formulated using the set covering problem concept. These models do not contain probabilities and time. Thus they are simple as models, easy in implementation, and yield tractable solutions. The dynamic and probabilistic feature of battle situations is implicitly reflected on the models. The first model is for the case that enemies' approaching route is clearly predictable, while the second model is for the unpredictable approaching route case.

  • PDF

A Collaborative Framework between Industry and Academia to Stimulate Entrepreneurship through Business Incubation

  • Chanakira, Maxwell;Kanhukamwe, Quinton C.
    • World Technopolis Review
    • /
    • v.5 no.1
    • /
    • pp.61-70
    • /
    • 2016
  • Entrepreneurship development has increasingly become a global solution to address the problem of rising unemployment. Science, Technology and Innovation (STI) have become important tools in improving the economic performance and social well-being of nations. When universities and industry work together to push the boundaries of knowledge, they become a powerful engine for innovation and economic growth. This paper is based on focus group interviews and discussions conducted with key players involved in the HIT-Sandown-UNDP Business Incubation Programme in Harare Zimbabwe. The business incubation project sought to support young Zimbabweans to transform their technical prototypes into commercially and socially viable ventures. As a result, a total of 10 prototypes were refined and investor ready business plans were developed for capital sourcing purposes. It was only through the coming together of the partners that real transformation of the lives of the participants was achieved through learning valuable business skills, coaching and mentoring. University-industry partnerships are a useful vehicle of setting up sustainable business incubation centres.

Development of New Management Prediction Support System based on Non-stochastic Model

  • Kaino, Toshihiro;Hirota, Kaoru;Mitsuta, Akimichi;Miura, Yasuyuki
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.7-10
    • /
    • 2003
  • In the field of financial technology, it is the U.S. initiative, and Japan is obliged to flattery in many respect. Currently Japan is in a too much defenseless situation that the economic structure is based on U.S. theory, In the conventional stochastic theory, it is also face that the prediction sometimes does not hit in the actual problem because it assumes a known probability distribution, none of which illustrates the real situation. A new research and development of management prediction support system is proposed based on fuzzy measures, that deals with the ambiguous, subjective evaluation by the people living in the real world well. Especially, the system will support venture, small and medium companies.

  • PDF

A Study on the Wear of Milling Tool and Relativity of Acoustic Emission in Cutting Process (절삭중 밀링공구의 마멸과 음향방출의 관련성에 관한 연구)

  • 윤종학;김동성
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.4 no.2
    • /
    • pp.31-37
    • /
    • 1995
  • This study is focused on the prediction of appropriate tool life by clarifying the correlation between progressive tool wear and AE signal. when rcutting SM45C by End mill in machining center. First of all, end mill have a problem that position of sensor sticking because it is revolution tool, but I think that it can be bained specific character according to sticking Sensor in the Vise. Consequently, the following results have been obtained; 1. Each cutting speed of feed rate over 0.1mm had a tendency to increase linearly according to the RMSAE 2. The level of AE signal at the same cutting area was more sensitive to depth of cut tharn the variation of feed rate 3. In the range of cutting duringqr about 75minqr atqr cutting speed 27m/min flankqr wear turns up aboutqr 0.21mm, aboutqr 0.29mm in the caseqr of about 65minqr at 33/min, qr hereby RMSAE increased rapidly at 0.2mm flank wear, also AE-HIT and CUM-CNTS.

  • PDF

Mitigating Cache Pollution Attack in Information Centric Mobile Internet

  • Chen, Jia;Yue, Liang;Chen, Jing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5673-5691
    • /
    • 2019
  • Information centric mobile network can significantly improve the data retrieving efficiency by caching contents at mobile edge. However, the cache pollution attack can affect the data obtaining process severely by requiring unpopular contents deliberately. To tackle the problem, we design an algorithm of mitigating cache pollution attacks in information centric mobile network. Particularly, the content popularity distribution statistic is proposed to detect abnormal behavior. Then a probabilistic caching strategy based on abnormal behavior is applied to dynamically maintain the steady-state distribution for content visiting probability and achieve the purpose of defense. The experimental results show that the proposed scheme can achieve higher request hit ratio and smaller latency for false locality content pollution attack than the CacheShield approach and the baseline approach where no mitigation approach is applied.

Preventing Fast Wear-out of Flash Cache with An Admission Control Policy

  • Lee, Eunji;Bahn, Hyokyung
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.5
    • /
    • pp.546-553
    • /
    • 2015
  • Recently, flash cache is widely adopted as the performance accelerator of legacy storage systems. Unlike other cache media, flash cache should be carefully managed as it has peculiar characteristics such as long write latency and limited P/E cycles. In particular, we make two prominent observations that can be utilized in managing flash cache. First, a serious worn-out problem happens when the working-set of a system is beyond the capacity of flash cache due to excessively frequent cache replacement. Second, more than 50% of data has no hit in flash cache as it is a second level cache. Based on these observations, we propose a cache admission control policy that does not cache data when it is first accessed, and inserts it into the cache only after its second access occurs within a certain time window. This allows the filtering of data disruptive to flash cache in terms of endurance and performance. With this policy, we prolong the lifetime of flash cache 2.3 times without any performance degradations.