• Title/Summary/Keyword: mapping method

Search Result 2,605, Processing Time 0.025 seconds

A research on Mathematical Invention via Real Analysis Course in University (대학교의 해석학 강좌에서 학생들의 수학적 발명에 관한 연구)

  • Lee, Byung-Soo
    • Communications of Mathematical Education
    • /
    • v.22 no.4
    • /
    • pp.471-487
    • /
    • 2008
  • Inventive mathematical thinking, original mathematical problem solving ability, mathematical invention and so on are core concepts, which must be emphasized in all branches of mathematical education. In particular, Polya(1981) insisted that inventive thinking must be emphasized in a suitable level of university mathematical courses. In this paper, the author considered two cases of inventive problem solving ability shown by his many students via real analysis courses. The first case is about the proof of the problem "what is the derived set of the integers Z?" Nearly all books on mathematical analysis sent the question without the proof but some books said that the answer is "empty". Only one book written by Noh, Y. S.(2006) showed the proof by using the definition of accumulation points. But the proof process has some mistakes. But our student Kang, D. S. showed the perfect proof by using The Completeness Axiom, which is very useful in mathematical analysis. The second case is to show the infinite countability of NxN, which is shown by informal proof in many mathematical analysis books with formal proofs. Some students who argued the informal proof as an unreasonable proof were asked to join with us in finding the one-to-one correspondences between NxN and N. Many students worked hard and find two singled-valued mappings and one set-valued mapping covering eight diagrams in the paper. The problems are not easy and the proofs are a little complicated. All the proofs shown in this paper are original and right, so the proofs are deserving of inventive mathematical thoughts, original mathematical problem solving abilities and mathematical inventions. From the inventive proofs of his students, the author confirmed that any students can develope their mathematical abilities by their professors' encouragements.

  • PDF

Viewer Tracking in 3D Environment and Bare-hand Interaction using the Binocular Augmented Reality System with Smartphones (스마트폰을 이용한 양안식 증강현실 시스템의 3차원 공간에서의 시점 위치 추적 및 맨손 인터랙션 기술)

  • Hwang, Jae-In;Lee, Jinwoo;Rho, Seungmin;Lee, Youna;Lim, Yongwan;Kim, Junho
    • Journal of the HCI Society of Korea
    • /
    • v.10 no.2
    • /
    • pp.65-71
    • /
    • 2015
  • In this paper, we present binocular augmented reality system with smartphones. With improvements of performance and resolution of recent smartphones, various virtual reality devices using smartphones and applications are appearing in the market. But the augmented reality system with smartphones are not that popular because of the lack of required technologies. In our work, we discuss about 3D mapping and tracking using computer vision. Also, we provide hybrid tracking using sensors in the smartphone which can handle the computer vision failure cases. Bare hand 3D interaction method in our system will be also presented.

Eicosapentaenoic Acid (EPA) Biosynthetic Gene Cluster of Shewanella oneidensis MR-1: Cloning, Heterologous Expression, and Effects of Temperature and Glucose on the Production of EPA in Escherichia coli

  • Lee, Su-Jin;Jeong, Young-Su;Kim, Dong-Uk;Seo, Jeong-Woo;Hur, Byung-Ki
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.11 no.6
    • /
    • pp.510-515
    • /
    • 2006
  • The putative EPA synthesis gene cluster was mined from the entire genome sequence of Shewanella oneidensis MR-1. The gene cluster encodes a PKS-like pathway that consists of six open reading frames (ORFs): ORFSO1602 (multi-domain beta-ketoacyl synthase, KS-MAT-4ACPs-KR), ORFSO1600 (acyl transferase, AT), ORFSO1599 (multi-domain beta-ketoacyl synthase, KS-CLF-DH-DH), ORFSO1597 (enoyl reductase, ER), ORFSO1604 (phosphopentetheine transferase, PPT), and ORFSO1603 (transcriptional regulator). In order to prove involvement of the PKS-like machinery in EPA synthesis, a 20.195-kb DNA fragment containing the genes was amplified from S. oneidensis MR-1 by the long-PCR method. Its identity was confirmed by the methods of restriction enzyme site mapping and nested PCR of internal genes orfSO1597 and orfSO1604. The DNA fragment was cloned into Escherichia coli using cosmid vector SuperCos1 to form pCosEPA. Synthesis of EPA was observed in four E. coli clones harboring pCosEPA, of which the maximum yield was 0.689% of the total fatty acids in a clone designated 9704-23. The production yield of EPA in the E. coli clone was affected by cultivation temperature, showing maximum yield at $20^{\circ}C$ and no production at $30^{\circ}C$ or higher. In addition, production yield was inversely proportional to glucose concentration of the cultivation medium. From the above results, it was concluded that the PKS-like modules catalyze the synthesis of EPA. The synthetic process appears to be subject to regulatory mechanisms triggered by various environmental factors. This most likely occurs via the control of gene expression, protein stability, or enzyme activity.

Real-Time Simulation of Single and Multiple Scattering of Light (빛의 단일 산란과 다중 산란의 실시간 시뮬레이션 기법)

  • Ki, Hyun-Woo;Lyu, Ji-Hye;Oh, Kyoung-Su
    • Journal of Korea Game Society
    • /
    • v.7 no.2
    • /
    • pp.21-32
    • /
    • 2007
  • It is significant to simulate scattering of light within media for realistic image synthesis; however, this requires costly computation. This paper introduces a practical image-space approximation technique for interactive subsurface scattering. We use a general two-pass approach, which creates transmitted irradiance samples onto shadow maps and computes illumination using the shadow maps. We estimate single scattering efficiently using a method similar to common shadow mapping with adaptive deterministic sampling. A hierarchical technique is applied to evaluate multiple scattering, based on a diffusion theory. We further accelerate rendering speed by tabulating complex functions and utilizing level of detail. We demonstrate that our technique produces high-quality images of animated scenes with blurred shadow at hundreds frames per second on graphics hardware. It can be integrated into existing interactive systems easily.

  • PDF

A Design of Integrated Security Policies for Enabling Adaptive Security in Campus Environment (캠퍼스 환경에서 적응적인 정보보안을 위한 통합 보안정책의 설계)

  • Ko, Bong-Koo;Park, Jong-Seon;Chung, Seung-Jong;Cho, Gi-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.3
    • /
    • pp.617-624
    • /
    • 2014
  • A campus network nowadays adapts the security policies in detail and even in variety, along with firewall based access control. Nevertheless, security threats, such as information hacking, intrusion and DoS, are not decreasing yet. This paper proposes an enabling method of discriminative security policies to enforce an adaptive security for security objects on basis of the security elements. The security level of a security devices is decided based on the mapping between the users and the objects. The proposed security policies could improve the security effect in terms of investment in creative campus environment, and aim to provide fast and stable services to users.

Technique of Serving 3D GSIS Data on the Internet (인터넷3D GSIS를 위한 3차원 데이터의 효율적 구축 및 생성방안)

  • Kang, In-Joon;Lee, Jun-Seok
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.10 no.1 s.19
    • /
    • pp.19-26
    • /
    • 2002
  • To provide 3D GSIS data on the internet, 3D data structures need to be researched and applied for spatial analysis for subsurface modeling. As for GSIS software R&D trend the following things have pointed out : 3-dimensional geo-processing technologies, internet-based application system development, distributed processing technologies for large volume of spatial information, real-time geo-data processing methodologies, Among them research scope within Internet-based application system or Web-based GSIS generally contains core parts of software development such as Internet application, large volume of spatial database handling, real-time spatial data processing, spatial data transfer and transformation, and volumetric display of processing results. This study shows the method of providing 3D GSIS on the internet using VRML model, which are made of DEM data, draped aerial photo, and VRML script programming. And it is also studied that offering 3D GSIS engine on the internet and precise texture mapping using satellite image and aerial photos.

  • PDF

Estimation of Inflow into Namgang Dam according to Climate Change using SWAT Model (SWAT 모형을 이용한 기후변화에 따른 남강댐 유입량 추정)

  • Kim, Dong-Hyeon;Kim, Sang-Min
    • Journal of The Korean Society of Agricultural Engineers
    • /
    • v.59 no.6
    • /
    • pp.9-18
    • /
    • 2017
  • The objective of this study was to estimate the climate change impact on inflow to Namgang Dam using SWAT (Soil and Water Assessment Tool) model. The SWAT model was calibrated and validated using observed flow data from 2003 to 2014 for the study watershed. The $R^2$ (Determination Coefficient), RMSE (Root Mean Square Error), NSE (Nash-Sutcliffe efficiency coefficient), and RMAE (Relative Mean Absolute Error) were used to evaluate the model performance. Calibration results showed that the annual mean inflow were within ${\pm}5%$ error compared to the observed. $R^2$ were ranged 0.61~0.87, RMSE were 1.37~7.00 mm/day, NSE were 0.47~0.83, and RMAE were 0.25~0.73 mm/day for daily runoff, respectively. Climate change scenarios were obtained from the HadGEM3-RA. The quantile mapping method was adopted to correct bias that is inherent in the climate change scenarios. Based on the climate change scenarios, calibrated SWAT model simulates the future inflow and evapotranspiration for the study watershed. The expected future inflow to Namgang dam using RCP 4.5 is increasing by 4.8 % and RCP 8.5 is increasing by 19.0 %, respectively. The expected future evapotranspiration for Namgang dam watershed using RCP 4.5 is decreasing by 6.7 % and RCP 8.5 is decreasing by 0.7 %, respectively.

Imageability Elements of Tourism Space using Spatial Cognitive Maps - Focused on Tourists of Nami Island in Their 20s and 30s - (공간 인지도를 이용한 관광공간의 이미지성 구성요인 - 남이섬의 20대 및 30대 관광자를 대상으로 -)

  • Kim, Hyun Ju;Yun, Hee Jeong
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.44 no.3
    • /
    • pp.37-46
    • /
    • 2016
  • This study intends to analyze the characteristics of imageability elements of the tourism space using the spatial cognitive mapping method. For this purpose, this study selects Nami Island as a study site and collects spatial cognitive maps or sketches of the study area focused on tourists in their 20s and 30s after they visit the site. The results of frequency analysis on imageability elements of Nami Island show that paths, landmarks, and edges are more frequently cognized to tourists in their 20s and 30s than districts and nodes. This study determines a new imageability element of the tourism space, "moving objects," such as or bikes or animals. Tourism planners or landscape designers can consider these useful imageability elements as important planning factors in order to improve and clarify the images of tourism spaces.

Robust Blind Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 블라인드 워터마킹 기법)

  • 김태호;남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.241-246
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of properity of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to several attack.

  • PDF

Model Checking of Concurrent Object-Oriented Systems (병렬 객체지향 시스템의 검증)

  • Cho, Seung-Mo;Kim, Young-Gon;Bae, Doo-Hwan;Byun, Sung-Won;Kim, Sang-Taek
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.1
    • /
    • pp.1-12
    • /
    • 2000
  • Model checking is a formal verification technique which checks the consistency between a requirement specification and a behavior model of the system by explorating the state space of the model. We apply model checking to the formal verification of the concurrent object-oriented system, using an existing model checker SPIN which has been successful in verifying concurrent systems. First, we propose an Actor-based modeling language, called APromela, by extending the modeling language Promela which is a modeling language supported in SPIN. APromela supports not only all the primitives of Promela, but additional primitives needed to model concurrent object-oriented systems, such as class definition, object instantiation, message send, and synchronization.Second, we provide translation rules for mapping APromela's such modeling primitives to Promela's. As an application of APromela, we suggest a verification method for UML models. By giving an example of specification, translation, and verification, we also demonstrate the applicability of our proposed approach, and discuss the limitations and further research issues.

  • PDF