• Title/Summary/Keyword: target modeling

Search Result 790, Processing Time 0.026 seconds

Infrared Image Synthesis of Real Background and Target Model (실제 배경과 표적모델의 적외선 영상 합성)

  • Ahn, Sang-Ho;Kim, Young-Choon;Kim, Ki-Hong
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.16 no.2
    • /
    • pp.207-213
    • /
    • 2013
  • An infrared image synthetic method is proposed for infrared system simulation. The synthesis image uses a background IR image captured from real scene and a target IR modeling image. The radiances related with maximum and minimum temperatures of the background and target images are calculated from the Planck's blackbody equation. Based on them, the background and target images are compensated and synthesized. The proposed method is simulated and the IR target images are generated by RadThermIR software.

iPSC technology-Powerful hand for disease modeling and therapeutic screen

  • Kim, Changsung
    • BMB Reports
    • /
    • v.48 no.5
    • /
    • pp.256-265
    • /
    • 2015
  • Cardiovascular and neurodegenerative diseases are major health threats in many developed countries. Recently, target tissues derived from human embryonic stem (hES) cells and induced pluripotent stem cells (iPSCs), such as cardiomyocytes (CMs) or neurons, have been actively mobilized for drug screening. Knowledge of drug toxicity and efficacy obtained using stem cell-derived tissues could parallel that obtained from human trials. Furthermore, iPSC disease models could be advantageous in the development of personalized medicine in various parts of disease sectors. To obtain the maximum benefit from iPSCs in disease modeling, researchers are now focusing on aging, maturation, and metabolism to recapitulate the pathological features seen in patients. Compared to pediatric disease modeling, adult-onset disease modeling with iPSCs requires proper maturation for full manifestation of pathological features. Herein, the success of iPSC technology, focusing on patient-specific drug treatment, maturation-based disease modeling, and alternative approaches to compensate for the current limitations of patient iPSC modeling, will be further discussed. [BMB Reports 2015; 48(5): 256-265]

Personalized Face Modeling for Photorealistic Synthesis

  • Kim, Kyungmin;Shim, Hyunjung
    • Journal of International Society for Simulation Surgery
    • /
    • v.2 no.2
    • /
    • pp.47-51
    • /
    • 2015
  • Faces play a key role in revealing the personalized attributes such as the identity, emotion, health condition, etc. Due to the importance of faces, computer-assisted face modeling and reconstruction have been actively studied both in computer vision and graphics community. Especially, face reconstruction and realistic face synthesis are well-grounded research problems and various approaches have been proposed during the last decade. In this paper, we discuss a wide range of existing work in face modeling by introducing their target applications, categorizing them upon their methodology and addressing their strength and weakness on performance. Finally, we introduce remaining research issues and suggest the future research direction in face modeling. We believe that this paper provides a high-level overview on face modeling techniques and helps understand the major research issues and the trends of methodology.

SAR(Synthetic Aperture Radar) 3-Dimensional Scatterers Point Cloud Target Model and Experiments on Bridge Area (영상레이더(SAR)용 3차원 산란점 점구름 표적모델의 교량 지역에 대한 적용)

  • Jong Hoo Park;Sang Chul Park
    • Journal of the Korea Society for Simulation
    • /
    • v.32 no.3
    • /
    • pp.1-8
    • /
    • 2023
  • Modeling of artificial targets in Synthetic Aperture radar (SAR) mainly simulates radar signals reflected from the faces and edges of the 3D Computer Aided Design (CAD) model with a ray-tracing method, and modeling of the clutter on the Earth's surface uses a method of distinguishing types with similar distribution characteristics through statistical analysis of the SAR image itself. In this paper, man-made targets on the surface and background clutter on the terrain are integrated and made into a three-dimensional (3D) point cloud scatterer model, and SAR image were created through computational signal processing. The results of the SAR Stripmap image generation of the actual automobile based SAR radar system and the results analyzed using EM modeling or statistical distribution models are compared with this 3D point cloud scatterer model. The modeling target is selected as an bridge because it has the characteristic of having both water surface and ground terrain around the bridge and is also a target of great interest in both military and civilian use.

Similarity Analysis Between SAR Target Images Based on Siamese Network (Siamese 네트워크 기반 SAR 표적영상 간 유사도 분석)

  • Park, Ji-Hoon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.25 no.5
    • /
    • pp.462-475
    • /
    • 2022
  • Different from the field of electro-optical(EO) image analysis, there has been less interest in similarity metrics between synthetic aperture radar(SAR) target images. A reliable and objective similarity analysis for SAR target images is expected to enable the verification of the SAR measurement process or provide the guidelines of target CAD modeling that can be used for simulating realistic SAR target images. For this purpose, this paper presents a similarity analysis method based on the siamese network that quantifies the subjective assessment through the distance learning of similar and dissimilar SAR target image pairs. The proposed method is applied to MSTAR SAR target images of slightly different depression angles and the resultant metrics are compared and analyzed with qualitative evaluation. Since the image similarity is somewhat related to recognition performance, the capacity of the proposed method for target recognition is further checked experimentally with the confusion matrix.

Input Shaping Design for Human Control System (휴먼 제어시스템의 입력형성기 설계)

  • Lee, Seok-Jae;Lyou, Joon
    • Proceedings of the KIEE Conference
    • /
    • 2006.04a
    • /
    • pp.54-56
    • /
    • 2006
  • To get the robust and reliable input command, we designed shaping function for target tracking system with commander's handle. Input signals of the commander's handle are generated by human operator. It is response of the human to reduce the error between target and gun. But, tracking error while operator aim a moving target manually gives poor system performance. Input noise, particularly, affects hit accuracy as the system performance. We proposed the design method of input command shaping to reduce the Input noise and to improve the operation ability and convenience. We performed the experiments with combat vehicle, example of Target Tracking System, to show the proposed method is efficient and practical.

  • PDF

Attacker and Host Modeling for Cyber-Attack Simulation (사이버 공격 시뮬레이션을 위한 공격자 및 호스트 모델링)

  • 정정례;이장세;박종서;지승도
    • Journal of the Korea Society for Simulation
    • /
    • v.12 no.2
    • /
    • pp.63-73
    • /
    • 2003
  • The major objective of this paper is to propose the method of attacker and host modeling for cyber-attack simulation. In the security modeling and simulation for information assurance, it is essential the modeling of attacker that is able to generate various cyber-attack scenarios as well as the modeling of host, which is able to represent behavior on attack concretely The security modeling and simulation, which was announced by Cohen, Nong Ye and etc., is too simple to concretely analyze attack behavior on the host. And, the attacker modeling, which was announced by CERT, Laura and etc., is impossible to represent complex attack excepting fixed forms. To deal with this problem, we have accomplished attacker modeling by adopted the rule-based SES which integrates the existing SES with rule-based expert system for synthesis and performed host modeling by using the DEVS formalism. Our approach is to show the difference from others in that (ⅰ) it is able to represent complex and repetitive attack, (ⅱ) it automatically generates the cyber-attack scenario suitable on the target system, (ⅲ) it is able to analyze host's behavior of cyber attack concretely. Simulation tests performed on the sample network verify the soundness of proposed method.

  • PDF

Performance Prediction and Analysis of Identification Friend or Foe(IFF) Radar by using Modeling & Simulation Methodology (M&S 기법을 통한 피아식별 레이다 성능예측 및 분석)

  • Kim, Hyunseung;Park, Myunghoon;Jeon, Woojoong;Hong, Sungmin
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.23 no.2
    • /
    • pp.159-167
    • /
    • 2020
  • In actual battlefield environment, IFF radar plays an important role in distinguishing friend or foe targets and assigning unique identification code to management. Performance of IFF radar is greatly affected by radio environment including atmosphere and terrain, target maneuvering and operation mode. In this paper, M&S tool is consisted of interrogator(IFF radar) and answering machine(target) for radar performance analysis. The wave propagation model using APM(Advanced Propagation Model) and radar actuator system were modeled by considering beam waveform of individual operation beam mode. Using this tool, IFF radar performance was analyzed through two experimental results. As a result, it is expected that performance of IFF radar can be predicted in the operational environment by considering target maneuvering and operation beam mode.

A Fuzzy Modeling Approach for a Spray Drying Production Process

  • Aburas Hani Mohammad A.
    • Journal of the Korean Ceramic Society
    • /
    • v.41 no.12 s.271
    • /
    • pp.873-879
    • /
    • 2004
  • In all major industries ranging from powder industries and advanced ceramics, to the food and pharmaceutical manufacture powder industries, the main production process is the spray dryers. In this paper, a systematic approach is used and six rules are obtained for the basis of the fuzzy model. A fuzzy model is based on the past behavior of the target system and expected to be able to reproduce the behavior of the target system. The output of the developed fuzzy model shows, graphically and statistically, a high level of face validity. Therefore, it is concluded that the developed fuzzy model mimics the actual process and can be considered, with confidence, as a reliable model to study, analyze, and improve the existing process.

A Survey of Research on Human-Vehicle Interaction in Defense Area (국방 분야의 인간-차량 인터랙션 연구)

  • Yang, Ji Hyun;Lee, Sang Hun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.18 no.3
    • /
    • pp.155-166
    • /
    • 2013
  • We present recent human-vehicle interaction (HVI) research conducted in the area of defense and military application. Research topics discussed in this paper include: training simulation for overland navigation tasks; expertise effects in overland navigation performance and scan patterns; pilot's perception and confidence on an overland navigation task; effects of UAV (Unmanned Aerial Vehicle) supervisory control on F-18 formation flight performance in a simulator environment; autonomy balancing in a manned-unmanned teaming (MUT) swarm attack, enabling visual detection of IED (Improvised Explosive Device) indicators through Perceptual Learning Assessment and Training; usability test on DaViTo (Data Visualization Tool); and modeling peripheral vision for moving target search and detection. Diverse and leading HVI study in the defense domain suggests future research direction in other HVI emerging areas such as automotive industry and aviation domain.