• Title/Summary/Keyword: 개체 기반

Search Result 923, Processing Time 0.025 seconds

3D Model Extraction Method Using Compact Genetic Algorithm from Real Scene Stereoscopic Image (소형 유전자 알고리즘을 이용한 스테레오 영상으로부터의 3차원 모델 추출기법)

  • Han, Gyu-Pil;Eom, Tae-Eok
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.538-547
    • /
    • 2001
  • Currently, 2D real-time image coding techniques had great developments and many related products were commercially developed. However, these techniques lack the capability of handling 3D actuality, occurred by the advent of virtual reality, because they handle only the temporal transmission for 2D image. Besides, many 3D virtual reality researches have been studied in computer graphics. Since the graphical researches were limited to the application of artificial models, the 3D actuality for real scene images could not be managed also. Therefore, a new 3D model extraction method based on stereo vision, that can deal with real scene virtual reality, is proposed in this paper. The proposed method adapted a compact genetic algorithm using population-based incremental learning (PBIL) to matching environments, in order to reduce memory consumption and computational time of conventional genetic algorithms. Since the PBIL used a probability vector and competitive learning, the matching algorithm became simple and the computation load was considerably reduced. Moreover, the matching quality was superior than conventional methods. Even if the characteristics of images are changed, stable outputs were obtained without the modification of the matching algorithm.

  • PDF

The Construction of URI-Based Human Resource Information from Science and Technology Papers (과학기술 문헌으로부터의 URI 기반 인력정보 구축)

  • Jung Han-Min;Lee Seung-Woo;Sung Won-Kyung;Kang In-Su
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.9
    • /
    • pp.152-163
    • /
    • 2006
  • The development of Semantic Web basically requires knowledge induced from the formalization and semantization of information, and thus ontology should be introduced as a knowledgization tool. URI(Universal Resource Identifier) is an indispensible scheme to uniquely indicate individuals on ontology. However, it is difficult to find the use cases of URI in real data including science and technology papers. This paper describes the method to construct internal and external human resource information based on URI from the papers. We use co-authors, e-mails, publication date, and affiliation for discriminating authors with the same strings. HRST(Human Resources devoted to Science and Technology) is referred to acquire URIs for human resource. We expect the internal and external human resource information would be adopted to outcome analysis applications such as researcher network analysis and outcome statistics.

  • PDF

Privilege Delegation Protocol Providing Delegation Traceability Using ID-based Cryptosystem in X.509 Proxy Certificate Environment (X.509 대리 인증서 환경에서 위임 추적 기능을 제공하는 ID 기반 암호 시스템 기반 권한 위임 프로토콜)

  • Lee, Youn-Ho;Kim, Byung-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.35 no.9_10
    • /
    • pp.441-451
    • /
    • 2008
  • Currently, the X.509 proxy certificate is widely used to delegate an entity's right to another entity in the computational grid environment. However it has two drawbacks: the potential security threat caused by intraceability of a delegation chain and the inefficiency caused by an interactive communication between the right grantor and the right grantee on the delegation protocol. To address these problems for computational grids, we propose a new delegation protocol without additional cost. We use an ID-based key generation technique to generate a proxy private key which is a means to exercise the delegated signing right. By applying the ID-based key generation technique, the proposed protocol has the delegation traceability and the non-interactive delegation property. Since the right delegation occurs massively in the computational grid environment, our protocol can contribute the security enhancement by providing the delegation traceability and the efficiency enhancement by reducing the inter-domain communication cost.

Radio Beacon-based Seamless Indoor and Outdoor Positioning for Personal Navigation Systems (개인 휴대용 네비게이션을 위한 라디오 비컨 기반 실내외 연속측위 시스템)

  • Kim, Sang-Kyoon;Jang, Yoon-Ho;Bae, Sang-Jun;Kwak, Kyung-Sup
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.4
    • /
    • pp.84-92
    • /
    • 2009
  • In this paper, using the received signal strength of radio beacon such as Wi-Fi, Bluetooth, CDMA and GPS signal from the satellite, we propose the system of positioning which considered indoor and outdoor based on the Place Lab. Conventional Place Lab utilize the various positioning parameters to estimate the indoor location. However, this conventional system has limitations with respect to the range and efficiency of usage. Therefore, we defined the converged model of multisensor data and re-organized the Place Lab to overcome the limitation of a conventional system. Proposed system uses the radio beacon signal and GPS signal together to estimate the location. Furthermore, it provides the seamless PNS service with many mobile devices because this system realized by the OSGi bundle. This proposed system has evaluated the performance with SAMSUNG T*OMNIA SCH-M490 smart phone and the result shows the system is able to support the PNS service.

  • PDF

Cluster Merging Using Enhanced Density based Fuzzy C-Means Clustering Algorithm (개선된 밀도 기반의 퍼지 C-Means 알고리즘을 이용한 클러스터 합병)

  • Han, Jin-Woo;Jun, Sung-Hae;Oh, Kyung-Whan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.5
    • /
    • pp.517-524
    • /
    • 2004
  • The fuzzy set theory has been wide used in clustering of machine learning with data mining since fuzzy theory has been introduced in 1960s. In particular, fuzzy C-means algorithm is a popular fuzzy clustering algorithm up to date. An element is assigned to any cluster with each membership value using fuzzy C-means algorithm. This algorithm is affected from the location of initial cluster center and the proper cluster size like a general clustering algorithm as K-means algorithm. This setting up for initial clustering is subjective. So, we get improper results according to circumstances. In this paper, we propose a cluster merging using enhanced density based fuzzy C-means clustering algorithm for solving this problem. Our algorithm determines initial cluster size and center using the properties of training data. Proposed algorithm uses grid for deciding initial cluster center and size. For experiments, objective machine learning data are used for performance comparison between our algorithm and others.

Environmental Data Management and Supply Plan for Building Synthetic Battlefield Environment of Air Combat Simulation (항공 전투 시뮬레이션의 합성전장환경 구축을 위한 환경 데이터 관리 및 공급 방안)

  • Yang, Ka-Ram;Hwam, Won K.;Park, Sang C.
    • Journal of the Korea Society for Simulation
    • /
    • v.22 no.3
    • /
    • pp.7-14
    • /
    • 2013
  • In this paper, there is a research for providing environmental data to reflect environmental effects to the simulation for the aviation weapon systems by the construction of the synthetic battlefield. The results of the aviation engagement simulation are able to differ by environmental effect. This paper analyzes the real aviation battlefield and designs the synthetic battlefield based on the analysis. In order to construct the designed synthetic battlefield, we collects the real environmental data for the atmosphere and structures the collected data using GIS (Geographic information system interpolation). The main objective of this paper is to design the synthetic battlefield based on the derived environmental factors from the analysis of the real aviation battlefield, and it constructs the designed synthetic battlefield by the collection of real atmosphere data. The constructed synthetic battlefield provides the environmental data which are requested from the distributed simulation system, and it makes the system reflect environmental effects to the simulation.

Adaptive Intrusion Detection Algorithm based on Learning Algorithm (학습 알고리즘 기반의 적응형 침입 탐지 알고리즘)

  • Sim, Kwee-Bo;Yang, Jae-Won;Lee, Dong-Wook;Seo, Dong-Il;Choi, Yang-Seo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.1
    • /
    • pp.75-81
    • /
    • 2004
  • Signature based intrusion detection system (IDS), having stored rules for detecting intrusions at the library, judges whether new inputs are intrusion or not by matching them with the new inputs. However their policy has two restrictions generally. First, when they couldn`t make rules against new intrusions, false negative (FN) errors may are taken place. Second, when they made a lot of rules for maintaining diversification, the amount of resources grows larger proportional to their amount. In this paper, we propose the learning algorithm which can evolve the competent of anomaly detectors having the ability to detect anomalous attacks by genetic algorithm. The anomaly detectors are the population be composed of by following the negative selection procedure of the biological immune system. To show the effectiveness of proposed system, we apply the learning algorithm to the artificial network environment, which is a computer security system.

Development of Reinforcement Learning-based Obstacle Avoidance toward Autonomous Mobile Robots for an Industrial Environment (산업용 자율 주행 로봇에서의 격자 지도를 사용한 강화학습 기반 회피 경로 생성기 개발)

  • Yang, Jeong-Yean
    • The Journal of the Korea Contents Association
    • /
    • v.19 no.3
    • /
    • pp.72-79
    • /
    • 2019
  • Autonomous locomotion has two essential functionalities: mapping builds and updates maps by uncertain position information and measured sensor inputs, and localization is to find the positional information with the inaccurate map and the sensor information. In addition, obstacle detection, avoidance, and path designs are necessarily required for autonomous locomotion by combining the probabilistic methods based on uncertain locations. The sensory inputs, which are measured by a metric-based scanner, have difficulties of distinguishing moving obstacles like humans from static objects like walls in given environments. This paper proposes the low resolution grid map combined with reinforcement learning, which is compared with the conventional recognition method for detecting static and moving objects to generate obstacle avoiding path. Finally, the proposed method is verified with experimental results.

External Morphology and Habitat of Black Soldier Fly (Hermetia illucens L.) in Korea (아메리카동애등에(Hermetia illucens L.)의 외부형태 및 서식지에 관한 연구)

  • Jeong, Gilsang;Kang, Hyejin;Choi, Hansu;Lee, Yonggu;Jin, Seon Deok
    • Korean Journal of Environmental Biology
    • /
    • v.36 no.4
    • /
    • pp.584-590
    • /
    • 2018
  • The adults of Hermetia illucens collected in Korea were about the same size as those from their origin. The body part with the largest size variation was the antenna 2 followed by the head width and the abdomen width. It can be the baseline of selection of superior individuals for organic waste decomposition and compost production. In regards to the habitat, the adult Hermetia illucens were collected from 22 of the 51 localities. Although geographical characteristics such as coordinates and altitude may not affect the insects, the presence of organic matters could affect them. The distribution pattern of the insects may act as an indicator of natural recycling of organic wastes.

A Random ID-based RFID Mutual authentication protocol for detecting Impersonation Attack against a back-end server and a reader (서버와 리더의 위장공격 탐지가 가능한 랜덤 ID기반 RFID 상호 인증 프로토콜)

  • Yeo, Don-Gu;Lee, Sang-Rae;Jang, Jae-Hoon;Youm, Heung-Youl
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.4
    • /
    • pp.89-108
    • /
    • 2010
  • Recently many mutual authentication protocol for light-weight hash-based for RFID have been proposed. Most of them have assumed that communications between a backend server and reader are secure, and not considered threats for backend server and RFID reader impersonation. In the real world, however, attacks against database or reader are more effective rather than attacks against RFID tag, at least from attacker's perspective. In this paper, we assume that all communications are not secure to attackers except the physical attack, and considering realistic threats for designing a mutual authentication protocol based on hash function. And It supports a mutual authentication and can protect against the replay attack, impersonation attack, location tracking attack, and denial of service attack in the related work. We besides provide a secure and efficient RFID mutual authentication protocol which resists impersonation attacks on all of the entities and alow a backend server to search tag-related information efficiently. We conclude with analyzing the safety and efficiency among latest works.