• Title/Summary/Keyword: 시스템 식별기술

Search Result 919, Processing Time 0.025 seconds

Location Service Modeling of Distributed GIS for Replication Geospatial Information Object Management (중복 지리정보 객체 관리를 위한 분산 지리정보 시스템의 위치 서비스 모델링)

  • Jeong, Chang-Won;Lee, Won-Jung;Lee, Jae-Wan;Joo, Su-Chong
    • The KIPS Transactions:PartD
    • /
    • v.13D no.7 s.110
    • /
    • pp.985-996
    • /
    • 2006
  • As the internet technologies develop, the geographic information system environment is changing to the web-based service. Since geospatial information of the existing Web-GIS services were developed independently, there is no interoperability to support diverse map formats. In spite of the same geospatial information object it can be used for various proposes that is duplicated in GIS separately. It needs intelligent strategies for optimal replica selection, which is identification of replication geospatial information objects. And for management of replication objects, OMG, GLOBE and GRID computing suggested related frameworks. But these researches are not thorough going enough in case of geospatial information object. This paper presents a model of location service, which is supported for optimal selection among replication and management of replication objects. It is consist of tree main services. The first is binding service which can save names and properties of object defined by users according to service offers and enable clients to search them on the service of offers. The second is location service which can manage location information with contact records. And obtains performance information by the Load Sharing Facility on system independently with contact address. The third is intelligent selection service which can obtain basic/performance information from the binding service/location service and provide both faster access and better performance characteristics by rules as intelligent model based on rough sets. For the validity of location service model, this research presents the processes of location service execution with Graphic User Interface.

A Study on a Quantified Structure Simulation Technique for Product Design Based on Augmented Reality (제품 디자인을 위한 증강현실 기반 정량구조 시뮬레이션 기법에 대한 연구)

  • Lee, Woo-Hun
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.85-94
    • /
    • 2005
  • Most of product designers use 3D CAD system as a inevitable design tool nowadays and many new products are developed through a concurrent engineering process. However, it is very difficult for novice designers to get the sense of reality from modeling objects shown in the computer screens. Such a intangibility problem comes from the lack of haptic interactions and contextual information about the real space because designers tend to do 3D modeling works only in a virtual space of 3D CAD system. To address this problem, this research investigate the possibility of a interactive quantified structure simulation for product design using AR(augmented reality) which can register a 3D CAD modeling object on the real space. We built a quantified structure simulation system based on AR and conducted a series of experiments to measure how accurately human perceive and adjust the size of virtual objects under varied experimental conditions in the AR environment. The experiment participants adjusted a virtual cube to a reference real cube within 1.3% relative error(5.3% relative StDev). The results gave the strong evidence that the participants can perceive the size of a virtual object very accurately. Furthermore, we found that it is easier to perceive the size of a virtual object in the condition of presenting plenty of real reference objects than few reference objects, and using LCD panel than HMD. We tried to apply the simulation system to identify preference characteristics for the appearance design of a home-service robot as a case study which explores the potential application of the system. There were significant variances in participants' preferred characteristics about robot appearance and that was supposed to come from the lack of typicality of robot image. Then, several characteristic groups were segmented by duster analysis. On the other hand, it was interesting finding that participants have significantly different preference characteristics between robot with arm and armless robot and there was a very strong correlation between the height of robot and arm length as a human body.

  • PDF

Applicability Analysis of Constructing UDM of Cloud and Cloud Shadow in High-Resolution Imagery Using Deep Learning (딥러닝 기반 구름 및 구름 그림자 탐지를 통한 고해상도 위성영상 UDM 구축 가능성 분석)

  • Nayoung Kim;Yerin Yun;Jaewan Choi;Youkyung Han
    • Korean Journal of Remote Sensing
    • /
    • v.40 no.4
    • /
    • pp.351-361
    • /
    • 2024
  • Satellite imagery contains various elements such as clouds, cloud shadows, and terrain shadows. Accurately identifying and eliminating these factors that complicate satellite image analysis is essential for maintaining the reliability of remote sensing imagery. For this reason, satellites such as Landsat-8, Sentinel-2, and Compact Advanced Satellite 500-1 (CAS500-1) provide Usable Data Masks(UDMs)with images as part of their Analysis Ready Data (ARD) product. Precise detection of clouds and their shadows is crucial for the accurate construction of these UDMs. Existing cloud and their shadow detection methods are categorized into threshold-based methods and Artificial Intelligence (AI)-based methods. Recently, AI-based methods, particularly deep learning networks, have been preferred due to their advantage in handling large datasets. This study aims to analyze the applicability of constructing UDMs for high-resolution satellite images through deep learning-based cloud and their shadow detection using open-source datasets. To validate the performance of the deep learning network, we compared the detection results generated by the network with pre-existing UDMs from Landsat-8, Sentinel-2, and CAS500-1 satellite images. The results demonstrated that high accuracy in the detection outcomes produced by the deep learning network. Additionally, we applied the network to detect cloud and their shadow in KOMPSAT-3/3A images, which do not provide UDMs. The experiment confirmed that the deep learning network effectively detected cloud and their shadow in high-resolution satellite images. Through this, we could demonstrate the applicability that UDM data for high-resolution satellite imagery can be constructed using the deep learning network.

A Graph Layout Algorithm for Scale-free Network (척도 없는 네트워크를 위한 그래프 레이아웃 알고리즘)

  • Cho, Yong-Man;Kang, Tae-Won
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.5_6
    • /
    • pp.202-213
    • /
    • 2007
  • A network is an important model widely used in natural and social science as well as engineering. To analyze these networks easily it is necessary that we should layout the features of networks visually. These Graph-Layout researches have been performed recently according to the development of the computer technology. Among them, the Scale-free Network that stands out in these days is widely used in analyzing and understanding the complicated situations in various fields. The Scale-free Network is featured in two points. The first, the number of link(Degree) shows the Power-function distribution. The second, the network has the hub that has multiple links. Consequently, it is important for us to represent the hub visually in Scale-free Network but the existing Graph-layout algorithms only represent clusters for the present. Therefor in this thesis we suggest Graph-layout algorithm that effectively presents the Scale-free network. The Hubity(hub+ity) repulsive force between hubs in suggested algorithm in this thesis is in inverse proportion to the distance, and if the degree of hubs increases in a times the Hubity repulsive force between hubs is ${\alpha}^{\gamma}$ times (${\gamma}$??is a connection line index). Also, if the algorithm has the counter that controls the force in proportion to the total node number and the total link number, The Hubity repulsive force is independent of the scale of a network. The proposed algorithm is compared with Graph-layout algorithm through an experiment. The experimental process is as follows: First of all, make out the hub that exists in the network or not. Check out the connection line index to recognize the existence of hub, and then if the value of connection line index is between 2 and 3, then conclude the Scale-free network that has a hub. And then use the suggested algorithm. In result, We validated that the proposed Graph-layout algorithm showed the Scale-free network more effectively than the existing cluster-centered algorithms[Noack, etc.].

A Study of RF Watermark Backward Compatibility under Various Channel Environments (다양한 채널환경 하에서의 RF 워터마크 역호환성 연구)

  • Kim, Jeong-Chang;Park, Sung-Ik;Choi, Dae-Won;Lim, Hyoung-Soo;Kim, Heung-Mook
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.8
    • /
    • pp.99-107
    • /
    • 2010
  • In a single frequency network (SFN) for Advanced Television Systems Committee (ATSC) terrestrial digital television (DTV) system, the interferences induced by the multiple transmitters and/or repeaters using the same frequency are inevitable. Since the presence of interferences results in performance degradation of the SFN, it is crucial to manipulate the interferences by adjusting the transmit power and timing of each transmitter and repeater. In the ATSC terrestrial DTV system, in order to facilitate the interference manipulation process, a transmitter identification (TxID) signal which is uniquely embedded in the signal to be transmitted from each transmitter and repeater is recommended. Even though the injection level of the TxID signal is much lower than the DTV signal, the TxID signal injection infects the DTV signal. Hence, the effect of the TxID signal on the DTV signal must be investigated before deployment. In this paper, the effect of the TxID signal on the performance of legacy DTV receivers under additive white Gaussian noise and multipath channel environments is investigated not only with computer simulation but also with laboratory and field tests. The test results show that the average threshold of visibility degradation of the legacy DTV receivers due to the TxID signal injection is less than 0.2 dB at the TxID injection level of -30 dB.

Open Collaboration Innovation Methodology (OCIM) : A Methodology for New Service Development (개방형 협업을 통한 서비스 혁신 방법론)

  • Lee, Zoon-Ky;Lee, Min-He;Chu, Yo-Han
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.1
    • /
    • pp.49-70
    • /
    • 2011
  • While new service development has become one of the most popular topics among practitioners and academics, methodologies development for new service development is only in its infancy. Especially, despite the growing interests in open innovations that effectively utilize external resources for R&D, existing research on new service development methodology designed to use external resources is scant. This article proposes a new methodology to generate new service business models that utilize massive external resources in combination with internal resources using ICT. The "Open Collaboration Innovation Methodology (OCIM)" is built based upon the theory of open innovation model and social psychology theories on behavioral motivation for cooperation. The model begins with the procedures to identify external resources that meet service objectives and requirements, and suggests motivation, control and monitoring mechanisms to implement a new service model. A business case is followed to demonstrate the use of the model. We expect that this model can be practically used by companies that are planning for developing new business models, and will provide a better understanding on open collaboration models, collective intelligence and crowd sourcing models.

Determination and Application of Combined Genotype of Simple Sequence Repeats (SSR) DNA Marker for Cultivars of Cymbidium goeringii (춘란(Cymbidium goeringii) 품종에 대한 Simple Sequence Repeats (SSR) DNA 마커의 복합 유전자형 결정과 적용)

  • Lee, Dae-Gun;Koh, Jae-Chul;Chung, Ki-Wha
    • Horticultural Science & Technology
    • /
    • v.30 no.3
    • /
    • pp.278-285
    • /
    • 2012
  • Cymbidium goeringii is one of the most important and popular species in the orchid family in north-east Asia. In the present study, we prepared multiplex PCR system, and used it for the genotyping of eight simple sequence repeats (SSR) markers (CG409, CG415, CG709, CG722, CG787, CG1023, CG1210, and CG1281) in subject with 40 samples of cultivated varieties. All the analyzed samples showed different combined genotypes. The average combined power of discrimination was very high value of $7.14{\times}10^{-10}$, and observed heterozygosity (Ho = 0.466) was similar with two wild populations of C. goeringii, which may indicate no or little occurrence of genetic change after collection from wild habitats. The present study also developed a two-dimensional barcode to express information of genotype results of eight SSR markers (SSR DNA ID). The discrimination power of DNA ID between two individuals will be statistically more than 99.999999%. The SSR DNA ID and two-dimensional barcode may be very usefully applied for the discrimination and maintence of cultivars of C. goeringii.

Advanced LWIR Thermal Imaging Sight Design (원적외선 2세대 열상조준경의 설계)

  • Hong, Seok-Min;Kim, Hyun-Sook;Park, Yong-Chan
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.3
    • /
    • pp.209-216
    • /
    • 2005
  • A new second generation advanced thermal imager, which can be used for battle tank sight has been developed by ADD. This system uses a $480\times6$ TDI HgCdTe detector, operating in the $7.7-10.3{\mu}m$ wavelength made by Sofradir. The IR optics has dual field of views such as $2.67\times2^{\circ}$ in NFOV and $10\times7.5^{\circ}$ in WFOV. And also, this optics is used for athermalization of the system. It is certain that our sensor can be used in wide temperature range without any degradation of the system performance. The scanning system to be able to display 470,000 pixels is developed so that the pixel number is greatly increased comparing with the first generation thermal imaging system. In order to correct non-uniformity of detector arrays, the two point correction method has been developed by using the thermo electric cooler. Additionally, to enhance the image of low contrast and improve the detection capability, we have proposed the new technique of histogram processing being suitable for the characteristics of contrast distribution of thermal imagery. Through these image processing techniques, we obtained the highest quality thermal image. The MRTD of the LWIR thermal sight shows good results below 0.05K at spatial frequency 2 cycles/mrad at the narrow field of view.

A Study of Artificial Intelligence Learning Model to Support Military Decision Making: Focused on the Wargame Model (전술제대 결심수립 지원 인공지능 학습방법론 연구: 워게임 모델을 중심으로)

  • Kim, Jun-Sung;Kim, Young-Soo;Park, Sang-Chul
    • Journal of the Korea Society for Simulation
    • /
    • v.30 no.3
    • /
    • pp.1-9
    • /
    • 2021
  • Commander and staffs on the battlefield are aware of the situation and, based on the results, they perform military activities through their military decisions. Recently, with the development of information technology, the demand for artificial intelligence to support military decisions has increased. It is essential to identify, collect, and pre-process the data set for reinforcement learning to utilize artificial intelligence. However, data on enemies lacking in terms of accuracy, timeliness, and abundance is not suitable for use as AI learning data, so a training model is needed to collect AI learning data. In this paper, a methodology for learning artificial intelligence was presented using the constructive wargame model exercise data. First, the role and scope of artificial intelligence to support the commander and staff in the military decision-making process were specified, and to train artificial intelligence according to the role, learning data was identified in the Chang-Jo 21 model exercise data and the learning results were simulated. The simulation data set was created as imaginary sample data, and the doctrine of ROK Army, which is restricted to disclosure, was utilized with US Army's doctrine that can be collected on the Internet.

Secure Mutual Authentication Protocol for RFID System without Online Back-End-Database (온라인 백-엔드-데이터베이스가 없는 안전한 RFID 상호 인증 프로토콜)

  • Won, Tae-Youn;Yu, Young-Jun;Chun, Ji-Young;Byun, Jin-Wook;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.20 no.1
    • /
    • pp.63-72
    • /
    • 2010
  • RFID is one of useful identification technology in ubiquitous environments which can be a replacement of bar code. RFID is basically consisted of tag, reader, which is for perception of the tag, and back-end-database for saving the information of tags. Although the usage of mobile readers in cellular phone or PDA increases, related studies are not enough to be secure for practical environments. There are many factors for using mobile leaders, instead of static leaders. In mobile reader environments, before constructing the secure protocol, we must consider these problems: 1) easy to lose the mobile reader 2) hard to keep the connection with back-end-database because of communication obstacle, the limitation of communication range, and so on. To find the solution against those problems, Han et al. suggest RFID mutual authentication protocol without back-end-database environment. However Han et al.'s protocol is able to be traced tag location by using eavesdropping, spoofing, and replay attack. Passive tag based on low cost is required lots of communication unsuitably. Hence, we analyze some vulnerabilities of Han et al.'s protocol and suggest RFID mutual authentication protocol without online back-end-database in aspect of efficiency and security.