• Title/Summary/Keyword: Invisible environment

Search Result 85, Processing Time 0.026 seconds

Mobile Robot Exploration in Indoor Environment Using Topological Structure with Invisible Barcodes

  • Huh, Jin-Wook;Chung, Woong-Sik;Nam, Sang-Yep;Chung, Wan-Kyun
    • ETRI Journal
    • /
    • v.29 no.2
    • /
    • pp.189-200
    • /
    • 2007
  • This paper addresses the localization and navigation problem in the movement of service robots by using invisible two dimensional barcodes on the floor. Compared with other methods using natural or artificial landmarks, the proposed localization method has great advantages in cost and appearance since the location of the robot is perfectly known using the barcode information after mapping is finished. We also propose a navigation algorithm which uses a topological structure. For the topological information, we define nodes and edges which are suitable for indoor navigation, especially for large area having multiple rooms, many walls, and many static obstacles. The proposed algorithm also has the advantage that errors which occur in each node are mutually independent and can be compensated exactly after some navigation using barcodes. Simulation and experimental results were performed to verify the algorithm in the barcode environment, showing excellent performance results. After mapping, it is also possible to solve the kidnapped robot problem and to generate paths using topological information.

  • PDF

Development of TCA Method for Cost Analysis in Farmhouse (TCA 분석 TOOL 개발과 농가비용 비교분석)

  • Yoon, Sung-Yee
    • Korean Journal of Organic Agriculture
    • /
    • v.12 no.1
    • /
    • pp.23-44
    • /
    • 2004
  • TCA(Total Cost Assessment) can be defined by a tool to evaluate actual profit about investment. Also, It can be used by method to make more reasonable decision-making in business. Enforcement of 'direct payment system' for environment friendship farmhouse of government is spreading recent times. But, it is true that it is no definite standard about appropriation of disbursement amount of money. TCA method can be utilized usefully for solution of these problem. Also, It will help to decide price grasping invisible cost and environment cost. Therefore, We tried that may can apply TCA theory in farmhouse class, and attempted economic performance estimation which use this. This study introduces TCA theory and developed applicable expense list in agriculture field. Also, We applied TCA theory to farmhouse. This theories referenced domestic and th6 foreign countries, connection literature. But, It handled part about invisible cost and social cost etc..

  • PDF

Topological Mapping and Navigation in Indoor Environment with Invisible Barcode (바코드가 있는 가정환경에서의 위상학적 지도형성 및 자율주행)

  • Huh, Jin-Wook;Chung, Woong-Sik;Chung, Wan-Kyun
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.30 no.9 s.252
    • /
    • pp.1124-1133
    • /
    • 2006
  • This paper addresses the localization and navigation problem using invisible two dimensional barcodes on the floor. Compared with other methods using natural/artificial landmark, the proposed localization method has great advantages in cost and appearance, since the location of the robot is perfectly known using the barcode information after the mapping is finished. We also propose a navigation algorithm which uses the topological structure. For the topological information, we define nodes and edges which are suitable for indoor navigation, especially for large area having multiple rooms, many walls and many static obstacles. The proposed algorithm also has an advantage that errors occurred in each node are mutually independent and can be compensated exactly after some navigation using barcode. Simulation and experimental results. were performed to verify the algorithm in the barcode environment, and the result showed an excellent performance. After mapping, it is also possible to solve the kidnapped case and generate paths using topological information.

A study on the applicability of invisible environment of surface image velocimeter using far infrared camera (원적외선 카메라를 이용한 표면영상유속계의 비가시 환경 적용성 검토)

  • Bae, Inhyuk;Yu, Kwonkyu;Yoon, Byungman;Kim, Seojun
    • Journal of Korea Water Resources Association
    • /
    • v.50 no.9
    • /
    • pp.597-607
    • /
    • 2017
  • In this study, the applicability of the surface image velocimeter using the far-infrared camera was examined in order to solve the application problem of the measurement in night time, which has been pointed out in previous studies as the limit of the surface image velocimeter. For this purpose, the accuracy evaluation of measurement of the far-infrared camera was conducted for two conditions. Accuracy was evaluated by calculating the relative error of the results of the measurements of surface image velocimeter using the normal video camera during the daytime that was already verified. As a result, the relative error of the surface velocimeter using the far infrared camera was 4.3% at maximum, the average error was about 1%, and the error of the fog condition was maximum 5.2% with an average of 2%. In conclusion, it is possible to measure with high accuracy when using far-infrared camera in a invisible environments where the water flow can not be visualized with a general camera.

A Calm GIS: Smart Mobile Applications

  • Lee, Eun-Kyu;Kim, Mi-Jeong;Oh, Byoung-Woo;Jang, Byung-Tae
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.631-633
    • /
    • 2003
  • Invisible networks have hidden bits flows from human being and become the periphery in the Internet overload; technologies become invisible and everywhere computing. The appearance of the calm environment requires a new relationship between human being and machines and geographic features: a paradigm shift. However no one says what next steps to those environments on details are, a reason why lots of people focus on the endeavors. In this paper, we touch the geographic features on ubiquitous environments and research the transition step of GIS mobile applications in order to achieve a natural integration of connectivity, capability and functionality.

  • PDF

Obstacle Information Transfer and Control Method using Haptic Device consist of Vibration Motors (진동모터로 구성된 햅틱 디바이스를 이용한 장애물 정보 전달 및 제어 방법)

  • Lee, Dong-Hyuk;Noh, Kyung-Wook;Kang, Sun Kyun;Han, Jong Ho;Lee, Jang-Myung
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.20 no.10
    • /
    • pp.1036-1043
    • /
    • 2014
  • In this paper, a new haptic device is proposed for the teleoperation, which can recognize the invisible environment of a mobile robot. With this new device, it is possible for the user to identify the location of an obstacle and to avoid it. The haptic device has been attached on the top of a joystick so that the user can remotely control the mobile robot to avoid the obstacles which are recognized by the ultrasonic sensors. Also, the invisible environment is recognized more accurately overlapping the data from the ultrasonic sensors. There are five vibration motors in the haptic device to indicate the direction of the obstacle. So the direction of the obstacle can be recognized by the vibration at the finger on each vibration motor. For various situations and surrounding environments, experiments are performed using fuzzy controller and overlapping ultrasonic sensors. The results demonstrate the effectiveness of the proposed haptic joystick.

Development of Series Connectable Wheeled Robot Module (직렬연결이 가능한 소형 바퀴 로봇 모듈의 개발)

  • Kim, Na-Bin;Kim, Ye-Ji;Kim, Ji-Min;Hwang, Yun Mi;Bong, Jae-Hwan
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.17 no.5
    • /
    • pp.941-948
    • /
    • 2022
  • Disaster response robots are deployed to disaster sites where human access is difficult and dangerous. The disaster response robots explore the disaster sites prevent a structural collapse and perform lifesaving to minimize damage. It is difficult to operate robots in the disaster sites due to rough terrains where various obstacles are scattered, communication failures and invisible environments. In this paper, we developed a series connectable wheeled robot module. The series connectable wheeled robot module was developed into two types: an active driven robot module and a passive driven robot module. A wheeled robot was built by connecting the two active type robot modules and one passive type robot module. Two robot modules were connected by one DoF rotating joint, allowing the wheeled robot to avoid obstructions in a vertical direction. The wheeled robot performed driving and obstacle avoidance using only pressure sensors, which allows the wheeled robot operate in the invisible environment. An obstacle avoidance experiment was conducted to evaluate the performance of the wheeled robot consisting of two active driven wheeled robot modules and one passive driven wheeled robot module. The wheeled robot successfully avoided step-shaped obstacles with a maximum height of 80 mm in a time of 24.5 seconds using only a pressure sensors, which confirms that the wheeled robot possible to perform the driving and the obstacle avoidance in invisible environment.

Authentication for Single/Multiple Domain using Attribute Certificates (유비쿼터스 컴퓨팅 환경에서 속성 인증서를 이용한 단일/멀티 도메인 인증)

  • Lee Deok-Gyu;Park Hee-Un;Lee In-Yeong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.3
    • /
    • pp.291-300
    • /
    • 2005
  • The Ubiquitous computer environment is thing which invisible computer that is not shown linked mutually through network so that user may use computer always is been pervasive. Intend computing environment that can use easily as user wants and it is the smart environment that user provides context awareness that is wanting computing environment. This Ubiquitous computing contains much specially weak side in security. Masquerade attack of that crawl that is quoted to user or server among device that is around user by that discrete various computing devices exist everywhere among them become possible. Hereupon, in this paper, proposed method that have following characteristic. Present authentication model through transfer or device. Suggest two method that realize authentication through device in case of moved to method(MD: Multi Domain) and user ownself space(SD: Single Domain) that realize authentication through device in case of moved user's direct path who device differs.

Research on Application of Service Design Methodology in IOT Environment

  • Kim, Byung-Taek;Cho, Yun-Sung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.22 no.3
    • /
    • pp.53-60
    • /
    • 2017
  • The purpose of this study is to provide empirical and quantitative analysis on user's perceived privacy, security, and user satisfaction when providing visualization information about objects and service provider behaviors that users can not perceive in internet service process. Through previous research, we have examined the importance of privacy and security factors as a key factor to be considered for the characteristics of the Internet of things and the Internet of things. In addition, service blueprint, which is one of the service design methodologies to examine the flow of service usage in providing Internet service of things, was examined. In the flow of things internet service utilization, it is found that the things that are out of the user's cognitive area and the behavior of the service provider take up a large part. Therefore, the hypothesis that the trust of the Internet service security and the satisfaction of the user experience can be improved by providing the security visualization information about the behavior of the object and the invisible service provider in the non-contact aspect of the user and the object. In order to verify the hypothesis, we conducted experiments and questionnaires on the use of virtual objects' internet environment and conducted statistical analysis based on them. As a result, it was analyzed that visual information feedback on non - contact and invisible objects and service provider's behaviors had a positive effect on user's perceived privacy, security, and satisfaction. In addition, we conclude that it can be used as a service design evaluation tool to eliminate psychological anxiety about security and to improve satisfaction in internet service design. We hope that this research will be a great help for the research on application method of service design method in Internet environment of objects.

World Without Boundaries and Trends in User Authentication Technology (경계없는 세상과 사용자 인증기술 동향)

  • Jin, S.H.;Cho, J.M.;Cho, S.R.;Cho, Y.S.;Kim, S.H.
    • Electronics and Telecommunications Trends
    • /
    • v.36 no.4
    • /
    • pp.135-144
    • /
    • 2021
  • The field of user authentication in Korea has experienced new dimensions since December 2020. Accredited certificate, which had been in use for 21 years since 1999, has been abolished. Accredited certificates have provided a trust foundation for various ICT-based industrial developments; however, new changes in the authentication sector are also required due to changes in the service and policy environment. Changes in the service environment occur rapidly because of the emergence of new technologies such as AI, IoT, Bio, Blockchain, and the daily use of non-face-to-face environments caused by COVID-19. Even with changes in the service environment, user authentication remains an essential foundation for providing services. This paper summarizes the current status of user authentication techniques, analyzes major changes in the service environment (such as Metaverse) associated with user authentication, and presents the direction of authentication techniques (Decentralized, Invisible, Privacy-preserving) through the derived implications.