• Title/Summary/Keyword: Large Objects

Search Result 880, Processing Time 0.03 seconds

A Markerless Augmented Reality Approach for Indoor Information Visualization System (실내 정보 가시화에 의한 u-GIS 시스템을 위한 Markerless 증강현실 방법)

  • Kim, Albert Hee-Kwan;Cho, Hyeon-Dal
    • Journal of Korea Spatial Information System Society
    • /
    • v.11 no.1
    • /
    • pp.195-199
    • /
    • 2009
  • Augmented reality is a field of computer research which deals with the combination of real-world and computer-generated data, where computer graphics objects are blended into real footage in real time and it has tremendous potential in visualizing geospatial information. However, to utilize augmented reality in mobile system, many researches have undergone with GPS or marker based approaches. Localization and tracking of current position become more complex problem when it is used in indoor environments. Many proposed RF based tracking and localization. However, it does cause deployment problems of large sensors and readers. In this paper, we present a noble markerless AR approach for indoor navigation system only using a camera. We will apply this work to mobile seamless indoor/outdoor u-GIS system.

  • PDF

The Development of Behavioral Modification Program on Weight Reduction in Overweight Patients taking Atypical Antipsychotics - Preliminary Study - (비정형 항정신병약물 복용 중인 과체중 환자에서 체중 감량을 위한 행동수정요법의 개발 - 예비연구 -)

  • Shin, Hong Beom;Park, Jong Ho;Cha, Bo Seok;Kim, Byung Soo;Lee, Suk Kyung;Kim, Hak Lyung;Kim, Yong Sik;Ahn, Young Min;Kang, Ung Gu
    • Korean Journal of Biological Psychiatry
    • /
    • v.10 no.2
    • /
    • pp.186-196
    • /
    • 2003
  • Objects:The authors devebped a behavioral modification program for oveweight outpatients with schi-zophrenia and bipolar disorder will had teen treated with atypical antipsychotics, and evaluated the applicability of this program to outpatients Methods:Two men and nine women who had been treated with atypical antipsychotics and will had gained at least 5 percent of their pre-treatment body weight for 10 weeks, attended a behavioral modification program. The patients' weight, body mass index and the diet-activity scale were assessed and were compared with those of a matched comparison group will dd not attend the behavioral modification program Results:The body weight of patients who attended the behavioral modification program reduced with statistical significance, The treatment group showed significant improvement in diet-related items but not in activity-related items of the diet-activity scale Conclusions:This study suggested the applicability of a eehavioral mcdification program on weight reduction to overweight patients taking atypical antipsychotics for the frrst time in Korea Additional large scale studies are needed to validate the effectiveness of this program.

  • PDF

Study on Plastics Detection Technique using Terra/ASTER Data

  • Syoji, Mizuhiko;Ohkawa, Kazumichi
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1460-1463
    • /
    • 2003
  • In this study, plastic detection technique was developed, applying remote sensing technology as a method to extract plastic wastes, which is one of the big causes of concern contributing to environmental destruction. It is possible to extract areas where plastic (including polypropylene and polyethylene) wastes are prominent, using ASTER data by taking advantage of its absorptive characteristics of ASTER/SWIR bands. The algorithm is applicable to define large industrial wastes disposal sites and areas where plastic greenhouses are concentrated. However, the detection technique with ASTER/SWIR data has some research tasks to be tackled, which includes a partial secretion of reference spectral, depending on some conditions of plastic wastes and a detection error in a region mixed with vegetations and waters. Following results were obtained after making comparisons between several detection methods and plastic wastes in different conditions; (a)'spectral extraction method' was suitable for areas where plastic wastes exist separated from other objects, such as coastal areas where plastic wastes drifted ashore. (single plastic spectral was used as a reference for the 'spectral extraction method') (b)On the other hand, the 'spectral extraction method' was not suitable for sites where plastic wastes are mixed with vegetation and soil. After making comparison of the processing results of a mixed area, it was found that applying both 'separation method' using un-mixing and ‘spectral extraction method’ with NDVI masked is the most appropriate method to extract plastic wastes. Also, we have investigated the possibility of reducing the influence of vegetation and water, using ASTER/TIR, and successfully extracted some places with plastics. As a conclusion, we have summarized the relationship between detection techniques and conditions of plastic wastes and propose the practical application of remote sensing technology to the extraction of plastic wastes.

  • PDF

GEOMETRY OF SATELLITE IMAGES - CALIBRATION AND MATHEMATICAL MODELS

  • JACOBSEN KARSTEN
    • Proceedings of the KSRS Conference
    • /
    • 2005.10a
    • /
    • pp.182-185
    • /
    • 2005
  • Satellite cameras are calibrated before launch in detail and in general, but it cannot be guaranteed that the geometry is not changing during launch and caused by thermal influence of the sun in the orbit. Modem satellite imaging systems are based on CCD-line sensors. Because of the required high sampling rate the length of used CCD-lines is limited. For reaching a sufficient swath width, some CCD-lines are combined to a longer virtual CCD-line. The images generated by the individual CCD-lines do overlap slightly and so they can be shifted in x- and y-direction in relation to a chosen reference image just based on tie points. For the alignment and difference in scale, control points are required. The resulting virtual image has only negligible errors in areas with very large difference in height caused by the difference in the location of the projection centers. Color images can be related to the joint panchromatic scenes just based on tie points. Pan-sharpened images may show only small color shifts in very mountainous areas and for moving objects. The direct sensor orientation has to be calibrated based on control points. Discrepancies in horizontal shift can only be separated from attitude discrepancies with a good three-dimensional control point distribution. For such a calibration a program based on geometric reconstruction of the sensor orientation is required. The approximations by 3D-affine transformation or direct linear transformation (DL n cannot be used. These methods do have also disadvantages for standard sensor orientation. The image orientation by geometric reconstruction can be improved by self calibration with additional parameters for the analysis and compensation of remaining systematic effects for example caused by a not linear CCD-line. The determined sensor geometry can be used for the generation? of rational polynomial coefficients, describing the sensor geometry by relations of polynomials of the ground coordinates X, Y and Z.

  • PDF

A Watermarking Scheme to Extract the Seal Image without the Original Image (원본정보 없이 씰영상의 추출이 가능한 이미지 워터마킹 기법)

  • Kim, Won-Gyum;Lee, Jong-Chan;Lee, Won-Don
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.12
    • /
    • pp.3885-3895
    • /
    • 2000
  • The emergence of digital imaging and digital networks has made duplication of original artwork easier. In order to protect these creations, new methods for signing and copyrighting visual data are needed. In the last few years, a large number of schemes have heen proposed for hiding copyright marks and other information in digital image, video, audio and other multimedia objects. In this paper, we propose a technique for embedding the watermark of visually recognizable patterns into the frequency domain of images. The embedded watermark can be retrieved from the decoded sequence witbout knowledge of the original. Because the source image is not required to extract the watermark, one cannot make the fake original that is invertible to watermarking scheme from the waternlarked image. In order to recover the embedded signature data without knowledge of the original, a prediction of the original value of the pixel containing the information is needed. The prediction is based on a averaging of amplitude values in a neighborhood around the pixel itself. Additionally the projxJsed technique could survive several kinds of image processings including JPEG lossy compression.

  • PDF

A Study about weight grant of Authentication level in USN environment

  • Choi, Bae-Young;Ahn, Byung-Ryul;Chung, Tai-Myoung
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.165-168
    • /
    • 2005
  • The objects, which can be personal digital assistants, electronic rings, doors or even clothes, offer embedded chips with computation facilities and are generally called artifacts. I later realized that this was not so the real problem is actually authentication. Recent results indicate scalability problems for flat ad hoc networks. Sensor network achieves function that handle surrounding information perception through sensor and sensed information to network that is consisted of sensor nodes of large number. Research about new access control techniques and height administration techniques need authentication information persons' certification assurance level classification in sensor network environment which become necessary different view base with authentication information at node for application of AAA technology in USN environment that must do authentication process using information that is collected from various sensor mountings. So, get base authentication information in sensor type and present weight grant model by security strength about authentication information through information who draw. In this paper collected information of sensor nodes model who give weight drawing security reinforcement as authentication information by purpose present be going to. and Must be able to can grasp special quality of each sensor appliances in various side and use this and decide authentication assurance level for value estimation as authentication information elements. Therefore, do to define item that can evaluate Authentication information elements thus and give simple authentication assurance level value accordingly because applying weight. Present model who give authentication assurance level value and weight for quotation according to security strength.

  • PDF

Rule-based and Probabilistic Event Recognition of Independent Objects for Interpretation of Emergency Scenarios (긴급 상황 시나리오 해석을 위한 독립 객체의 규칙 기반 및 확률적 이벤트 인식)

  • Lee, Jun-Cheol;Choi, Chang-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.3
    • /
    • pp.301-314
    • /
    • 2008
  • The existing event recognition is accomplished with the limited systematic foundation, and thus much longer learning time is needed for emergency scenario interpretation due to large scale of probability data. In this paper, we propose a method for nile-based event recognition of an independent object(human) which extract a feature vectors from the object and analyze the behavior pattern of each object and interpretation of emergency scenarios using a probability and object's events. The event rule of an independent object is composed of the Primary-event, Move-event, Interaction-event, and 'FALL DOWN' event and is defined through feature vectors of the object and the segmented motion orientated vector (SMOV) in which the dynamic Bayesian network is applied. The emergency scenario is analyzed using current state of an event and its post probability. In this paper, we define diversified events compared to that of pre-existing method and thus make it easy to expand by increasing independence of each events. Accordingly, semantics information, which is impossible to be gained through an.

  • PDF

Design of Embedded Based Distributed RFID Gateway Using Open Source Hardware (오픈 소스 하드웨어를 이용한 임베디드 기반의 분산형 RFID 게이트웨이의 설계)

  • Jeon, Jun-Cheol
    • Journal of Advanced Navigation Technology
    • /
    • v.19 no.6
    • /
    • pp.581-586
    • /
    • 2015
  • In this paper, we configure a Radio Frequency IDentification (RFID) gateway using an arduino and raspberry pi which are recent issues with a representative open source hardware. RFID technology is emerging as a key technology in a variety of environments as a technique to automatically identify objects using a radio frequency signal. In this paper, we propose a distributed RFID gateway for providing various communication methods and processing a large amount of RFID tag information efficiently, and to increase the scalability and middleware communication efficiency of the RFID reader. Existing RFID middleware systems have the problems that they should adhere the web service for interworking with a reader and the communication standard. Therefore, in this paper, we comprise our RFID gate to satisfy not only the serial communication configuration but also various digital signal processing standard so that it increases the communication efficiency of the middleware system.

Database Table Management and Input/output Design System on the Web (웹 기반 서버 데이터베이스 테이블 관리 및 입출력 형태 정의 시스템)

  • 한순희
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.433-445
    • /
    • 1999
  • Today's Web tends to change from simple guideline to more complex information Provider based on large amount of data, enabling a better understanding of the objects. It provides various information retrieval techniques. Therefore, these data have to be stored and maintained in a database system for efficiency and consistency. But database system absolutely requires systematic and consistent management techniques. As a consequence, a high trained and well-educated person should do it. In this paper, we design and implement a tool for easy and reliable database table creation and management on the web. If users log in this system, they can get a list of tables created by themselves and will find a hyper link per each table. Futhermore, they can view and manage it's contents.

  • PDF

Influences Analysis of SAS Azimuth Resolution on the UUV Trajectory Disturbances (수중 무인정 궤적 교란에 따른 SAS 방위해상도 영향에 대한 분석)

  • Kim, Boo-il
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.1
    • /
    • pp.222-229
    • /
    • 2016
  • Active synthetic aperture sonar on the small UUV is generated several trajectory disturbances under the influences of underwater environments, and causing a large error in the synthetic aperture processing. In this paper, we analyzed the effects of azimuth resolution for the phase mismatch of the synthetic aperture focus processing when the periodic or random trajectory disturbances was generated on the side direction. The simulation results show that ghost targets are generated and azimuth resolution is very deteriorated when disturbance amplitude is greater than $0.3{\lambda}$ and disturbance period is greater than $2L_{sa}$ in the periodic trajectory disturbances environments. And detection performance on the seabed small objects by the synthetic aperture processing is shown that there is a significant effects on the azimuth resolution depending on the types and conditions of the platform trajectory disturbance variations.