• Title/Summary/Keyword: Shape Context

Search Result 191, Processing Time 0.027 seconds

A Study on the Pungsu of the Site and Space Layout of Vice Minister Lee's House in Oeam Historic Village (외암마을 이참판댁 입지 및 공간배치의 풍수고찰)

  • Han, Jong-Koo
    • Journal of the Korean Institute of Rural Architecture
    • /
    • v.16 no.4
    • /
    • pp.9-15
    • /
    • 2014
  • Pungsu acts as a strong guideline for selecting a location of the village having a certain geographical condition. The attitude of choosing an auspicious site regarding the shape of mountains and water stream, is widely accepted by the intelligent class of Josen period. Therefore, the theory is one of the main factor influenced on the traditional village and house in Korea. Regarding the fact that a real effect of pungsu on the formation of traditional village and house, Study with a view of Pungsu theory could be a good method for deeply understanding the traditional architecture in Korea. In this context, the study analyzes the site and space lay out of an upper class house of vice minister Lee(Lee, Jung Ryul, 1868~1950) in Oeam historic village with Pungsu theory. The house is composed of Anchae(house for the women) and Sanrangchae(house for the men and receiving guests) and Hangrangchae(servants' quarters). Through the study, It finds out that the house is carefully selected and planned considering surrounding physical environment so called Jusan(back hill), Ansan(front hill), Choengyong(blue dragon) and Beckho(white tiger) of Pungsu theory.

Digital Control of Automatic Gun Systems Incorporating an Intermittently Rotating Chamber (간헐 회전식 약실을 적응한 자동포 시스템의 디지털 제어)

  • Lim, S.C.;Kim, K.K.;Shim, J.S.;Kil, S.J.;Kim, H.C.;Lee, G.H.;Cha, G.U.;Cho, C.K.;Hong, S.K.
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.10 no.2
    • /
    • pp.126-133
    • /
    • 2007
  • Lately, there exist growing demands to increase the firepower of mid-calibre automatic guns despite spatial limitations of armament. In this context, ammunitions of simple cylindrical shape are considered so advantageous that associated automatic guns are under development incorporating an intermittently rotating chamber mechanism. In this paper, relevant subsystems for such guns are to be described, and a digital controller to automate the entire system as well. Via dynamic simulations it proves to function well being able to drive the chamber at any constant speed up to 200spm, which is merely limited by the recoil performance. It is remarkable that the system synchronization idea in use is applicable to any other multi-actuator systems that should operate on the basis of event rather than time.

Nondestructive damage evaluation of a curved thin beam

  • Kim, Byeong Hwa;Joo, Hwan Joong;Park, Tae Hyo
    • Structural Engineering and Mechanics
    • /
    • v.24 no.6
    • /
    • pp.665-682
    • /
    • 2006
  • A vibration-based nondestructive damage evaluation technique for a curved thin beam is introduced. The proposed method is capable of detecting, locating, and sizing structural damage simultaneously by using a few of the lower natural frequencies and their corresponding mode shapes before and after a small damage event. The proposed approach utilizes modal flexibilities reconstructed from measured modal parameters. A rigorous system of equations governing damage and curvature of modal flexibility is derived in the context of elasticity. To solve the resulting system of governing equations, an efficient pseudo-inverse technique is introduced. The direct inspection of the resulting solutions provides the location and severity of damage in a curved thin beam. This study confirms that there is a strong linear relationship between the curvature of modal flexibility and flexural damage in the selected class of structures. Several numerical case studies are provided to justify the performance of the proposed approach. The proposed method introduces a way to avoid the singularity and mode selection problems from earlier attempts.

Static analysis of functionally graded non-prismatic sandwich beams

  • Rezaiee-Pajand, M.;Masoodi, Amir R.;Mokhtari, M.
    • Advances in Computational Design
    • /
    • v.3 no.2
    • /
    • pp.165-190
    • /
    • 2018
  • In this article, the static behavior of non-prismatic sandwich beams composed of functionally graded (FG) materials is investigated for the first time. Two types of beams in which the variation of elastic modulus follows a power-law form are studied. The principle of minimum total potential energy is applied along with the Ritz method to derive and solve the governing equations. Considering conventional boundary conditions, Chebyshev polynomials of the first kind are used as auxiliary shape functions. The formulation is developed within the framework of well-known Timoshenko and Reddy beam theories (TBT, RBT). Since the beams are simultaneously tapered and functionally graded, bending and shear stress pushover curves are presented to get a profound insight into the variation of stresses along the beam. The proposed formulations and solution scheme are verified through benchmark problems. In this context, excellent agreement is observed. Numerical results are included considering beams with various cross sectional types to inspect the effects of taper ratio and gradient index on deflections and stresses. It is observed that the boundary conditions, taper ratio, gradient index value and core to the thickness ratio significantly influence the stress and deflection responses.

A Study on Multibiometrics derived from Calling Activity Context using Smartphone for Implicit User Authentication System

  • Negara, Ali Fahmi Perwira;Yeom, Jaekeun;Choi, Deokjai
    • International Journal of Contents
    • /
    • v.9 no.2
    • /
    • pp.14-21
    • /
    • 2013
  • Current smartphone authentication systems are deemed inconvenient and difficult for users on remembering their password as well as privacy issues on stolen or forged biometrics. New authentication system is demanded to be implicit to users with very minimum user involvement being. This idea aims towards a future model of authentication system for smartphones users without users realizing them being authenticated. We use the most frequent activity that users carry out with their smartphone, which is the calling activity. We derive two basics related interactions that are first factor being arm's flex (AF) action to pick a phone to be near ones' ears and then once getting near ear using second factor from ear shape image. Here, we combine behavior biometrics from AF in first factor and physical biometrics from ear image in second factor. Our study shows our dual-factor authentication system does not require explicit user interaction thereby improving convenience and alleviating burden from users from persistent necessity to remember password. These findings will augment development of novel implicit authentication system being transparent, easier, and unobtrusive for users.

Graphemes Segmentation for Arabic Online Handwriting Modeling

  • Boubaker, Houcine;Tagougui, Najiba;El Abed, Haikal;Kherallah, Monji;Alimi, Adel M.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.503-522
    • /
    • 2014
  • In the cursive handwriting recognition process, script trajectory segmentation and modeling represent an important task for large or open lexicon context that becomes more complicated in multi-writer applications. In this paper, we will present a developed system of Arabic online handwriting modeling based on graphemes segmentation and the extraction of its geometric features. The main contribution consists of adapting the Fourier descriptors to model the open trajectory of the segmented graphemes. To segment the trajectory of the handwriting, the system proceeds by first detecting its baseline by checking combined geometric and logic conditions. Then, the detected baseline is used as a topologic reference for the extraction of particular points that delimit the graphemes' trajectories. Each segmented grapheme is then represented by a set of relevant geometric features that include the vector of the Fourier descriptors for trajectory shape modeling, normalized metric parameters that model the grapheme dimensions, its position in respect to the baseline, and codes for the description of its associated diacritics.

Deduplication and Exploitability Determination of UAF Vulnerability Samples by Fast Clustering

  • Peng, Jianshan;Zhang, Mi;Wang, Qingxian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.10
    • /
    • pp.4933-4956
    • /
    • 2016
  • Use-After-Free (UAF) is a common lethal form of software vulnerability. By using tools such as Web Browser Fuzzing, a large amount of samples containing UAF vulnerabilities can be generated. To evaluate the threat level of vulnerability or to patch the vulnerabilities, automatic deduplication and exploitability determination should be carried out for these samples. There are some problems existing in current methods, including inadequate pertinence, lack of depth and precision of analysis, high time cost, and low accuracy. In this paper, in terms of key dangling pointer and crash context, we analyze four properties of similar samples of UAF vulnerability, explore the method of extracting and calculate clustering eigenvalues from these samples, perform clustering by fast search and find of density peaks on a large number of vulnerability samples. Samples were divided into different UAF vulnerability categories according to the clustering results, and the exploitability of these UAF vulnerabilities was determined by observing the shape of class cluster. Experimental results showed that the approach was applicable to the deduplication and exploitability determination of a large amount of UAF vulnerability samples, with high accuracy and low performance cost.

An Open Standard-based Terrain Tile Production Chain for Geo-referenced Simulation

  • Yoo, Byoung-Hyun
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.497-506
    • /
    • 2008
  • The needs for digital models of real environment such as 3D terrain or cyber city model are increasing. Most of applications related with modeling and simulation require virtual environment constructed from geospatial information of real world in order to guarantee reliability and accuracy of the simulation. The most fundamental data for building virtual environment, terrain elevation and orthogonal imagery is acquired from optical sensor of satellite or airplane. Providing interoperable and reusable digital model is important to promote practical application of high-resolution satellite imagery. This paper presents the new research regarding representation of geospatial information, especially for 3D shape and appearance of virtual terrain. and describe framework for constructing real-time 3D model of large terrain based on high-resolution satellite imagery. It provides infrastructure of 3D simulation with geographical context. Web architecture, XML language and open protocols to build a standard based 3D terrain are presented. Details of standard-based approach for providing infrastructure of real-time 3D simulation using high-resolution satellite imagery are also presented. This work would facilitate interchange and interoperability across diverse systems and be usable by governments, industry scientists and general public.

An alternative approach to extreme value analysis for design purposes

  • Bardsley, Earl
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2016.05a
    • /
    • pp.201-201
    • /
    • 2016
  • The asymptotic extreme value distributions of maxima are a natural choice when designing against future extreme events like flood peaks or wave heights, given a stationary time series. The generalized extreme value distribution (GEV) is often utilised in this context because it is seen as a convenient single expression for extreme event analysis. However, the GEV has a drawback because the location of the distribution bound relative to the data is a discontinuous function of the GEV shape parameter. That is, for annual maxima approximated by the Gumbel distribution, the data is also consistent with a GEV distribution with an upper bound (no lower bound) or a GEV distribution with a lower bound (no upper bound). A more consistent single extreme value expression for design purposes is proposed as the Weibull distribution of smallest extremes, as applied to transformed annual maxima. The Weibull distribution limit holds here for sufficiently large sample sizes, irrespective of the extreme value domain of attraction applicable to the untransformed maxima. The Gumbel, Type 2, and Type 3 extreme value distributions thus become redundant, together with the GEV, because in reality there is only a single asymptotic extreme value distribution required for design purposes - the Weibull distribution of minima as applied to transformed maxima. An illustrative synthetic example is given showing transformed maxima from the normal distribution approaching the Weibull limit much faster than the untransformed sample maxima approach the normal distribution Gumbel limit. Some New Zealand examples are given with the Weibull distribution being applied to reciprocal transformations of annual flood maxima, where the untransformed maxima follow apparently different extreme value distributions.

  • PDF

MSFM: Multi-view Semantic Feature Fusion Model for Chinese Named Entity Recognition

  • Liu, Jingxin;Cheng, Jieren;Peng, Xin;Zhao, Zeli;Tang, Xiangyan;Sheng, Victor S.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.6
    • /
    • pp.1833-1848
    • /
    • 2022
  • Named entity recognition (NER) is an important basic task in the field of Natural Language Processing (NLP). Recently deep learning approaches by extracting word segmentation or character features have been proved to be effective for Chinese Named Entity Recognition (CNER). However, since this method of extracting features only focuses on extracting some of the features, it lacks textual information mining from multiple perspectives and dimensions, resulting in the model not being able to fully capture semantic features. To tackle this problem, we propose a novel Multi-view Semantic Feature Fusion Model (MSFM). The proposed model mainly consists of two core components, that is, Multi-view Semantic Feature Fusion Embedding Module (MFEM) and Multi-head Self-Attention Mechanism Module (MSAM). Specifically, the MFEM extracts character features, word boundary features, radical features, and pinyin features of Chinese characters. The acquired font shape, font sound, and font meaning features are fused to enhance the semantic information of Chinese characters with different granularities. Moreover, the MSAM is used to capture the dependencies between characters in a multi-dimensional subspace to better understand the semantic features of the context. Extensive experimental results on four benchmark datasets show that our method improves the overall performance of the CNER model.