• Title/Summary/Keyword: connected objects

Search Result 264, Processing Time 0.024 seconds

CONDITIONS IMPLYING CONTINUITY OF MAPS

  • Baran, Mehmet;Kula, Muammer;Erciyes, Ayhan
    • Journal of the Korean Mathematical Society
    • /
    • v.46 no.4
    • /
    • pp.813-826
    • /
    • 2009
  • In this paper, we generalize the notions of preserving and strongly preserving maps to arbitrary set based topological categories. Further, we obtain characterizations of each of these concepts as well as interprete analogues and generalizations of theorems of Gerlits at al [20] in the categories of filter and local filter convergence spaces.

Geometrically Invariant Image Watermarking Using Connected Objects and Gravity Centers

  • Wang, Hongxia;Yin, Bangxu;Zhou, Linna
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.11
    • /
    • pp.2893-2912
    • /
    • 2013
  • The design of geometrically invariant watermarking is one of the most challenging work in digital image watermarking research area. To achieve the robustness to geometrical attacks, the inherent characteristic of an image is usually used. In this paper, a geometrically invariant image watermarking scheme using connected objects and gravity center is proposed. First, the gray-scale image is converted into the binary one, and the connected objects according to the connectedness of binary image are obtained, then the coordinates of these connected objects are mapped to the gray-scale image, and the gravity centers of those bigger objects are chosen as the feature points for watermark embedding. After that, the line between each gravity center and the center of the whole image is rotated an angle to form a sector, and finally the same version of watermark is embedded into these sectors. Because the image connectedness is topologically invariant to geometrical attacks such as scaling and rotation, and the gravity center of the connected object as feature points is very stable, the watermark synchronization is realized successfully under the geometrical distortion. The proposed scheme can extract the watermark information without using the original image or template. The simulation results show the proposed scheme has a good invisibility for watermarking application, and stronger robustness than previous feature-based watermarking schemes against geometrical attacks such as rotation, scaling and cropping, and can also resist common image processing operations including JPEG compression, adding noise, median filtering, and histogram equalization, etc.

A Study on the Influence of Changing Data Classification Criteria Depending on the Correlation of Variables

  • Seung-Jae Kim
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.4
    • /
    • pp.442-459
    • /
    • 2024
  • Currently, many industrial fields are pursuing research and development toward a hyper-connected society. However, as we become a hyper-connected society that perceives virtual reality as if it were reality, accurate classification of data to recognize objects, emotions and facial expressions must be accompanied. In other words, only when data meaning objects, emotions, and facial expressions are accurately classified will reliability of cognition and recognition be obtained not only in the physical world but also in a hyper-connected society. In addition, errors in perception and recognition of objects, emotions, and facial expressions can be reduced through big data analysis, and it will be protected from secondary incidents and damages. Therefore, in this study, we try to find out whether the classification of data is well done in the stage where AI with automatic cognition ability recognizes and recognizes objects, emotions, and facial expressions, and whether the data classified according to characteristics is a reliable classification result. In the experiment, when classifying data using a decision tree, we plan to conduct a study to find out whether the classification criteria of the data affect the classification criteria according to the degree of correlation between variables.

A study on the direction of security control of IoT environment (사물인터넷 환경에서의 보안 관제 방향에 관한 연구)

  • Koh, Keunho;Lee, Sungryoul;Ahn, Seongjin
    • Convergence Security Journal
    • /
    • v.15 no.5
    • /
    • pp.53-59
    • /
    • 2015
  • With radical development of information and communication Technology, Internet of Things(IoT) era - all the th ings around us are connected through internet so that it enables objects to exchange data with connected devices a nd is expected to offer new advanced services that goes beyond the value where each existing objects could have o ffered respectively - has come. Concerns regarding security threat are being raised in adopting IoT as the number of internet-connected appliances are rapidly increasing. So, we need to consider how to protect and control countles s objects. This paper covers the role and procedures of existing security control. Futhermore, it provides information about the direction of security control when it comes to IoT.

A Query Processing Method for Hierarchical Structured e-Learning System (계층적으로 구조화된 이러닝 시스템을 위한 질의 처리 기법)

  • Kim, Youn-Hee;Kim, Jee-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.3
    • /
    • pp.189-201
    • /
    • 2011
  • In this paper, we design an ontology which provides interoperability by integrating typical metadata specifications and defines concepts and semantic relations between concepts that are used to describe metadata for learning objects in university courses. And we organize a hierarchical structured e-Learning system for efficient retrieval of learning objects on many local storages that use different specifications to describe metadata and propose a query processing method based on inferences. The proposed e-Learning system can provide more accurate and satisfactory retrieval service by using the designed ontology because both learning objects that be directly connected to user queries and deduced learning objects that be semantically connected to them are retrieved.

Development Element Object and Implementation using MPC Data Model (수리시설물의 기본객체 추출과 MPC모델을 이용한 객체 구현)

  • 윤성수;이정재
    • Magazine of the Korean Society of Agricultural Engineers
    • /
    • v.44 no.1
    • /
    • pp.57-68
    • /
    • 2002
  • In the irrigation facilities, the irrigation system is connected systematically, and thus, it agrees to the object-oriented concept. Since it is necessary to go through comparative evaluations and to devise several alternatives plans in designing the irrigation system, it will be very efficient to use the objects that contain the design data. In this study, the object-oriented methodology has been proposed to define the objects, which will be used in the design system of irrigation facility. Furthermore, as for the essential elements of the objects, concept of element objects is formulated. By employing this concept, appropriate element objects have been derided for the irrigation facility. Necessary data model for realization of the objects is examined and selected. And then, required elements for applying the selected data model to the irrigation facility will be proposed

The Cognition of Non-Ridged Objects Using Linguistic Cognitive System for Human-Robot Interaction (인간로봇 상호작용을 위한 언어적 인지시스템 기반의 비강체 인지)

  • Ahn, Hyun-Sik
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.15 no.11
    • /
    • pp.1115-1121
    • /
    • 2009
  • For HRI (Human-Robot Interaction) in daily life, robots need to recognize non-rigid objects such as clothes and blankets. However, the recognition of non-rigid objects is challenging because of the variation of the shapes according to the places and laying manners. In this paper, the cognition of non-rigid object based on a cognitive system is presented. The characteristics of non-rigid objects are analysed in the view of HRI and referred to design a framework for the cognition of them. We adopt a linguistic cognitive system for describing all of the events happened to robots. When an event related to the non-rigid objects is occurred, the cognitive system describes the event into a sentential form and stores it at a sentential memory, and depicts the objects with a spatial model for being used as references. The cognitive system parses each sentence syntactically and semantically, in which the nouns meaning objects are connected to their models. For answering the questions of humans, sentences are retrieved by searching temporal information in the sentential memory and by spatial reasoning in a schematic imagery. Experiments show the feasibility of the cognitive system for cognizing non-rigid objects in HRI.

A Development of Ship-Block Dividing CAD Module Connected to WWW (WWW와 연계된 선박 조립 구조물의 분할 CAD모듈 개발)

  • 최해진;이수홍
    • Korean Journal of Computational Design and Engineering
    • /
    • v.2 no.4
    • /
    • pp.267-275
    • /
    • 1997
  • A ship-block cutting module is being developed as part of a computational system for a ship design. The module supports product-information to other modules in design process and displays ship-blocks in cutting-operation. Welding-information is essential to process-planning and scheduling. In the module, ship-blocks are modeled by Plate-Objects and then divided into several cutting pieces. The module automatically creates Welding-Objects containing welding-information in the process. Since the module is connected to WWW(World Wide Web), users in various platforms can access the models simultaneously In addition, users can check manufacturing constraints by inspecting a virtual model.

  • PDF

A Study on Dual-IDS Technique for Improving Safety and Reliability in Internet of Things (사물인터넷 환경에서 안전성과 신뢰성 향상을 위한 Dual-IDS 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.1
    • /
    • pp.49-57
    • /
    • 2017
  • IoT can be connected through a single network not only objects which can be connected to existing internet but also objects which has communication capability. This IoT environment will be a huge change to the existing communication paradigm. However, the big security problem must be solved in order to develop further IoT. Security mechanisms reflecting these characteristics should be applied because devices participating in the IoT have low processing ability and low power. In addition, devices which perform abnormal behaviors between objects should be also detected. Therefore, in this paper, we proposed D-IDS technique for efficient detection of malicious attack nodes between devices participating in the IoT. The proposed technique performs the central detection and distribution detection to improve the performance of attack detection. The central detection monitors the entire network traffic at the boundary router using SVM technique and detects abnormal behavior. And the distribution detection combines RSSI value and reliability of node and detects Sybil attack node. The performance of attack detection against malicious nodes is improved through the attack detection process. The superiority of the proposed technique can be verified by experiments.

A Development of Remote Control System using PDA based WINDOWS CE .NET (WINDOWS CE .NET 기반의 PDA를 이용한 원격제어시스템 개발)

  • Yang, Won-Seok;Lee, Yoo-Sang;Jeon, Jae-Wuk;Moon, Il-Hyeon;Jeon, Chang-Wan;Ahn, Dal;Lim, Jong-Sik;Choi, Kwan-Sun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.8 no.6
    • /
    • pp.1480-1490
    • /
    • 2007
  • This study implemented a remote control system using PDA based on WINDOWS CE. NET. In existing remote control systems, the user generally controls remote objects and obtain data using a computer, which is a local system connected to the internet, and the remote objects are connected to server computers. In order to control remote objects, the user has to have a computer, a space to use the Internet, and wired internet. The system proposed in this study uses an embedded board as a server and PDA as a client. Thus, the user can control remote objects at any place as long as wireless internet is available. In addition, because an embedded board is used as a server, the system has the characteristics of high performance and low power consumption. The proposed system provides not only remote control environment using PDA but also conventional control environment using a computer as a client. In case PDA is not available, remote objects still can be controlled from any place as long as there are wired internet and a computer.

  • PDF