Proceedings of the IEEK Conference (대한전자공학회:학술대회논문집)
The Institute of Electronics and Information Engineers (IEIE)
- 기타
2000.11c
-
Voltage mode chaotic neuron has been designed in integrated circuit and fabricated by using 0.8
$\mu\textrm{m}$ single poly CMOS technology. The fabricated CMOS chaotic neuron consist of chaotic signal generator and sigmoid output function. This paper presents an analysis of the chaotic behavior in the voltage mode CMOS chaotic neuron. From empirical equations of the chaotic neuron, the dynamical responses such as time series, bifurcation, and average firing rate are calculated. And, results of experiments in the single chaotic neuron and chaotic neural networks by two neurons are shown and compared with the simulated results. -
Genetic algorithm is a searching method which based on the law of the survival of the fittest. Multi-population Genetic Algorithm is a modified form of Genetic Algorithm, which was devised for covering the defect of general genetic algorithm. The core of multi-population genetic algorithm is said to be the migration schemes. The fitness-based migration scheme and the random migration scheme are currently used. In this paper, a new migration scheme, ‘the migration scheme between groups’, is suggested, and compared to the general two migration schemes.
-
This paper is to compare DTCNN(Discrete-time Cellular Neural Networks) applying the fuzzy morphology operators with the conventional FCNN(Fuzzy CNN) using the general morphology operators. These methods are to the image filtering, and are compared as MSE. Also the main goal of this paper is to compare the fuzzy morphology operators with the general morphology operators through image input. In a result of computer simulation, we could know that the error of DTCNN applying the fuzzy morphology operators is less about 6.1809 than FCNN using the general morphology operators in the image included 10% noise, also the error of the former is less about 5.5922 than the latter in the image included 20% noise. And the image of DTCNN applying the fuzzy morphology operators is superior to FCNN using the general morphology operators.
-
본 논문에서는 복잡한 카오스 신호를 발생시키는 HVPM(hyperchaotic volume preserving maps) 모델과 HVPM 모델의 구현회로를 제안한다. 랜덤 한 카오스 신호를 발생시키기 위하여 3차원 이산시간(discrete-time) 연산과 비선형 사상(maps)으로 모듈러(modulus) 함수를 이용하여 하이퍼카오스 신호를 발생시킨다. 그리고 HVPM 모델은 여러 가지 시스템 파라미터들을 변화시키면 다양한 카오스 신호를 발생시킬 수 있으며, 출력되는 카오스 신호는 비주기성을 갖게 된다. 이러한 특징을 갖는 HVPM 모델의 회로 구현을 위하여 2단 N형의 함수를 CMOS와 선형 연산증폭기 및 비교기를 이용하여 보드상에서 구현하여, 다양한 하이퍼카오스 신호를 확인할 수 있었다.
-
In this paper, an effective intention reading scheme is proposed for human-friendly interface. Soft computing techniques such as fuzzy logic and artificial neural networks are used for this. And Gabor filter based feature(GG feature) is also proposed to deal with local activity in the human face. It is based on human visual system and Gabor filter based approach is very popular in these days. The proposed scheme is adopted for human-friendly interface for rehabilitation service robotic system KARES II.
-
HMM(Hidden Markov Model)은 시간적인 정보를 토대로 하는 수학적인 방법으로서 문자인식에 많이 사용되어지고 있다. 그런데 HMM이 적용되고자 하는 문제에서 사용되어지는 상태 수와 HMM에서 사용되어지는 parameter들은 처음에 결정되는 값들에 의해서 상당히 많은 영향을 받게 된다. 따라서 한글의 특성을 이용한 HMM의 상태 수를 결정한 후 결정되어진 각각의 HMM parameter들을 Genetic Algorithm을 이용하였다. Genetic Algorithm은 매개변수 최적화 문제에 대하여 자연의 진화 원리를 마땅한 알고리즘으로 선택, 교배, 돌연변이 연산을 이용하여 최적의 개체를 구하게 된다. 여기서는 HMM에서의 Viterbi Algorithm을 적합도 검사에 사용하였다.
-
In this paper, we describe a study on the spotting and recognition of handwritten numerals using neural networks. To recognize a handwritten numeral, two kinds of neural network classifiers ate developed. One makes use of the positive samples only, while the other does both of the positive and negative samples. We propose two numeral spotters which discriminate between numerals and non-numerals. Those are also implemented by using neural networks. From the various experimental results, we found that our methods can be successfully applied to spot and recognize handwritten numerals.
-
A fast method of Hangul address word verification is presented in this Paper. Pre-segmentation and recognition by DP matching is adopted in this paper. An address line image is over-segmented by analyzing the topology of connected components and the projection profile. A fast individual Hangul character verifier was developed by applying SVM (Support Vector Machine). The segmentation hypothesis was represented by lattice structure, and a best path search by dynamic programming generates the most probable segmentation path and the final verification score. The word verifier was tested on 310 address image DB, and it show the possibility of improvements of this method.
-
In this paper, we propose an Intelligent Monitoring Network System(IMNS) for The truck scale balance system. Truck scale balance system consis of three parts; Load cell part, Indicator part, and Junction box part. IMNS is attached to Junction box in truck scale balance system. Even if Load cell have been some problems, a truck scale balance system still has been run to determine, the values involved error. therefore prosed system is has concentrated on Load cell part. Other Parts have been changed a portion of circuit for monitoring system.
-
Recently many efforts on the development of automatic processing system for delivery sequence sorting have been performed in ETRI , which requires the use of postal 4-state bar code system to encode delivery points. The 4-state bar code called postal 4-state bar code for high speed processing that has been specifically designed for information processing of logistics and automatic processing of the mail items. This paper describes a method of Reed-Solomon encoding for creating error correction codeword of 4-state bar code.
-
Due to the emerging of high-speed network, lots of interests of access to remote data have increased. Those interests motivate using of Cooperative Caching that uses remote cache like local cache by sharing other clients' cache. The conventional algorithm like GMS(Global Memory Service) has some disadvantages that occurred bottleneck and decreasing performance because of exchanges of many messages to server or manager. On the other hand, Hint-based algorithm resolves a GMS's server bottleneck as each client has hint information of all blocks. But Hint-based algorithm also causes some problems such as inaccurate information in it, if it has too old hint information. In this paper, we offer the policy that supplement bottleneck and inaccuracy; by using file identifier that can search for the lookup table and by exchanging oldest block information between each client periodically.
-
EC, which is done the virtual space through Web, has weakly like security problem because anybody can easily access to the system due to open network attribute of Web. Therefore, we need the solutions that protect the Web security for safe and useful EC. One of these solutions is the implementation of a strong cipher system. NC(Nonpolynomial Complete) cipher system proposed in this paper is advantage for the Web security and it overcomes the limit of the 64 bits cipher system using 128 bits key length for input, output, encryption key and 16 rounds. Moreover, it is designed for the increase of time complexity by adapted more complex design for key scheduling regarded as one of the important element effected to encryption.
-
In this paper, We propose the new interconnection network which is designed to edge numbering method using inorder traversal a Fibonacci trees and its jump sequence is Fibonacci numbers. It has a simple (shortest path)routing algorithm, diameter, node degree. It has a spaning subtree which is Fibonacci tree and it is embedded Fibonacci tree. It is compared with Hypercube. We improve diameter compared with Hypercube on interconnection network measrtes.
-
This paper addresses design and implementation of a router based on Linux. Around MPC860T CPU which includes a common communication controller as the main processor, the hardware has two WAN ports and one Ethernet port. Linux was optimized and ported into the hardware, and used as the operating system.
-
In this paper, a novel algorithm for digital watermarking is proposed. We use two pattern keys from BCH (15, 7) code and one randomizing key. In the embedding process, optimal watermark coefficients are determined by statistical analysis of the DCT coefficients from the standpoint of HVS. In the detection, watermark coefficients are restored by correlation matching of the possible pattern keys and minimizing the estimation errors. Attacks tested in the experiments ate image enhancement and image compression (JPEG). Performance is evaluated by BER of the logo images and SNR/PSNR of the restored images. Our method has higher performance against JPEG attacks. Analysis for the performance is included.
-
본 논문은 표준완성형코드를 표준으로 허프만 부호를 생성하기 위해 부호화 효율이 가장 높은 곳에서 예외 부호화를 통해 최적의 허프만 부호를 얻는다. 현재 우리나라의 DTV는 한글문자를 압축하지 않고 전송하는 형태이며, 본격적인 데이터 방송이 시작되면 한글 데이터가 차지하는 전송량으로 인한 심각한 문제가 야기된다. 본 논문에서는 데이터 방송에서 문제가 되는 전송량을 줄이기 위해 한글 전용 최적의 허프만 부호를 생성하여 일련의 해결책을 찾고자 하며 영문 위주인 데이터 압축기술을 한글에 맞게 적용하여 DTV 방송용 한글 전용 압축부호를 만드는데 있다.
-
본 논문에서는 JPEG 영상을 인터넷상에서 효율적으로 전송하기 위한 Partial Access를 지원하는 JPEG 변환 처리 기술을 제안한다. 네트웍 상에서 영상을 전부 전송하지 않고 클라이언트의 브라우져의 디스플레이에 필요한 부분만을 실시간으로 전송한다면 전체 네트웍 효율을 높일 수 있다. 이를 위해서는 영상을 Partial Access 할 수 있어야 한다. 또한, 본 논문에서 제안한 Partial Access 기능이 추가된 JPEG 영상은 기존의 JPEG과 완전 호환되며, 클라이언트는 기존의 일반 웹 브라우져를 그대로 사용할 수 있다.
-
In this paper, we propose an efficient method to extract a goal area which may be closely related to the scoring highlight. In our method, the boundary between the ground and the non-ground area is used. An efficient methods for a rapid detection of both the boundary and then the goal area are proposed. Our simulation results show that our method is very reliable and takes less processing time compared with previous methods. This performance improvements may be caused by the use of a general simple feature.
-
With the rapid growth of network distributions of digitized media(audio, image, and video), there is an urgent need for copyright protection. For now watermarking is a well-known technique for copyright protection of digital data. To embed a digital watermark to the image, discrete cosine transform(DCT) and wavelet transform are commonly used. In this paper, the performance of the DCT based watermarking technique and wavelet based watermarking technique were compared and the influences of the parameter a that decides the strength of the watermarking data were considered.
-
The wireless network has bursty and high error rates. Due to the quite limited bandwidth in wireless networks, images are usually transmitted as a compressed version with VLC(variable length coding). Loss of coded data can affect a decoded image to a large extent, making concealment of errors caused by data loss an important issue. This paper presents a error concealment technique for DCT(Discrete Cosine Transform) based image coding. First, a method to estimate the missing DC coefficients of a JPEG coded image which is required for decoding the compressed image, is suggested and evaluated. Second, the missing data is interpolated by exploiting the probability of being nonzero and the correlation between adjacent blocks. In addition, since the these technique is computational efficient, it conserves system resources and power consumption, which are restrictive in mobile computers.
-
In this paper, we propose an efficient database system for video retrieval. Using the color spaces, it shows results of user's request. Each color space used following user's selection. We suggest adaptive three color systems for database. Experimental results based on a video database containing 331 shots are included.
-
The most important technology is the compression methods in the multimedia society. Audio files are rapidly propagated through internet. MP-3(MPEG-1 Layer3) is offered to CD tone quality in 128kbps, but 64kbps below tone-quality is abruptly down. On the other hand, MPEG-II AAC (Advanced Audio Coding) is not compatible with MPEG-I, but AAC has a high compression ratio 1.4 times better than MP-3 and it has max. 7.1 channel and 96KHz sampling rate. In this paper, we designed the optimized MDCT (Modified Discrete Cosine Transform) that could decrease the capacity of enormous computation and could increase the processing speed in the MPEG-2 AAC encoder.
-
One of the most important marketing strategies is how to solve customers' complaints. Under developing internet environment, it is possible to use internet multimedia consultant system to do cope with the problem. In this paper, we have realized the customer consulting system which is based on Linux as the operating system. Java is used as a programming language. With the use of the RTP(Real-time Transport protocol), the system provides picture and sound transactions between a consultant and customers in a real-time fashion.
-
An embedded system is a combination of computer hardware and software, and perhaps additional mechanical or other parts, designed to perform a specific function. In this paper, we design and implement efficient SDKs for the embedded system. When we develop the embedded system, we use the cross development method because of limited resource. Simulator, stub for GDB, and monitor are implemented in order. Simulator consists of 4 threads; CPU, display, I/O, timer thread. Stub is developed to connect GDB. Monitor is programed to improve stub and can debug the application program without the debugger in the host.
-
Many applications in computer graphics require highly detailed complex models. However, the level of detail may vary considerably according to applications. It is often desirable to use approximations in place of excessively detailed models. We have developed a surface simplification algorithm which uses iterative contractions of edges to simplify models and maintains surface error approximations using a quadric metric. In this paper, we present an improved quadric error metric for simplifying meshes. The new metric, based on subdivided edge classification, results in more accurate simplified meshes. We show that a subdivided edge classification captures discontinuities efficiently. The new scheme is demonstrated on a variety of meshes.
-
Human face recognition and 3D human face reconstruction has been studied in this paper. To find the facial feature points, find edge from input image and analysis the accumulated histogram of edge information. This paper use a Generic Face Model to display the 3D human face model which was implement with OpenGL and generated with 500 polygons. For reality of 3D human face model, we propose Group matching mapping method between facial feature points and the one of Generic Face Model. The personalized 3D human face model which resembles real human face can be generated automatically in less than 5 seconds on Pentium PC.
-
In this paper, we suggest an authentication system for online lecture using facial information and a face recognition algorithm base on relation of face. First, a facial area on complex background is detected using color information. Second, features are extracted with edge profile. Third, compare it with the value of original facial image in database. By experiments, we know that the proposed system is an useful method for online lecture authentication system.
-
In this paper, we propose a pen gesture recognition system for user interface in multimedia terminal which requires fast processing time and high recognition rate. It is realtime and interaction system between graphic and text module. Text editing in recognition system is performed by pen gesture in graphic module or direct editing in text module, and has all 14 editing functions. The pen gesture recognition is performed by searching classification features that extracted from input strokes at pen gesture model. The pen gesture model has been constructed by classification features, ie, cross number, direction change, direction code number, position relation, distance ratio information about defined 15 types. The proposed recognition system has obtained 98% correct recognition rate and 30msec average processing time in a recognition experiment.
-
The design and Implementation of High School Computer Education Electronic Textbook Based on the WBIThis paper, which is about electronic-textbook, shows that, in the seventh curriculum, how the student can study “Age Information and Computer” through the web site. By selecting their unit by themselves, studying it themselves, and studying further step after a formative test, the student will be able to study on the suitable level. Students themselves also check their progress in learning and submit their assignment. A series of these activities will make it possible for the student to get used to the computer.
-
In this paper, a multimedia database retrieval system is proposed using MPEG-7 meta data. Multimedia content based retrieval system is implemented with the MPEG-7 meta data extraction and matching technique. MPEG-7 descriptors and descriptor schemes are stored into the database with other meta data. When a query image is given, the descriptors and descriptor schemes of the query image are extracted and compared with the descriptors and descriptor schemes in the database. Finally, images having more similarity are retrieved.
-
In this paper, a new service architecture for IP Telephony, based on the ITU-T standard H.323[1], is proposed. This architecture uses mobile Agents and existing architectural concepts taken from Intelligent Network[IN]. This IP service architecture enables telecom services deployed through mobile service agents on a per user basis, which results in several advantages when compared to centralized service architecture. The paper demonstrates that the flexible and extensible architecture can accommodate a wide variety of future services.
-
In this paper, we propose as new algorithm for the selection of key frames in a given video. For the selected key frames to be well defined, the selected key frames need to spread out on the whole temporal domain of the given video and guaranteed not to be duplicate. For this purpose, we take the first frame of each shot of the video as the candidate key frame to represent the video. To reduce the overall processing time, we eliminate some candidate key frames which are visually indistinct in the histogram difference. The key frames are then selected using a clustering processing based on the singly linked hierarchical tree. To make the selected key frames be distributed evenly on the whole video, the deviation and time difference between the selected key frames are used. The simulation results demonstrate that our method provides the better performance compared with previous methods.
-
This paper proposes a character segmentation method for Korean letter address image. The poor quality of image binarization results in broken character strokes. To overcome this problem, two steps of processing ate introduced. The first one is to merge broken characters to generate character candidates, and the other one is to reduce the complexity of segmentation graph path. These two steps do not use recognition information to keep in high-speed.
-
We propose simple analog MOS circuits producing the one-dimensional compact motion-sensing circuits. In the proposed circuit, the optical flow is computed by a number of local motion sensors which are based on biological motion detectors. Mimicking the structure of biological motion detectors made the circuit structure quite simple, compared with conventional velocity sensing circuits. Extensive simulation results by a simulation program of integrated circuit emphasis (SPICE) indicated that the proposed circuits could compute local velocities of a moving light spot and showed direction selectivity for the moving spot
-
A novel silicon retina chip based on the information processing in the vertebrate retina was designed. The chip has a novel wiring structure in which all pixels are connected through the channel of MOS transistors, which simplifies a wiring structure compared with conventional resistive networks. The proposed structure minimizes the pixel area and certainly increases a fill factor since each pixel consists of only two photodiodes and three MOS transistors. It also enables the chip to operate over a wide range of light intensity by adjusting its conductance with the gate voltage. Simulation results with SPICE showed that the chip could extract the edge of input images successfully.
-
Nowadays, internet or web is popularized in society. So, intranet or inside computation environment of business has been changed a web based open system. Client and Server system that has been used core technique for enterprise information system several years is developing e-business system that perform a business in web based. Because, internet is extension of a whole field like business or information technology Therefore we understand a meaning of e-business and ERP system that a form of e-business system. Then we realize problem of existing system and study a technology for complement of system. Finally, we propose a proper model for e-business system and develop an example.
-
This paper presents an implementation of internet gateway system, named AX-2000 and call simulator. AX-2000 plays a important role in internet telephony technology and is composed of various board such as MPU, AVU. DVU, AMU. FXS, FXO, EM. Also AX-2000 supports G.729.a, G.723.1 for voice compression, G3 FAX Relay(T.38) and H.323. A capability of AX-2000 is 8 analog voice channel or 30 digital voice channel. For functional verification of AX-2000 voice interface, call simulator is designed. The call simulator makes actual call path between SUT(system under test) and reference AX-2000 system, then through call path examines functions of voice interface.
-
Since the IP multicast was proposed, there have been many research works on reliable multicast protocols[1]. In multicast communication, many reliable multicast schemes were studied in order to overcome packet losses in the network. However the fact that packets are lost in the underlying networks but the solutions are sought in the end hosts makes the search for solutions difficult. If routers can identify packets before dropped from congestion, the routers can initiate recovery process. recovery scheme by routers is proposed. This scheme is much faster than by sender-initiated or receiver-initiated recovery and latency is smaller.
-
Recently, the advent of World-Wide-Web(WWW) and the explosive popularity of the Internet gave birth to collaborative applications which were enabled by computers and networks as their primary media. And the progress of 3D computer graphics enabled collaborative application with 3D virtual environments or distributed virtual environments. In this paper, we explain our implementation of Share collaboration engine and Virtual Architectural Engineering 2000 (VAE2000) system which is our pilot application implemented with Share collaboration engine. And we explain problems presented by our experiments with VAE2000 system. For those problems, we design our new middle-ware system, SHINE(SHared INternet Environment). The SHINE proposes new concepts and approaches for collaboration with 3D objects in a virtual world.
-
This paper presents the development of an 8051-compatible microcontroller. The 8051 microcontroller is one the most popular mjcrocontroller used nowadays. All the features of the 8051, including peripherals, are implemented. The output of this work is a synthesizable RTL model that is readily available for a simple control unit in a more complex chip, such as an SOC. We put some important notes relating to the implementation of the 8051's features, including bit addressing, multiplication/division, etc.
-
CT images are sequential images that provide medical doctors helpful information for treatment and surgical operation. It is also widely used for the 3D reconstruction of human bone and organs. In the 3D reconstruction, the quality of the reconstructed 3D model heavily depends on the segmentation results. In this paper, we propose an algorithm suitable for the segmentation of teeth and the maxilofacial bone.
-
This paper presents an experimental system, where an object extracted from an image sequence is embedded into the desired position in a scene. First, a moving object is detected and the 3-D structure is obtained by SFM analysis of comer trajectories. We constrained the motion to translational motion only. Extracted objects are classified by matching with 3-D models and then the structure of the occluded part is restored. Camera calibration is performed for the background scene which will embed the object. Finally, the object is embedded into the scene. In the experiments, we used synthetic image sequences generated with OpenGL library for easy evaluation of the 3-D structure estimation.
-
The Naming Service is central to most common object request broker architecture(CORBA) applications. It serves as a directory for CORBA objects-the building blocks of CORBA applications. As the Windows computing environment is disseminated, the performance features of the existing CORBA is becoming of great interest. Thus, in this paper, we intend to examine some performance features of three commercially-available Naming Service implementations of CORBA in strictly Windows (NT and 98) environment.
-
This paper presents a new DR(Dead Reckoning) algorithm in client-server-based networked virtual environment using network delay estimation. In the algorithm, a new update packet is sent to server (or client) whenever the difference of current real value and tracking value after network delay is larger than threshold. To confirm the proposed algorithm, a test network game was implemented. Through iterative field tests, we knew that this algorithm provides fair service and stability.
-
In this paper, we present a model based 3d facial modeling method for virtual reality application using only one front of face photography. We extract facial feature using facial photography and modify mesh of the basic 3D model by the facial feature. After this , We use texture mapping for more similarity. By experiment, we know that the modeling technic is useful method for Movie, Virtual Reality Application, Game , Clothing Industry , 3D Video Conference.