• Title/Summary/Keyword: 경계결정

Search Result 1,128, Processing Time 0.027 seconds

Shot Boundary Detection Using Global Decision Tree (전역적 결정트리를 이용한 샷 경계 검출)

  • Shin, Seong-Yoon;Moon, Hyung-Yoon;Rhee, Yang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.1
    • /
    • pp.75-80
    • /
    • 2008
  • This paper proposes a method to detect scene change using global decision tree that extract boundary cut that have width of big change that happen by camera brake from difference value of frames. First, calculate frame difference value through regional X2-histogram and normalization, next, calculate distance between difference value using normalization. Shot boundary detection is performed by compare global threshold distance with distance value for two adjacent frames that calculating global threshold distance based on distance between calculated difference value. Global decision tree proposed this paper can detect easily sudden scene change such as motion from object or camera and flashlight.

  • PDF

Tree-based Modeling of Prosodic Phrasing and Segmental Duration (운율구 추출 및 음소 지속 시간의 트리 기반 모델링)

  • 이상호;오영환
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.6
    • /
    • pp.43-53
    • /
    • 1998
  • 본 논문에서는 한국어 TTS시스템을 위한 운율구 추출, 운율구 사이의 휴지 기간, 음소의 지속 시간 모델링 방법을 설명한다. 실험을 위해 여러 장르로 구성된 400문장을 선 정하고, 이를 전문 여성 아나운서가 발성하였다. 녹음된 음성 신호에 대해 음소 및 운율구 경계를 결정하고, 문장에 대해서는 형태소 분석, 발음표기 변환, 구문 분석을 수행하였다. 400문장(약33분) 중 240문장(약20분)을 이용하여 결정 트리 및 회귀 트리를 학습시킨 후, 160분장(약13분)에 대해 실험하였다. 운율 모델링을 위한 특징들이 제안되었고, 학습된 트리 들을 해석함으로써 특징들의 유효성이 평가되었다. 실험 문장에 대해 운율구 경계의 유무를 결정하는 결정 트리의 오류율은 14.46%이었고, 운율구 사이의 휴지 기간과 음소 지속 시간 을 예측하기 위한 회귀 트리들의 평균 제곱 오류근(RMSE)이 각각 132msec, 22msec이었다. 수집된 모든 자료(400문장)로 학습한 결과, 운율구 경계 결정 오류율, 휴지 기간 및 지속시 간 RMSE의 10-fold cross-validation 추정치가 각각 13.77%, 127.91msec, 21.54msec이었다.

  • PDF

THEMIS 위성의 플라즈마 입자 관측을 이용한 방사선 벨트 경계 조건 결정

  • Sin, Dae-Gyu;Lee, Dae-Yeong;Hwang, Jeong-A;Kim, Gyeong-Chan;Kim, Jin-Hui;Jo, Jeong-Hui
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.1
    • /
    • pp.91.1-91.1
    • /
    • 2012
  • 지구 자기권의 입자분포는 지구 자기권의 상태와 태양풍의 물리적 상황에 따라 다르다. 가령, 정지궤도에서 고에너지 입자의 flux가 낮아지는 것이 관측된다. 이러한 flux dropout 기간은 대부분 storm main phase에 해당된다. 반면 태양풍의 속력이 상대적으로 높은 HSS(high speed stream)기간 동안에는 대부분 정지궤도에서의 고에너지 입자 flux가 높아지며 radiation belt의 고에너지 입자들의 seed electron 역할을 할 것으로 예상하고 있다. 본 연구에서는 GOSE 11 위성의 electron flux data와 태양풍의 속도를 이용하여 HSS, quiet time, flux dropout 기간을 정의 하였다. 또한, 지구로부터 7~8Re 떨어진 night side지역을 radiation belt의 trapping boundary 바로 바깥 경계지역과 같다고 가정하였다. 그리고 각 기간 동안 이 경계지역에서 입자들의 분포와 관련된 물리적 조건을 결정하는 것을 목표로 하였다. 이는 방사선 벨트 내부에서의 역학적 진화에 영향을 미칠 수 있다. 2007년 6월부터 2010년 8월까지 이러한 경계지역에 THEMIS 위성이 위치했을 때 ESA와 SST의 omni-directional flux를 이용하여 에너지에 대한 입자플럭스 분포 함수를 산출하였다. 또한 각 기간에 평균한 분포 함수를 가장 잘 나타낼 수 있는 해석적 함수를 도출하였다. 추가로, 경계지역에서의 입자들의 pitch angle 분포 패턴도 결정 하였다. 이 결과는 방사선 벨트의 전산모사에서 실질적인 경계 조건으로 사용될 수 있다.

  • PDF

Estimation of Maximum Inundation Zone due to Tsunamis with Moving Boundary (이동경계를 이용한 지진해일의 최대범람구역 추산)

  • 조용식;서승원
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.13 no.2
    • /
    • pp.100-108
    • /
    • 2001
  • Along the shoreline a special treatment is required to simulate movement of periodic waves such as tsunami and tide because of continuous movement of shoreline as waves rise and recede. A moving boundary treatment is first proposed to track the movement of shoreline in this study. The treatment is then employed to obtain a maximum inundation area to be used for mitigation of coastal flooding. The obtained maximum inundation zone for a specific location is compared to that of available observed data. A reasonable agreement is observed.

  • PDF

Detection of Cavities by Inverse Heat Conduction Boundary Element Method Using Minimal Energy Technique (최소 에너지기법을 이용한 역 열전도 경계요소법의 공동 탐지)

  • Choi, C.Y.
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.17 no.4
    • /
    • pp.237-247
    • /
    • 1997
  • A geometrical inverse heat conduction problem is solved for the infrared scanning cavity detection by the boundary element method using minimal energy technique. By minimizing the kinetic energy of temperature field, boundary element equations are converted to the quadratic programming problem. A hypothetical inner boundary is defined such that the actual cavity is located interior to the domain. Temperatures at hypothetical inner boundary are determined to meet the constraints of mea- surement error of surface temperature obtained by infrared scanning, and then boundary element analysis is peformed for the position of an unknown boundary (cavity). Cavity detection algorithm is provided, and the effects of minimal energy technique on the inverse solution method are investigated by means of numerical analysis.

  • PDF

Fuzzy Neural Network Using a Learning Rule utilizing Selective Learning Rate (선택적 학습률을 활용한 학습법칙을 사용한 신경회로망)

  • Baek, Young-Sun;Kim, Yong-Soo
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.5
    • /
    • pp.672-676
    • /
    • 2010
  • This paper presents a learning rule that weights more on data near decision boundary. This learning rule generates better decision boundary by reducing the effect of outliers on the decision boundary. The proposed learning rule is integrated into IAFC neural network. IAFC neural network is stable to maintain previous learning results and is plastic to learn new data. The performance of the proposed fuzzy neural network is compared with performances of LVQ neural network and backpropagation neural network. The results show that the performance of the proposed fuzzy neural network is better than those of LVQ neural network and backpropagation neural network.

Design of Unproved Diffie-Hellman Key Agreement Protocol Based on Distance Bounding for Peer-to-peer Wireless Networks (향상된 경계 결정 기반의 Diffie-Hellman 키 일치 프로토콜)

  • Park, Sern-Young;Kim, Ju-Young;Song, Hong-Yeop
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.1C
    • /
    • pp.117-123
    • /
    • 2008
  • We propose an improved Diffie-Hellman(DH) key agreement protocol over a radio link in peer-to-peer networks. The proposed protocol ensures a secure establishment of the shared key between two parties through distance bounding(DB). Proposed protocol is much improved in the sense that we now reduce the number of messages exchanged by two, the number of parameters maintained by four, and 2(7682(k/64)-64) of XOR operations, where k is the length of the random sequence used in the protocol. Also, it ensures a secure reusability of DH public parameters. Start after striking space key 2 times.

Effect of Metal-Induced Lateral Crystallization Boundary Located in the TFT Channel Region on the Leakage Current (박막트랜지스터의 채널 내에 형성된 금속 유도 측면 결정화의 경계가 누설전류에 미치는 영향)

  • Kim, Tae-Gyeong;Kim, Gi-Beom;Yun, Yeo-Geon;Kim, Chang-Hun;Lee, Byeong-Il;Ju, Seung-Gi
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.4
    • /
    • pp.31-37
    • /
    • 2000
  • In the case of metal-induced lateral crystallization (MILC) for low temperature poly-Si TFT, offset length between Ni-thin film and the sides of gate could be modified to control the location of MILC boundary. Electrical characteristics were compared to analyze the effect of MILC boundary that was located either in or out of the channel region of the TFT. By removing the MILC boundary from channel region, on current, subthreshold slope and leakage current properties could be improved. When MILC boundary was located in the channel region, leakage current was reduced with electrical stress biasing. The amount of reduction increased as the channel width increased, but it was independent of the channel length.

  • PDF

A Study on GIS DB Building Plan for Maritime Boundary Determination (우리나라 해양경계 획정을 위한 GIS DB 구축 항목선정에 관한 연구)

  • Choi, Yun-Soo;Im, Young-Tae;Hwang, Yoo-Jeong;Lee, Yoo-Jung
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.11 no.4
    • /
    • pp.41-50
    • /
    • 2008
  • Intense competition for resources has forced many countries pay attention to their eyes to the ocean. Therefore, the disputes and the conflict over the delimitation of the EEZ and continental shelf will be sharpened. Since 1982 Law of the Sea Convention, Korea has opened the talks with Japan and China to discuss the boundary issues as the adjacent water zone is less than 400 miles between Korea and Japan and Korea and China. This study is to review the important rules and techniques for the delimitation of the maritime boundary which have defined in the Law of the Sea Convention and IHO-51 technical guide and to figure out how to build the maritime delimitation GIS DB to negotiate effectively with the neighboring countries. Definition of the base point and baseline will be the utmost important concept to delimit the ocean boundary. The policy makers and the specialists who prepare for the international negotiation meeting between the countries have to be ready to draw the maritime boundary for our best interest under the Law of the Sea Convention. The negotiation strategies and the principles can be made with the concrete and reliable database relevant to maritime boundary issues. So effective and fast strategic decision for negotiation can only be made based on maritime boundary delimitation GIS DB.

  • PDF

Application of the Recursive Contract Net Protocol for the Threshold Value Determination in Wireless Sensor Networks (무선 센서 네트워크에서 경계값 결정을 위한 재귀적 계약망 프로토콜의 적용)

  • Seo, Hee-Suk
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.4
    • /
    • pp.41-49
    • /
    • 2009
  • In ubiquitous sensor networks, sensor nodes can be compromised by an adversary since they are deployed in hostile environments. False sensing reports can be injected into the network through these compromised nodes, which may cause not only false alarms but also the depletion of limited energy resource in the network. In the security solutions for the filtering of false reports, the choice of a security threshold value which determines the security level is important. In the existing adaptive solutions, a newly determined threshold value is broadcasted to the whole nodes, so that extra energy resource may be consumed unnecessarily. In this paper, we propose an application of the recursive contract net protocol to determine the threshold value which can provide both energy efficiency and sufficient security level. To manage the network more efficiently, the network is hierarchically grouped, and the contract net protocol is applied to each group. Through the protocol, the threshold value determined by the base station using a fuzzy logic is applied only where the security attack occurs on.