• Title/Summary/Keyword: 다중 임계치

Search Result 77, Processing Time 0.032 seconds

Effects of Multiple Threshold Values for PN Code Acquisition in DS-CDMA Systems (PN 코드 동기획득에서 다중 임계치의 효과)

  • Lee, Seong-Ju;Kim, Jae-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.1
    • /
    • pp.42-48
    • /
    • 2002
  • In this paper, a decision method using multiple threshold values for PN code acquisition in Direct Sequence Code Division Multiple Access (DS-CDMA) systems is described. We apply this technique to the conventional double dwell serial search algorithm and analyze it in terms of mean code acquisition time. For the analysis, we present mathematical model of proposed algorithm and also perform the simulation under IMT-2000 channel models. Numerical results show that our proposed scheme outperforms the conventional one by 0.2 - 0.5 sec with respect to the mean code acquisition time because multiple threshold values mitigate the possible decline in search performance caused by the use of a single threshold.

Binarization of Vehicle Plate Region using Adaptive Multi-threshold (Adaptive Multi-threshold를 이용한 자동차 번호판영역의 이진화)

  • 김형재;이도엽;배익성;이철희;차의영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 1998.04a
    • /
    • pp.143-147
    • /
    • 1998
  • 카메라 영상에 의한 자동차 번호판 인식시스템은 영상 획득, 번호판 추출, 전처리, 문자 분리, 문자 인식 등 크게 5자기의 핵심 부분으로 구성된다. 따라서 자동차 번호판 인식시스템의 성능을 향상시키기 위해서는 이들 부분들 각각의 성능의 최적화가 필요하다. 본 연구는 자동차 번호판 인식시스템의 여러 단계 중 전처리에 해당하는 번호판 영역의 이진화에 관한 연구로서, 기존의 단일 임계치 방법과 다중 임계치 방법이 해결하지 못했던 부분을 보완하는 새로운 다중 임계치 방법을 제안한다. 본 논문에서 제안하는 다중 임계치 알고리즘(Adaptive Multi-threshold Algorithm)을 사용함으로써 gray-level 번호판 영상에 대해서 보다 깨끗한 이진 영상을 얻을 수 있었으며, 또한 이 알고리즘은 번호판 영역의 밝기값이 고르지 않은 영상에 대해서도 효율적인 알고리즘 임을 알 수 있었다.

  • PDF

Performance Analysis of Frequent Pattern Mining with Multiple Minimum Supports (다중 최소 임계치 기반 빈발 패턴 마이닝의 성능분석)

  • Ryang, Heungmo;Yun, Unil
    • Journal of Internet Computing and Services
    • /
    • v.14 no.6
    • /
    • pp.1-8
    • /
    • 2013
  • Data mining techniques are used to find important and meaningful information from huge databases, and pattern mining is one of the significant data mining techniques. Pattern mining is a method of discovering useful patterns from the huge databases. Frequent pattern mining which is one of the pattern mining extracts patterns having higher frequencies than a minimum support threshold from databases, and the patterns are called frequent patterns. Traditional frequent pattern mining is based on a single minimum support threshold for the whole database to perform mining frequent patterns. This single support model implicitly supposes that all of the items in the database have the same nature. In real world applications, however, each item in databases can have relative characteristics, and thus an appropriate pattern mining technique which reflects the characteristics is required. In the framework of frequent pattern mining, where the natures of items are not considered, it needs to set the single minimum support threshold to a too low value for mining patterns containing rare items. It leads to too many patterns including meaningless items though. In contrast, we cannot mine any pattern if a too high threshold is used. This dilemma is called the rare item problem. To solve this problem, the initial researches proposed approximate approaches which split data into several groups according to item frequencies or group related rare items. However, these methods cannot find all of the frequent patterns including rare frequent patterns due to being based on approximate techniques. Hence, pattern mining model with multiple minimum supports is proposed in order to solve the rare item problem. In the model, each item has a corresponding minimum support threshold, called MIS (Minimum Item Support), and it is calculated based on item frequencies in databases. The multiple minimum supports model finds all of the rare frequent patterns without generating meaningless patterns and losing significant patterns by applying the MIS. Meanwhile, candidate patterns are extracted during a process of mining frequent patterns, and the only single minimum support is compared with frequencies of the candidate patterns in the single minimum support model. Therefore, the characteristics of items consist of the candidate patterns are not reflected. In addition, the rare item problem occurs in the model. In order to address this issue in the multiple minimum supports model, the minimum MIS value among all of the values of items in a candidate pattern is used as a minimum support threshold with respect to the candidate pattern for considering its characteristics. For efficiently mining frequent patterns including rare frequent patterns by adopting the above concept, tree based algorithms of the multiple minimum supports model sort items in a tree according to MIS descending order in contrast to those of the single minimum support model, where the items are ordered in frequency descending order. In this paper, we study the characteristics of the frequent pattern mining based on multiple minimum supports and conduct performance evaluation with a general frequent pattern mining algorithm in terms of runtime, memory usage, and scalability. Experimental results show that the multiple minimum supports based algorithm outperforms the single minimum support based one and demands more memory usage for MIS information. Moreover, the compared algorithms have a good scalability in the results.

A Study on Translation-Invariant Wavelet De-Noising with Multi-Thresholding Function (다중 임계치 함수의 TI 웨이브렛 잡음제거 기법)

  • Choi, Jae-Yong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.25 no.7
    • /
    • pp.333-338
    • /
    • 2006
  • This paper proposes an improved do-noising method using multi-thresholding function based on translation-invariant (W) wavelet proposed by Donoho et al. for underwater radiated noise measurement. The traditional wavelet thresholding de-noising method causes Pseudo-Gibbs phenomena near singularities due to discrete wavelet transform. In order to suppress Pseudo-Gibbs Phenomena, a do-noising method combining multi-thresholding function with the translation-invariant wavelet transform is proposed in this paper. The multi-thresholding function is a modified soft-thresholding to each node according to the discriminated threshold so as to reject かon external noise and white gaussian noise. It is verified by numerical simulation. And the experimental results are confirmed through sea-trial using multi-single sensors.

Regular Pattern Mining with Multiple Minimum Supports (다중 최소 임계치를 이용한 정규 패턴 마이닝)

  • Choi, Hyong-Gil;Lee, Sang-Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2013.11a
    • /
    • pp.1061-1063
    • /
    • 2013
  • 기존의 많은 빈발 패턴 마이닝은 단일 최소 임계치를 전체 트랜잭션 데이터베이스의 각 아이템에 똑같이 적용하고 빈발 패턴을 마이닝해왔다. 단일 최소 임계치를 설정함으로써, 모든 아이템이 동일한 임계치가 적용되므로 레어 아이템 문제가 발생한다. 한편, 일정 주기마다 발생하는 정규 패턴이라고 한다. 실 세계에서는 빈발한 아이템 뿐만 아니라 주기적으로 발생하는 패턴정보의 필요성이 증가하고 있다. 본 논문은 레어 아이템 문제를 해결하는 빈발한 정규 패턴을 마이닝하는 기법을 제시한다.

A Study on the Denoising Method by Multi-threshold for Underwater Transient Noise Measurement (수중 천이소음측정을 위한 다중 임계치 잡음제거기법 연구)

  • 최재용;도경철
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.6
    • /
    • pp.576-584
    • /
    • 2002
  • This paper proposes a new denosing method using wavelet packet, to reject unknown external noise and white gaussian ambient noise for measuring the transient noise which is one of the important elements for ship classification. The previous denosing method applied the same wavelet threshold at each node of multi-single sensors for rejecting white noise is not adequate in the underwater environment existing lots of external noises. The proposed algorithm of this paper applies a modified soft-threshold to each node according to the discriminated threshold so as to reject unknown external noise and white gaussian ambient noise. It is verified by numerical simulation that the SNR is increased more than 25㏈. And the simulation results are confirmed through sea-trial using multi-single sensors.

Real-Time Face-Detection Based on Multiple Color-Spaces and Multiple Thresholds for Distance Measurement Between Speaker and Smart-Phone (화자(話者)와 스마트폰의 거리 측정을 위한 다중 색 좌표계와 다중 임계치 기반 실시간 얼굴검출)

  • Lee, Jae-Won;Kwon, Goo-Rak;Hong, Sung-Hoon
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.4
    • /
    • pp.481-493
    • /
    • 2011
  • As the development of mobile devices, mobile phones are equipped with many features. Video-call feature is one of them. In this paper, we present distance measurement between speaker and smart-phone using multiple color spaces and multiple thresholds. first, detect face based on skin color information. and second, measure distance between speaker and smart-phone using the detected face region. Especially, the first considering point in the development of face area detection is real-time processing and the second point is robustness to solve the problems of face detection errors due to rapid change of object movement, lighting and background between adjacent frames.

Performance Analysis of Adaptive Bandwidth and Subcarrier Allocation Scheme for a Multi-user OFDM System (다중 사용자 OFDM 시스템을 위한 적응적 대역폭 및 부반송파 할당 기법의 성능 분석)

  • Lim, Yeon-Ju;Park, Sang-Kyu
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.11A
    • /
    • pp.1113-1119
    • /
    • 2006
  • For a multi-user OFDM system in mobile channels which requires low-complexity in adaptive resource allocations, resource allocation algorithm using multi-threshold is proposed. The allocation scheme, which is performed by the multi-threshold values in descending order, considers only subcarriers over each threshold level. Moreover, some subcarriers with the lowest channel gain can be· removed in the present threshold level within the constraint of satisfaction of the required data rate, in order to allocate them to the other users when the allocation process of next threshold is executed. As a result, the proposed bandwidth and subcarrier algorithm has better system performances than the conventional allocation schemes in terms of required power and processing time, which is expected as a technique that improves the spectral efficiency of OFDM systems in a mobile environment.

Detection performance of MC-CDMA parallel acquisition with reference filter in a multipath fading channel

  • 유영환;강성진;강창언
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.23 no.4
    • /
    • pp.893-900
    • /
    • 1998
  • 본 논문에서는 잡음 예측 필터를 적용한 멀티 캐리어 CDMA 병렬 동기 시스템을 위한 임계치의 통계적인 해석에 중점을 둔다. 시스템 성능 척도로써 평균 동기 획득 시간을 검파 확률과 오보 확률의 관점에서 유도한다. 다중 경로 페이딩 채널에서 평균 동기 획득 시간을 유도한다. 수치해석 결과, 잡음 예측 필터를 적용한 멀티 캐리어 CDMA 병렬 동기 해석에 있어서 임계치의 통계적인 특성을 이용한 동기 해석이 임계치의 근사화에 의한 동기 해석보다 정확한 결과를 보임을 알 수 있다. 또한, 잡음 예측 필터를 적용한 멀티 캐리어 CDMA 별렬 동기 시스템이 넓은 범위의 SNR에 대해서 평균 동기 획득 시간을 최소화할 수 있는 임계치를 검파할 수 있음을 확인할 수 있다.

  • PDF

An Authentication Protocol-based Multi-Layer Clustering for Mobile Ad Hoc Networks (이동 Ad Hoc 망을 위한 다중 계층 클러스터링 기반의 인증 프로토콜)

  • Lee Keun-Ho;Han Sang-Bum;Suh Heyi-Sook;Lee Sang-Keun;Hwang Chong-Sun
    • Journal of KIISE:Information Networking
    • /
    • v.33 no.4
    • /
    • pp.310-323
    • /
    • 2006
  • In this paper, we describe a secure cluster-routing protocol based on a multi-layer scheme in ad hoc networks. We propose efficient protocols, Authentication based on Multi-layer Clustering for Ad hoc Networks (AMCAN), for detailed security threats against ad hoc routing protocols using the selection of the cluster head (CH) and control cluster head (CCH) using a modification of cluster-based routing ARCH and DMAC. This protocol provides scalability of Shadow Key using threshold authentication scheme in ad hoc networks. The proposed protocol comprises an end-to-end authentication protocol that relies on mutual trust between nodes in other clusters. This scheme takes advantage of Shadow Key using threshold authentication key configuration in large ad hoc networks. In experiments, we show security threats against multilayer routing scheme, thereby successfully including, establishment of secure channels, the detection of reply attacks, mutual end-to-end authentication, prevention of node identity fabrication, and the secure distribution of provisional session keys using threshold key configuration.