• Title/Summary/Keyword: 도메인 결정

Search Result 205, Processing Time 0.025 seconds

Improvement of Perceptual Quality of HEVC by Rate Distortion Optimization Using Frequency Domain Structural Similarity (주파수 도메인의 구조적 유사도를 통한 HEVC 주관적 화질 향상 율-왜곡 최적화)

  • Jung, Sanghyun;Jeon, Byuengwoo
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2017.06a
    • /
    • pp.81-82
    • /
    • 2017
  • 본 논문에서는 PSNR 을 높이도록 최적화된 HEVC 의 율-왜곡 최적화(RDO)를 MS-SSIM 를 높이도록 하여 RDO 를 수행 하도록 한다. 구현 방법으로는 MS-SSIM 도출 방법과 비슷하도록 원본과 4 단계의 저역 통과 필터(LPF)를 통과한 결과에 대한 DCT(Discrete Cosine Transform) 를 수행하고 그 AC 계수의 비율로 lagrange multiplier(${\lambda}$)를 수정하는 방식이다. AC 계수 비율과 MS-SSIM 에서 도출 된 가중치, LPF 특성 등에 따라 새롭게 각 스케일의 가중치를 결정하여 최종적으로 ${\lambda}$ 가중치를 결정하여 그 결과를 바탕으로 RDO 를 수행한다. 시뮬레이션을 통해 제안의 방법과 HEVC reference software 의 BD-rate 계산 결과 7%의 PNSR, -13.2%의 MS-SSIM 를 얻을 수 있었고 이에 따라 주관적 화질을 개선했다고 할 수 있다.

  • PDF

A Method of Ontology Inference based on Bayesian Probability for Decision Making of Intelligent Home Agents (지능형 홈 에이전트의 의사결정을 위한 베이지안 확률기반 온톨로지 추론 방법)

  • Lim, Sung-Soo;Cho, Sung-Bae
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.10c
    • /
    • pp.357-361
    • /
    • 2007
  • 지능형 에이전트가 홈네트워크 환경 속에서 사용자에게 적절한 서비스를 제공하기 위해서는 에이전트가 속한 환경에 대한 모델이 필요하다. 온톨로지는 이러한 환경 모델을 표현하기 위한 유용한 도구로 복잡한 도메인의 조직적 구조 표현에 있어서 뛰어난 성능을 보여준다. 하지만 전통적 온톨로지는 크리스프 로직에 기반하기 때문에 현실세계의 불확실성을 표현하기에는 적합하지 않다. 본 논문에서는 온톨로지의 이러한 한계점을 보완하고, 불확실한 환경 속에서 지능형 홈 에이전트가 적절한 의사결정을 내릴 수 있도록 하는 베이지안 네트워크기반 온톨로지 추론 방법을 제안한다. 제안하는 방법에서는 온톨로지의 클래스 객체를 베이지안 네트워크의 노드로 나타내고, 객체 속성(object property)을 아크로 표현함으로써, 확률적 추론이 가능한 온톨로지를 제공한다. 몇 가지 시나리오와 설계 복잡도 분석을 통해서 제안하는 방법의 유용성을 평가한다.

  • PDF

Discovery of Deleterious nsSNPs on the Genes related to the Lipid Metabolism and Prediction of Changes on Biological Function in Korean Native Chicken (한국 재래닭에서 지질대사 관련 유전자에 존재하는 유해성 nsSNP 발굴 및 생물학적 기능 예측)

  • Oh, Jae-Don;Shin, Dong-Hyun;Shin, Sang-Soo;Yoon, Chang;Song, Ki-Duk
    • Korean Journal of Poultry Science
    • /
    • v.43 no.4
    • /
    • pp.263-272
    • /
    • 2016
  • In this study, we aimed to identify the nonsynonymous single nucleotide polymorphisms (nsSNPs) located in lipid metabolism-related genes because lipids are an important factor affecting the taste and flavor of meat, and they predict the functional consequences. The results showed that we identified 139 common nsSNPs in all five Korean native chicken (KNC) lines from the 81 genes related to lipid metabolism. Furthermore, sorting intolerant from tolerant (SIFT) and polymorphism phenotyping v2 (Polyphen-2) analyses predicted that among the genes, 14 nsSNPs of nine genes might be deleterious. Protein domain prediction of the nine genes revealed that all deleterious nsSNPs identified in this study were located outside the functional domain. This observation suggests that the common deleterious nsSNPs might be dispensable and have a minor effect on the traits of the KNCs.

Accuracy Analysis of Parallel Method based on Non-overlapping Domain Decomposition Method (비중첩 영역 분할기법 기반 병렬해석의 정확도 분석)

  • Tak, Moonho;Song, Yooseob;Jeon, Hye-Kwan;Park, Taehyo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.26 no.4
    • /
    • pp.301-308
    • /
    • 2013
  • In this paper, an accuracy analysis of parallel method based on non-overlapping domain decomposition method is carried out. In this approach, proposed by Tak et al.(2013), the decomposed subdomains do not overlap each other and the connection between adjacent subdomains is determined via simple connective finite element named interfacial element. This approach has two main advantages. The first is that a direct method such as gauss elimination is available even in a singular problem because the singular stiffness matrix from floating domain can be converted to invertible matrix by assembling the interfacial element. The second is that computational time and storage can be reduced in comparison with the traditional finite element tearing and interconnect(FETI) method. The accuracy of analysis using proposed method, on the other hand, is inclined to decrease at cross points on which more than three subdomains are interconnected. Thus, in this paper, an accuracy analysis for a novel non-overlapping domain decomposition method with a variety of subdomain numbers which are interconnected at cross point is carried out. The cause of accuracy degradation is also analyze and establishment of countermeasure is discussed.

A Comparative Study of Block Chain : Bitcoin·Namecoin·MediBloc (블록체인 비교연구: 비트코인·네임코인·메디블록)

  • Kim, Ji Yeon
    • Journal of Science and Technology Studies
    • /
    • v.18 no.3
    • /
    • pp.217-255
    • /
    • 2018
  • Bitcoin, which appeared in 2008, was merely a conceptual virtual currency, but it now enjoys the status as actual money. Bitcoin is an electronic money system that can be traded directly without a central trust institution. Thanks to the popularization of Bitcoin, blockchain technology has become a widespread concern. That technology is expanding not only the currency mechanism, but also a variety of other services. The possibility of a blockchain in relation to actual currency is ongoing. This paper investigates the technological characteristics and social construction of the blockchain by comparing the cases of Bitcoin, Namecoin, and MediBloc among blockchain applications. Namecoin emerged in 2013 is an attempt to replace the centralized Internet Domain Name System(DNS). There has been controversy over that current system for a long time, but replacing the already established system is not easy. Nevertheless, Namecoin has potential as an alternative. Meanwhile, MediBloc is an application that involves distributed management of medical data in South Korea. MediBloc claims that the key producers of medical data are patients themselves. This is to challenge to the question who is a knowledge producer of medical data. Through these three cases, it has discussed that blockchain technology does supports to form more democratic decision-making or simply provide a technical solution as automation. As a citizen, we can intervene in the realization of blockchains by presenting social agenda. This will be a method of the social construction of technology.

An Efficient Index Term Extraction Method in IR using Lexical Chains (정보검색에서 어휘체인을 이용한 효과적인 색인어 추출 방안)

  • Kang, Bo-Yeong;Lee, Sang-Jo
    • Journal of KIISE:Software and Applications
    • /
    • v.29 no.8
    • /
    • pp.584-594
    • /
    • 2002
  • In information retrieval or digital library, one of the most important factors is to find out the exact information which users need. In this paper, we present an efficient index term extraction method which makes it possible to guess the content of documents and get the information more exactly. To find out index terms in a document, we use lexical chains. Before generating lexical chains, we roughly disambiguate the senses of nouns in a document using specific concept, called semantic window. Semantic window is that we look ahead semantic relations of peripheral nouns and disambiguate the senses of nouns. After generating lexical chains with sense-disambiguated nouns, we find out strong chains by some metrics and extract index terms from a few strong chains. We evaluated our system, using results of a key phrase extraction system, KEA. This system works in general domains of documents Including Information Retrieval and Digital Library.

Validation Technique for Class Name Postfixes Based on the Machine Learning of Class Properties (클래스 특성 기계학습에 기반한 클래스 이름의 접미사 검증 기법)

  • Lee, Hongseok;Lee, Junha;Lee, Illo;Park, Soojin;Park, Sooyong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.4 no.6
    • /
    • pp.247-252
    • /
    • 2015
  • As software has gotten bigger in magnitude and the complexity of software has been increased, the maintenance has gained in-creasing attention for its significant impact on the cost. Identifiers have an impact on more than 90 percent of the readability which accounts for a majority portion of the maintenance activities. For this reason, the existing works focus on domain-specific features based on identifiers. However, their approaches have a limitation when either a class name does not reflect the intention of its context or a class naming is incorrect. Therefore, this paper suggests a series of class name validation process by extracting properties of classes, building learning model by applying a decision tree technique of machine learning, and generating a validation report containing the list of recommendable postfixes of classes to be validated. To evaluate this, four open source projects are selected and indicators such as precision, recall, and ROC curve present the value of this work when it comes to five specific postfixes including functional information on class names.

Multimedia Information Retrieval Using Semantic Relevancy (의미적 연관성을 이용한 멀티미디어 정보 검색)

  • Park, Chang-Sup
    • Journal of Internet Computing and Services
    • /
    • v.8 no.5
    • /
    • pp.67-79
    • /
    • 2007
  • As the Web technologies and wired/wireless network are improved and various new multimedia services are introduced recently, need for searching multimedia including video data has been much increasing, The previous approaches for multimedia retrieval, however, do not make use of the relationships among semantic concepts contained in multimedia contents in an efficient way and provide only restricted search results, This paper proposes a multimedia retrieval system exploiting semantic relevancy of multimedia contents based on a domain ontology, We show the effectiveness of the proposed system by experiments on a prototype system we have developed. The proposed multimedia retrieval system can extend a given search keyword based on the relationships among the semantic concepts in the ontology and can find a wide range of multimedia contents having semantic relevancy to the input keyword. It also presents the results categorized by the semantic meaning and relevancy to the keyword derived from the ontology. Independency of domain ontology with respect to metadata on the multimedia contents is preserved in the proposed system architecture.

  • PDF

Rule Models for the Integrated Design of Knowledge Acquisition, Reasoning, and Knowledge Refinement (지식획득, 추론, 지식정제의 통합적 설계를 위한 규칙모델의 구축)

  • Lee, Gye-Sung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.7
    • /
    • pp.1781-1791
    • /
    • 1996
  • A number of research issues such as knowledge acquisition, inferencing techniques, and knowledge refinement methodologies have been involved in the development of expert systems. Since each issue is considered very com- plicated, there has been little effort to take all the issues into account collectively at once. However, knowledge acquisition and inferencing are closely reated because the knowledge is extracted by human experts from the inferencing process for solving a specific task or problem. Knowledge refinement is also accomplished by hand-ling problems caused during the inferencing process of the system due to incompleteness and inconsistency of the knowledge base. From this perspecitive, we present a method by which software platform is established in which those issues are integrated in the development of expert systems, especially in the domain where the domain models and concepts are hard to be constructed because of inherent fuzziness of the domain. We apply a machine learning technique,technique, conceptual clustering,to build a knowledge base and rual models by which an efficient inferencing,incermental knp\owledge acquisition and refinment are possible.

  • PDF

Study of the experimentation methodology for the counter fire operations by using discrete event simulation (이산사건 시뮬레이션을 활용한 대화력전 전투실험 방법론 연구)

  • Kim, Hyungkwon;Kim, Hyokyung;Kim, Youngho
    • Journal of the Korea Society for Simulation
    • /
    • v.25 no.2
    • /
    • pp.41-49
    • /
    • 2016
  • Counter Fire Operations can be characterized as having a system of systems that key features include situational awareness, command and control systems and highly responsive strike achieved by precision weapons. Current modeling methodology cannot provide an appropriate methodology for a system of systems and utilizes modeling and simulation tools to implement analytic options which can be time consuming and expensive. We explain developing methodology and tools for the effectiveness analysis of the counter fire operations under Network Centric Warfare Environment and suggest how to support a efficient decision making with the methodology and tools. Theater Counter Fire Operations tools consist of Enemy block, ISR block, C2 block and Shooter block. For the convenience of using by domain expert or non simulation expert, it is composed of the environments that each parameter and algorithm easily can be altered by user.