• Title/Summary/Keyword: 바이오 데이터

Search Result 1,364, Processing Time 0.029 seconds

Fast Matching Pursuit Using Absolute Symmetry and Classified Dictionary (절대값 대칭성과 사전 분류를 이용한 고속 Matching Pursuit)

  • O, Seok-Byeong;Jeon, Byeong-U
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.2
    • /
    • pp.11-21
    • /
    • 2002
  • Although the matching Pursuit is effective for video coding at low bit rate, it has a Problem since it needs much more calculation than the conventional block-based video coding method. The proposed fast matching pursuit method reduces inner product calculation that takes the most part of entire calculation by utilizing the symmetry of the absolute values of the one-dimensional Gator dictionary bases, the modified dictionary which allows faster matching without causing image quality degradation, and a Property of the two-dimensional Gabor dictionary that can be grouped in advance to four classes according to its frequency characteristics. Proposed method needs only about 1/8 of multiplications compared to the well-known separability-based fast method proposed by Neff.

Soil Moisture Monitoring and Recession Characteristics Analysis in Conifer Forest (침엽수 산림에서의 토양수분 모니터링과 감쇄특성 분석)

  • Hong, Eun-Mi;Choi, Jin-Yong;Yoo, Seung-Hwan;Nam, Won-Ho;Lee, Tae-Seok
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2010.05a
    • /
    • pp.1686-1690
    • /
    • 2010
  • 우리나라 면적의 약 67%에 이르는 660만ha의 산림 중 침엽수림은 혼효림을 포함하여 약 74%를 차지해 활엽수림보다 넓게 분포하고 있다. 이와 같이 넓은 산림은 가뭄, 홍수와 같은 수문현상과 관련이 있으며 강우에 따른 유출에의 기여하는 바가 클 뿐만 아니라 강우, 증발산, 침투 유출에 이르는 다양한 수문현상이 복합적으로 나타난다. 특히, 최근 임목밀도의 증가가 오히려 증발산량의 증가, 옆면에 의한 강우 차단량의 증가 등을 발생시켜 가뭄과 홍수 또는 산사태의 원인이 될 수 있으며, 수자원 함양을 저해하는 요소로 작용하고 있다는 우려의 목소리가 나오고 있다. 따라서 산림지역의 증발산과 관련 있는 토양수분의 지속적인 모니터링과 감쇄특성 및 토양수분 환경에 대한 연구는 중요한 요소 연구가 될 수 있다. 봄에서 여름으로 진행되는 시기에는 강우발생에 비해 수목의 생육이 활발하여 증발산에 따른 토양수분 변화 및 감소가 급격하게 일어나며, 여름에는 토양수분의 감소도 뚜렷한 반면, 강우사상도 많이 발생하여 이에 따른 변화폭이 크게 나타난다. 또한, 가을에서 겨울로 진행되는 시기에는 수목의 생육의 둔화와 기온 하강으로 인하여 토양수분 감쇄현상 및 변화가 적게 나타나 토양수분의 변화양상이 계절마다 다르게 나타난다. 이에 토양수분의 감쇄현상을 파악하면 곧 산림지역에서의 증발산량 및 토양수분 소비특성을 파악할 수 있기 때문에, 산림에서 실제 토양수분 모니터링과 이를 통한 시간별, 깊이별 토양수분 변화 및 감쇄현상을 파악하는 것은 중요하다. 따라서 본 연구에서는 침엽수 산림에서의 토층별 월별 토양수분의 감쇄특성을 분석하기 위하여 침엽수림에서 토양수분 장기 모니터링 시스템을 구축하여 시간별, 토층별 토양수분 모니터링을 실시하고, 이를 바탕으로 침엽수림에서의 토양수분 감쇄현상을 분석하였다. 또한 토양수분 데이터 및 기상자료를 활용하여 월별, 기간별 토양수분 감쇄곡선을 산정하고 감쇄상수를 비교하였으며, 감쇄특성에 대하여 비교 분석하였다.

  • PDF

The DLB Method for Multimedia Synchronization in the ATM Networks (ATM 망에서 멀티미디어 동기화를 위한 DLB 기법)

  • 구경옥;이병수;조용환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.4
    • /
    • pp.842-854
    • /
    • 1997
  • In this paper, the improved Dual Leaky-Bucket(DLB) algorithm is proposed to reduce the synchronous cell loss rate. The conventional DLB algorithm does not support synchronous cells, but the proposed algorithm gives higher priority to synchronous cells. To reduce synchronous cell loss rate, the synchronous cell detector is used in the proposed algorithm. Synchronous cell detector detects synchronous cells, and passes them cells to the 2nd Leaky-Bucket. So it is similar to give higher priority to synchronous cells. In this paper, the proposed algorithm used audio/videl traffic modeled by On/Off and Two-state MMPP, and simulated by SLAM II package. As simulation results, the proposed algorithm gets lower synchronous cell loss rate than the conventional DLB algorithms. The improved DLB algorithm for multimedia synchronization can be extended to any other cells which require higher priority.

  • PDF

논제 부정 Access에 대한 Firewall의 과제와 대책

  • 변성준;서정석;최원석
    • Proceedings of the Korea Database Society Conference
    • /
    • 2000.11a
    • /
    • pp.227-238
    • /
    • 2000
  • Firewall은 다양한 부정Access의 방지책으로서 확실히 유효한 수단이지만 이 Firewall은 사용자로부터 지시된 설정을 충실히 실행하는 것으로 설정 오류, 소프트웨어의 정지, 허가된 룰을 악용한 침입 등 반드시 사용자가 바라는 작용을 무조건적 상태에서 보증해 주는 것은 아니다. 따라서 사용자는 도입 후 에도 운용시에 Access log를 감시하고 본래의 Security Policy에 반하는 행위를 매일 매일 체크하지 않으면 안될 상황에 처해 있다. 본 연구는 이러한 부정Access에 대한 이와 같은 Firewall의 현상에 대한 과제 중에서 "부정Access를 어떻게 하면 일찍, 정확히 체크할 수 있는가\ulcorner"라는 주제를 선택하여 Firewall의 한계와 그 대응책을 실제로 부정Access를 시험해 보는 것으로 검증하기로 하였다. 실험결과에서 (1)Port Scan이나 전자메일 폭탄(서비스정지공격)등은 Firewall로 방지하는 것은 불가능하거나 혹은 Checking이 곤란하다. (2)공격마다 로그 수집을 했음에도 관계없이 Firewall의 로그는 번잡하므로 단시간에 사태의 발견이 대단히 곤란하다고 하는 Firewall의 한계를 인식하였다. 그리고 그 대책으로서 우리는 체크 툴의 유효성에 착안하여 조사한 결과, 결국 무엇이 부정Access인가에 대해서는 어디까지나 이용하는 측이 판단하여 Firewall 상에 설정하지 않으면 안되지만 체크 툴은 이 부정Access 정보를 데이터베이스로서 갖고 있음으로써 '무엇이 부정Access인가'를 이용자 대신에 판단하고 툴에 따라서는 설정을 자동적으로 변경하여 부정 Access의 저지율을 향상시킨다. 이처럼 체크 툴은 Firewall의 수비능력을 보강하는 위치에 있다고 생각할 수 있다.다. 4 장에서는 3장에서 제기한 각각의 문제점에 대해 RAD 의 관점에 비추어 e-business 시스템의 단기개발을 실현하기 위한 고려사항이나 조건 해결책을 제안한다. 본 논문이 지금부터 e-business 를 시작하려고 하는 분, e-business 시스템의 개발을 시작하려고 하는 분께 단기간의 e-business 실현을 위한 하나의 지침이 된다면 다행이겠다.formable template is used to optimize the matching. Then, clustering the similar shapes by the distance between each centroid, papaya can be completely detected from the background.uage ("Association of research for algorithm of calculating machine (1992)"). As a result, conventional NN and CNN were available for interpolation of sampling data. Moreover, when nonlinear intensity is not so large under the field condition of small slope, interpolation performance of CNN was a little not so better than NN. However, when nonlinear intensity is large under the field condition of large slope, interpolation performance of CNN was relatively better than NN.콩과 자연 콩이 성분 분석에서 차이를

  • PDF

Perceptual Ad-Blocker Design For Adversarial Attack (적대적 공격에 견고한 Perceptual Ad-Blocker 기법)

  • Kim, Min-jae;Kim, Bo-min;Hur, Junbeom
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.5
    • /
    • pp.871-879
    • /
    • 2020
  • Perceptual Ad-Blocking is a new advertising blocking technique that detects online advertising by using an artificial intelligence-based advertising image classification model. A recent study has shown that these Perceptual Ad-Blocking models are vulnerable to adversarial attacks using adversarial examples to add noise to images that cause them to be misclassified. In this paper, we prove that existing perceptual Ad-Blocking technique has a weakness for several adversarial example and that Defense-GAN and MagNet who performed well for MNIST dataset and CIFAR-10 dataset are good to advertising dataset. Through this, using Defense-GAN and MagNet techniques, it presents a robust new advertising image classification model for adversarial attacks. According to the results of experiments using various existing adversarial attack techniques, the techniques proposed in this paper were able to secure the accuracy and performance through the robust image classification techniques, and furthermore, they were able to defend a certain level against white-box attacks by attackers who knew the details of defense techniques.

A Survey on Admission Control Mechanisms for providing QoS in the IEEE 802.11 Wireless LANs (IEEE 802.11 무선랜에서 QoS 제공을 위한 허가 제어 연구)

  • Lee, Kye-Sang
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.535-538
    • /
    • 2005
  • Wireless LANs based on the IEEE 802.11 standard are widely spread for use nowadays. Traffic which are conveyed over the WLANs change rapidly from normal data such a Email and Web pages, to multimedia data of high resolution video and voice. To meet QoS (Quality of Service) required by these multimedia traffic, the IEEE 802 committee recently has developed a new standard, IEEE 802.11e. IEEe 802.11.e contains two MAC mechanisms for providing QoS: EDCA(Enhanced Distributed Channel Access) and HCCA (HCF Controlled Channel Access). Using these standardized MAC mechanisms as a building platform, various admission control mechanisms can be combined to offer QoS gurantees for multimedia traffic. This paper surveys these research efforts.

  • PDF

Development of the EM Wave Absorber Using MnZn-Ferrite and Sendust for Wireless LAN at 2.4 GHz (MnZn-Ferrite와 Sendust를 이용한 2.4 GHz 무선LAN용 전파흡수체 개발)

  • Lee, Dae-Hee;Choi, Chang-Mook;Choi, Dong-Han;Kim, Dong-Il
    • Journal of Navigation and Port Research
    • /
    • v.31 no.10
    • /
    • pp.865-868
    • /
    • 2007
  • Recently, wireless LANs are often applied in home or office because of its various of convenience. Frequency range of wireless LANs specified by IEEE 802.11b is at 2.4 GHz. The bluetooth, the microwave oven, and the PDA(Personal Digital Assistants) uses, however, the same frequency band. So problems will be produced in these environments, such as multi-pass interference and system-to-system interference. These problems can be eliminated by using EM wave absorber. In this paper, we designed and fabricated EM wave absorber using MnZn-Ferrite, Sendust, and CPE( Chlorinated Polyethylene). The EM wave absorber with the ratio of material (MnZn-Ferrite : Sendust : CPE = 64 : 16 : 20 wt.%) has thickness of 3.7 mm and absorption ability more than 17 dB at 2.4 GHz.

Collection Fusion Algorithm in Distributed Multimedia Databases (분산 멀티미디어 데이터베이스에 대한 수집 융합 알고리즘)

  • Kim, Deok-Hwan;Lee, Ju-Hong;Lee, Seok-Lyong;Chung, Chin-Wan
    • Journal of KIISE:Databases
    • /
    • v.28 no.3
    • /
    • pp.406-417
    • /
    • 2001
  • With the advances in multimedia databases on the World Wide Web, it becomes more important to provide users with the search capability of distributed multimedia data. While there have been many studies about the database selection and the collection fusion for text databases. The multimedia databases on the Web have autonomous and heterogeneous properties and they use mainly the content based retrieval. The collection fusion problem of multimedia databases is concerned with the merging of results retrieved by content based retrieval from heterogeneous multimedia databases on the Web. This problem is crucial for the search in distributed multimedia databases, however, it has not been studied yet. This paper provides novel algorithms for processing the collection fusion of heterogeneous multimedia databases on the Web. We propose two heuristic algorithms for estimating the number of objects to be retrieved from local databases and an algorithm using the linear regression. Extensive experiments show the effectiveness and efficiency of these algorithms. These algorithms can provide the basis for the distributed content based retrieval algorithms for multimedia databases on the Web.

  • PDF

Gender Classification System Based on Deep Learning in Low Power Embedded Board (저전력 임베디드 보드 환경에서의 딥 러닝 기반 성별인식 시스템 구현)

  • Jeong, Hyunwook;Kim, Dae Hoe;Baddar, Wisam J.;Ro, Yong Man
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.1
    • /
    • pp.37-44
    • /
    • 2017
  • While IoT (Internet of Things) industry has been spreading, it becomes very important for object to recognize user's information by itself without any control. Above all, gender (male, female) is dominant factor to analyze user's information on account of social and biological difference between male and female. However since each gender consists of diverse face feature, face-based gender classification research is still in challengeable research field. Also to apply gender classification system to IoT, size of device should be reduced and device should be operated with low power. Consequently, To port the function that can classify gender in real-world, this paper contributes two things. The first one is new gender classification algorithm based on deep learning and the second one is to implement real-time gender classification system in embedded board operated by low power. In our experiment, we measured frame per second for gender classification processing and power consumption in PC circumstance and mobile GPU circumstance. Therefore we verified that gender classification system based on deep learning works well with low power in mobile GPU circumstance comparing to in PC circumstance.

A Method on Retrieving Personalized Information Based on Mutual Trust in Real and Online World (현실과 가상 세계에서 상호 신뢰도에 기반한 개인화 정보의 식별 방법)

  • Kim, Myeonghun;Kim, Sangwook
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.5
    • /
    • pp.257-266
    • /
    • 2017
  • Two remarkable problems of recent online social network are information overflow and information overload. Since the mid-1990s, many researches to overcome these issues have been conducted with information recommender systems and context awareness based personalization techniques, the importance of trust or relationship between users to discover influential information has been increasing as recent online social networks become huge. But almost researches have not regarded trust or relationship in real world while reflecting them in online world. In this paper, we present a novel method how to discover influential and spreadable information that is highly personalized to a user. This valuable information is extracted from an information set that consists of lots of information user missed in the past, and we assumes important information is likely to exist in this set.