• Title/Summary/Keyword: 분할함수

Search Result 547, Processing Time 0.026 seconds

Destination Address Block Location on Machine-printed and Handwritten Korean Mail Piece Images (인쇄 및 필기 한글 우편영상에서의 수취인 주소 영역 추출 방법)

  • 정선화;장승익;임길택;남윤석
    • Journal of KIISE:Software and Applications
    • /
    • v.31 no.1
    • /
    • pp.8-19
    • /
    • 2004
  • In this paper, we propose an efficient method for locating destination address block on both of machine-Printed and handwritten Korean mail piece images. The proposed method extracts connected components from the binary mail piece image, generates text lines by merging them, and then groups the text fines into nine clusters. The destination address block is determined by selecting some clusters. Considering the geometric characteristics of address information on Korean mail piece, we split a mail piece image into nine areas with an equal size. The nine clusters are initialized with the center coordinate of each area. A modified Manhattan distance function is used to compute the distance between text lines and clusters. We modified the distance function on which the aspect ratio of mail piece could be reflected. The experiment done with live Korean mail piece images has demonstrated the superiority of the Proposed method. The success rate for 1, 988 testing images was about 93.56%.

New Offline Electronic Cash using Hash Chain (해쉬체인을 이용한 새로운 오프라인 전자화폐)

  • 김상진;오희국
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.207-221
    • /
    • 2003
  • A hash chain is highly efficient, attractive structure to use in electronic cash. Previous systems using hash chain were, however, either credit-based vendor-specific cash or debit-based general-purpose cash which lacks efficiency due to double spending problem. In this paper, we propose a new divisible cash system using hash chain. This newly proposed cash is general-purpose, debit-based, anonymous, and offline. The efficiency of the system results from its capacity to pay variable amounts with no additional costs. A client always performs a single blind signature in the withdrawal phase, independent of the length of the chain. During payment, a client performs a single challenge-and-response or generates a single signature, independent of the amount paid. This system provides a new refund mechanism, which uses a refund ticket, that allows clients to refund the unspent part of the chain without revealing any connection to the spent part.

Spatio-Temporal Index Structure based on KDB-Tree for Tracking Positions of Moving Objects (이동 객체의 위치 추적을 위한 KDB-트리 기반의 시공간 색인구조)

  • Seo Dong-Min;Bok Kyoung-Soo;Yoo Jae Soo;Lee Byoung-Yup
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.77-94
    • /
    • 2004
  • Recently, the needs of index structure which manages moving objects efficiently have been increased because of the rapid development of location-based techniques. Existing index structures frequently need updates because moving objects change continuatively their positions. That caused entire performance loss of the index structures. In this paper, we propose a new index structure called the TPKDB-tree that is a spatio-temporal index structure based on KDB-tree. Our technique optimizes update costs and reduces a search time for moving objects and reduces unnecessary updates by expressing moving objects as linear functions. Thus, the TPKDB-tree efficiently supports the searches of future positions of moving objects by considering the changes of moving objects included in the node as time-parameter. To maximize space utilization, we propose the new update and split methods. Finally, we perform various experiments to show that our approach outperforms others.

  • PDF

A study on the behavior of the piston with varying friction force in the double cylinder-typed extension gas spring (2중 실린더 구조를 갖는 인장 가스스프링의 마찰력 변화에 따른 피스톤 거동에 대한 연구)

  • Jeong, Nam-Gyun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.2
    • /
    • pp.9-14
    • /
    • 2018
  • The function of gas springs is based on the compression of a gas. They are used in a wide variety of industries, and demand for them is increasing. Gas springs can be divided into compression and extension springs. Extension springs have not been studied much in relation to control of the piston speed, unlike compression springs. In this study, the magnitude of the piston rebound pressure was theoretically predicted by calculating the pressure loss in a double-cylinder extension gas spring. Numerical simulations of the piston behavior were carried out for small and large amounts of friction between the piston and the cylinder. FLUENT was used for the simulation with a 6-DOF model and UDF to simulate the behavior of the piston. The calculation regions of the front and rear of the piston were separated, and different types of grids were generated in the regions to implement a dynamic mesh using only a layering method. The results show that the piston returns with the target speed in both cases. However, the patterns of the piston behavior reaching the final speed are different.

A Study on Secure Group Key Management Based on Agent for Multicast Data Transmission (멀티캐스트 전송을 위한 에이전트 기반의 안전한 그룹 키 관리방안 연구)

  • Kim, Bo-Seung;Kim, Jung-Jae;Zhang, Feng-De;Shin, Yong-Tae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.12 no.1
    • /
    • pp.436-444
    • /
    • 2011
  • As practical use degree of multicasting increase, security for multicast is recognized as an important issue. Previous research in the area of secure multicast has mainly focused on group key management. The most important thing about the security of multicast is that only authorized members of this group will be able to access the data. The member of access to multicast communication is to use cryptography with a common shared session encryption key. We propose decentralized group key management based on agent for dynamic multicast with large groups and frequent joins or leaves in this paper. Whole group divide to several subgroup using agent technology and each agent manage members of each subgroup. Also, when rekeying updates that using one-way hash function can prevent the key exposure, and reduce the key distribution delay.

An Enhancement of Removing Noise Branches by Detecting Noise Blobs (잡영블랍 검출에 의한 잡영가지 제거 방법의 개선)

  • 김성옥;임은경;김민환
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.419-428
    • /
    • 2003
  • Several methods have been studied to prune the parasitic branches that cause unfortunately from thinning a shape to get its skeleton. We found that the symmetric path finding method was most efficient because it followed the boundary pixels of the shape just once. In this paper, its extended method is proposed to apply to removing the noise branches that protrude out of the boundary of a segmented or extracted shape in a given image. The proposed method can remove a noise branch with one-pixel width and also remove the noise branch that includes a round shape called a noise blob. The method uses a 4-8-directional boundary-following technique to determine symmetric paths and finds noise branches with noise blobs by detecting quasi-symmetric paths. Its time complexity is a linear function of the number of boundary pixels. Interactively selectable parameters are used to define various types of noise branches flexibly, which are the branch - size parameter and the blob-size parameter. Experimental results for a practical shape and various artificial shapes showed that the proposed method was very useful for simplifying the shapes.

  • PDF

GC-Tree: A Hierarchical Index Structure for Image Databases (GC-트리 : 이미지 데이타베이스를 위한 계층 색인 구조)

  • 차광호
    • Journal of KIISE:Databases
    • /
    • v.31 no.1
    • /
    • pp.13-22
    • /
    • 2004
  • With the proliferation of multimedia data, there is an increasing need to support the indexing and retrieval of high-dimensional image data. Although there have been many efforts, the performance of existing multidimensional indexing methods is not satisfactory in high dimensions. Thus the dimensionality reduction and the approximate solution methods were tried to deal with the so-called dimensionality curse. But these methods are inevitably accompanied by the loss of precision of query results. Therefore, recently, the vector approximation-based methods such as the VA- file and the LPC-file were developed to preserve the precision of query results. However, the performance of the vector approximation-based methods depend largely on the size of the approximation file and they lose the advantages of the multidimensional indexing methods that prune much search space. In this paper, we propose a new index structure called the GC-tree for efficient similarity search in image databases. The GC-tree is based on a special subspace partitioning strategy which is optimized for clustered high-dimensional images. It adaptively partitions the data space based on a density function and dynamically constructs an index structure. The resultant index structure adapts well to the strongly clustered distribution of high-dimensional images.

Optimal Control Method of Directional Antenna Beam (지향성 안테나 빔의 최적 제어 방식)

  • Hyun, Kyo-Hwan;Joeng, Seong-Boo;Kim, Joo-Woong;Eom, Ki-Hwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.717-720
    • /
    • 2007
  • This paper presents a novel scheme that quickly searches for the optimal direction of multiple directional antennas, and locks on to it for high-speed millimeter wavelength transmissions, when communications to another antenna directional are disconnected. The proposed method utilizes a modified genetic algorithm, which selects a superior initial group through preprocessing in order to solve the local solution in genetic algorithm. TDD (Time Division Duplex) is utilized as the transfer method and data controller for the antenna. Once the initial communication is completed for the specific number of individuals, no longer antenna's data will be transmitted nil each station processes GA in order to produce the next generation. After reproduction, individuals of the next generation become the data, and communication between each station is made again. In order to verify the effectiveness of the proposed system, simulation results of 1:1, 1:2, 1:5 directional antennas and experiment results of 1:1 directionalantennas confirmed the efficiency of the proposed method. The 16bit split is 8bit, but it has similar performance as 16bit gene.

  • PDF

A code acquisition method using signed-rank statistics in frequency-selective channels (주파수선택적 감쇄 채널에서 부호순위 통계량을 쓴 부호 획득 방법)

  • Kim, Hong-Gil;Jeong, Chang-Yong;Song, Ik-Ho;Gwon, Hyeong-Mun;Kim, Yong-Seok
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.2
    • /
    • pp.69-80
    • /
    • 2002
  • In this paper, signed-rank based nonparametric detectors are used for direct sequence code division multiple access pseudo-noise code acquisition systems in frequency-selective Rician fading channels. We first derive the locally optimum rank detector, and then propose the locally suboptimum rank (LSR) and k-th order modified signed-rank (MSRk) detectors using approximate score functions. We compare the serial and hybrid parallel double-dwell schemes using the LSR and MSRk detectors with those using the conventional squared-sum (SS) using the cell averaging constant false alarm rate processor and modified sign detectors. From the simulation results, it is shown that the LSR and MSRk detectors perform better than the SS detector using the cell averaging constant false alarm rate processor.

Services Identification based on Use Case Recomposition (유스케이스 재구성을 통한 서비스 식별)

  • Kim, Yu-Kyong
    • The Journal of Society for e-Business Studies
    • /
    • v.12 no.4
    • /
    • pp.145-163
    • /
    • 2007
  • Service-Oriented Architecture is a style of information systems that enables the creation of applications that are built by combining loosely coupled and interoperable services. A service is an implementation of business functionality with proper granularity and invoked with well-defined interface. In service modeling, when the granularity of a service is finer, the reusability and flexibility of the service is lower. For solving this problem concerns with the service granularity, it is critical to identify and define coarse-grained services from the domain analysis model. In this paper, we define the process to identify services from the Use Case model elicited from domain analysis. A task tree is derived from Use Cases and their descriptions, and Use Cases are reconstructed by the composition and decomposition of the task tree. Reconstructed Use Cases are defined and specified as services. Because our method is based on the widely used UML Use Case models, it can be helpful to minimize time and cost for developing services in various platforms and domains.

  • PDF