• Title/Summary/Keyword: 스트링

Search Result 270, Processing Time 0.029 seconds

Statistical Analysis of Projection-Based Face Recognition Algorithms (투사에 기초한 얼굴 인식 알고리즘들의 통계적 분석)

  • 문현준;백순화;전병민
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.5A
    • /
    • pp.717-725
    • /
    • 2000
  • Within the last several years, there has been a large number of algorithms developed for face recognition. The majority of these algorithms have been view- and projection-based algorithms. Our definition of projection is not restricted to projecting the image onto an orthogonal basis the definition is expansive and includes a general class of linear transformation of the image pixel values. The class includes correlation, principal component analysis, clustering, gray scale projection, and matching pursuit filters. In this paper, we perform a detailed analysis of this class of algorithms by evaluating them on the FERET database of facial images. In our experiments, a projection-based algorithms consists of three steps. The first step is done off-line and determines the new basis for the images. The bases is either set by the algorithm designer or is learned from a training set. The last two steps are on-line and perform the recognition. The second step projects an image onto the new basis and the third step recognizes a face in an with a nearest neighbor classifier. The classification is performed in the projection space. Most evaluation methods report algorithm performance on a single gallery. This does not fully capture algorithm performance. In our study, we construct set of independent galleries. This allows us to see how individual algorithm performance varies over different galleries. In addition, we report on the relative performance of the algorithms over the different galleries.

  • PDF

Optimizing Multi-way Join Query Over Data Streams (데이타 스트림에서의 다중 조인 질의 최적화 방법)

  • Park, Hong-Kyu;Lee, Won-Suk
    • Journal of KIISE:Databases
    • /
    • v.35 no.6
    • /
    • pp.459-468
    • /
    • 2008
  • A data stream which is a massive unbounded sequence of data elements continuously generated at a rapid rate. Many recent research activities for emerging applications often need to deal with the data stream. Such applications can be web click monitoring, sensor data processing, network traffic analysis. telephone records and multi-media data. For this. data processing over a data stream are not performed on the stored data but performed the newly updated data with pre-registered queries, and then return a result immediately or periodically. Recently, many studies are focused on dealing with a data stream more than a stored data set. Especially. there are many researches to optimize continuous queries in order to perform them efficiently. This paper proposes a query optimization algorithm to manage continuous query which has multiple join operators(Multi-way join) over data streams. It is called by an Extended Greedy query optimization based on a greedy algorithm. It defines a join cost by a required operation to compute a join and an operation to process a result and then stores all information for computing join cost and join cost in the statistics catalog. To overcome a weak point of greedy algorithm which has poor performance, the algorithm selects the set of operators with a small lay, instead of operator with the smallest cost. The set is influenced the accuracy and execution time of the algorithm and can be controlled adaptively by two user-defined values. Experiment results illustrate the performance of the EGA algorithm in various stream environments.

A Design of Time-based Anomaly Intrusion Detection Model (시간 기반의 비정상 행위 침입탐지 모델 설계)

  • Shin, Mi-Yea;Jeong, Yoon-Su;Lee, Sang-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1066-1072
    • /
    • 2011
  • In the method to analyze the relationship in the system call orders, the normal system call orders are divided into a certain size of system call orders to generates gene and use them as the detectors. In the method to consider the system call parameters, the mean and standard deviation of the parameter lengths are used as the detectors. The attack of which system call order is normal but the parameter values are changed, such as the format string attack, cannot be detected by the method that considers only the system call orders, whereas the model that considers only the system call parameters has the drawback of high positive defect rate because of the information obtained from the interval where the attack has not been initiated, since the parameters are considered individually. To solve these problems, it is necessary to develop a more efficient learning and detecting method that groups the continuous system call orders and parameters as the approach that considers various characteristics of system call related to attacking simultaneously. In this article, we detected the anomaly of the system call orders and parameters by applying the temporal concept to the system call orders and parameters in order to improve the rate of positive defect, that is, the misjudgment of anomaly as normality. The result of the experiment where the DARPA data set was employed showed that the proposed method improved the positive defect rate by 13% in the system call order model where time was considered in comparison with that of the model where time was not considered.

Assessment of Isokinetic Muscle Function in Elite Canadian College Paddlers (대학 엘리트 카나디언 선수들의 어깨·허리·무릎 관절의 등속성 근기능 평가 및 진단)

  • Shin, Kwang-Taek;An, Chang-Gyu;Sohn, Jee-Hoon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.1
    • /
    • pp.229-238
    • /
    • 2013
  • The aim of this study is to evaluate university canadian paddlers' iso-kinetic muscle function and provide training advices. Eight university paddlers with a 8.5 years career participated in this study. Inbody 720, biodex system III, biodex stabilizer system and THP 2 are used to investigate body component, muscle function(peak torque, average power and work fatigue), agility and dynamic balance. Iso-kinetic muscle function around shoulder, thorax and knee are measured. And then bilateral and unilateral muscle imbalance are calculated at each joint. Results of this study are as follows; University canadian paddlers' BMI average is 24.90 $kg/m^2$ and percent body fat is 12.23%. Reaction time average was 324 msec and balance score at each leg are below 2.0. A3, A4, A5, A6, A8 are needed to train shoulder muscle strength and power. A1, A2, A7, A8 are needed to strengthen shoulder muscle endurance. A2, A5, A8 are needed to train thorax muscle strength and power. A1, A8 are needed to strengthen thorax muscle endurance. Most of paddlers' reciprocal muscle balance ratio on thorax and knee are out of normal range. A2, A3, A4, A8 are needed to train abdominal strength and A3, A5, A6, A7, A8 are needed to train hamstring strength.

Research on Malicious code hidden website detection method through WhiteList-based Malicious code Behavior Analysis (WhiteList 기반의 악성코드 행위분석을 통한 악성코드 은닉 웹사이트 탐지 방안 연구)

  • Ha, Jung-Woo;Kim, Huy-Kang;Lim, Jong-In
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.4
    • /
    • pp.61-75
    • /
    • 2011
  • Recently, there is significant increasing of massive attacks, which try to infect PCs that visit websites containing pre-implanted malicious code. When visiting the websites, these hidden malicious codes can gain monetary profit or can send various cyber attacks such as BOTNET for DDoS attacks, personal information theft and, etc. Also, this kind of malicious activities is continuously increasing, and their evasion techniques become professional and intellectual. So far, the current signature-based detection to detect websites, which contain malicious codes has a limitation to prevent internet users from being exposed to malicious codes. Since, it is impossible to detect with only blacklist when an attacker changes the string in the malicious codes proactively. In this paper, we propose a novel approach that can detect unknown malicious code, which is not well detected by a signature-based detection. Our method can detect new malicious codes even though the codes' signatures are not in the pattern database of Anti-Virus program. Moreover, our method can overcome various obfuscation techniques such as the frequent change of the included redirection URL in the malicious codes. Finally, we confirm that our proposed system shows better detection performance rather than MC-Finder, which adopts pattern matching, Google's crawling based malware site detection, and McAfee.

A Study of Moth-eye Nano Structure Embedded Optical Film with Mitigated Output Power Loss in PERC Photovoltaic Modules (PERC 태양전지 모듈의 출력저하 방지를 위한 모스아이(Moth-eye) 광학필름 연구)

  • Oh, Kyoung-suk;Park, Jiwon;Choi, Jin-Young;Chan, Sung-il
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.27 no.4
    • /
    • pp.55-60
    • /
    • 2020
  • The PERC photovoltaic (PV) modules installed in PV power plant are still reports potential-induced degradation (PID) degradation due to high voltage potential differences. This is because Na+ ions in the cover glass of PV modules go through the encapsulant (EVA) and transferred to the surface of solar cells. As positive charges are accumulated at the ARC (SiOx/SiNx) interface where many defects are distributed, shunt-resistance (Rsh) is reduced. As a result, the leakage current is increased, and decrease in solar cell's power output. In this study, to prevent of this phenomenon, a Moth-eye nanostructure was deposited on the rear surface of an optical film using Nano-Imprint Lithography method, and a solar mini-module was constructed by inserting it between the cover glass and the EVA. To analyze the PID phenomenon, a cell-level PID acceleration test based on IEC 62804-1 standard was conducted. Also analyzed power output (Pmax), efficiency, and shunt resistance through Light I-V and Dark I-V. As a result, conventional solar cells were decreased by 6.3% from the initial efficiency of 19.76%, but the improved solar cells with the Moth-eye nanostructured optical film only decreased 0.6%, thereby preventing the PID phenomenon. As of Moth-eye nanostructured optical film, the transmittance was improved by 4%, and the solar module output was improved by 2.5%.

A Study on Considerations in the Authority Control to Accommodate LRM Nomen (LRM 노멘을 수용하기 위한 전거제어시 고려사항에 관한 연구)

  • Lee, Mihwa
    • Journal of Korean Library and Information Science Society
    • /
    • v.52 no.1
    • /
    • pp.109-128
    • /
    • 2021
  • This paper is to explore considerations in authority control to accommodate LRM nomen entities through the literature reviews, the analysis of RDA rules, and the opinion survey of domestic catalog experts. As a result, for authority control, considerations were proposed in the aspect of nomen's attribute elements, catalog description, and MARC authority format. First, it is necessary to describe in as much detail as possible the category, the scheme, intended audience, the context of use, the reference source, the language, the script, the script conversion as the attributes of the nomen with the status of identification, note, and indifferentiated name indicators added in RDA. Second, the description method of attribute elements and relational elements of nomen can be unstructured, structured, identifier, and IRI as suggested in RDA, and vocabulary encoding scheme (VES) and string encoding scheme (SES) should be written for structured description, Also, cataloging rules for structuring authorized access points and preferred names/title should be established. Third, an additional expansion plan based on Maxwell's expansion (draft) was proposed in order to prepare the MARC 21 authority format to reflect the LRM nomen. (1) The attribute must be described in 4XX and 5XX so that the attribute can be entered for each nomen, and the attributes of the nomen to be described in 1XX, 5XX and 4XX are presented separately. (2) In order to describe the nomen category, language, script, script conversion, context of use, and date of usage as a nomen attribute, field and subfield in MARC 21 must be added. Accordingly, it was proposed to expand the subfield of 368, 381, and 377, and to add fields to describe the context of use and date of usage. The considerations in authority control for the LRM nomen proposed in this paper will be the basis for establishing an authority control plan that reflects LRM in Korea.

Fundamental Frequency Extraction of Stay Cable based on Energy Equation (에너지방정식에 기초한 사장 케이블 기본진동수 추출)

  • Kim, Hyeon Kyeom;Hwang, Jae Woong;Lee, Myeong Jae
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.1A
    • /
    • pp.125-133
    • /
    • 2008
  • According to longer and longer span, dynamic instability of stay cable should be prevented. Dynamic instability occurs mainly symmetric 1st mode and antisymmetric 1st mode in stay cable. Especially symmetric 1st mode has a lot of influence on sag. Therefore fundamental frequency of stay cable is different from that of taut sting. Irvine, Triantafyllou, Ahn etc. analyzed dynamic behavior of taut cable with sag through analytical technical and their researches give important results for large bounds of Irvine parameter. But each research shows mutually different values out of characteristic (cross-over or mode-coupled) point and each solution of frequency equations of all researchers can be very difficultly found because of their very high non-linearity. Presented study focuses on fundamental frequency of stay cable. Generalized mechanical energy with symmetric 1st mode vibration shape satisfied boundary conditions is evolved by Rayleigh-Ritz method. It is possible to give linear analytic solution within characteristic point. Error by this approach shows only below 3% at characteristic point against existing researches. And taut cable don't exceed characteristic point. I.e. high accuracy, easy solving techniques, and a little bit limitations. Therefore presented study can be announced that it is good study ergonomically.

Comparison of the Neurologic Outcome according to the Method of Proximal Graft Anastomosis at the Aortic Side during Off-pump Coronary Artery Bypass Grafting: The Heartstring Sealing System versus Conventional Manual Anastomosis (무심폐기 관상동맥 우회술에 있어서 이식편의 대동맥부 근위부 문합 방법에 따른 수술 후 신경학적 합병증 발생의 비교: 하트스트링을 이용한 방법 대 고식적인 수기 문합술)

  • Cho, Won-Chul;Kim, Joon-Bum;Kim, Hee-Jung;Kim, Hwan-Wook;Kim, Yun-Seok;Jung, Jae-Seung;Choo, Suk-Jung
    • Journal of Chest Surgery
    • /
    • v.42 no.4
    • /
    • pp.441-446
    • /
    • 2009
  • Background: Side clamping of ascending aorta during proximal graft anastomosis in coronary bypassing surgery in-creases the risk of direct aortic injury as well as embolization of intimal atheroma. Heartstring proximal sealing system (Guidant Corporation, Santa Clara, Calif), developed to avoid aortic side clamping, may minimize risks of such complications. The aim of the current study is to compare the surgical outcomes of the two proximal anastomosis techniquesi.e., Heartstring system versus aortic side clamping in off pump coronary bypassing' surgery (OPCAB). Material and Method: From January 2003 to August 2008, 499 patients underwent OPCAB. Of them, proximal graft anastomosis was performed using Heartstring system in 182 patients (Group I) and conventional manual anastomosis in 317 patients (Group II). The two groups were compared for postoperative major complications and mortality. Result: Two groups showed similar characteristics in terms of preoperative demographic data, left ventricular ejection fraction, renal function and history of diabetes, hypertension and smoking. Although there was no inter-group difference in the history of cerebral ischemia (p=0.48), preoperative brain magnetic resonance angiography revealed greater incidence of severe carotid artery stenosis (>75% of lumen) in the Group I than in the. Group II (44.5% in the Group I and 30.0% in the Group II, p=0.003). There were no inter-group differences in postoperative mortality (p=0.40) and complications (p=0.47) including neurologic events (3 in the Group land 2 in the Group II, p=0.258). Whereas neurologic events all comprised transient ischemic attacks in the Group I, they comprised multiple embolic strokes in the Group II. One patient in the Group II experienced aortic dissection during proximal anastomosis which resulted in ascending aortic replacement. Conclusion: Although proximal anastomosis using Heartstring system did not show statistically significant benefit over aortic side clamping, the. absence of embolic stroke maybe a definite benefit which may be better defined through further studies over a larger cohort.

Evaluating Reverse Logistics Networks with Centralized Centers : Hybrid Genetic Algorithm Approach (집중형센터를 가진 역물류네트워크 평가 : 혼합형 유전알고리즘 접근법)

  • Yun, YoungSu
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.55-79
    • /
    • 2013
  • In this paper, we propose a hybrid genetic algorithm (HGA) approach to effectively solve the reverse logistics network with centralized centers (RLNCC). For the proposed HGA approach, genetic algorithm (GA) is used as a main algorithm. For implementing GA, a new bit-string representation scheme using 0 and 1 values is suggested, which can easily make initial population of GA. As genetic operators, the elitist strategy in enlarged sampling space developed by Gen and Chang (1997), a new two-point crossover operator, and a new random mutation operator are used for selection, crossover and mutation, respectively. For hybrid concept of GA, an iterative hill climbing method (IHCM) developed by Michalewicz (1994) is inserted into HGA search loop. The IHCM is one of local search techniques and precisely explores the space converged by GA search. The RLNCC is composed of collection centers, remanufacturing centers, redistribution centers, and secondary markets in reverse logistics networks. Of the centers and secondary markets, only one collection center, remanufacturing center, redistribution center, and secondary market should be opened in reverse logistics networks. Some assumptions are considered for effectively implementing the RLNCC The RLNCC is represented by a mixed integer programming (MIP) model using indexes, parameters and decision variables. The objective function of the MIP model is to minimize the total cost which is consisted of transportation cost, fixed cost, and handling cost. The transportation cost is obtained by transporting the returned products between each centers and secondary markets. The fixed cost is calculated by opening or closing decision at each center and secondary markets. That is, if there are three collection centers (the opening costs of collection center 1 2, and 3 are 10.5, 12.1, 8.9, respectively), and the collection center 1 is opened and the remainders are all closed, then the fixed cost is 10.5. The handling cost means the cost of treating the products returned from customers at each center and secondary markets which are opened at each RLNCC stage. The RLNCC is solved by the proposed HGA approach. In numerical experiment, the proposed HGA and a conventional competing approach is compared with each other using various measures of performance. For the conventional competing approach, the GA approach by Yun (2013) is used. The GA approach has not any local search technique such as the IHCM proposed the HGA approach. As measures of performance, CPU time, optimal solution, and optimal setting are used. Two types of the RLNCC with different numbers of customers, collection centers, remanufacturing centers, redistribution centers and secondary markets are presented for comparing the performances of the HGA and GA approaches. The MIP models using the two types of the RLNCC are programmed by Visual Basic Version 6.0, and the computer implementing environment is the IBM compatible PC with 3.06Ghz CPU speed and 1GB RAM on Windows XP. The parameters used in the HGA and GA approaches are that the total number of generations is 10,000, population size 20, crossover rate 0.5, mutation rate 0.1, and the search range for the IHCM is 2.0. Total 20 iterations are made for eliminating the randomness of the searches of the HGA and GA approaches. With performance comparisons, network representations by opening/closing decision, and convergence processes using two types of the RLNCCs, the experimental result shows that the HGA has significantly better performance in terms of the optimal solution than the GA, though the GA is slightly quicker than the HGA in terms of the CPU time. Finally, it has been proved that the proposed HGA approach is more efficient than conventional GA approach in two types of the RLNCC since the former has a GA search process as well as a local search process for additional search scheme, while the latter has a GA search process alone. For a future study, much more large-sized RLNCCs will be tested for robustness of our approach.