• Title/Summary/Keyword: 에러검출

Search Result 270, Processing Time 0.032 seconds

A Correlation Analysis between Land Surface Temperature and NDVI in Kunsan City using Landsat 7 TM/ETM+ Satellite Images (Landsat 7 TM/ETM+ 위성영상을 이용한 군산지역 지표 온도와 NDVI에 대한 상관분석)

  • Lee, Hong-Ro;Kim, Hyung-Moo
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.8 no.2
    • /
    • pp.31-43
    • /
    • 2005
  • Four time points of the fractional area data during the 15 years of the highest group of land surface temperature and the lowest group of NDVl of the Kunsan city Chollabuk_do, Korea located beneath the Yellow sea coast, are observed and analyzed their correlations for the intention to detect the changes of urban land cover. As long as the effective contributions of satellite images in the continuous monitoring of the wide area for wide range of time period, Landsat-5 TM and Landsat-7 ETM+ artificial satellite images, acquisited over the Kunsan city area, are surveyed by the compared calibration after quantization and classification of the deviations between TM and ETM+ images substituted approved error correction thresholds such as gains and biases or offsets. This experiment and research applied Landsat-5 TM and Landsat-7 ETM+ artificial satellite images in change detection of urban land cover in urbanized Kunsan city, then detected strong and proportional correlation relationship between the highest group of land surface temperature and the lowest group of NDVI which exceeded R=(+)0.9478, so the proposed Correlation Analysis Model between the highest group of land surface temperature and the lowest group of NDVI will be able to give proof an effective suitability to the land city change detection monitoring.

  • PDF

Autonomous Surveillance-tracking System for Workers Monitoring (작업자 모니터링을 위한 자동 감시추적 시스템)

  • Ko, Jung-Hwan;Lee, Jung-Suk;An, Young-Hwan
    • 전자공학회논문지 IE
    • /
    • v.47 no.2
    • /
    • pp.38-46
    • /
    • 2010
  • In this paper, an autonomous surveillance-tracking system for Workers monitoring basing on the stereo vision scheme is proposed. That is, analysing the characteristics of the cross-axis camera system through some experiments, a optimized stereo vision system is constructed and using this system an intelligent worker surveillance-tracking system is implemented, in which a target worker moving through the environments can be detected and tracked, and its resultant stereo location coordinates and moving trajectory in the world space also can be extracted. From some experiments on moving target surveillance-tracking, it is analyzed that the target's center location after being tracked is kept to be very low error ratio of 1.82%, 1.11% on average in the horizontal and vertical directions, respectively. And, the error ratio between the calculation and measurement values of the 3D location coordinates of the target person is found to be very low value of 2.5% for the test scenario on average. Accordingly, in this paper, a possibility of practical implementation of the intelligent stereo surveillance system for real-time tracking of a target worker moving through the environments and robust detection of the target's 3D location coordinates and moving trajectory in the real world is finally suggested.

The design of communication protocol for controlling efficiently modular medical instruments (모듈화된 의료장비들의 효율적 제어를 위한 통신 프로토콜 설계)

  • 신창민;김영길
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.284-287
    • /
    • 2000
  • Recently, developing medical devices have a tendency becoming the module for satisfying user's mutual complex needs. Because the most effective method for the observation of patients condition a diagnosis and a treatment is collecting data from various devices and controling operation following it. Module tendency is more popular due to manage easily totally many individual systems. This study implemented communication protocol to control by one control system connecting modular medical devices. Implemented system consist of one master module controlling all module and managing communication and many Slave modules. Communication between each modules introduced SPI(Serial Peripheral Interface) among many synchronous serial communication methods for the exact transmission and receipt of data. All communication executes by packet format. This can detect error. And, this protocol introduced PNP(Plug And Play) function that auto-detect connecting or removing module during running. This protocol exactly transmitted and received in faster speed more than 1Mbps. And in practical application to the ventilator this confirmed to give and take real-time data. And various functions by th central control system is implemented in this protocol.

  • PDF

An On-chip ESD Protection Method for Preventing Current Crowding on a Guard-ring Structure (가드링 구조에서 전류 과밀 현상 억제를 위한 온-칩 정전기 보호 방법)

  • Song, Jong-Kyu;Jang, Chang-Soo;Jung, Won-Young;Song, In-Chae;Wee, Jae-Kyung
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.105-112
    • /
    • 2009
  • In this paper, we investigated abnormal ESD failure on guard-rings in the smart power IC fabricated with $0.35{\mu}m$ Bipolar-CMOS-DMOS (BCD) technology. Initially, ESD failure occurred below 200 V in the Machine Model (MM) test due to current crowding in the parasitic diode associated with the guard-rings which are generally adopted to prevent latch-up in high voltage devices. Optical Beam Induced Resistance Charge (OBIRCH) and Scanning Electronic Microscope (SEM) were used to find the failure spot and 3-D TCAD was used to verify cause of failure. According to the simulation results, excessive current flows at the comer of the guard-ring isolated by Local Oxidation of Silicon (LOCOS) in the ESD event. Eventually, the ESD failure occurs at that comer of the guard-ring. The modified comer design of the guard-ring is proposed to resolve such ESD failure. The test chips designed by the proposed modification passed MM test over 200 V. Analyzing the test chips statistically, ESD immunity was increased over 20 % in MM mode test. In order to avoid such ESD failure, the automatic method to check the weak point in the guard-ring is also proposed by modifying the Design Rule Check (DRC) used in BCD technology. This DRC was used to check other similar products and 24 errors were found. After correcting the errors, the measured ESD level fulfilled the general industry specification such as HBM 2000 V and MM 200V.

Development and Evaluation of Quality Assurance Worksheet for the Radiation Treatment Planning System (방사선치료계획 시스템의 정도관리 절차서 개발 및 유용성 평가)

  • Cho Kwang Hwan;Choi Jinho;Shin Dong Oh;Kwon Soo Il;Choi Doo Ho;Kim Yong Ho;Lee Sang Hoon
    • Progress in Medical Physics
    • /
    • v.15 no.4
    • /
    • pp.186-191
    • /
    • 2004
  • The periodic Quality Assurance (QA) of each radiation treatment related equipments is important one, but quality assurance of the radiation treatment planning system (RTPS) is still not sufficient rather than other related equipments in clinics. Therefore, this study will present and test the periodic QA program to compare, evaluation the efficiency of the treatment planning systems. This QA program is divided to terms for the input, output devices and dosimetric data and categorized to the weekly, monthly, yearly and non-periodically with respect to the job time, frequency of error, priority of importance. CT images of the water equivalent solid phantom with a heterogeneity condition are input into the RTPS to proceed the test. The actual measurement data are obtained by using the ion chamber for the 6 MV, 10 MV photon beam, then compared a calculation data with a measurement data to evaluate the accuracy of the RTPS. Most of results for the accuracy of geometry and beam data are agreed within the error criteria which is recommended from the various advanced country and related societies. This result can be applied to the periodic QA program to improve the treatment outcome as a proper model in Korea and used to evaluate the accuracy of the RTPS.

  • PDF

Efficient Multiplex Audio Monitoring System in Digital Broadcasting (디지털 방송에서 효율적인 다중 오디오 모니터링 시스템)

  • Kim, Yoo-Won;Sohn, Surg-Won;Jo, Geun-Sik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.91-98
    • /
    • 2008
  • In digital broadcasting, it is possible to multiplex maximum one hundred audio or music programs into MPEG-2 transport stream, which is suitable for transmitting through one channel. In order to check if multiplex music programs are transmitted well, we need a multiplex audio monitoring system that monitors the programs in real-time. In analog broadcasting, we have used hardware-based audio monitoring system for a small number music programs. However, the effectiveness of hardware-based audio monitoring system from the cost and function viewpoint is so low that a new system is needed for digital broadcasting. In this paper, we have designed and implemented a software-based audio monitoring system to satisfy these requirements. In this implementation, only one PC is used without other hardware facilities, and the system monitors digital broadcasting music programs effectively. Transmitted digital broadcasting streams are demultiplexed into many music programs and the realtime value of audio level and packet error information for these programs are displayed in the screen. Thus, the system detects and shows the abnormal transmitting programs automatically. Simulation results show that effective realtime multiplex audio monitoring is possible for digital broadcasting music programs.

  • PDF

DNA Watermarking Method based on Random Codon Circular Code (랜덤 코돈 원형 부호 기반의 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.

Automated Geometric Correction of Geostationary Weather Satellite Images (정지궤도 기상위성의 자동기하보정)

  • Kim, Hyun-Suk;Lee, Tae-Yoon;Hur, Dong-Seok;Rhee, Soo-Ahm;Kim, Tae-Jung
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.4
    • /
    • pp.297-309
    • /
    • 2007
  • The first Korean geostationary weather satellite, Communications, Oceanography and Meteorology Satellite (COMS) will be launched in 2008. The ground station for COMS needs to perform geometric correction to improve accuracy of satellite image data and to broadcast geometrically corrected images to users within 30 minutes after image acquisition. For such a requirement, we developed automated and fast geometric correction techniques. For this, we generated control points automatically by matching images against coastline data and by applying a robust estimation called RANSAC. We used GSHHS (Global Self-consistent Hierarchical High-resolution Shoreline) shoreline database to construct 211 landmark chips. We detected clouds within the images and applied matching to cloud-free sub images. When matching visible channels, we selected sub images located in day-time. We tested the algorithm with GOES-9 images. Control points were generated by matching channel 1 and channel 2 images of GOES against the 211 landmark chips. The RANSAC correctly removed outliers from being selected as control points. The accuracy of sensor models established using the automated control points were in the range of $1{\sim}2$ pixels. Geometric correction was performed and the performance was visually inspected by projecting coastline onto the geometrically corrected images. The total processing time for matching, RANSAC and geometric correction was around 4 minutes.

In-Band Full-Duplex Wireless Communication Using USRP (USRP 장치를 이용한 동일대역 전이중 무선통신 연구)

  • Park, Haeun;Yoon, Jiyong;Kim, Youngsik
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.30 no.3
    • /
    • pp.229-235
    • /
    • 2019
  • The implementation of an in-band full-duplex wireless communication system is demonstrated in this study. In the analog/RF domain, the self-interference(SI) signal is reduced using a separate antenna for the transmitter and receiver paths, and most of the SI signal is canceled in the digital domain. A software defined radio(SDR) is used to implement the in-band full-duplex wireless communication system. The USRP X310 device uses transmitting and receiving antennas. By adjusting the gain of the transmitting and receiving ends of the SDR device, the magnitude of the SI signal entering the receiving antenna, and the size of the received signal from the outside, are both set to -64 dB. To verify the in-band full-duplex wireless communication performance, the source data is image and orthogonal frequency-division multiplexing is used for modulation. A WiFi standard frame with a carrier frequency of 2.67 GHz and bandwidth of 20 MHz is used. In the received signal, the SI signal is canceled by digital signal processing and the SI signal is attenuated by up to 34 dB. OFDM demodulation was impossible when the SI signal was not removed. However, the bit error rate is reduced to $2.63{\times}10^{-5}$ when the SI signal is attenuated by 34 dB, and no error is detected in the 100 Mbit data output as a result of passing through the Viterbi decoder.

Research Trend Analysis Using Bibliographic Information and Citations of Cloud Computing Articles: Application of Social Network Analysis (클라우드 컴퓨팅 관련 논문의 서지정보 및 인용정보를 활용한 연구 동향 분석: 사회 네트워크 분석의 활용)

  • Kim, Dongsung;Kim, Jongwoo
    • Journal of Intelligence and Information Systems
    • /
    • v.20 no.1
    • /
    • pp.195-211
    • /
    • 2014
  • Cloud computing services provide IT resources as services on demand. This is considered a key concept, which will lead a shift from an ownership-based paradigm to a new pay-for-use paradigm, which can reduce the fixed cost for IT resources, and improve flexibility and scalability. As IT services, cloud services have evolved from early similar computing concepts such as network computing, utility computing, server-based computing, and grid computing. So research into cloud computing is highly related to and combined with various relevant computing research areas. To seek promising research issues and topics in cloud computing, it is necessary to understand the research trends in cloud computing more comprehensively. In this study, we collect bibliographic information and citation information for cloud computing related research papers published in major international journals from 1994 to 2012, and analyzes macroscopic trends and network changes to citation relationships among papers and the co-occurrence relationships of key words by utilizing social network analysis measures. Through the analysis, we can identify the relationships and connections among research topics in cloud computing related areas, and highlight new potential research topics. In addition, we visualize dynamic changes of research topics relating to cloud computing using a proposed cloud computing "research trend map." A research trend map visualizes positions of research topics in two-dimensional space. Frequencies of key words (X-axis) and the rates of increase in the degree centrality of key words (Y-axis) are used as the two dimensions of the research trend map. Based on the values of the two dimensions, the two dimensional space of a research map is divided into four areas: maturation, growth, promising, and decline. An area with high keyword frequency, but low rates of increase of degree centrality is defined as a mature technology area; the area where both keyword frequency and the increase rate of degree centrality are high is defined as a growth technology area; the area where the keyword frequency is low, but the rate of increase in the degree centrality is high is defined as a promising technology area; and the area where both keyword frequency and the rate of degree centrality are low is defined as a declining technology area. Based on this method, cloud computing research trend maps make it possible to easily grasp the main research trends in cloud computing, and to explain the evolution of research topics. According to the results of an analysis of citation relationships, research papers on security, distributed processing, and optical networking for cloud computing are on the top based on the page-rank measure. From the analysis of key words in research papers, cloud computing and grid computing showed high centrality in 2009, and key words dealing with main elemental technologies such as data outsourcing, error detection methods, and infrastructure construction showed high centrality in 2010~2011. In 2012, security, virtualization, and resource management showed high centrality. Moreover, it was found that the interest in the technical issues of cloud computing increases gradually. From annual cloud computing research trend maps, it was verified that security is located in the promising area, virtualization has moved from the promising area to the growth area, and grid computing and distributed system has moved to the declining area. The study results indicate that distributed systems and grid computing received a lot of attention as similar computing paradigms in the early stage of cloud computing research. The early stage of cloud computing was a period focused on understanding and investigating cloud computing as an emergent technology, linking to relevant established computing concepts. After the early stage, security and virtualization technologies became main issues in cloud computing, which is reflected in the movement of security and virtualization technologies from the promising area to the growth area in the cloud computing research trend maps. Moreover, this study revealed that current research in cloud computing has rapidly transferred from a focus on technical issues to for a focus on application issues, such as SLAs (Service Level Agreements).