• Title/Summary/Keyword: 이진코드

Search Result 255, Processing Time 0.022 seconds

Rotation and Size Invariant Fingerprint Recognition Using The Neural Net (회전과 크기변화에 무관한 신경망을 이용한 지문 인식)

  • Lee, Nam-Il;U, Yong-Tae;Lee, Jeong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.2
    • /
    • pp.215-224
    • /
    • 1994
  • In this paper, the rotation and size invariant fingerprint recognition using the neural network EART (Extended Adaptive Resonance Theory) is studied ($515{\times}512$) gray level fingerprint images are converted into the binary thinned images based on the adaptive threshold and a thinning algorithm. From these binary thinned images, we extract the ending points and the bifurcation points, which are the most useful critical feature points in the fingerprint images, using the $3{\times}3$ MASK. And we convert the number of these critical points and the interior angles of convex polygon composed of the bifurcation points into the 40*10 critical using the weighted code which is invariant of rotation and size as the input of EART. This system produces very good and efficient results for the rotation and size variations without the restoration of the binary thinned fingerprints.

  • PDF

The Composition and Analytical Classification of Cyber Incident based Hierarchical Cyber Observables (계층적 침해자원 기반의 침해사고 구성 및 유형분석)

  • Kim, Young Soo;Mun, Hyung-Jin;Cho, Hyeisun;Kim, Byungik;Lee, Jin Hae;Lee, Jin Woo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.11
    • /
    • pp.139-153
    • /
    • 2016
  • Cyber incident collected from cyber-threat-intelligence sharing Center is growing rapidly due to expanding malicious code. It is difficult for Incident analysts to extract and classify similar features due to Cyber Attacks. To solve these problems the existing Similarity Analysis Method is based on single or multiple cyber observable of similar incidents from Cyber Attacks data mining. This method reduce the workload for the analysis but still has a problem with enhancing the unreality caused by the provision of improper and ambiguous information. We propose a incident analysis model performed similarity analysis on the hierarchically classified cyber observable based on cyber incident that can enhance both availability by the provision of proper information. Appling specific cyber incident analysis model, we will develop a system which will actually perform and verify our suggested model.

Jeju Jong-Nang Channel Code III (제주 정낭(錠木) 채널 Code III)

  • Park, Ju-Yong;Kim, Jeong-Su;Lee, Moon-Ho
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.5
    • /
    • pp.91-103
    • /
    • 2015
  • This paper presents "The 3-User NOR switching channel based on interference decoding with receiver cooperation" in succession to "Jeju Jong Nang channel code I, II". The Jeju Jong Nang code is considered as one of the earliest human binary coded communication (HBCC) in the world with a definite "1" or "0" binary symbolic analysis of switching circuits. In this paper, we introduce a practical example of interference decoding with receiver cooperation based on the three user Jong Nang NOR switching channel. The proposed system models are the three user Jong Nang (TUJN) NOR logic switching on-off, three-user injective deterministic NOR switching channel and Gaussian interference channel (GIC) with receiver cooperation. Therefore, this model is well matched to Shannon binary symmetric and erasure channel capacity. We show the applications of three-user Gaussian interference decoding to obtain deterministic channels which means each receiver cooperation helps to adjacent others in order to increase degree of freedom. Thus, the optimal sum rate of interference mitigation through adjacent receiver cooperation achieves 7 bits.

Iterative Coding for High Speed Power Line Communication Systems (고속 전력선 통신 시스템을 위한 반복 부호화 기법)

  • Kim, Yo-Cheol;Cho, Bong-Youl;Lee, Jae-Jo;Kim, Jin-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.185-192
    • /
    • 2011
  • In this paper, we simulate and analyze performance of iterative coding scheme, double binary turbo code, for high speed power line communication (PLC) systems. PLC system has hostile environment for high speed data transmission, so error correction method is necessary to compensate effects of PLC channel. We employ the PLC model proposed by M. Zimmerman and Middleton Class A interference model, and system performance is evaluated in terms of bit error rate (BER). From the simulation results, we confirm double binary turbo code provides considerable coding gains to PLC system and BER performance is significantly improved as the number of iteration increase. It is also confirmed that BER performance increases as code rate is lager, while it decreases as the code rate is smaller.

Research of Semantic Considered Tree Mining Method for an Intelligent Knowledge-Services Platform

  • Paik, Juryon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.27-36
    • /
    • 2020
  • In this paper, we propose a method to derive valuable but hidden infromation from the data which is the core foundation in the 4th Industrial Revolution to pursue knowledge-based service fusion. The hyper-connected societies characterized by IoT inevitably produce big data, and with the data in order to derive optimal services for trouble situations it is first processed by discovering valuable information. A data-centric IoT platform is a platform to collect, store, manage, and integrate the data from variable devices, which is actually a type of middleware platforms. Its purpose is to provide suitable solutions for challenged problems after processing and analyzing the data, that depends on efficient and accurate algorithms performing the work of data analysis. To this end, we propose specially designed structures to store IoT data without losing the semantics and provide algorithms to discover the useful information with several definitions and proofs to show the soundness.

Optimal Gas Detection System in Cargo Compressor Room of Gas Fueled LNG Carrier (가스추진 LNG 운반선의 가스 압축기실에 설치된 가스검출장치의 최적 배치에 관한 연구)

  • Lee, Sang-Won;Shao, Yude;Lee, Seung-Hun;Lee, Jin-Uk;Jeong, Eun-Seok;Kang, Ho-Keun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.5
    • /
    • pp.617-626
    • /
    • 2019
  • This study analyzes the optimal location of gas detectors through the gas dispersion in a cargo compressor room of a 174K LNG carrier equipped with high-pressure cargo handling equipment; in addition, we propose a reasonable method for determining the safety regulations specified in the new International Code of the Construction and Equipment of Ships Carrying Liquefied Gases in Bulk (IGC). To conduct an LNG gas dispersion simulation in the cargo compressor room-equipped with an ME-GI engine-of a 174 K LNG carrier, the geometry of the room as well as the equipment and piping, are designed using the same 3D size at a 1-to-1 scale. Scenarios for a gas leak were examined under high pressure of 305 bar and low pressure of 1 bar. The pinhole sizes for high pressure are 4.5, 5.0, and 5.6mm, and for low pressure are 100 and 140 mm. The results demonstrate that the cargo compressor room will not pose a serious risk with respect to the flammable gas concentration as verified by a ventilation assessment for a 5.6 mm pinhole for a high-pressure leak under gas rupture conditions, and a low-pressure leak of 100 and 140 mm with different pinhole sizes. However, it was confirmed that the actual location of the gas detection sensors in a cargo compressor room, according to the new IGC code, should be moved to other points, and an analysis of the virtual monitor points through a computational fluid dynamics (CFD) simulation.

Comparative Analysis of Self-supervised Deephashing Models for Efficient Image Retrieval System (효율적인 이미지 검색 시스템을 위한 자기 감독 딥해싱 모델의 비교 분석)

  • Kim Soo In;Jeon Young Jin;Lee Sang Bum;Kim Won Gyum
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.12
    • /
    • pp.519-524
    • /
    • 2023
  • In hashing-based image retrieval, the hash code of a manipulated image is different from the original image, making it difficult to search for the same image. This paper proposes and evaluates a self-supervised deephashing model that generates perceptual hash codes from feature information such as texture, shape, and color of images. The comparison models are autoencoder-based variational inference models, but the encoder is designed with a fully connected layer, convolutional neural network, and transformer modules. The proposed model is a variational inference model that includes a SimAM module of extracting geometric patterns and positional relationships within images. The SimAM module can learn latent vectors highlighting objects or local regions through an energy function using the activation values of neurons and surrounding neurons. The proposed method is a representation learning model that can generate low-dimensional latent vectors from high-dimensional input images, and the latent vectors are binarized into distinguishable hash code. From the experimental results on public datasets such as CIFAR-10, ImageNet, and NUS-WIDE, the proposed model is superior to the comparative model and analyzed to have equivalent performance to the supervised learning-based deephashing model. The proposed model can be used in application systems that require low-dimensional representation of images, such as image search or copyright image determination.

Round Robin Analysis of Pressure-Temperature Limit Curve for Reactor Vessel (원자로 용기의 압력-온도 한계곡선 Round Robin 해석)

  • 정명조;이진호;박윤원;최영환;김영진
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.16 no.2
    • /
    • pp.153-163
    • /
    • 2003
  • Performed here is a comparative assessment study for the generation of the pressure-temperature limit curve of the reactor vessel. A round robin problem is proposed using the data available in Korea and all organizations interested in the generation of the pressure-temperature limit curve are invited. The problems consisting of 12 cases for cool-down are solved and their results are compared to generate a reference solution for the reference problem, which will be useful in the evaluation of the generation of the pressure-temperature limit curve in the future.

Analysis of Hydraulic Characteristics of High Pressure Injector with Piezo Actuator (피에조 액츄에이터 적용 고압 인젝터의 유압 동특성 해석)

  • Lee, Jin-Wook;Min, Kyoung-Doug
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.4
    • /
    • pp.164-173
    • /
    • 2006
  • In the electro-hydraulic injector for the common rail Diesel fuel injection system, the injection nozzle is being opened and closed by movement of a injector's needle which is balanced by pressure at the nozzle seat and at the needle control chamber, at the opposite end of the needle. In this study, the piezo actuator was considered as a prime movers in high pressure Diesel injector. Namely a piezo-driven Diesel injector, as a new method driven by piezoelectric energy, has been applied with a purpose to develop the analysis model of the piezo actuator to predict the dynamics characteristics of the hydraulic component(injector) by using the AMESim code. Aimed at simulating the hydraulic behavior of the piezo-driven injector, the circuit model has been developed and verified by comparison with the experimental results. As this research results, we found that the input voltage exerted on piezo stack is the dominant factor which affects on the initial needle behavior of piezo-driven injector than the hydraulic force generated by the constant injection pressure. Also we know the piezo-driven injector has more degrees of freedom in controlling the injection rate with the high pressure than a solenoid-driven injector.

A Study on the Optical Communication Channel using Forward Error Correcting Technique (순방향 에러 교정 기법을 이용한 광통신 채널에 관한 연구)

  • Kang, Young-Jin;Kim, Sun-Yeob
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.14 no.2
    • /
    • pp.835-839
    • /
    • 2013
  • In this paper, We operate at a relatively low BER or using forward error control coding techniques on ways to increase the capacity of optical communication systems research. Coding gain is defined as the ratio of the probability of the coded signal and coding of error signal. Coding gain is increased, partly because of the period, to reduce the value of the optimal coding of the signal error probability decreases because of the effective bit binary symbol duration is longer than can be ignored. Transmission capacity on the coding gain for various code rates, which show the extent of up to 75Gb/s transmission capacity to get through it was confirmed that these coding techniques.