• Title/Summary/Keyword: 임계치 설정

Search Result 186, Processing Time 0.035 seconds

Enhanced ART1 Algorithm for the Recognition of Student Identification Cards of the Educational Matters Administration System on the Web (웹 환경 학사관리 시스템의 학생증 인식을 위한 개선된 ART1 알고리즘)

  • Park Hyun-Jung;Kim Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.5 s.37
    • /
    • pp.333-342
    • /
    • 2005
  • This paper proposes a method, which recognizes student's identification card by using image processing and recognition technology and can manage student information on the web. The presented scheme sets up an average brightness as a threshold, based on the brightest Pixel and the least bright one for the source image of the ID card. It is converting to binary image, applies a horizontal histogram, and extracts student number through its location. And, it removes the noise of the student number region by the mode smoothing with 3$\times$3 mask. After removing noise from the student number region, each number is extracted using vertical histogram and normalized. Using the enhanced ART1 algorithm recognized the extracted student number region. In this study, we propose the enhanced ART1 algorithm different from the conventional ART1 algorithm by the dynamical establishment of the vigilance parameter. which shows a tolerance limit of unbalance between voluntary and stored patterns for clustering. The Experiment results showed that the recognition rate of the proposed ART1 algorithm was improved much more than that of the conventional ART1 algorithm. So, we develop an educational matters administration system by using the proposed recognition method of the student's identification card.

  • PDF

Model-based Macroblock Layer Rate Control for Low Bit Rate Video Coding (저전송률 비디오 압축을 위한 모델 기반 매크로블록 레이어 비트율 제어)

  • Park, Sang-Hyun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.4
    • /
    • pp.50-57
    • /
    • 2009
  • This paper presents a new model-based macroblock layer rate control algorithm for low bit rate video coding which generates output bits corresponding to a target bit budget. The H.264 standard uses various coding modes and optimization methods to improve the compression performance, which makes it difficult to control the generated traffic accurately in low bit rate environments. In the proposed scheme, we first estimate MAD values of macroblocks in a frame and define a target remaining bits using the estimated MAD values before encoding each macroblock. If a difference between the target value and the actual value is greater than a threshold value, the quantization parameter is adjusted to decrease the difference. It is shown by experimental results that the new algorithm can obtain more than 66% decrease of the difference between the target bits and the resulting bits for a frame with the PSNR performance better than that of the existing rate control algorithm.

Extraction of Hypertension Blood flow of Brachial Artery from Color Doppler Ultrasonography by Using 4-directional Contour Tracking Algorithm and Enhanced FCM Method (4 방향 윤곽선 추적 알고리즘과 개선된 FCM 방법을 이용한 색조 도플러 초음파 영상에서 상완 동맥의 고혈압 혈류 추출)

  • Yu, Seong-won;Jung, Young-hun;Shim, Sung-bo;Kim, Hye-ran;Kim, Min-ji;Kim, Kwang Beak
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2017.05a
    • /
    • pp.71-73
    • /
    • 2017
  • 본 논문에서는 4 방향 윤곽선 추적 기법과 히스토그램 분석 기법을 기반으로 한 개선된 FCM 알고리즘을 적용하여 색조 도플러 초음파 영상에서 상완 동맥의 혈류를 추출하고 분석하는 방법을 제안한다. 제안된 방법에서는 상완 동맥의 혈류를 정확히 추출하기 위해 전처리 과정으로 색조 도플러 초음파 영상 이외의 환자 정보가 있는 영역을 제거한 후, ROI 영역을 추출한다. 추출된 ROI 영역에서 영상의 최대 명암도를 임계치로 설정한 이진화 기법을 적용하여 ROI 영역을 이진화한다. 이진화된 ROI 영역에서 4 방향 윤곽선 추적 기법을 적용하여 상완 동맥이 존재하는 사다리꼴 형태의 영역을 추출한다. 색 정보를 분석한 히스토그램을 이용하여 특징점의 개수를 계산하고 계산된 특징점의 개수를 FCM 알고리즘의 초기 클러스터의 개수로 설정한 후, 추출된 사다리꼴 형태의 영역에 적용하여 양자화 한다. 양자화된 영역 중에서 빨간색으로 분류된 영역을 고혈압 영역으로 추출한다. 제안된 추출 방법을 20개의 색조 도플러 초음파 영상을 대상으로 실험한 결과, 20개의 색조 도플러 초음파 영상에서 18개의 색조 도플러 초음파 영상이 정확히 추출되었다.

  • PDF

A Secure Routing Protocol in MANET based on Malicious behavior Pattern of Node and Trust Level (노드의 악의적 행위패턴 및 신뢰수준 기반의 MANET Secure 라무팅 방안)

  • Park, Seong-Seung;Park, Gun-Woo;Ryu, Keun-Ho;Lee, Sang-Hoon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.5
    • /
    • pp.103-117
    • /
    • 2009
  • In MANET(Mobile Ad-Hoc Network), providing security to routing has been a significant issue recently. Existing studies, however, focused on either of secure routing or packet itself where malicious operations occur. In this paper, we propose SRPPnT(A Secure Routing Protocol in MANET based on Malicious Pattern of Node and Trust Level) that consider both malicious behavior on packet and secure routing. SRPPnT is identify the node where malicious activities occur for a specific time to compose trust levels for each node, and then to set up a routing path according to the trust level obtained. Therefore, SRPPnT is able to make efficient countermeasures against malicious operations. SRPPnT is based on AODV(Ad-Hoc On-Demand Distance Vector Routing). The proposed SRPPnT, from results of the NS-2 network simulation. shows a more prompt and accurate finding of malicious nodes than previous protocols did, under the condition of decreased load of networks and route more securely.

Performance Analysis of Asynchronous 2.5 Gbps / 622Mbps Optical Subscriber Network with Manchester coded Downstream and NRZ upstream re-modulation (맨체스터 부호로 코딩된 하향신호의 재변조를 이용한 비동기 2.5 Gbps / 622 Mbps 광가입자 망의 성능 분석)

  • Park, Sang-Jo;Kim, Bong-Kyu
    • Korean Journal of Optics and Photonics
    • /
    • v.20 no.3
    • /
    • pp.143-147
    • /
    • 2009
  • We propose an asymmetrical 2.5 Gbps / 622 Mbps bidirectional optical subscriber network with Manchester coded downstream and NRZ (Non-Return-to-Zero) upstream remodulation. The proposed system has important characteristics in the optical network unit (ONU): it does not require a light source or the usual control circuits such as wavelength control and output power control, and it is possible to use a synchronization scheme between upstream and downstream data. We theoretically analyze BER(Bit Error Rate) performance of upstream data remodulated with Manchester coded downstream according to the types of NRZ downstream data and perform simulations with MATLAB. The BER performance and the receiver sensitivity have been improved by 3 dB by adjusting threshold levels compared to the conventional receiver. The results have shown the remodulation scheme with Manchester coded downstream could be a useful technology for asynchronous and asymmetric optical subscriber networks with low cost and simple structures.

Designing of the Statistical Models for Imprinting Patterns of Quantitative Traits Loci (QTL) in Swine (돼지에 있어서 양적 형질 유전자좌(QTL) 발현 특성 분석을 위한 통계적 검정 모형 설정)

  • Yoon D. H.;Kong H. S.;Cho Y. M.;Lee J. W.;Choi I. S.;Lee H. K.;Jeon G. J.;Oh S. J.;Cheong I. C.
    • Journal of Embryo Transfer
    • /
    • v.19 no.3
    • /
    • pp.291-299
    • /
    • 2004
  • Characterization of quantitative trait loci (QTL) was investigated in the experimental cross population between Berkshire and Yorkshire breed. A total of 512 F$_2$ offspring from 65 matting of F$_1$ parents were phenotyped the carcass traits included average daily gain (ADG), average backfat thickness (ABF), tenth rip backfat thickness (TRF), loin eye area (LEA), and last rip backfat thickness (LRF). All animals were genotyped for 125 markers across the genome. Marker linkage maps were derived and used in QTL analysis based on line cross least squares regression interval mapping. A decision tree to identify QTL with imprinting effects was developed based on tests against the Mendelian mode of QTL expression. To set the evidence of QTL presence, empirical significance thresholds were derived at chromosome-wise and genome-wise levels using specialized permutation strategies. Significance thresholds derived by the permutation test were validated in the data set based on simulation of a pedigree and data structure similar to the Berkshire-Yorkshire population. Genome scan revealed significant evidences for 13 imprinted QTLs affecting growth and body compositions of which nine were identified to be QTL with paternally expressed inheritance mode. Four of QTLs in the loin eye area (LEA), and tenth rip backfat thickness (TRF), a maternally expressed QTL were found on chromosome 10 and 12. These results support the useful statistical models to analyse the imprinting far the QTLs related carcass trait.

Noise Robust Speech Recognition Based on Parallel Model Combination Adaptation Using Frequency-Variant (주파수 변이를 이용한 Parallel Model Combination 모델 적응에 기반한 잡음에 강한 음성인식)

  • Choi, Sook-Nam;Chung, Hyun-Yeol
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.3
    • /
    • pp.252-261
    • /
    • 2013
  • The common speech recognition system displays higher recognition performance in a quiet environment, while its performance declines sharply in a real environment where there are noises. To implement a speech recognizer that is robust in different speech settings, this study suggests the method of Parallel Model Combination adaptation using frequency-variant based on environment-awareness (FV-PMC), which uses variants in frequency; acquires the environmental data for speech recognition; applies it to upgrading the speech recognition model; and promotes its performance enhancement. This FV-PMC performs the speech recognition with the recognition model which is generated as followings: i) calculating the average frequency variant in advance among the readily-classified noise groups and setting it as a threshold value; ii) recalculating the frequency variant among noise groups when speech with unknown noises are input; iii) regarding the speech higher than the threshold value of the relevant group as the speech including the noise of its group; and iv) using the speech that includes this noise group. When noises were classified with the proposed FV-PMC, the average accuracy of classification was 56%, and the results from the speech recognition experiments showed the average recognition rate of Set A was 79.05%, the rate of Set B 79.43%m, and the rate of Set C 83.37% respectively. The grand mean of recognition rate was 80.62%, which demonstrates 5.69% more improved effects than the recognition rate of 74.93% of the existing Parallel Model Combination with a clear model, meaning that the proposed method is effective.

Analysis of impact of CATV leakage on CDMA Mobile Communication Systems (CDMA 이동통신시스템에 대한 케이블 방송 전송설비 누설전자파 영향 분석)

  • Park, Seong-Gyoon;Han, Chan-Kyu
    • Journal of IKEEE
    • /
    • v.15 no.3
    • /
    • pp.218-226
    • /
    • 2011
  • In this paper, the leaky electric field intensity of outdoor CATV facilities on CDMA mobile service band defined in technical regulation related with CATV is investigated if appropriate or not. From experimental and theoretical analysis results, Maximum allowable power level of CATV leakage should be -110dBm/1.23MHz. Also, the CATV leakage intensity thresholds, which may not nearly give an impact on the uplink performance of CDMA mobile base station for outdoor background noise of -100~-80dBm/1.23MHz to be measured in outdoor environment, couldn't conform to the current CATV technical regulation. Therefore, the leakage intensity in the current CATV technical regulation is rated as a too much low level in view of an overly worst case.

A Stable Multilevel Partitioning Algorithm for VLSI Circuit Designs Using Adaptive Connectivity Threshold (가변적인 연결도 임계치 설정에 의한 대규모 집적회로 설계에서의 안정적인 다단 분할 방법)

  • 임창경;정정화
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.35C no.10
    • /
    • pp.69-77
    • /
    • 1998
  • This paper presents a new efficient and stable multilevel partitioning algorithm for VLSI circuit design. The performance of multilevel partitioning algorithms that are proposed to enhance the performance of previous iterative-improvement partitioning algorithms for large scale circuits, depend on choice of construction methods for partition hierarchy. As the most of previous multilevel partitioning algorithms forces experimental constraints on the process of hierarchy construction, the stability of their performances goes down. The lack of stability causes the large variation of partition results during multiple runs. In this paper, we minimize the use of experimental constraints and propose a new method for constructing partition hierarchy. The proposed method clusters the cells with the connection status of the circuit. After constructing the partition hierarchy, a partition improvement algorithm, HYIP$^{[11]}$ using hybrid bucket structure, unclusters the hierachy to get partition results. The experimental results on ACM/SIGDA benchmark circuits show improvement up to 10-40% in minimum outsize over the previous algorithm $^{[3] [4] [5] [8] [10]}$. Also our technique outperforms ML$^{[10]}$ represented multilevel partition method by about 5% and 20% for minimum and average custsize, respectively. In addition, the results of our algorithm with 10 runs are better than ML algorithm with 100 runs.

  • PDF

CUCE: clustering protocol using node connectivity and node energy (노드 연결도와 에너지 정보를 이용한 개선된 센서네트워크 클러스터링 프로토콜)

  • Choi, Hae-Won
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.17 no.4
    • /
    • pp.41-50
    • /
    • 2012
  • Network life time is very important issue for wireless sensor network(WSN). It is very important to design sensor networks for sensors to utilize their energies in effective ways. A-PEGASIS that basically bases on PEGASIS and enhances in two aspects-an elegant chain generation algorithm and periodical update of chains. However, it has problems in the chain generation mechanism and some possibility of network partitioning or sensing hole problem in the network, in LEACH related protocols. This dissertation proposes a new clustering protocol to solve the co-shared problems in the previous protocols. The basic idea of our scheme is using the table for node connectivity. The results show that the network life time would be extended in about 1.8 times longer than LEACH and 1.5 times longer than PEGASIS-A.