• Title/Summary/Keyword: 임계치 설정

Search Result 186, Processing Time 0.061 seconds

A Generalized Method for Extracting Characters and Video Captions (일반화된 문자 및 비디오 자막 영역 추출 방법)

  • Chun, Byung-Tae;Bae, Young-Lae;Kim, Tai-Yun
    • Journal of KIISE:Software and Applications
    • /
    • v.27 no.6
    • /
    • pp.632-641
    • /
    • 2000
  • Conventional character extraction methods extract character regions using methods such as color reduction, region split and merge and texture analysis from the whole image. Because these methods use many heuristic variables and thresholding values derived from a priori knowledge, it is difficult to generalize them algorithmically. In this paper, we propose a method that can extract character regions using a topographical feature extraction method and a point-line-region extension method. The proposed method can also solve the problems of conventional methods by reducing heuristic variables and generalizing thresholding values. We see that character regions can be extracted by generalized variables and thresolding values without using a priori knowledge of character region. Experimental results show that the candidate region extraction rate is 100%, and the character region extraction rate is over 98%.

  • PDF

The Conversion method from ID-based Encryption to ID-based Dynamic Threshold Encryption (ID기반 암호시스템을 이용하여 ID기반 동적 임계 암호시스템으로 변환하는 방법)

  • Kim, Mi-Lyoung;Kim, Hyo-Seung;Son, Young-Dong;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.733-744
    • /
    • 2012
  • Dynamic threshold public-key encryption provides dynamic setting of the group of all users, receivers and the threshold value. Over recent years, there are many studies on the construction of scheme, called ID-based dynamic threshold encryption, which combines the ID-based encryption with dynamic threshold encryption. In this paper, we analyze the ID-based dynamic threshold encryption proposed by Xing and Xu in 2011, and show that their scheme has a structural problem. We propose a conversion method from ID-based encryption which uses the bilinear map to ID-based dynamic threshold encryption. Additionally, we prove this converted scheme has CPA security under the full model.

Methods for Genetic Parameter Estimations of Carcass Weight, Longissimus Muscle Area and Marbling Score in Korean Cattle (한우의 도체중, 배장근단면적 및 근내지방도의 유전모수 추정방법)

  • Lee, D.H.
    • Journal of Animal Science and Technology
    • /
    • v.46 no.4
    • /
    • pp.509-516
    • /
    • 2004
  • This study is to investigate the amount of biased estimates for heritability and genetic correlation according to data structure on marbling scores in Korean cattle. Breeding population with 5 generations were simulated by way of selection for carcass weight, Longissimus muscle area and latent values of marbling scores and random mating. Latent variables of marbling scores were categorized into five by the thresholds of 0, I, 2, and 3 SD(DSI) or seven by the thresholds of -2, -1, 0,1I, 2, and 3 SD(DS2). Variance components and genetic pararneters(Heritabilities and Genetic correlations) were estimated by restricted maximum likelihood on multivariate linear mixed animal models and by Gibbs sampling algorithms on multivariate threshold mixed animal models in DS1 and DS2. Simulation was performed for 10 replicates and averages and empirical standard deviation were calculated. Using REML, heritabilitis of marbling score were under-estimated as 0.315 and 0.462 on DS1 and DS2, respectively, with comparison of the pararneter(0.500). Otherwise, using Gibbs sampling in the multivariate threshold animal models, these estimates did not significantly differ to the parameter. Residual correlations of marbling score to other traits were reduced with comparing the parameters when using REML algorithm with assuming linear and normal distribution. This would be due to loss of information and therefore, reduced variation on marbling score. As concluding, genetic variation of marbling would be well defined if liability concepts were adopted on marbling score and implemented threshold mixed model on genetic parameter estimation in Korean cattle.

The Overload Control Scheme Using a Delay Queue in the SIP Signalling Networks (SIP 시그널링 네트워크에서 지연 큐를 이용한 과부하 제어 방법)

  • Lee, Jong-Min;Jeon, Heung-Jin;Kwon, Oh-Jun
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.8
    • /
    • pp.1038-1047
    • /
    • 2012
  • The SIP(Session Initation Protocol) is an application layer protocol that is used to establish, release, and change the call session of the IP telephony. In the SIP signalling networks, when the number of the UA(User Agent) requested the call session increase, the number of messages to be processed by SIP proxy server increase. It often will be caused the overload of the SIP proxy server. In this paper, we proposed the overload control method with a normal queue and a delay queue in the SIP proxy server. When it is estimated the overload of the server by the excess of the high threshold in the normal queue, new INVITE messages will be put into the delay queue to reduce the load of the server. It results in some delay of the call session from the INVITE message. Subsequently when the number of messages in the normal queue is reduced below the low threshold, the INVITE messages in the delay queue is processed. The simulation results showed that the number of the retransmission messages by our proposed method was 45% less than the one by the method with single queue. The results also showed that the average call success rate by the proposed method was 2% higher than the one by the method with single queue.

The Improving Method of Facial Recognition Using the Genetic Algorithm (유전자 알고리즘에 의한 얼굴인식성능의 향상 방안)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.11 no.1
    • /
    • pp.95-105
    • /
    • 2005
  • As the security system using facial recognition, the recognition performance depends on the environments (e. g. face expression, hair style, age and make-up etc.) For the revision of easily changeable environment, it's generally used to set up the threshold, replace the face image which covers the threshold into images already registered, and update the face images additionally. However, this usage has the weakness of inaccuracy matching results or can easily active by analogous face images. So, we propose the genetic algorithm which absorbs greatly the facial similarity degree and the recognition target variety, and has excellence studying capacity to avoid registering inaccuracy. We experimented variable and similar face images (each 30 face images per one, total 300 images) and performed inherent face images based on ingredient analysis as face recognition technique. The proposed method resulted in not only the recognition improvement of a dominant gene but also decreasing the reaction rate to a recessive gene.

  • PDF

Multi-advanced Sensor-based Building Disaster Prevention Detection System (다중첨단센서기반 건축물 재난방지 감지 시스템)

  • Lim, Jaedon;Kim, Jungjip;Jung, Hoekyung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2018.05a
    • /
    • pp.567-568
    • /
    • 2018
  • In recent years, there have been frequent occurrences of collapsing buildings and tilting accidents due to frequent earthquakes and aging of buildings. Various methods have been proposed to prevent disasters on these buildings. In this paper, we propose a system algorithm that provides an indication of anomalous phenomena such as collapse and tilting of buildings by real - time monitoring of IoT (Internet of Things) - based architectural anomalies. The multi-advanced sensor is based on the Inclinometer sensor and the Accelerometer sensor, transmits the detected data to the server in real time, accumulates the data, and provides the service to cope when the set threshold value is different. It is possible to evacuate and repair the collapse and tilting of the building by warning the occurrence of the upper threshold event event such as the collapse and tilting of the building.

  • PDF

Safety Monitoring System of Structures Using MEMS Sensor (MEMS 센서기반의 구조물의 안전 모니터링 시스템)

  • Lim, Jaedon;Kim, Jungjip;Hong, Dueui;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.10
    • /
    • pp.1307-1313
    • /
    • 2018
  • In recent years, there have been frequent occurrences of collapsing buildings and tilting accidents due to frequent earthquakes and aging of buildings. Various methods have been proposed to prevent disasters on these buildings. In this paper, we propose a system that provides an indication of anomalous phenomena such as collapse and tilting of buildings by real-time monitoring of IoT(Internet of Things) based architectural anomalies. The MEMS sensor is based on the inclinometer sensor and the accelerometer sensor, transmits the detected data to the server in real time, accumulates the data, and provides the service to cope when the set threshold value is different. It is possible to evacuate and repair the collapse and tilting of the building by warning the occurrence of the upper threshold event such as the collapse and tilting of the building.

Formation of Nearest Neighbors Set Based on Similarity Threshold (유사도 임계치에 근거한 최근접 이웃 집합의 구성)

  • Lee, Jae-Sik;Lee, Jin-Chun
    • Journal of Intelligence and Information Systems
    • /
    • v.13 no.2
    • /
    • pp.1-14
    • /
    • 2007
  • Case-based reasoning (CBR) is one of the most widely applied data mining techniques and has proven its effectiveness in various domains. Since CBR is basically based on k-Nearest Neighbors (NN) method, the value of k affects the performance of CBR model directly. Once the value of k is set, it is fixed for the lifetime of the CBR model. However, if the value is set greater or smaller than the optimal value, the performance of CBR model will be deteriorated. In this research, we propose a new method of composing the NN set using similarity scores as themselves, which we shall call s-NN method, rather than using the fixed value of k. In the s-NN method, the different number of nearest neighbors can be selected for each new case. Performance evaluation using the data from UCI Machine Learning Repository shows that the CBR model adopting the s-NN method outperforms the CBR model adopting the traditional k-NN method.

  • PDF

An adaptive Fuzzy Binarization (적응 퍼지 이진화)

  • Jeon, Wang-Su;Rhee, Sang-Yong
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.26 no.6
    • /
    • pp.485-492
    • /
    • 2016
  • A role of the binarization is very important in separating the foreground and the background in the field of the computer vision. In this study, an adaptive fuzzy binarization is proposed. An ${\alpha}$-cut control ratio is obtained by the distribution of grey level of pixels in a sliding window, and binarization is performed using the value. To obtain the ${\alpha}$-cut, existing thresholding methods which execution speed is fast are used. The threshold values are set as the center of each membership function and the fuzzy intervals of the functions are specified with the distribution of grey level of the pixel. Then ${\alpha}$-control ratio is calculated using the specified function and binarization is performed according to the membership degree of the pixels. The experimental results show the proposed method can segment the foreground and the background well than existing binarization methods and decrease loss of the foreground.

Portable system module for wireless based on mountain climbing safety using 447 MHz band FSK (447MHz 대역 FSK방식을 이용한 무선 통신 기반 산행 안전을 위한 휴대 시스템)

  • Lim, Jae Don;Kim, Jung Jip;Jung, Hoekyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.11
    • /
    • pp.1428-1433
    • /
    • 2019
  • Interest in mountain accidents among the technical trends of disasters in Korea is increasing continuously. When accidents occur, the most common methods are location tracking and accident reporting using smartphones, and rescue activities are being carried out by using them. In this paper, we proposed an improvement of wireless safety system for mountain climbing safety using 447 FSK. Using the 447 MHz band transmitter / receiver, it accumulates position coordinates and data through position transmission and rescue signal transmission in case of anomalies. If a sender is out of the threshold of the set area range, a danger warning notification can be generated to quickly exit the danger zone. Provide services. In addition, it is considered that the health condition of the sender is continuously checked and the receiver is warned when the specified threshold is exceeded, so that it is possible to respond to the sender's disaster.