• Title/Summary/Keyword: 전자해도 표현 표준

Search Result 219, Processing Time 0.025 seconds

Virtual Reality Using X3DOM (X3DOM을 이용한 가상현실)

  • Chheang, Vuthea;Ryu, Ga-Ae;Jeong, Sangkwon;Lee, Gookhwan;Yoo, Kwan-Hee
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.1
    • /
    • pp.165-170
    • /
    • 2017
  • Web 3D technology can be used to simulate the experiments of scientific, medical, engineering and multimedia visualization. On the web environment, 3D virtual reality can be accessed well without strictly on operating system, location and time. Virtual Reality (VR) is used to depict a three-dimensional, computer generated realistic images, sound and other sensations to replicated a real environment or an imaginary setting which can be explored and interacted with by a person. That person is immersed within virtual environment and is able to manipulate objects or perform a series of action. Virtual environment can be created with X3D which is the ISO standard for defining 3D interactive, web-based 3D content and integrating with multimedia. In this paper, we discuss about X3D VR stereo rendering scene and propose new X3D nodes for the HMD VR (head mounted display virtual reality). The proposed nodes are visualized by the web browser X3DOM of X3D.

An On-line Construction of Generalized RBF Networks for System Modeling (시스템 모델링을 위한 일반화된 RBF 신경회로망의 온라인 구성)

  • Kwon, Oh-Shin;Kim, Hyong-Suk;Choi, Jong-Soo
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.37 no.1
    • /
    • pp.32-42
    • /
    • 2000
  • This paper presents an on-line learning algorithm for sequential construction of generalized radial basis function networks (GRBFNs) to model nonlinear systems from empirical data. The GRBFN, an extended from of standard radial basis function (RBF) networks with constant weights, is an architecture capable of representing nonlinear systems by smoothly integrating local linear models. The proposed learning algorithm has a two-stage learning scheme that performs both structure learning and parameter learning. The structure learning stage constructs the GRBFN model using two construction criteria, based on both training error criterion and Mahalanobis distance criterion, to assign new hidden units and the linear local models for given empirical training data. In the parameter learning stage the network parameters are updated using the gradient descent rule. To evaluate the modeling performance of the proposed algorithm, simulations and their results applied to two well-known benchmarks are discussed.

  • PDF

Design of $GF(3^m)$ Current-mode CMOS Multiplier ($GF(3^m)$상의 전류모드 CMOS 승산기 설계)

  • Na, Gi-Soo;Byun, Gi-Young;Kim, Heung-Soo
    • Journal of IKEEE
    • /
    • v.8 no.1 s.14
    • /
    • pp.54-62
    • /
    • 2004
  • In this paper, we discuss on the design of a current mode CMOS multiplier circuit over $GF(3^m)$. Using the standard basis, we show the variation of vector representation of multiplicand by multiplying primitive element α, which completes the multiplicative process. For the $GF(3^m)$ multiplicative circuit design, we design GF(3) adder and multiplier circuit using current mode CMOS technology and get the simulation results. Using the basic gates - GF(3) adder and multiplier, we build the $GF(3^m)$ multiplier circuit and show the examples for the case m=3. We also propose the assembly of the operation blocks for a complete $GF(3^m)$ multiplier. Therefore, the proposed circuit is easily extensible to other p and m values over $GF(p^m)$ and has advantages for VLSI implementation. We verify the validity of the proposed circuit by functional simulations and the results are provided.

  • PDF

Design of an Efficient Binary Arithmetic Encoder for H.264/AVC (H.264/AVC를 위한 효율적인 이진 산술 부호화기 설계)

  • Moon, Jeon-Hak;Kim, Yoon-Sup;Lee, Seong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.66-72
    • /
    • 2009
  • This paper proposes an efficient binary arithmetic encoder for CABAC which is used one of the entropy coding methods for H.264/AVC. The present binary arithmetic encoding algorithm requires huge complexity of operation and data dependency of each step, which is difficult to be operated in fast. Therefore, renormalization exploits 2-stage pipeline architecture for efficient process of operation, which reduces huge complexity of operation and data dependency. Context model updater is implemented by using a simple expression instead of transIdxMPS table and merging transIdxLPS and rangeTabLPS tables, which decreases hardware size. Arithmetic calculator consists of regular mode, bypass mode and termination mode for appearance probability of binary value. It can operate in maximum speed. The proposed binary arithmetic encoder has 7282 gate counts in 0.18um standard cell library. And input symbol per cycle is about 1.

High Compression Image Coding with BTC Parameters (BTC 파라메타를 이용한 고압축 영상부호화)

  • Shim, Young-Serk;Lee, Hark-Jun
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.2
    • /
    • pp.140-146
    • /
    • 1989
  • An efficient quantization and encoding of BTC (Block Truncation Coding) parameters {($Y_{\alpha},\;Y_{\beta}),\;P_{{\beta}/{\beta}}$} are investigated, In our algorithm 4${\times}$4 blocks are classified into flat or edge block. While edge block is represented by two approximation level $Y_{\alpha},\;Y_{\beta}$ with label plane $P_{{\beta}/{\beta}}$, flat block is represented by single approximation level Y. The approximation levels Y, $Y_{\alpha}$ and $Y_{\beta}$ are encoded by predictive quatization specially designed, and the label plane $P_{{\beta}/{\beta}}$ is tried to be encoded using stored 32 reference plantes. The performance of the proposed scheme has appeared comparable to much more complex transform coding in terms of SNR, although it requires more study on the representation of small slope in background.

  • PDF

Fuzzy Inference Systems Based on FCM Clustering Algorithm for Nonlinear Process (비선형 공정을 위한 FCM 클러스터링 알고리즘 기반 퍼지 추론 시스템)

  • Park, Keon-Jun;Kang, Hyung-Kil;Kim, Yong-Kab
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.5 no.4
    • /
    • pp.224-231
    • /
    • 2012
  • In this paper, we introduce a fuzzy inference systems based on fuzzy c-means clustering algorithm for fuzzy modeling of nonlinear process. Typically, the generation of fuzzy rules for nonlinear processes have the problem that the number of fuzzy rules exponentially increases. To solve this problem, the fuzzy rules of fuzzy model are generated by partitioning the input space in the scatter form using FCM clustering algorithm. The premise parameters of the fuzzy rules are determined by membership matrix by means of FCM clustering algorithm. The consequence part of the rules is expressed in the form of polynomial functions and the coefficient parameters of each rule are determined by the standard least-squares method. And lastly, we evaluate the performance and the nonlinear characteristics using the data widely used in nonlinear process.

The Significance of Semiotics for Visual Web Interface (시각적 웹 인터페이스에 대한 기호학 의미)

  • Jang, Seung-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.795-802
    • /
    • 2018
  • This study describes the semantic theoretic interpretation through the extensive use of semantic metaphors for intensive web interface with information and the metaphoric value of metaphors for interface design. Common factors that influence web design are empirical establishment and verification for generating web symbols and these are have important elemental perspectives that are used to assess the usefulness and key elements of the site. In addition, the structure of the screen has begun to change dynamically from the application of web technological functions, and the media functions have become important to make web standards when implementing visual structuring from the perspective of semiotic. Instead of using a technical expression approach to examine semiotic, a semiotic approach is applied to create aesthetic codes through the human-computer interface in terms of semiotic in a variety of natural and universal fields. Based on this, it is used as means of communication to convey the intended meaning to users so as to highlight the importance of the usability issues and metaphors user interface.

Nonlinear Process Modeling Using Hard Partition-based Inference System (Hard 분산 분할 기반 추론 시스템을 이용한 비선형 공정 모델링)

  • Park, Keon-Jun;Kim, Yong-Kab
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.7 no.4
    • /
    • pp.151-158
    • /
    • 2014
  • In this paper, we introduce an inference system using hard scatter partition method and model the nonlinear process. To do this, we use the hard scatter partition method that partition the input space in the scatter form with the value of the membership degree of 0 or 1. The proposed method is implemented by C-Means clustering algorithm. and is used for the initial center values by means of binary split. by applying the LBG algorithm to compensate for shortcomings in the sensitive initial center value. Hard-scatter-partitioned input space forms the rules in the rule-based system modeling. The premise parameters of the rules are determined by membership matrix by means of C-Means clustering algorithm. The consequence part of the rules is expressed in the form of polynomial functions and the coefficient parameters of each rule are determined by the standard least-squares method. The data widely used in nonlinear process is used to model the nonlinear process and evaluate the characteristics of nonlinear process.

Role based XML Encryption for Enforcing Access Control Policy (접근제어 정책구현을 위한 역할기반 XML 암호화)

  • Choi Dong-Hee;Park Seog
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.3-15
    • /
    • 2005
  • As a large quantity of information is presented in XML format on the web, there are increasing demands for XML security. Research area or n security is about Encryption Digital signature, Key management and Access control. until now research on U security has been focused on the security of data network using digital signature and encryption technology. As XML data become extensive and complex XML security comes to involve not only network security but also managerial security. Managerial security is guaranteed through access control. But XML Encryption supports simple network security. So it can't support multiple users and multiple access control policies. In this paper, we propose an integration method of encryption and access control policy for securing XML documents. This methodology can supper multiple authorizations of multiple users with integrating access control. And this can reduce the cost of evaluation process of the existing complicated access authorization with pre-processing.

Analyses on Achievable Data Rate for Single-User Decoding(SUD) Receiver: with Application to CIS NOMA Strong Channel User (SUD 수신기의 획득가능한 전송률 분석: 상관 정보원 비직교 다중 접속의 강 채널 사용자에 대한 응용)

  • Chung, Kyu-Hyuk
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.6
    • /
    • pp.1003-1010
    • /
    • 2020
  • This paper investigates the achievable data rate for the single-user decoding(SUD) receiver, which does not perform successive interference cancellation(SIC), in contrast to the conventional SIC non-orthogonal multiple access(NOMA) scheme. First, the closed-form expression for the achievable data rate of SUD NOMA with correlated information sources(CIS) is derived, for the stronger channel user. Then it is shown that for the stronger channel user, the achievable data rate of SUD NOMA with independent information sources(IIS) is generally inferior to that of conventional SIC NOMA with IIS. However, for especially highly CIS, we show that the achievable data rate of SUD NOMA is greatly superior to that of conventional SIC NOMA. In addition, to verify the impact of CIS on the achievable data rate of SUD, the extensive comparisons of the achievable data rates for the SUD receiver and the SIC receiver are compared for various correlation coefficients.