• Title/Summary/Keyword: 점 패턴

Search Result 1,600, Processing Time 0.039 seconds

Transmission Loss Allocation Considering Generation Increasing Patterns (발전량 증가 패턴을 고려한 송전 손실 배분 방법)

  • Moon, Hyung-Jun;Min, Kyung-Il;Moon, Young-Hyun
    • Proceedings of the KIEE Conference
    • /
    • 2011.07a
    • /
    • pp.162-163
    • /
    • 2011
  • 송전손실 배분에 대한 방법 중에서 발전 증가 패턴에 따른 방법을 제시하였다. 손실 감도 계산을 통하여 모선별 계통 손실을 구한다. 기저점에서 동작점으로 증가해 갈 때의 송전 손실 배분에 대해서 공정하게 할 수 있는 알고리즘이다. 모선별 계통 손실은 적분 경로에 따라 달라지게 되고, 이에 따라 어떻게 달라지는 지 시뮬레이션을 통하여 알아보았다.

  • PDF

An Improved Hough Transform Using Valid Features (유효 특징점을 이용한 개선된 허프변환)

  • Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.9
    • /
    • pp.2203-2208
    • /
    • 2014
  • The Hough transform (HT), that is a typical algorithm for detecting lines in images, needs considerable computational costs and easily detects pseudo-lines on the real world images, because of the large amount of features generated by their complex background or noise. This paper proposes an improved HT that add a preprocessing to estimate the validity of features to the conventional HT. The feature estimation can remove a lot of inessential features for the line detection using a pattern of $3{\times}3$ block features. Experiments using various images show that the proposed algorithm saves computational costs by removing 14%~58% of features depending on images and besides it is superior to the conventional HT in valid line detection.

Improved Prediction Structure and Motion Estimation Method for Multi-view Video Coding (다시점 비디오 부호화를 위한 개선된 예측 구조와 움직임 추정 기법)

  • Yoon, Hyo Sun;Kim, Mi Young
    • Journal of KIISE
    • /
    • v.41 no.11
    • /
    • pp.900-910
    • /
    • 2014
  • Multi-view video is obtained by capturing one three-dimensional scene with many cameras at different positions. The computational complexity of multi view video coding increases in proportion to the number of cameras. To reduce computational complexity and maintain the image quality, improved prediction structure and motion estimation method is proposed in this paper. The proposed prediction structure exploits an average distance between the current picture and its reference pictures. The proposed prediction structure divides every GOP into several groups to decide the maximum index of hierarchical B layer and the number of pictures of each B layer. And the proposed motion estimation method uses a hierarchical search strategy. This strategy method consists of modified diamond search pattern, progressive diamond search pattern and modified raster search pattern. Experiment results show that the complexity reduction of the proposed prediction structure and motion estimation method over JMVC (Joint Multiview Video Coding) reference model using hierarchical B pictures of Fraunhofer-HHI and TZ search method can be up to 40~70% while maintaining similar video quality and bit rates.

A Convex Hull Algorithm for 2D Patterns (2차원 패턴의 볼록 헐 알고리즘)

  • 홍기천;오일석
    • Journal of Korea Multimedia Society
    • /
    • v.4 no.4
    • /
    • pp.363-369
    • /
    • 2001
  • This paper proposes a convex hull algorithm for 2D patterns. The proposed algorithm is divided ito 2steps; candidate convex point extraction and final convex point extraction. First step removes as many points as possible that cannot be convex points using simple operation. Second step computes final convex hull of 2D patterns. This method accelerates execution time, since it consists of simple operations. Experimental results show that the proposed method is faster than other 2 methods in speed.

  • PDF

Buffer Overflow Vulnerability Auto Detection System (버퍼 오버플로우 취약점 자동 탐지 시스템)

  • Kim, Jae-Hwan;Kim, Han-Gyeol;Kim, Hyun-Jung;Yoo, Sang-Hyun;Won, Il-Yong
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2017.11a
    • /
    • pp.345-348
    • /
    • 2017
  • 버퍼 오버플로우(Buffer Overflow) 취약점은 시스템 보안에서 아주 중요하다. 본 논문은 바이너리 파일에서 버퍼 오버플로우 취약점을 자동 감지하는 시스템을 제안하였다. 다양한 버퍼 오버플로우 샘플소스를 이용하여 패턴을 만들고, 이렇게 만들어진 패턴을 이용하여 바이너리 파일에서 버퍼 오버플로우 취약점이 포함되어 있는지를 판단한다. 제안한 시스템의 유용성을 위해 실험을 하였고, 어느 정도 의미 있는 결과를 얻을 수 있었다.

Buffer Overflow Detection Using Machine Pattern of BBL (BBL단위 기계어 패턴을 이용한 버퍼 오버플로우 탐지법)

  • Han, Kwang-Hee;Joeng, Young-Gil;Jin, Young-Taek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2018.10a
    • /
    • pp.178-180
    • /
    • 2018
  • 버퍼 오버플로우 취약점은 자체적으로 외부코드를 실행시키거나 다른 취약점과 연계해 공격될 수 있는 취약점으로 이를 탐지하기 위해 많은 연구들이 진행되었다. 기존의 버퍼 오버플로우 취약점 탐지기법에 대한 연구는 취약함수를 검색하거나 동적오염분석으로 얻은 비 신뢰 데이터의 흐름을 감시하여 취약함수로 전파되는 걸 탐지하는 방식 이었다. 하지만 이러한 기법은 다양한 한계를 가진다. 본 논문은 이러한 문제들을 해결하기 위해 버퍼 오버플로우가 발생하는 기계어 패턴을 BBL단위로 감시하고, 비 신뢰 데이터의 흐름을 추적하여 기존의 탐지 사각지대를 없애는 방법을 제안한다.

A Study on the Optimum Synthesis of Beam Patterns and Excitation Current Weights for Monopulse Tracking Linear Array Antennas (모노펄스 추적용 선형 배열 안테나 빔 패턴 및 여기 전류 가중치들의 최적 합성에 관한 연구)

  • Park, Eui-Joon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.19 no.5
    • /
    • pp.533-540
    • /
    • 2008
  • In the sum and difference pattern synthesis problem of the equi-spaced monopulse tracking linear array antennas, an efficient numerical approach to deriving the relative excitation current weights of antenna elements is presented for the desired patterns. This method is based on the optimum perturbation of null points which are inherent to the Schelkunoffs polynomial representing the pattern array factor. Accordingly, opposite to the conventional method in which the excitation weights are directly optimized, this method is advantageous in that the patterns with the desired individual sidelobe levels(SLLs) and the corresponding excitation weights are easily synthesized by the control of null points. Furthermore, it is showed that two types of difference patterns can be synthesized as imposing the different initial values of null points in the optimization process. The proposed method is numerically validated by synthesizing the patterns with the arbitrary SLLs and substituting the extracted results into the array factor equation.

Two-Stage Neural Networks for Sign Language Pattern Recognition (수화 패턴 인식을 위한 2단계 신경망 모델)

  • Kim, Ho-Joon
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.22 no.3
    • /
    • pp.319-327
    • /
    • 2012
  • In this paper, we present a sign language recognition model which does not use any wearable devices for object tracking. The system design issues and implementation issues such as data representation, feature extraction and pattern classification methods are discussed. The proposed data representation method for sign language patterns is robust for spatio-temporal variances of feature points. We present a feature extraction technique which can improve the computation speed by reducing the amount of feature data. A neural network model which is capable of incremental learning is described and the behaviors and learning algorithm of the model are introduced. We have defined a measure which reflects the relevance between the feature values and the pattern classes. The measure makes it possible to select more effective features without any degradation of performance. Through the experiments using six types of sign language patterns, the proposed model is evaluated empirically.

Research on the Analysis of Maritime Traffic Pattern using Centroid Method (중심점 기법을 이용한 통항패턴 분석에 관한 연구)

  • Kim, Hye-Jin;Oh, Jae-Yong
    • Journal of Navigation and Port Research
    • /
    • v.42 no.6
    • /
    • pp.453-458
    • /
    • 2018
  • The analysis of maritime traffic refers to the processes that are used to analyze the environmental characteristics of the target area and, based on this analysis, predict the traffic pattern of the vessels. In recent years, maritime traffic analysis has become significant with increase maritime traffic volume and expansion of VTS coverage area. In addition, maritime traffic analysis is also applicable in the safety assessment of port facilities and the VTS (Vessel Traffic Service). In this paper, we propose a method to analyze the vessels' traffic pattern by using the heat map and the centroid method. This method is efficient for the analysis of the vessel trajectory data where spatial characteristics change with time. In the experiments, the traffic density and centroid by time have were analyzed. Trajectory data collected at Mokpo harbor was adopted. Finally, we reviewed the experimental results to verify the feasibility of the proposed method as a maritime traffic analysis method.

The study on the extraction of the minutiae and singular [oint for fingerprint matching (지문인식 정합을 위한 특징점과 특이점 추출 연구)

  • 나호준;김창수
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2004.05a
    • /
    • pp.275-278
    • /
    • 2004
  • 지문 인식 방식은 기존의 영상 처리와는 달리 여러 가지 문제점을 포함하고 있다. 지문에는 기준 좌표축이 존재하지 않으므로 회전되어 채취된 지문에 대한 처리가 어려우며, 신체의 일부로서 유연성을 가지고 있어 채취될 때마다 모양이 달라 보이고, 지문이 손상될 수 있어 저 품질의 지문이 빈번히 발생할 수 있다 본 논문에서는 방향성의 흐름 패턴을 이용한 특이점 추출에 초점이 맞춰져 있으며 추출된 특이점 정보는 현재 구현되어진 특징점 추출 정보와 연계해 정합을 위한 기준점으로 활용한다. 기준점을 축으로 생성되어진 직교좌표는 지문 영상의 회전변위에 대한 영향을 최소화 하여 지문의 정합도를 높여준다.

  • PDF