• Title/Summary/Keyword: 코드 검색

Search Result 299, Processing Time 0.025 seconds

Object boundary tracking using modified boundary tracking algorithm (개선된 체인코드틀 이용한 물체 윤곽선 추척)

  • Kim, Yuk;Kwon, Woo-Hyen;Koo, Bon-Ho;Youn, Kyung-Sup
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.411-412
    • /
    • 2007
  • 본 논문에서는 경계선 추적에 널리 사용되고 있는 체인코드를 개선하여 윤곽선 추적 시 시간과 메모리 효율을 개선하였다. 일반적으로 정형화된 물체는 윤곽선의 동선이 대부분 이전 검색동선과 같은 방향으로 움직인다. 기존의 8방향 체인코드에는 같은 동선에 있는 경계선이라도 픽셀하나당 한번 씩 검사를 한다. 개선된 체인코드는 확인된 경계영역에서 상하좌우, 대각선 방향으로 한 픽셀씩 더 확인하여 기존 체인코드보다 시간과 메모리 효율을 개선할 수 있다.

  • PDF

Recognition of the Passport by Using Self-Generating Supervised Learning Algorithm (자가 생성 지도 학습 알고리즘을 이용한 여권 인식)

  • Kim, Kyoung-Hwa;Jung, Sung-Ye;Nam, Mi-Young;Kim, Kwang-Baek
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.10a
    • /
    • pp.567-570
    • /
    • 2001
  • 현재의 출입국 관리자는 여권을 제시하면 여권을 육안으로 검색하고 수작업으로 정보를 입력하여 여권 데이터베이스와 대비하는 것이다. 본 논문에서는 이러한 문제점을 해결하기 위하여 자동으로 여권을 인식할 수 있는 방법을 제안한다. 여권에는 사용자에 대한 많은 정보들이 있는데 여권 영상에서 코드 정보 영역을 히스토그램 방식과 소벨 연산자를 이용하여 코드 영역 및 개별 코드 문자를 추출하고 새로운 자가 생성 지도학습 알고리즘(Self-Generating Supervised Learning Algorithm)을 제안하여 여권 인식에 적응하였다. 10개의 여권 영상을 실험한 결과 모든 코드의 문자 영역이 추출되었고 인식되었다.

  • PDF

Automatic Generation of Code Optimizer for DFA Pattern Matching (DFA 패턴 매칭을 위한 코드 최적화기의 자동적 생성)

  • Yun, Sung-Lim;Oh, Se-Man
    • The KIPS Transactions:PartA
    • /
    • v.14A no.1 s.105
    • /
    • pp.31-38
    • /
    • 2007
  • Code Optimization is converting to a code that is equivalent to given program but more efficient, and this process is processed in Code Optimizer. This paper designed and processed Code Optimizer Generator that automatically generates Code Optimizer. In other words Code Optimizer is automatically generated for DFA Pattern Matching which finds the optimal code for the incoming pattern description. DFA Pattern Matching removes redundancy comparisons that occur when patterns are sought for through normalization process and improves simplification and structure of pattern shapes for low cost. Automatic generation of Code Optimization for DFA Pattern Matching eliminates extra effort to generate Code Optimizer every time the code undergoes various transformations, and enables formalism of Code Optimization. Also, the advantage of making DFA for optimization is that it is faster and saves cost of Code Optimizer Generator.

Reuse of Analysis/Design patterns Based on Analogy (Analogy를 기반으로 한 분석/설계 패턴의 재사용)

  • Kim, Jeong-A;Kim, Haeng-Gon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.6 no.4
    • /
    • pp.916-931
    • /
    • 1999
  • Code reuse in software reuse has several limitations such as difficulties of understanding and retrieval of the reuse code written by other developers. To overcome these problems, it should be possible to reuse the analysis/design information than source code itself. In this paper, we present analogical matching techniques for the reuse of object models and patterns. We have suggested the design patterns as reusable components and the representation techniques to store them. The contents of the paper is as follows.1. analogical matching functions to retrieve analogous components from reusable libraries. 2. the representation of reusable components to be stored in the library in order to support the analogical matching. 3. the design library with more semantic informations about domains. 4. the analogical matching agent with a user-friendly interface that can retrieve the analogous components from the library based on analogical matching techniques.

  • PDF

Cutting Plane Algorithm for the Selection of Non-Isolated Pixel Modulation Code (고립 픽셀 제거 변조부호 선택을 위한 절단평면 알고리즘)

  • Park, Taehyung;Lee, Jaejin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38A no.6
    • /
    • pp.465-470
    • /
    • 2013
  • In this paper, we introduce a modulation code design problem where best selection of two-dimensional codewords are determined to reduce two-dimensional (2D) Intersymbol Interference (ISI) and Interpage Interference (IPI), while when these codewords are randomly arranged on the storage, isolated pixel cannot be formed. Codeword selection problem and isolated pixel detection problem are formulated as integer program models and we develop a cutting plane algorithm where a valid cut is generated to remove current feasible solution to avoid isolated pixel by solving the isolated pixel detection subproblem. Using the proposed method, $4{\times}2$ 6/8 codewords with non-isolated pixel are found.

Threats and countermeasures of malware (악성코드의 위협과 대응책)

  • Lim, Dong Yul
    • Journal of Convergence Society for SMB
    • /
    • v.5 no.1
    • /
    • pp.13-18
    • /
    • 2015
  • The malware, as hackers generic name of executable code that is created for malicious purposes, depending on the presence or absence of a self-replicating ability infected subjects, and are classified as viruses, worms, such as the Trojan horse. Mainly Web page search and P2P use, such as when you use a shareware, has become penetration is more likely to occur in such a situation. If you receive a malware attack, whether the e-mail is sent it is automatically, or will suffer damage such as reduced system performance, personal information leaks. While introducing the current malware, let us examine the measures and describes the contents related to the malicious code.

  • PDF

A Method to Find the Core Node Engaged in Malware Propagation in the Malware Distribution Network Hidden in the Web (웹에 숨겨진 악성코드 배포 네트워크에서 악성코드 전파 핵심노드를 찾는 방안)

  • Kim Sung Jin
    • Convergence Security Journal
    • /
    • v.23 no.2
    • /
    • pp.3-10
    • /
    • 2023
  • In the malware distribution network existing on the web, there is a central node that plays a key role in distributing malware. If you find and block this node, you can effectively block the propagation of malware. In this study, a centrality search method applied with risk analysis in a complex network is proposed, and a method for finding a core node in a malware distribution network is introduced through this approach. In addition, there is a big difference between a benign network and a malicious network in terms of in-degree and out-degree, and also in terms of network layout. Through these characteristics, we can discriminate between malicious and benign networks.

On a Reduction of Codebook Searching Time by using RPE Searching Tchnique in the CELP Vocoder (RPE 검색을 이용한 CELP 보코더의 불규칙 코드북 검색)

  • 김대식
    • Proceedings of the Acoustical Society of Korea Conference
    • /
    • 1995.06a
    • /
    • pp.141-145
    • /
    • 1995
  • Code excited linear prediction speech coders exhibit good performance at data rates as low as 4800 bps. The major drawback to CELP type coders is their large computational requirements. In this paper, we propose a new codebook search method that preserves the quality of the CELP vocoder with reduced complexity. The basic idea is to restrict the searching range of the random codebook by using a searching technique of the regular pulse excitation. Applying the proposed method to the CELP vocoder, we can get approximately 48% complexity reduction in the codebook search.

  • PDF

A Study on the Development of Ontology based on the Jewelry Brand Information (귀금속.보석 상품정보 온톨로지 구축에 관한 연구)

  • Lee, Ki-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.13 no.7
    • /
    • pp.247-256
    • /
    • 2008
  • This research is to develop product retrieval system through simplified communication by applying intelligent agent technology based on automatically created domain ontology to present solution on problems with e-commerce system which searches in the web documents with a simple keyword. Ontology development extracts representative term based on classification information of international product classification code(UNSPSC) and jewelry websites that is applied to analogy relationship thesaurus to establish standardized ontology. The intelligent agent technology is applied to retrieval stage to support efficiency of information collection for users by designing and developing e-commerce system supported with semantic web. Moreover, it designs user profile to personalized search environment and provide personalized retrieval agent and retrieval environment with inference function to make available with fast information collection and accurate information search.

  • PDF

Face Data Clustering Method for Face Recognition Using Self Organizing Feature Map (자기 조직화 지도 모형을 이용한 인종별 얼굴 영상 군집화 기법)

  • 권혜련;고병철;변혜란;이일병
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2003.10b
    • /
    • pp.577-579
    • /
    • 2003
  • 본 논문에서는 생체인식 분야 중 얼굴인식의 검색 정확성 향상 및 검색 시간을 단축하기 위한 단계로 인종별 얼굴영상 데이터베이스에 대한 군집화 기법을 연구하였다. 우선, 일반적으로 얼굴 및 이미지 검색에 사용되는 다양한 특징을 추출하고, 추출한 다차원의 특징 데이터들로부터 다 인종 얼굴 데이터를 유사한 인종별로 정확하게 군집화 하기 위해 최적의 특징벡터를 자동으로 선택 할 수 있는 방법을 제안하였다. 군집결과 분석을 위해 자기 조직화 지도 모형을 이용하였는데, 이는 2차원 분석 및 가시화에 유용하며, 학습 후 코드북벡터를 사용하여 유사한 의미간의 거리부터 검색할 수 있는 특징을 가지고 있다. 특징추출에 관한 실험결과 인종별 구분을 위한 특징벡터로는 웨이블릿 주파수 성분(lowpass 성분)과 CbCr 특징벡터가 인종별 군집화에 가장 유용한 특징으로 선택되었으며. 추출된 특징을 바탕으로 semantic map을 구성하여 제안방법의 효율성을 제시하였다.

  • PDF