• Title/Summary/Keyword: 패틴

Search Result 4, Processing Time 0.017 seconds

Automated Vinyl Green House Identification Method Using Spatial Pattern in High Spatial Resolution Imagery (공간패턴을 이용한 자동 비닐하우스 추출방법)

  • Lee, Jong-Yeol;Kim, Byoung-Sun
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.2
    • /
    • pp.117-124
    • /
    • 2008
  • This paper introduces a novel approach for automated mapping of a map feature that is vinyl green house in high spatial resolution imagery Some map features have their unique spatial patterns. These patterns are normally detected in high spatial resolution remotely sensed data by human recognition system. When spatial patterns can be applied to map feature identification, it will improve image classification accuracy and will be contributed a lot to feature identification. In this study, an automated feature identification approach using spatial aucorrelation is developed, specifically for the vinyl green house that has distinctive spatial pattern in its array. The algorithm aimed to develop the method without any human intervention such as digitizing. The method can investigate the characteristics of repeated spatial pattern of vinyl green house. The repeated spatial pattern comes from the orderly array of vinyl green house. For this, object-based approaches are essential because the pattern is recognized when the shapes that are consists of the groups of pixels are involved. The experimental result shows very effective vinyl house extraction. The targeted three vinyl green houses were exactly identified in the IKONOS image for a part of Jeju area.

A study on design of glasses pattern using Optical Art (옵아트를 이용안 안경 패턴 디자인의 연구)

  • Kang, Min-Soo;Kim, In-Soo;Kang, Sung-Soo
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.10 no.4
    • /
    • pp.391-403
    • /
    • 2005
  • Vision is the most important sense of the five senses in our body. This represents that an eye is for the mysterious organ playing the essential role in our body. Alain Mikli known as a famous spectacle designer in France said that glasses exists for seeing and for being seen. This saying is one of the philosophically well-organized definition of the most fundamental function of eye-glasses described in and out of itself. Today, in the world, there are a number of works of glasses design and lots of glasses designers are designing hard in order to convey the goods with the best value and philosophy to customers. They work for the goal that glasses is used as seeing and try to give customers satisfaction and enjoyment of it. And they think that glasses should play the role of the interface. At this point, we need to catch hold of the interface of glasses. That means that glasses has to have the communication between eyes and objects and be the mediation of the connection between the image of oneself and that of one by others. For the character of the interface of glasses, glasses designers should plan and investigate this character at the being of design. This study of optical art has been researched for the necessary and sufficient condition between consumers and products.

  • PDF

An Implementation of Automatic Genre Classification System for Korean Traditional Music (한국 전통음악 (국악)에 대한 자동 장르 분류 시스템 구현)

  • Lee Kang-Kyu;Yoon Won-Jung;Park Kyu-Sik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.1
    • /
    • pp.29-37
    • /
    • 2005
  • This paper proposes an automatic genre classification system for Korean traditional music. The Proposed system accepts and classifies queried input music as one of the six musical genres such as Royal Shrine Music, Classcal Chamber Music, Folk Song, Folk Music, Buddhist Music, Shamanist Music based on music contents. In general, content-based music genre classification consists of two stages - music feature vector extraction and Pattern classification. For feature extraction. the system extracts 58 dimensional feature vectors including spectral centroid, spectral rolloff and spectral flux based on STFT and also the coefficient domain features such as LPC, MFCC, and then these features are further optimized using SFS method. For Pattern or genre classification, k-NN, Gaussian, GMM and SVM algorithms are considered. In addition, the proposed system adopts MFC method to settle down the uncertainty problem of the system performance due to the different query Patterns (or portions). From the experimental results. we verify the successful genre classification performance over $97{\%}$ for both the k-NN and SVM classifier, however SVM classifier provides almost three times faster classification performance than the k-NN.

A Source-Level Discovery Methodology for Vulnerabilities of Linux Kernel Variables (리눅스 커널 변수 취약성에 대한 소스레벨 발견 방법론)

  • Ko Kwangsun;Kang Yong-hyeog;Eom Young Ik;Kim Jaekwang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.6
    • /
    • pp.13-25
    • /
    • 2005
  • In these days, there are various uses of Linux such as small embedded systems, routers, and huge servers, because Linux gives several advantages to system developers by allowing to use the open source code of the Linux kernel. On the other hand, the open source nature of the Linux kernel gives a bad influence on system security. If someone wants to exploit Linux-based systems, the attacker can easily do it by finding vulnerabilities of their Linux kernel sources. There are many kinds of existing methods for lading source-level vulnerabilities of softwares, but they are not suitable for finding source-level vulnerabilities of the Linux kernel which has an enormous amount of source code. In this paper, we propose the Onion mechanism as a methodology of finding source-level vulnerabilities of Linux kernel variables. The Onion mechanism is made up of two steps. The Int step is to select variables that may be vulnerable by using pattern matching mechanism and the second step is to inspect vulnerability of each selected variable by constructing and analyzing the system call trees. We also evaluate our proposed methodology by applying it to two well-known source-level vulnerabilities.