• Title/Summary/Keyword: 필터 링

Search Result 3,386, Processing Time 0.026 seconds

Mitigation of Impulse Noise Using Slew Rate Limiter in Oversampled Signal for Power Line Communication (전력선 통신에서 오버 샘플링과 Slew Rate 제한을 이용한 임펄스 잡음 제거 기법)

  • Oh, Woojin;Natarajan, Bala
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.4
    • /
    • pp.431-437
    • /
    • 2019
  • PLC(Power Line Communication) is being used in various ways in smart grid system because of the advantages of low cost and high data throughput. However, power line channel has many problems due to impulse noise and various studies have been conducted to solve the problem. Recently, ACDL(Adaptive Cannonical Differential Limiter) which is based on an adaptive clipping with analog nonlinear filter, has been proposed and performs better than the others. In this paper, we show that ACDL is similar to the detection of slew rate with oversampled digital signal by simplification and analysis. Through the simulation under the PRIME standard it is shown that the proposed performs equal to or better than that of ACDL, but significantly reduce the complexity to implement. The BER performance is equal but the complexity is reduced to less than 10%.

Digitization Impact on the Spaceborne Synthetic Aperture Radar Digital Receiver Analysis (위성탑재 영상레이다 디지털 수신기에서의 양자화 영향성 분석)

  • Lim, Sungjae;Lee, Hyonik;Sung, Jinbong;Kim, Seyoung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.11
    • /
    • pp.933-940
    • /
    • 2021
  • The space-borne SAR(Synthetic Aperture Radar) system radiates the microwave signal and receives the backscattered signal. The received signal is converted to digital at the Digital Receiver, which is implemented at the end of the SAR sensor receiving chain. The converted signal is formated after signal processing such as filtering and data compression. Two quantization are conducted in the Digital Receiver. One quantization is an analog to digital conversion at ADC(Analog-Digital Converter). Another quantization is the BAQ(Block Adaptive Quantization) for data compression. The quantization process is a conversion from a continuous or higher bit precision to a discrete or lower bit precision. As a result, a quantization noise is inevitably occurred. In this paper, the impact of two quantization processes are analyzed in a view of SNR degradation.

Adaptive Convolution Filter-Based 3D Plane Reconstruction for Low-Power LiDAR Sensor Systems (저전력 LiDAR 시스템을 위한 Adaptive Convolution Filter에 기반한 3D 공간 구성)

  • Chong, Taewon;Park, Daejin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.10
    • /
    • pp.1416-1426
    • /
    • 2021
  • In the case of a scanning type multi-channel LiDAR sensor, the distance error called a walk error may occur due to a difference in received signal power. This work error causes different distance values to be output for the same object when scanning the surrounding environment based on multiple LiDAR sensors. For minimizing walk error in overlapping regions when scanning all directions using multiple sensors, to calibrate distance for each channels using convolution on external system. Four sensors were placed in the center of 6×6 m environment and scanned around. As a result of applying the proposed filtering method, the distance error could be improved by about 68% from average of 0.5125 m to 0.16 m, and the standard deviation could be improved by about 48% from average of 0.0591 to 0.030675.

An Method for Inferring Fine Dust Concentration Using CCTV (CCTV를 이용한 미세먼지 농도 유추 방법)

  • Hong, Sunwon;Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1234-1239
    • /
    • 2019
  • This paper proposes a method for measuring fine dust concentration through digital processing of images captured by only existing CCTVs without additional equipment. This image processing algorithm consists of noise reduction, edge sharpening, ROI setting, edge strength calculation, and correction through HSV conversion. This algorithm is implemented using the C ++ OpenCV library. The algorithm was applied to CCTV images captured over a month. The edge strength values calculated for the ROI region are found to be closely related to the fine dust concentration data. To infer the correlation between the two types fo data, a trend line in the form of a power equation is established using MATLAB. The number of data points deviating from the trend line accounts for around 12.5%. Therefore, the overall accuracy is about 87.5%.

Search Space Partitioning-based Receiver for Generalized Spatial Modulation under Channel Information Errors (일반화 공간변조 시스템에서 채널 정보 오차를 고려한 탐색 영역 분할 수신기)

  • Yoon, Hakjoon;Im, Changyong;Lee, Kyungchun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.12
    • /
    • pp.1631-1637
    • /
    • 2019
  • In this paper, we propose a low-complexity robust maximum likelihood (ML) receiver for generalized spatial modulation. The proposed receiver performs the transmit antenna partition to lower the computational loads. After we divide the transmit antenna combinations into two parts, one of which is "the likely TAC part," and the other of which is "the unlikely TAC part", based on the minimum mean square error (MMSE) filtering output. We first perform the maximum likelihood detection only in the likely TAC part. Then we evaluate the reliability of the solution found in the first search, and based its reliability we decide whether we continue the search in the unlikely TAC part. This partitioned search strategy maintains the performance of the conventional robust maximum likelihood receiver and simultaneously lowers computational loads. Through simulation, we found that our newly-proposed receiver achieves considerable gains over the conventional robust ML detector in terms of the computational loads while providing almost the same performance.

Frequency and Social Network Analysis of the Bible Data using Big Data Analytics Tools R (빅데이터 분석도구 R을 이용한 성경 데이터의 빈도와 소셜 네트워크 분석)

  • Ban, ChaeHoon;Ha, JongSoo;Kim, Dong Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.166-171
    • /
    • 2020
  • Big data processing technology that can store and analyze data and obtain new knowledge has been adjusted for importance in many fields of the society. Big data is emerging as an important problem in the field of information and communication technology, but the mind of continuous technology is rising. the R, a tool that can analyze big data, is a language and environment that enables information analysis of statistical bases. In this paper, we use this to analyze the Bible data. We analyze the four Gospels of the New Testament in the Bible. We collect the Bible data and perform filtering for analysis. The R is used to investigate the frequency of what text is distributed and analyze the Bible through social network analysis, in which words from a sentence are paired and analyzed between words for accurate data analysis.

A Design of Similar Video Recommendation System using Extracted Words in Big Data Cluster (빅데이터 클러스터에서의 추출된 형태소를 이용한 유사 동영상 추천 시스템 설계)

  • Lee, Hyun-Sup;Kim, Jindeog
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.2
    • /
    • pp.172-178
    • /
    • 2020
  • In order to recommend contents, the company generally uses collaborative filtering that takes into account both user preferences and video (item) similarities. Such services are primarily intended to facilitate user convenience by leveraging personal preferences such as user search keywords and viewing time. It will also be ranked around the keywords specified in the video. However, there is a limit to analyzing video similarities using limited keywords. In such cases, the problem becomes serious if the specified keyword does not properly reflect the item. In this paper, I would like to propose a system that identifies the characteristics of a video as it is by the system without human intervention, and analyzes and recommends similarities between videos. The proposed system analyzes similarities by taking into account all words (keywords) that have different meanings from training videos, and in such cases, the methods handled by big data clusters are applied because of the large scale of data and operations.

Apple Detection Algorithm based on an Improved SSD (개선 된 SSD 기반 사과 감지 알고리즘)

  • Ding, Xilong;Li, Qiutan;Wang, Xufei;Chen, Le;Son, Jinku;Song, Jeong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.21 no.3
    • /
    • pp.81-89
    • /
    • 2021
  • Under natural conditions, Apple detection has the problems of occlusion and small object detection difficulties. This paper proposes an improved model based on SSD. The SSD backbone network VGG16 is replaced with the ResNet50 network model, and the receptive field structure RFB structure is introduced. The RFB model amplifies the feature information of small objects and improves the detection accuracy of small objects. Combined with the attention mechanism (SE) to filter out the information that needs to be retained, the semantic information of the detection objectis enhanced. An improved SSD algorithm is trained on the VOC2007 data set. Compared with SSD, the improved algorithm has increased the accuracy of occlusion and small object detection by 3.4% and 3.9%. The algorithm has improved the false detection rate and missed detection rate. The improved algorithm proposed in this paper has higher efficiency.

A method of improving the quality of 3D images acquired from RGB-depth camera (깊이 영상 카메라로부터 획득된 3D 영상의 품질 향상 방법)

  • Park, Byung-Seo;Kim, Dong-Wook;Seo, Young-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.5
    • /
    • pp.637-644
    • /
    • 2021
  • In general, in the fields of computer vision, robotics, and augmented reality, the importance of 3D space and 3D object detection and recognition technology has emerged. In particular, since it is possible to acquire RGB images and depth images in real time through an image sensor using Microsoft Kinect method, many changes have been made to object detection, tracking and recognition studies. In this paper, we propose a method to improve the quality of 3D reconstructed images by processing images acquired through a depth-based (RGB-Depth) camera on a multi-view camera system. In this paper, a method of removing noise outside an object by applying a mask acquired from a color image and a method of applying a combined filtering operation to obtain the difference in depth information between pixels inside the object is proposed. Through each experiment result, it was confirmed that the proposed method can effectively remove noise and improve the quality of 3D reconstructed image.

Implementation of an Integrated Access Control Rule Script Language and Graphical User Interface for Hybrid Firewalls (혼합형 침입차단시스템을 위한 통합 접근제어 규칙기술 언어 및 그래픽 사용자 인터페이스 구현)

  • 박찬정
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.9 no.1
    • /
    • pp.57-70
    • /
    • 1999
  • Since a hybrid firewall filters packets at a network layer along with providing gateway functionalities at an application layer, it has a better performance than an If filtering firewall. In addition, it provides both the various kinds of access control mechanisms and transparent services to users. However, the security policies of a network layer are different from those of an application layer. Thus, the user interfaces for managing a hybrid firewalls in a consistent manner are needed. In this paper, we implement a graphical user interface to provide access control mechanisms and management facilities for a hybrid firewall such as log analysis, a real-time monitor for network traffics, and the statisics on traffics. And we also propose a new rule script language for specifying access control rules. By using the script language, users can generate the various forma of access control rules which are adapted by the existing firewalls.