• Title/Summary/Keyword: Binary Systems

Search Result 1,169, Processing Time 0.024 seconds

Optimal sensor placement under uncertainties using a nondirective movement glowworm swarm optimization algorithm

  • Zhou, Guang-Dong;Yi, Ting-Hua;Zhang, Huan;Li, Hong-Nan
    • Smart Structures and Systems
    • /
    • v.16 no.2
    • /
    • pp.243-262
    • /
    • 2015
  • Optimal sensor placement (OSP) is a critical issue in construction and implementation of a sophisticated structural health monitoring (SHM) system. The uncertainties in the identified structural parameters based on the measured data may dramatically reduce the reliability of the condition evaluation results. In this paper, the information entropy, which provides an uncertainty metric for the identified structural parameters, is adopted as the performance measure for a sensor configuration, and the OSP problem is formulated as the multi-objective optimization problem of extracting the Pareto optimal sensor configurations that simultaneously minimize the appropriately defined information entropy indices. The nondirective movement glowworm swarm optimization (NMGSO) algorithm (based on the basic glowworm swarm optimization (GSO) algorithm) is proposed for identifying the effective Pareto optimal sensor configurations. The one-dimensional binary coding system is introduced to code the glowworms instead of the real vector coding method. The Hamming distance is employed to describe the divergence of different glowworms. The luciferin level of the glowworm is defined as a function of the rank value (RV) and the crowding distance (CD), which are deduced by non-dominated sorting. In addition, nondirective movement is developed to relocate the glowworms. A numerical simulation of a long-span suspension bridge is performed to demonstrate the effectiveness of the NMGSO algorithm. The results indicate that the NMGSO algorithm is capable of capturing the Pareto optimal sensor configurations with high accuracy and efficiency.

Constant Time Algorithm for Alignment of Unaligned Linear Quadtrees on RMESH (RMESH구조에서 unaligned 선형 사진트리의 alignment를 위한 상수시간 알고리즘)

  • 김경훈;우진운
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.10-18
    • /
    • 2004
  • Quadtree, which is a hierarchical data structure, is a very important data structure to represent binary images. The linear quadtree representation as a way to store a quadtree is efficient to save space compared with other representations. Therefore, it has been widely studied to develop efficient algorithms to execute operations related with quadtrees. The operations of unaligned linear quadtrees, which are operations among the linear quadtrees with different origin, are able to perform the translated or rotated images efficiently. And this operations requires alignment of the linear quadtrees. In this paper, we present an efficient algorithm to perform alignment of unaligned linear quadtrees, using three-dimensional $n{\pm}n{\pm}n$ processors on RMESH(Reconfigurable MESH). This algorithm has constant-time complexity by using efficient basic operations to route the locational codes of quardtree on the hierarchical structure of $n{\pm}n{\pm}n$ RMESH.

Area Efficient Bit-serial Squarer/Multiplier and AB$^2$-Multiplier (공간 효율적인 비트-시리얼 제곱/곱셈기 및 AB$^2$-곱셈기)

  • 이원호;유기영
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.1_2
    • /
    • pp.1-9
    • /
    • 2004
  • The important arithmetic operations over finite fields include exponentiation, division, and inversion. An exponentiation operation can be implemented using a series of squaring and multiplication operations using a binary method, while division and inversion can be performed by the iterative application of an AB$^2$ operation. Hence, it is important to develop a fast algorithm and efficient hardware for this operations. In this paper presents new bit-serial architectures for the simultaneous computation of multiplication and squaring operations, and the computation of an $AB^2$ operation over $GF(2^m)$ generated by an irreducible AOP of degree m. The proposed architectures offer a significant improvement in reducing the hardware complexity compared with previous architectures, and can also be used as a kernel circuit for exponentiation, division, and inversion architectures. Furthermore, since the Proposed architectures include regularity and modularity, they can be easily designed on VLSI hardware and used in IC cards.

Volume Reconstruction by Cellboundary Representation for Medical Volume Visualization (의료영상 가시화를 위한 셀 경계 방식 체적 재구성 방법)

  • Choi, Young-Kyu;Lee, Ee-Taek
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.235-244
    • /
    • 2000
  • This paper addresses a new method for constructing surface representation of 3D structures from a sequence of tomographic cross-sectional images, Firstly, we propose cell-boundary representation by transforming the cuberille space into cell space. A cell-boundary representation consists of a set of boundary cells with their 1-voxel configurations, and can compactly describe binary volumetric data. Secondly, to produce external surface from the cell-boundary representation, we define 19 modeling primitives (MP) including volumetric, planar and linear groups. Surface polygons are created from those modeling primitives using a simple table look-up operation. Comparing with previous method such as Marching Cube or PVP algorithm, our method is robust and does not make any crack in resulting surface model. Hardware implementation is expected to be easy because our algorithm is simple(scan-line), efficient and guarantees data locality in computation time.

  • PDF

A Research of Anomaly Detection Method in MS Office Document (MS 오피스 문서 파일 내 비정상 요소 탐지 기법 연구)

  • Cho, Sung Hye;Lee, Sang Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.6 no.2
    • /
    • pp.87-94
    • /
    • 2017
  • Microsoft Office is an office suite of applications developed by Microsoft. Recently users with malicious intent customize Office files as a container of the Malware because MS Office is most commonly used word processing program. To attack target system, many of malicious office files using a variety of skills and techniques like macro function, hiding shell code inside unused area, etc. And, people usually use two techniques to detect these kinds of malware. These are Signature-based detection and Sandbox. However, there is some limits to what it can afford because of the increasing complexity of malwares. Therefore, this paper propose methods to detect malicious MS office files in Computer forensics' way. We checked Macros and potential problem area with structural analysis of the MS Office file for this purpose.

Implementation for Texture Imaging Algorithm based on GLCM/GLDV and Use Case Experiments with High Resolution Imagery

  • Jeon So Hee;Lee Kiwon;Kwon Byung-Doo
    • Proceedings of the KSRS Conference
    • /
    • 2004.10a
    • /
    • pp.626-629
    • /
    • 2004
  • Texture imaging, which means texture image creation by co-occurrence relation, has been known as one of useful image analysis methodologies. For this purpose, most commercial remote sensing software provides texture analysis function named GLCM (Grey Level Co-occurrence Matrix). In this study, texture-imaging program for GLCM algorithm is newly implemented in the MS Visual IDE environment. While, additional texture imaging modules based on GLDV (Grey Level Difference Vector) are contained in this program. As for GLCM/GLDV texture variables, it composed of six types of second order texture function in the several quantization levels of 2(binary image), 8, and 16: Homogeneity, Dissimilarity, Energy, Entropy, Angular Second Moment, and Contrast. As for co-occurrence directionality, four directions are provided as $E-W(0^{\circ}),\;N-E(45^{\circ}),\;S-W(135^{\circ}),\;and\;N-S(90^{\circ}),$ and W-E direction is also considered in the negative direction of E- W direction. While, two direction modes are provided in this program: Omni-mode and Circular mode. Omni-mode is to compute all direction to avoid directionality problem, and circular direction is to compute texture variables by circular direction surrounding target pixel. At the second phase of this study, some examples with artificial image and actual satellite imagery are carried out to demonstrate effectiveness of texture imaging or to help texture image interpretation. As the reference, most previous studies related to texture image analysis have been used for the classification purpose, but this study aims at the creation and general uses of texture image for urban remote sensing.

  • PDF

Autonomous Battle Tank Detection and Aiming Point Search Using Imagery (영상정보에 기초한 전차 자율탐지 및 조준점탐색 연구)

  • Kim, Jong-Hwan;Jung, Chi-Jung;Heo, Mira
    • Journal of the Korea Society for Simulation
    • /
    • v.27 no.2
    • /
    • pp.1-10
    • /
    • 2018
  • This paper presents an autonomous detection and aiming point computation of a battle tank by using RGB images. Maximally stable extremal regions algorithm was implemented to find features of the tank, which are matched with images extracted from streaming video to figure out the region of interest where the tank is present. The median filter was applied to remove noises in the region of interest and decrease camouflage effects of the tank. For the tank segmentation, k-mean clustering was used to autonomously distinguish the tank from its background. Also, both erosion and dilation algorithms of morphology techniques were applied to extract the tank shape without noises and generate the binary image with 1 for the tank and 0 for the background. After that, Sobel's edge detection was used to measure the outline of the tank by which the aiming point at the center of the tank was calculated. For performance measurement, accuracy, precision, recall, and F-measure were analyzed by confusion matrix, resulting in 91.6%, 90.4%, 85.8%, and 88.1%, respectively.

On Design and Performance Analysis of Asymmetric 2PAM: 5G Network NOMA Perspective (비대칭 2PAM의 설계와 성능 분석: 5G 네트워크의 비직교 다중 접속 관점에서)

  • Chung, Kyuhyuk
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.10
    • /
    • pp.24-31
    • /
    • 2020
  • In non-orthogonal multiple access (NOMA), the degraded performance of the weaker channel gain user is a problem. In this paper, we propose the asymmetric binary pulse amplitude modulation (2PAM), to improve the bit-error rate (BER) performance of the weaker channel user in NOMA with the tolerable BER loss of the stronger channel user. First, we design the asymmetric 2PAM, calculate the total allocated power, and derive the closed-form expression for the BER of the proposed scheme. Then it is shown that the BER of the weaker channel user improves, with the small BER loss of the stronger channel user. The superiority of the proposed scheme is also validated by demonstating that the signal-to-noise ratio (SNR) gain of the weaker channel user is about 10 dB, with the SNR loss of 3 dB of the stronger channel user. In result, the asymmetric 2PAM could be considered in NOMA of 5G systems. As a direction of the future research, it would be meaningful to analyze the achievable data rate for the propsed scheme.

Method for Designing VMS Messages Based on Drivers' Legibility Performance (운전자 판독능력을 고려한 VMS 메시지 설계 방법론 개발 및 적용)

  • Kim, Seong-Min;O, Cheol;Jang, Myeong-Sun;Kim, Tae-Hyeong
    • Journal of Korean Society of Transportation
    • /
    • v.25 no.3
    • /
    • pp.99-109
    • /
    • 2007
  • Variable message signs (VMS), which are used for providing real-time information on traffic conditions and accident occurrences, are one of the important components of intelligent transportation systems VMS messages need to meet human factor requirements: messages should be readable and understandable while driving. Lab-controlled experiments on VMS messages were conducted to obtain useful data for analyzing drivers' responsive characteristics for VMS messages. Binary logistic regression (BLR) modeling techniques were applied to explore the relationships among drivers' message perceptions, message reading time, and amount of VMS messages. Probabilistic outcomes of the proposed BLR-based perception model could be greatly utilized to design VMS messages considering drivers' legibility performance. The major contribution of this study is to develop invaluable statistical models that can be used in designing VMS messages more effectively from the human factor point of view. The results could be further applied to establish the scheme of VMS message phase and duration.

A FCA-based Classification Approach for Analysis of Interval Data (구간데이터분석을 위한 형식개념분석기반의 분류)

  • Hwang, Suk-Hyung;Kim, Eung-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.1
    • /
    • pp.19-30
    • /
    • 2012
  • Based on the internet-based infrastructures such as various information devices, social network systems and cloud computing environments, distributed and sharable data are growing explosively. Recently, as a data analysis and mining technique for extracting, analyzing and classifying the inherent and useful knowledge and information, Formal Concept Analysis on binary or many-valued data has been successfully applied in many diverse fields. However, in formal concept analysis, there has been little research conducted on analyzing interval data whose attributes have some interval values. In this paper, we propose a new approach for classification of interval data based on the formal concept analysis. We present the development of a supporting tool(iFCA) that provides the proposed approach for the binarization of interval data table, concept extraction and construction of concept hierarchies. Finally, with some experiments over real-world data sets, we demonstrate that our approach provides some useful and effective ways for analyzing and mining interval data.