• Title/Summary/Keyword: Binary-tree

Search Result 297, Processing Time 0.024 seconds

CNN-based In-loop Filter on TU Block (TU 블록 크기에 따른 CNN기반 인루프필터)

  • Kim, Yang-Woo;Jeong, Seyoon;Cho, Seunghyun;Lee, Yung-Lyul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.11a
    • /
    • pp.15-17
    • /
    • 2018
  • VVC(Versatile Video Coding)는 입력된 영상을 CTU(Coding Tree Unit) 단위로 분할하여 코딩하며, 이를 다시 QTBTT(Quadtree plus binary tree and triple tree)로 분할하고, TU(Transform Unit)도 이와 같은 단위로 분할된다. 따라서 TU의 크기는 $4{\times}4$, $4{\times}8$, $4{\times}16$, $4{\times}32$, $8{\times}4$, $16{\times}4$, $32{\times}4$, $8{\times}8$, $8{\times}16$, $8{\times}32$, $16{\times}8$, $32{\times}8$, $16{\times}16$, $16{\times}32$, $32{\times}16$, $32{\times}32$, $64{\times}64$의 17가지 종류가 있다. 기존의 VVC 참조 Software인 VTM에서는 디블록킹필터와 SAO(Sample Adaptive Offset)로 이루어진 인루프필터를 이용하여 에러를 복원하는데, 본 논문은 TU 크기에 따라서 원본블록과 복원블록의 차이(에러)가 통계적으로 다름을 이용하여 서로 다른 CNN(Convolution Neural Network)을 구축하고 에러를 복원하는 방법으로 VTM의 인루프 필터를 대체한다. 복원영상의 에러를 감소시키기 위하여 TU 블록크기에 따라 DenseNet의 Dense Block기반 CNN을 구성하고, Hyper Parameter와 복잡도의 감소를 위해 네트워크 간에 일부 가중치를 공유하는 모양의 Network를 구성하였다.

  • PDF

Adaptive Chroma Block Partitioning Method using Comparison of Similarity between Channels (채널 간 유사도 비교를 이용한 적응형 색차 블록 분할 방법)

  • Baek, A Ram;Choi, Sanggyu;Choi, Haechul
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2018.06a
    • /
    • pp.260-261
    • /
    • 2018
  • MPEG과 VCEG은 차세대 비디오 부호화 표준 기술 개발를 위한 JVET(Joint Video Exploration Team)을 구성하여 현재 비디오 표준화인 HEVC 대비 높은 부호화 효율을 목표로 연구를 진행하며 CfP(Call for Proposal) 단계를 진행 중이다. JVET의 공통 플랫폼인 JEM(Joint Exploration Test Model)은 HEVC의 quad-tree 기반 블록 분할 구조를 대신하여 더 많은 유연성을 제공하는 QTBT(Quad-tree plus binary-tree)가 적용되었다. QTBT는 화면 내 부호화 효율을 높이기 위한 하나의 방법으로 휘도와 색차 신호에 대해 분할된 블록 구조를 지원한다. 이러한 방법은 채널 간 블록 분할 모양이 동일하거나 비슷한 경우에 중복되는 블록 분할 신호가 발생할 수 있는 단점이 있다. 따라서 본 논문에서는 화면 내 부호화에서 채널 간 유사도 비교를 이용하여 적응형 색차 블록 방법을 제안한다. 제안한 방법의 실험 결과로 JEM 6.0과 비교하여 CfE(Call for Evidence) 영상에서 평균 0.28%의 Y BD-rate 감소와 함께 평균 124.5%의 부호화 복잡도 증가를 확인하였다.

  • PDF

A Design and Implementation for Dynamic Relocate Algorithm Using the Binary Tree Structure (이진트리구조를 이용한 동적 재배치 알고리즘 설계 및 구현)

  • 최강희
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.6
    • /
    • pp.827-836
    • /
    • 2001
  • Data is represented by file structure in Computer System. But the file size is to be larger, it is hard to control and transmit. Therefore, in recent years, many researchers have developed new algorithms for the data compression. And now, we introduce a new Dynamic Compression Technique, making up for the weaknesses of huffman's. The huffman compression technique has two weaknesses. The first, it needs two steps of reading, one for acquiring character frequency and the other for real compression. The second, low compression rate caused by storing tree information. These weaknesses can be solved by our new Dynamic Relocatable Method, reducing the reading pass by relocating data file to dynamic form, and then storing tree information from pipeline structure. The first, it needs two steps of reading, one for acquiring character frequency and the other for real compression. The second, low compression rate caused by storing tree information. These weaknesses can be solved by our new Dynamic Relocatable Method, reducing the reading pass by relocating data file to dynamic form, and then storing tree information from pipeline structure.

  • PDF

Multicast Routing On High Speed networks using Evolutionary Algorithms (진화 알고리즘을 이용한 초고속 통신망에서의 멀티캐스트 경로배정 방법에 관한 연구)

  • Lee, Chang-Hoon;Zhang, Byoung-Tak;Ahn, Sang-Hyun;Kwak, Ju-Hyun;Kim, Jae-Hoon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.671-680
    • /
    • 1998
  • Network services, such as teleconferencing, remote diagnostics and education, and CSCW require multicasting. Multicast routing methods can be divided into two categories. One is the shortest path tree method and the other is the minimal Steiner tree method. The latter has an advantage over the former in that only one Steiner tree is needed for a group. However, finding a minimal Steiner tree is an NP-complete problem and it is necessary to find an efficient heuristic algorithm. In this paper, we present an evolutionary optimization method for finding minimal Steiner trees without sacrificing too much computational efforts. In particular, we describe a tree-based genetic encoding scheme which is in sharp constast with binary string representations usually adopted in convetional genetic algorithms. Experiments have been performed to show that the presented method can find optimal Steiner trees for given vetwork configurations. Comparitivie studies have shown that the evolutionary method finds on average a better solution than other conventional heustric algorithms.

  • PDF

New formula in domination theory and it's application for reliability analysis (Domination이론에서의 새로운 식과 이의 신뢰성계산에 대한 적용)

  • 이광원;이일재;강신재
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.1
    • /
    • pp.16-26
    • /
    • 1996
  • In a series of original papers, [1-17] efficient methods and algorithms have been presented, for the exact solution of many reliability problems represented by binary networks. A starting point of these methods was the concept of domination, firstly introduced in ,elation with reliability problems in [2]. It's application to directed networks resulted in the development of a topological formula for the classical problem of the two terminal reliability. This result was extended later to the all-terminal and the k-terminal reliability problems. All papers mentioned above use a path oriented representation for the network topology. In practical applications, however, it is common and often advantageous to work with cut sets. This article considers the Domination theory for reliability problem of a network. Some topological formula are derived and the power and the application of this formula are shown through the alternative proof of topological formula of A. Satyanarayana [2].

  • PDF

A Study on Decision Factors Affecting Utilization of Elderly Welfare Center: Focus on Gimpo City (노인복지관 이용 결정요인에 관한 연구: 김포시 노인을 중심으로)

  • Won, Il;Kim, Keunhong;Kim, SungHyun
    • 한국노년학
    • /
    • v.38 no.2
    • /
    • pp.351-364
    • /
    • 2018
  • The purpose of this study is to learn about the decision factors affecting utilization of elderly welfare center of the elderly living in Gimpo city. The reason of the study is that the elderly welfare center as a provider of general welfare services could not only thinking about the state policy but also need to consider about the inherent role and function of the elderly. Especially for these elders living in rural areas, although the number of elderly welfare centers of the whole country has greatly increased in last 10 years, the effect and function of the facility are almost the same and they are still lack of leisure activities. This issue become a serious problem nowadays. For the above reasons, this article conducts a social survey of 360 elderly people over the age of 65 who lives in the Gimpo city which is a rural-urban type city. The research method is to examine the relationship between the predisposing factors, enabling factors and need factors of Andersen's behavior model with binary logistic regression analysis and the decision tree analysis. The result of binary logistic regression shows the most of factors of Andersen's model is significant. The factors of age, gender, education level in predisposing factors; monthly income in enabling factors and the reserve for old life, the preparation of economic activity for old life in need factors are significant. Then the result of decision tree analysis shows the interaction between factors; when the education level in predisposing factors is higher, the possibility of using of elderly welfare center becomes bigger. Also as the level of healthy promoting preparation in the need factors gets lower, the possibility of using of elderly welfare center still becomes bigger. Although differences were found in the interpretation of the results of regression analysis and decision tree analysis, the results of this study can still provide support for the necessity of elderly welfare centers providing integrated welfare services.

Comparison of Methodologies for Characterizing Pedestrian-Vehicle Collisions (보행자-차량 충돌사고 특성분석 방법론 비교 연구)

  • Choi, Saerona;Jeong, Eunbi;Oh, Cheol
    • Journal of Korean Society of Transportation
    • /
    • v.31 no.6
    • /
    • pp.53-66
    • /
    • 2013
  • The major purpose of this study is to evaluate methodologies to predict the injury severity of pedestrian-vehicle collisions. Methodologies to be evaluated and compared in this study include Binary Logistic Regression(BLR), Ordered Probit Model(OPM), Support Vector Machine(SVM) and Decision Tree(DT) method. Valuable insights into applying methodologies to analyze the characteristics of pedestrian injury severity are derived. For the purpose of identifying causal factors affecting the injury severity, statistical approaches such as BLR and OPM are recommended. On the other hand, to achieve better prediction performance, heuristic approaches such as SVM and DT are recommended. It is expected that the outcome of this study would be useful in developing various countermeasures for enhancing pedestrian safety.

Noisy Time Varying Vibration Signal Analysis using Adaptive Predictor-Binary Tree Structured Filter Bank System (적응예측기-이진트리구조 필터뱅크 시스템을 이용한 잡음이 부가된 시변 진동신호 분석)

  • Bae, Hyeon-Deok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.1
    • /
    • pp.77-84
    • /
    • 2017
  • Generally, a time-varying vibration signal is generated in a rotating machine system, and when there is a failure in the rotating machine, the signal contains noise. In this paper, we propose a system consisting of an adaptive predictor and a binary tree filter bank for analyzing time - varying vibration signals with noise. And the vibration signal analyzed results in this system is used for fault diagnosis of the rotating machine. The adaptive predictor of the proposed system predicts the periodic signal components, and the filter bank system decomposes the difference signal between the input signal and the predicted periodic signal into subband. Since each subband signal includes a noise signal component due to a failure, it is possible to diagnose the failure of the using rotary machine. The validity of the proposed vibration signal analysis method is shown in the simulations, where the periodic components cancelled vibrating signals are decomposed to 32 subband, and the signal characteristics related faults are analyzed.

Conservative Visibility Preprocessing by Expressing 4-D visibility Information on 2-D Spaces (2차원 평면상에 4차원 가시성 정보의 표현을 통한 포괄적 가시성 전처리)

  • Heo, Jun-Hyeok;Wohn, Kwang-Yun
    • Journal of the Korea Computer Graphics Society
    • /
    • v.5 no.2
    • /
    • pp.9-23
    • /
    • 1999
  • Visibility preprocessing is a useful method to reduce the complexity of scenes to be processed in real-time, and so enhances the overall rendering performance for interactive visualization of virtual environments. In this paper, we propose an efficient visibility preprocessing method. In the proposed method, we assume that navigatable areas in virtual environments are partitioned into rectangular parallelpiped cells or sub-worlds. To preprocess the visibility of each polygon for a given partitioned cell, we should determine at least the area-to-area visibility. This is inherently a four-dimensional problem. We efficiently express four-dimensional visibility information on two-dimensional spaces and keep it within a ternary tree, which is conceptually similar to a BSP(Binary Space Partitioning) tree, by exploiting the characteristics of conservative visibility. The proposed method is able to efficiently handle more general environments like urban scenes, and remove invisible polygons jointly blocked by multiple occluders. The proposed method requires O(nm) time and O(n+m) space. By selecting a suitable value for m, users can select a suitable level of trade-off between the preprocessing time and the quality of the computational result.

  • PDF

An Group-based Security Protocol for Machine Type Communications in LTE-Advanced (LTE-Advanced에서의 Machine Type Communications을 위한 그룹 기반 보안 프로토콜)

  • Choi, Dae-Sung;Choi, Hyoung-Kee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.885-896
    • /
    • 2013
  • MTC(Machine Type Communications), providing a variety of services anytime and anywhere by connecting the cellular network to the machine and things without human intervention, is being considered as a major challenge of the next-generation communications. Currently, When a massive MTC devices simultaneously connect to the network, each MTC device needs an independent access authentication process. Because of this process, authentication signaling congestion and overload problems will cause in LTE-Advanced. In this paper, we propose a group-based authentication protocol and a key management protocol. For managing the MTC devices as group units, the proposed protocol elects a group leader and authentications only once with the core network. After the authentication is completed, a group leader manages the rest members and MME(Mobility Management Entity) by constructing a binary tree. Finally, the propose protocol analysis show that the proposed protocol not only can reduces the authentication signaling which generated in between the MTC devices and the core network but also can manages the MTC devices, efficiently.