• Title/Summary/Keyword: CA Algorithm

Search Result 226, Processing Time 0.029 seconds

Fragile Watermark System using Quantization and DC Coefficients (양자화와 DC 계수를 이용한 연성 워터마크 시스템)

  • Yoo, Heung-Ryol;Son, Yung-Deug
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.774-779
    • /
    • 2018
  • This paper presents fragile watermark system using quantization and DC coefficients. It is a way to prevent the watermark fro, being detected if the original has been modified in any way. In other words, the detection of a watermark ca be said to be originality after the watermark is inserted, without any damage. Since lossy compression such as JPEG is often allowed or required in practical applications, authentication methods, authentication methods should be distinguished from malicious modifications such as image shifting, cropping, filtering, and replacement. The proposed algorithm implements a fragile watermarking algorithm that shows image authentication with JPEC compression and the watermark easily breaks other malicious variants.

Design of a TL Personal Dosimeter Identifiable PA Exposure and Development of Its Dose Evaluation Algorithm (후방피폭선량계측이 가능한 TL 개인선량계의 설계 및 선량평가 알고리즘 개발)

  • Kwon, J.W.;Kim, H.K.;Yang, J.S.;Kim, J.L.;Lee, J.K.
    • Journal of Radiation Protection and Research
    • /
    • v.29 no.3
    • /
    • pp.179-186
    • /
    • 2004
  • A single-dosimeter worn on the anterior surface of body of a worker was found to provide significant underestimation of dose to the worker when radiation comes from behind of the human body. Recently, several researchers suggested that this kind of underestimation can be corrected to a certain extent by using an extra dosimeter on the back. But this multiple dosimetry also has the disadvantages like overestimation lowering work efficiency or cost burden. In this study, a single dosimeter introducing asymmetric filters enabled to identify PA exposure was designed by monte-carlo simulation and experiments and its dose evaluation algorithm for AP-PA mixed radiation field was established. This algorithm was applicable to penetrating radiation which had the effective energy more than 100 keV. Besides, the dosimeter and algorithm in this study were possible to be applied to near PA exposure.

A Review of Multivariate Analysis Studies Applied for Plant Morphology in Korea (국내 식물 형태 연구에 사용된 다변량분석 논문에 대한 재고)

  • Chang, Kae Sun;Oh, Hana;Kim, Hui;Lee, Heung Soo;Chang, Chin-Sung
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.3
    • /
    • pp.215-224
    • /
    • 2009
  • A review was given of the role of traditional morphometrics in plant morphological studies using 54 published studies in three major journals and others in Korea, such as Journal of Korean Forestry Society, Korean Journal of Plant Taxonomy, Korean Journal of Breeding, Korean Journal of Apiculture, Journal of Life Science, and Korean Journal of Plant Resources from 1997 to 2008. The two most commonly used techniques of data analysis, cluster analysis (CA) and principal components analysis (PCA) with other statistical tests were discussed. The common problem of PCA is the underlying assumptions of methods, like random sampling and multivariate normal distribution of data. The procedure was intended mainly for continuous data and was not efficient for data which were not well summarized by variances or covariances. Likewise CA was most appropriate for categorical rather than continuous data. Also, the CA produced clusters whether or not natural groupings existed, and the results depended on both the similarity measure chosen and the algorithm used for clustering. An additional problems of the PCA and the CA arised with both qualitative and quantitative data with a limited number of variables and/or too few numbers of samples. Some of these problems may be avoided if a certain number of variables (more than 20 at least) and sufficient samples (40-50 at least) are considered for morphometric analyses, but we do not think that the methods are all mighty tools for data analysts. Instead, we do believe that reasonable applications combined with focus on objectives and limitations of each procedure would be a step forward.

A Classification of Breast Tumor Tissue Images Using SVM (SVM을 이용한 유방 종양 조직 영상의 분류)

  • Hwang, Hae-Gil;Choi, Hyun-Ju;Yoon, Hye-Kyoung;Choi, Heung-Kook
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2005.11a
    • /
    • pp.178-181
    • /
    • 2005
  • Support vector machines is a powerful learning algorithm and attempt to separate belonging to two given sets in N-dimensional real space by a nonlinear surface, often only implicitly dened by a kernel function. We described breast tissue images analyses using texture features from Haar wavelet transformed images to classify breast lesion of ductal organ Benign, DCIS and CA. The approach for creating a classifier is composed of 2 steps: feature extraction and classification. Therefore, in the feature extraction step, we extracted texture features from wavelet transformed images with $10{\times}$ magnification. In the classification step, we created four classifiers from each image of extracted features using SVM(Support Vector Machines). In this study, we conclude that the best classifier in histological sections of breast tissue in the texture features from second-level wavelet transformed images used in Polynomial function.

  • PDF

Advanced OS-CFAR Processor Design with Low Computational Effort (순서통계에 근거한 개선된 CFAR 검파기의 하드웨어 구조 제안)

  • Hyun, Eu-Gin;Lee, Jong-Hun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.65-71
    • /
    • 2012
  • An OS-CFAR (Ordered Statistics CFAR) based on a sorting algorithm is useful for automotive radar systems in a multi-target situation. However, while the typical cell-averaging CFAR has low computational complexity, the OS-CFAR has much higher computation effort. In this paper, we design the new OS-CFAR architecture with a low computational effort. In the proposed method, since one time sorting processing is performed for the decision of the CFAR threshold, the whole processing effort can be reduced. When the fast sorting technique is employed, the computing time of the proposed OS-CFAR is always much shorter compared with typical OS-CFAR method regardless of the data size. We also present the processing result of proposed architecture using the real radar data.

Statistical Estimation of the Number of Contending Stations and its Application to a Multi-round Contention Resolution Scheme

  • Jang, Seowoo;Choi, Jin-Ghoo;Yoon, Sung-Guk
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4259-4271
    • /
    • 2016
  • With the increased popularity of IEEE 802.11 WLAN, the density of the WLAN devices per access point has also increased, resulting in throughput performance degradation. One of the solutions to the problem is improving the protocol efficiency by a using multi-round contention scheme. This paper first discusses how to estimate the number of contending stations in a WLAN network by using minimum elapsed backoff counter values that can be easily monitored by each station. An approximate closed form expression is derived for the number of active contending stations using the smallest backoff counter value in the network. We then apply this result to adapt the number of contending rounds according to the network loading level to enhance the throughput performance of a multi-round contention scheme. Through simulation, we show that the accuracy of the estimation algorithm depends on the contention parameters of W and the number of backoff counter observing samples, and found a reasonable value for each parameter. We clearly show that our adaptive multi-round contention scheme outperforms the standard contention scheme that uses a fixed number of rounds.

Analysis of EMS NETWORK Topology Algorithm (EMS NETWORK Topology 알고리즘에 대한 연구)

  • Yu, Hyun-Jung;Choi, Young-Min;Kim, Min-Bae;Kim, Kwang-Ho;Park, Yong-Jo;Kim, Sung-Hak
    • Proceedings of the KIEE Conference
    • /
    • 2007.11b
    • /
    • pp.69-71
    • /
    • 2007
  • 최근 들어 전력 계통은 점차 복잡해지고 계통의 규모 역시 빠른 속도로 성장하고 있다. 한국전력거래소는 전력계통의 안정적, 경제적 운영을 담당하고 있는 기관으로 '01년 현재의 에너지관리시스템(EMS)를 도입하여 실시간 전력계통에 대한 정확한 판단을 기반으로 전력계통의 안정성과 경제성 확보에 주력하고 있다. EMS의 대표적인 기능은 계통데이터의 수집(SCADA), 자동발전제어(AGC), 계통해석(NA) 등으로 대별되며, 이중 계통해석 기능은 프로그램 규모면에서 가장 큰 부분을 차지하고 있다. 계통해석 기능은 또다시 상태추정(SE), 상정사고분석(CA), 안전도해석(SENH), 고장해석(SCT) 등의 프로그램으로 구성되어 다양한 실시간 계통해석을 수행하게 된다. 전력계통 해석은 먼저 대상계통을 수학적 모델로 정식화하기 전에 계통망의 기하학적 구조를 기술하는 단계가 필요한데 이를 토폴로지 처리라고 하며, 보통 그래프이론인 노트(Node)와 마디(Branch)를 사용하여 전력계통망을 구성하는 요소들의 연결관계를 정의하게 된다. 본고는 이론적 수준을 넘어 EMS의 계통해석 기능에서 실계통을 해석하기 위해 쓰이고 있는 토폴로지 처리의 기본 알고리즘을 분석하여 국내 전력산업 기술 선진화에 기여하고자 한다.

  • PDF

Channel Statistical MAC Protocol for Cognitive Radio

  • Xiang, Gao;Zhu, Wenmin;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.1
    • /
    • pp.40-44
    • /
    • 2010
  • opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. A dynamical sensing range as a important parameter introduced to maintain the our protocol performance. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.

Combustion Control of Refuse Incineration Plant using Fuzzy Model and Genetic Algorithms (퍼지 모델과 유전 알고리즘을 이용한 쓰레기 소각로의 연소 제어)

  • Park, Jong-Jin;Choi, Kyu-Seok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.7
    • /
    • pp.2116-2124
    • /
    • 2000
  • In this paper we propose combustion control of refuse incineration plant using fuzzy model and genetic algorithm. At first fuzzy modelling is performed to obtain fuzzy model of the refuse incineration plant and obtained fuzzy model predicts outputs of the plant when inputs are given. Fuzzy model ca be used to obtain control strategy, and train and enhance operators' skill by simulating the plant. Then genetic algorithms search and find out optimal control inputs over all possible solutions in respect to desired outputs and these are inserted to plant. In order to testify proposed control method, computer simulation was carried out. As a result, ISE of fuzzy model of refuse incineration plant is 0.015 and ITAE of control by proposed method, 352 which is better than that by manual operation.

  • PDF

Multi-Channel MAC Protocol Using Statistical Channel Utilization for Cognitive Networks

  • Xiang, Gao;Zhu, Wen-Min;Park, Hyung-Kun
    • Journal of information and communication convergence engineering
    • /
    • v.8 no.3
    • /
    • pp.273-276
    • /
    • 2010
  • Opportunistic spectrum access (OSA) allows unlicensed users to share licensed spectrum in space and time with no or little interference to primary users, with bring new research challenges in MAC design. We propose a cognitive MAC protocol using statistical channel information and selecting appropriate idle channel for transmission. The protocol based on the CSMA/CA, exploits statistics of spectrum usage for decision making on channel access. Idle channel availability, spectrum hole sufficiency and available channel condition will be included in algorithm statistical information. The model include the control channel and data channel, the transmitter negotiates with receiver on transmission parameters through control channel, statistical decision results (successful rate of transmission) from exchanged transmission parameters of control channel should pass the threshold and decide the data transmission with spectrum hole on data channel. The proposed protocol's simulation will show that proposed protocol does improve the throughput performance via traditional opportunistic spectrum access MAC protocol.