• Title/Summary/Keyword: CONTAIN Code

Search Result 87, Processing Time 0.026 seconds

Finger Vein Recognition Using Generalized Local Line Binary Pattern

  • Lu, Yu;Yoon, Sook;Xie, Shan Juan;Yang, Jucheng;Wang, Zhihui;Park, Dong Sun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.5
    • /
    • pp.1766-1784
    • /
    • 2014
  • Finger vein images contain rich oriented features. Local line binary pattern (LLBP) is a good oriented feature representation method extended from local binary pattern (LBP), but it is limited in that it can only extract horizontal and vertical line patterns, so effective information in an image may not be exploited and fully utilized. In this paper, an orientation-selectable LLBP method, called generalized local line binary pattern (GLLBP), is proposed for finger vein recognition. GLLBP extends LLBP for line pattern extraction into any orientation. To effectually improve the matching accuracy, the soft power metric is employed to calculate the matching score. Furthermore, to fully utilize the oriented features in an image, the matching scores from the line patterns with the best discriminative ability are fused using the Hamacher rule to achieve the final matching score for the last recognition. Experimental results on our database, MMCBNU_6000, show that the proposed method performs much better than state-of-the-art algorithms that use the oriented features and local features, such as LBP, LLBP, Gabor filter, steerable filter and local direction code (LDC).

Thermal Hydraulic Design Parameters Study for Severe Accidents Using Neural Networks

  • Roh, Chang-Hyun;Chang, Soon-Heung
    • Proceedings of the Korean Nuclear Society Conference
    • /
    • 1997.10a
    • /
    • pp.469-474
    • /
    • 1997
  • To provide tile information ell severe accident progression is very important for advanced or new type of nuclear power plant (NPP) design. A parametric study, therefore was performed to investigate the effect of thermal hydraulic design parameters ell severe accident progression of pressurized water reactors (PWRs), Nine parameters, which are considered important in NPP design or severe accident progression, were selected among the various thermal hydraulic design parameters. The backpropagation neural network (BPN) was used to determine parameters, which might more strongly affect the severe accident progression, among mile parameters. For training. different input patterns were generated by the latin hypercube sampling (LHS) technique and then different target patterns that contain core uncovery time and vessel failure time were obtained for Young Gwang Nuclear (YGN) Units 3&4 using modular accident analysis program (MAAP) 3.0B code. Three different severe accident scenarios, such as two loss of coolant accidents (LOCAs) and station blackout(SBO), were considered in this analysis. Results indicated that design parameters related to refueling water storage tank (RWST), accumulator and steam generator (S/G) have more dominant effects on the progression of severe accidents investigated, compared to tile other six parameters.

  • PDF

Case Study of Building Special-Purpose Simple Browser (단순 웹브라우저의 설계와 구현 사례)

  • 우원택
    • Proceedings of the Korea Society for Industrial Systems Conference
    • /
    • 2002.06a
    • /
    • pp.136-147
    • /
    • 2002
  • The purpose of this study is to understand what we need to know about Microsoft's powerful web browser control so that we will be able to code and create a special-purpose browser. For this purpose, first of all, some literature survey was undertaken to study how the web browser looks like and is operated. One case design and coding was devoted to using visual basic to create our own web browser. The primary task of this job was accomplished with the form making up of a bunch of image controls, a status bar on the button, a picture box to contain the image buttons, the combo box, the command button and the menus and the statements shown in the above exhibits and tables respectively. After putting it all together, the form was implemented to see if it would work properly. The program was also enhanced to have a special purpose functions permitting filtering functions. The result was more or less successful, however has some limitations such as the simplicity of the programming structures and functions. However, this study is useful for understanding general outline of special-purpose web browser development.

  • PDF

Simple Sequence Repeat (SSR)-Based Gene Diversity in Burkholderia pseudomallei and Burkholderia mallei

  • Song, Han;Hwang, Junghyun;Myung, Jaehee;Seo, Hyoseok;Yi, Hyojeong;Sim, Hee-Sun;Kim, Bong-Su;Nierman, William C.;Kim, Heenam Stanley
    • Molecules and Cells
    • /
    • v.27 no.2
    • /
    • pp.237-241
    • /
    • 2009
  • Pathogens Burkholderia pseudomallei (Bp) and Burkholderia mallei (Bm) contain a large number (> 12,000) of Simple Sequence Repeats (SSRs). To study the extent to which these features have contributed to the diversification of genes, we have conducted comparative studies with nineteen genomes of these bacteria. We found 210 genes with characteristic types of SSR variations. SSRs with nonamer repeat units were the most abundant, followed by hexamers and trimers. Amino acids with smaller and nonpolar R-groups are preferred to be encoded by the variant SSRs, perhaps due to their minimal impacts to protein functionality. A majority of these genes appears to code for surface or secreted proteins that may directly interact with the host factors during pathogenesis or other environmental factors. There also are others that encode diverse functions in the cytoplasm, and this protein variability may reflect an extensive involvement of phase variation in survival and adaptation of these pathogens.

Feature Extraction of Shape of Image Objects in Content-based Image Retrieval (내용기반으로한 이미지 검색에서 이미지 객체들의 외형특징추출)

  • Cho, June-Suh
    • The KIPS Transactions:PartB
    • /
    • v.10B no.7
    • /
    • pp.823-828
    • /
    • 2003
  • The main objective of this paper is to provide a methodology of feature extraction using shape of image objects for content-based image retrieval. The shape of most real-life objects is irregular, and hence there is no universal approach to quantify the shape of an arbitrary object. In particular. electronic catalogs contain many image objects for their products. In this paper, we perform feature extraction based on individual objects in images rather than on the whole image itself, since our method uses a shape-based approach of objects using RLC lines within an image. Experiments show that shape parameters distinctly represented image objects and provided better classification and discrimination among image objects in an image database compared to Texture.

Forgotten Permission Usages: An Empirical Study on App Description Based Android App Analysis

  • Wu, Zhiqiang;Lee, Scott Uk-Jin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.26 no.6
    • /
    • pp.107-113
    • /
    • 2021
  • In this paper, we conducted an empirical study to investigate whether Android app descriptions provide enough permission usages for measuring app quality in terms of human writing and consistency between code and descriptions. Android app descriptions are analyzed for various purposes such as quality measurement, functionality recommendation, and malware detection. However, many app descriptions do not disclose permission usages, whether accidentally or on purpose. Most importantly, the previous studies could not precisely analyze app descriptions if permission usages cannot be completely introduced in app descriptions. To assess the consistency between permissions and app descriptions, we implemented a state-of-the-art method to predict Android permissions for 29,270 app descriptions. As a result, 25% of app descriptions may not contain any permission semantic, and 57% of app descriptions cannot accurately reflect permission usages.

A Study on an Error Correction Code Circuit for a Level-2 Cache of an Embedded Processor (임베디드 프로세서의 L2 캐쉬를 위한 오류 정정 회로에 관한 연구)

  • Kim, Pan-Ki;Jun, Ho-Yoon;Lee, Yong-Surk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.1
    • /
    • pp.15-23
    • /
    • 2009
  • Microprocessors, which need correct arithmetic operations, have been the subject of in-depth research in relation to soft errors. Of the existing microprocessor devices, the memory cell is the most vulnerable to soft errors. Moreover, when soft errors emerge in a memory cell, the processes and operations are greatly affected because the memory cell contains important information and instructions about the entire process or operation. Users do not realize that if soft errors go undetected, arithmetic operations and processes will have unexpected outcomes. In the field of architectural design, the tool that is commonly used to detect and correct soft errors is the error check and correction code. The Itanium, IBM PowerPC G5 microprocessors contain Hamming and Rasio codes in their level-2 cache. This research, however, focuses on huge server devices and does not consider power consumption. As the operating and threshold voltage is currently shrinking with the emergence of high-density and low-power embedded microprocessors, there is an urgent need to develop ECC (error check correction) circuits. In this study, the in-output data of the level-2 cache were analyzed using SimpleScalar-ARM, and a 32-bit H-matrix for the level-2 cache of an embedded microprocessor is proposed. From the point of view of power consumption, the proposed H-matrix can be implemented using a schematic editor of Cadence. Therefore, it is comparable to the modified Hamming code, which uses H-spice. The MiBench program and TSMC 0.18 um were used in this study for verification purposes.

Detecting Security Vulnerabilities in TypeScript Code with Static Taint Analysis (정적 오염 분석을 활용한 타입스크립트 코드의 보안 취약점 탐지)

  • Moon, Taegeun;Kim, Hyoungshick
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.2
    • /
    • pp.263-277
    • /
    • 2021
  • Taint analysis techniques are popularly used to detect web vulnerabilities originating from unverified user input data, such as Cross-Site Scripting (XSS) and SQL Injection, in web applications written in JavaScript. To detect such vulnerabilities, it would be necessary to trace variables affected by user-submitted inputs. However, because of the dynamic nature of JavaScript, it has been a challenging issue to identify those variables without running the web application code. Therefore, most existing taint analysis tools have been developed based on dynamic taint analysis, which requires the overhead of running the target application. In this paper, we propose a novel static taint analysis technique using symbol information obtained from the TypeScript (a superset of JavaScript) compiler to accurately track data flow and detect security vulnerabilities in TypeScript code. Our proposed technique allows developers to annotate variables that can contain unverified user input data, and uses the annotation information to trace variables and data affected by user input data. Since our proposed technique can seamlessly be incorporated into the TypeScript compiler, developers can find vulnerabilities during the development process, unlike existing analysis tools performed as a separate tool. To show the feasibility of the proposed method, we implemented a prototype and evaluated its performance with 8 web applications with known security vulnerabilities. We found that our prototype implementation could detect all known security vulnerabilities correctly.

An I/O Interface Circuit Using CTR Code to Reduce Number of I/O Pins (CTR 코드를 사용한 I/O 핀 수를 감소 시킬 수 있는 인터페이스 회로)

  • Kim, Jun-Bae;Kwon, Oh-Kyong
    • Journal of the Korean Institute of Telematics and Electronics D
    • /
    • v.36D no.1
    • /
    • pp.47-56
    • /
    • 1999
  • As the density of logic gates of VLSI chips has rapidly increased, more number of I/O pins has been required. This results in bigger package size and higher packager cost. The package cost is higher than the cost of bare chips for high I/O count VLSI chips. As the density of logic gates increases, the reduction method of the number of I/O pins for a given complexity of logic gates is required. In this paper, we propose the novel I/O interface circuit using CTR (Constant-Transition-Rate) code to reduce 50% of the number of I/O pins. The rising and falling edges of the symbol pulse of CTR codes contain 2-bit digital data, respectively. Since each symbol of the proposed CTR codes contains 4-bit digital data, the symbol rate can be reduced by the factor of 2 compared with the conventional I/O interface circuit. Also, the simultaneous switching noise(SSN) can be reduced because the transition rate is constant and the transition point of the symbols is widely distributed. The channel encoder is implemented only logic circuits and the circuit of the channel decoder is designed using the over-sampling method. The proper operation of the designed I/O interface circuit was verified using. HSPICE simulation with 0.6 m CMOS SPICE parameters. The simulation results indicate that the data transmission rate of the proposed circuit using 0.6 m CMOS technology is more than 200 Mbps/pin. We implemented the proposed circuit using Altera's FPGA and confimed the operation with the data transfer rate of 22.5 Mbps/pin.

  • PDF

Repeated Reading Experience of University Students (대학생들의 반복독서 경험에 관한 연구)

  • Lee, Seung-Chae
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.41 no.2
    • /
    • pp.161-180
    • /
    • 2007
  • The goal of this study is to examine what sort of books people read repeatedly, what are the different preferences between men and women, how much the repeatedly-read books are related to the most memorable books and how the repeatedly-read books are connected to reading habits. A questionnaire was provided to college students and their repeated reading experiences were searched. The results of the statistical analysis are summarized : 1) Most college students have experienced repeated reading more than twice. 2) The number of college students who have experienced repeated reading twice is the highest and next, those who have read repeatedly 3 times. Also, the number of times of repeated reading tends to be similar between male and female students. 3) The books which many students read repeatedly more than twice are : a) Romance of 3 Kingdoms b) Little Prince c) Da Vinci Code d) Alchemist e) Chinese nine spine stickle back f) Meu Pe do Larania Lima g) Harry potter. 4) About half of the students have read the most memorable books many times. 5) The importance of books was evaluated on the basis of the number of repeated readers and the number of readings. The order of the important books is Three Romans of 3 kingdoms, Little Prince, Da Vinci Code, Meu Pe do Larania Lima, Tuesdays with Mollie, Harry Potter, and The Myth of Greece and Rome. 6) The preferred books by male college students are mostly the stories of fighters while female likes books that contain deep emotion and morality. More than half of the males' repeated reading was Romance of 3 Kingdoms while the preferred books of females are distributed widely.