• 제목/요약/키워드: Chain Matching

검색결과 55건 처리시간 0.028초

A Study on Character Recognition using HMM and the Mason's Theorem

  • Lee Sang-kyu;Hur Jung-youn
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2004년도 ICEIC The International Conference on Electronics Informations and Communications
    • /
    • pp.259-262
    • /
    • 2004
  • In most of the character recognition systems, the method of template matching or statistical method using hidden Markov model is used to extract and recognize feature shapes. In this paper, we used modified chain-code which has 8-directions but 4-codes, and made the chain-code of hand-written character, after that, converted it into transition chain-code by applying to HMM(Hidden Markov Model). The transition chain code by HMM is analyzed as signal flow graph by Mason's theory which is generally used to calculate forward gain at automatic control system. If the specific forward gain and feedback gain is properly set, the forward gain of transition chain-code using Mason's theory can be distinguished depending on each object for recognition. This data of the gain is reorganized as tree structure, hence making it possible to distinguish different hand-written characters. With this method, $91\%$ recognition rate was acquired.

  • PDF

블록체인을 활용한 역경매 봉사활동 관리시스템 설계 (Volunteering system using block chain and reverse auction)

  • 김시우
    • 문화기술의 융합
    • /
    • 제5권1호
    • /
    • pp.435-441
    • /
    • 2019
  • 최근 블록체인 기술이 발전하면서, 다양한 분야에 접목되어 사용되고 있다. 블록체인의 분산형 구조이기에 거래의 신뢰성과 정보 추적이 용이하다는 장점을 가지고 있다. 본 연구에서는 복지시스템에 접목시켜 역경매가 가능한 봉사 활동 관리시스템을 설계 하여, 이를 이용한 복지 크레딧 관리 시스템을 제안한다. 현 봉사활동의 문제점과 봉사활동 크레딧에 사용될 플랫폼을 소개하며, 이를 통해서 앞으로의 개발 목표와 네트워크 참여자를 늘리기 위한 보상, 사용의 편의성 증대에 관한 내용을 설명하였다.

태그간의 상호 간섭과 캐비닛의 간섭을 고려한 열쇠 관리용 캐비닛 안의 소형 UHF RFID 태그 안테나 (A Small UHF RFID Key-Chain Tag Antenna for a Key-Management Metallic Cabinet with Consideration of Coupling of Adjacent Tags and Cabinet)

  • 남세현;박용권;전병돈;정유정
    • 한국전자파학회논문지
    • /
    • 제20권9호
    • /
    • pp.823-828
    • /
    • 2009
  • 열쇠 관리용 철재 캐비닛 안에 장착되는 UHF 대역의 열쇠고리형 소형 태그 안테나를 설계 제작하였다. 열쇠 고리형 태그 안테나는 인접한 태그 안테나, 열쇠고리의 금속 부분, 그리고 캐비닛 등과의 상호 간섭 작용을 고려하여 소형으로($66\;mm{\times}6\;mm$) 제작하였다. 제작된 태그 안테나는 T-matching 방법을 사용하여 정합하였고, 미엔더(Meander) 형태를 이용하여 크기를 줄여서 유전체(FR-4) 기판을 사용하여 제작하였다. 먼저 인접한 태그 안테나들과의 상호 간섭을 감안하여 태그 안테나를 설계하였고, 캐비닛의 철재 근처에 장착되는 태그 안테나용으로 또 다른 설계를 제안하였다. 인접한 태그 안테나들의 개수를 변화시켜가며 태그 안테나의 특성과 인식 거리에 미치는 영향을 분석하고 측정하였다. 그 결과 캐비닛에 장착되는 총 360개의 태그 안테나를 모두 인식할 수 있었다.

Logic Built In Self Test 구조의 내부 특성 패턴 매칭 알고리즘 (Internal Pattern Matching Algorithm of Logic Built In Self Test Structure)

  • 전유성;김인수;민형복
    • 대한전기학회:학술대회논문집
    • /
    • 대한전기학회 2008년도 제39회 하계학술대회
    • /
    • pp.1959-1960
    • /
    • 2008
  • The Logic Built In Self Test (LBIST) technique is substantially applied in chip design in most many semiconductor company in despite of unavoidable overhead like an increase in dimension and time delay occurred as it used. Currently common LBIST software uses the MISR (Multiple Input Shift Register) However, it has many considerations like defining the X-value (Unknown Value), length and number of Scan Chain, Scan Chain and so on for analysis of result occurred in the process. So, to solve these problems, common LBIST software provides the solution method automated. Nevertheless, these problems haven't been solved automatically by Tri-state Bus in logic circuit yet. This paper studies the algorithm that it also suggest algorithm that reduce additional circuits and time delay as matching of pattern about 2-type circuits which are CUT(circuit Under Test) and additional circuits so that the designer can detect the wrong location in CUT: Circuit Under Test.

  • PDF

제품 차별화 지연생산의 경제적 타당성: 문헌연구 (Economic Evaluation of Delayed Product Differentiation: Literature Review)

  • 이호창
    • 산업공학
    • /
    • 제17권1호
    • /
    • pp.56-70
    • /
    • 2004
  • Expanding product variety and high customer service provision place an enormous burden on demand forecasting and the matching of supply with demand in a supply chain. Postponement of product differentiation has been found to be powerful means to improve supply chain performance in the presence of increasing product variety. Delaying the point of product differentiation implies that the process would not commit the work-in-process into a particular finished product until a later point. This paper reviews the recent analytical models that quantify the value of delayed product differentiation. We conclude the literature review by summarizing and synthesizing the economic evaluation of the postponement and outline directions for future research.

혼합 군에 대한 확률적 란체스터 모형의 정규근사 (Gaussian Approximation of Stochastic Lanchester Model for Heterogeneous Forces)

  • 박동현;김동현;문형일;신하용
    • 대한산업공학회지
    • /
    • 제42권2호
    • /
    • pp.86-95
    • /
    • 2016
  • We propose a new approach to the stochastic version of Lanchester model. Commonly used approach to stochastic Lanchester model is through the Markov-chain method. The Markov-chain approach, however, is not appropriate to high dimensional heterogeneous force case because of large computational cost. In this paper, we propose an approximation method of stochastic Lanchester model. By matching the first and the second moments, the distribution of each unit strength can be approximated with multivariate normal distribution. We evaluate an approximation of discrete Markov-chain model by measuring Kullback-Leibler divergence. We confirmed high accuracy of approximation method, and also the accuracy and low computational cost are maintained under high dimensional heterogeneous force case.

소사체 치아에서의 유전자지문 분석을 위한 실험적 연구 (Experimental Study for DNA Fingerprint from Teeth of Charred Body)

  • Jong-Hoon Choi
    • Journal of Oral Medicine and Pain
    • /
    • 제21권2호
    • /
    • pp.351-367
    • /
    • 1996
  • In the field Of individual identification in forensic Science, if the body is charred, it is sometimes impossible to identify the morphologic changes and charred tissue such as blood, muscle and bone can not be identified by forensic microbiologic method such as DNA typing. So the author used the characteristics of teeth which is relatively firm compare to other organs and stable to external environment such as heat and also possess cells needed for the DNA typing. The author conducted the experiment on teeth to detect DNA related to individual identification regarding to temperature in which other charredorgans can not be detected. The experiment was done on 64 extracted third molars consisted of unheated ones, and heated teeth to $100^{\circ}C$, $150^{\circ}C$, $200^{\circ}C$ for 45 min, 90 min, and 120 min respectively and to $250^{\circ}C$ for 45 min. DNA was extracted from each tooth and amplified fragment length polymorphism procedure(AMP-FLPs) using polymerase chain reaction(PCR) was applied and observed for the matching DNA in HumTH01 and HumCD4 locus and the followings Are the results : 1. It was able to detect matching DNA in HumTH01 and HumCD4 locus in every teeth which no heating has been done. 2. It was able to detect matching DNA in HumTH01 and HumCD4 locus in every teeth heated to $100^{\circ}C$ for 45, 90 and 120 min. 3. It was able to detect matching DNA in HumTH01 and HumCD4 locus in teeth heated to $l00^{\circ}C$, $200^{\circ}C$ for 45, 90, 120 min. 4. It was impossible to detect matching DNA in HumTH01 and HumCD4 locus in teeth heated to $250^{\circ}C$. So, it is possible to extract DNA from teeth that otherwise can not be extracted from other organs in the charred body and it can be concluded that teeth are highly reliable and applicatable as forensic odontology for individual identification.

  • PDF

웹 카메라에서 블록정합기법을 이용한 헤어커팅 포인트 분석 및 개선 (Haircutting Point Analysis and Improvement the Block Matching Algorithm Using in Web Camera)

  • 강남순
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.189-197
    • /
    • 2009
  • This paper suggests the system for searching and application is to be in combination between existing hair art area and Image/Video processing area. This proposed system usually saves various hair types into a database, then, users send images of their face over the internet by using WebCam. Finally, they can find the hair types for users. Hair cutting is technology that form draft to make hair style. Man cut must decide how in image of sinciput, image of side bean curd, after lower image must operate. Silhouette is produced as is different by change of this three places. Customer increases in the beauty salon and beauty salon chain being changed, research about beauty art is necessary point of time. In this treatise, our country of when swim and operate haircut about problem that happen sample survey and analysis.

λ/64-spaced compact ESPAR antenna via analog RF switches for a single RF chain MIMO system

  • Lee, Jung-Nam;Lee, Yong-Ho;Lee, Kwang-Chun;Kim, Tae Joong
    • ETRI Journal
    • /
    • 제41권4호
    • /
    • pp.536-548
    • /
    • 2019
  • In this study, an electronically steerable parasitic array radiator (ESPAR) antenna via analog radio frequency (RF) switches for a single RF chain MIMO system is presented. The proposed antenna elements are spaced at ${\lambda}/64$, and the antenna size is miniaturized via a dielectric radome. The optimum reactance load value is calculated via the beamforming load search algorithm. A switch simplifies the design and implementation of the reactance loads and does not require additional complex antenna matching circuits. The measured impedance bandwidth of the proposed ESPAR antenna is 1,500 MHz (1.75 GHz-3.25 GHz). The proposed antenna exhibits a beam pattern that is reconfigurable at 2.48 GHz due to changes in the reactance value, and the measured peak antenna gain is 4.8 dBi. The reception performance is measured by using a $4{\times}4$ BPSK signal. The measured average SNR is 17 dB when using the proposed ESPAR antenna as a transmitter, and the average SNR is 16.7 dB when using a four-conventional monopole antenna.

Malware Detection with Directed Cyclic Graph and Weight Merging

  • Li, Shanxi;Zhou, Qingguo;Wei, Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제15권9호
    • /
    • pp.3258-3273
    • /
    • 2021
  • Malware is a severe threat to the computing system and there's a long history of the battle between malware detection and anti-detection. Most traditional detection methods are based on static analysis with signature matching and dynamic analysis methods that are focused on sensitive behaviors. However, the usual detections have only limited effect when meeting the development of malware, so that the manual update for feature sets is essential. Besides, most of these methods match target samples with the usual feature database, which ignored the characteristics of the sample itself. In this paper, we propose a new malware detection method that could combine the features of a single sample and the general features of malware. Firstly, a structure of Directed Cyclic Graph (DCG) is adopted to extract features from samples. Then the sensitivity of each API call is computed with Markov Chain. Afterward, the graph is merged with the chain to get the final features. Finally, the detectors based on machine learning or deep learning are devised for identification. To evaluate the effect and robustness of our approach, several experiments were adopted. The results showed that the proposed method had a good performance in most tests, and the approach also had stability with the development and growth of malware.