• Title/Summary/Keyword: Code Filtering

Search Result 107, Processing Time 0.024 seconds

Numerical investigation of turbulent lid-driven flow using weakly compressible smoothed particle hydrodynamics CFD code with standard and dynamic LES models

  • Tae Soo Choi;Eung Soo Kim
    • Nuclear Engineering and Technology
    • /
    • 제55권9호
    • /
    • pp.3367-3382
    • /
    • 2023
  • Smoothed Particle Hydrodynamics (SPH) is a Lagrangian computational fluid dynamics method that has been widely used in the analysis of physical phenomena characterized by large deformation or multi-phase flow analysis, including free surface. Despite the recent implementation of eddy-viscosity models in SPH methodology, sophisticated turbulent analysis using Lagrangian methodology has been limited due to the lack of computational performance and numerical consistency. In this study, we implement the standard and dynamic Smagorinsky model and dynamic Vreman model as sub-particle scale models based on a weakly compressible SPH solver. The large eddy simulation method is numerically identical to the spatial discretization method of smoothed particle dynamics, enabling the intuitive implementation of the turbulence model. Furthermore, there is no additional filtering process required for physical variables since the sub-grid scale filtering is inherently processed in the kernel interpolation. We simulate lid-driven flow under transition and turbulent conditions as a benchmark. The simulation results show that the dynamic Vreman model produces consistent results with experimental and numerical research regarding Reynolds averaged physical quantities and flow structure. Spectral analysis also confirms that it is possible to analyze turbulent eddies with a smaller length scale using the dynamic Vreman model with the same particle size.

직접대역확산 방식의 시분할 다중접속 위성통신 제어채널 고속 부호동기 방법 (Fast code synchronization method of the DS-SS/TDMA control channel for satellite communication)

  • 류영재
    • 한국위성정보통신학회논문지
    • /
    • 제4권1호
    • /
    • pp.14-20
    • /
    • 2009
  • 본 논문은 작전범위 내에 분포된 수백 대의 위성 단말의 상태를 제어, 감시하기 위한 DS-SS/TDMA 역방향 제어채널의 동기 구조 및 방법에 대하여 언급한다. 군용 위성은 전자전 기능 및 수백 대의 위성단말의 상태를 동시에 제어하기 위해 DS-SS/TDMA 방식의 제어채널이 필요하나 동기 시간이 긴 문제가 있다. 본 논문은 짧은 주기의 세부 Bin으로 구성된 프리앰블을 제어채널 데이터 앞부분에 삽입하고 각 세부 Bin을 병렬적으로 수신하는 정합 필터형태의 동기회로를 적용함으로서 심각한 재밍환경에서 수 ms이내에 대부분의 제어채널 패킷을 수신할 수 있는 제어채널 동기방법을 제안한다.

  • PDF

DCT and DWT Based Robust Audio Watermarking Scheme for Copyright Protection

  • Deb, Kaushik;Rahman, Md. Ashikur;Sultana, Kazi Zakia;Sarker, Md. Iqbal Hasan;Chong, Ui-Pil
    • 융합신호처리학회논문지
    • /
    • 제15권1호
    • /
    • pp.1-8
    • /
    • 2014
  • Digital watermarking techniques are attracting attention as a proper solution to protect copyright for multimedia data. This paper proposes a new audio watermarking method based on Discrete Cosine Transformation (DCT) and Discrete Wavelet Transformation (DWT) for copyright protection. In our proposed watermarking method, the original audio is transformed into DCT domain and divided into two parts. Synchronization code is applied on the signal in first part and 2 levels DWT domain is applied on the signal in second part. The absolute value of DWT coefficient is divided into arbitrary number of segments and calculates the energy of each segment and middle peak. Watermarks are then embedded into each middle peak. Watermarks are extracted by performing the inverse operation of watermark embedding process. Experimental results show that the hidden watermark data is robust to re-sampling, low-pass filtering, re-quantization, MP3 compression, cropping, echo addition, delay, and pitch shifting, amplitude change. Performance analysis of the proposed scheme shows low error probability rates.

An Image Retrieving Scheme Using Salient Features and Annotation Watermarking

  • Wang, Jenq-Haur;Liu, Chuan-Ming;Syu, Jhih-Siang;Chen, Yen-Lin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제8권1호
    • /
    • pp.213-231
    • /
    • 2014
  • Existing image search systems allow users to search images by keywords, or by example images through content-based image retrieval (CBIR). On the other hand, users might learn more relevant textual information about an image from its text captions or surrounding contexts within documents or Web pages. Without such contexts, it's difficult to extract semantic description directly from the image content. In this paper, we propose an annotation watermarking system for users to embed text descriptions, and retrieve more relevant textual information from similar images. First, tags associated with an image are converted by two-dimensional code and embedded into the image by discrete wavelet transform (DWT). Next, for images without annotations, similar images can be obtained by CBIR techniques and embedded annotations can be extracted. Specifically, we use global features such as color ratios and dominant sub-image colors for preliminary filtering. Then, local features such as Scale-Invariant Feature Transform (SIFT) descriptors are extracted for similarity matching. This design can achieve good effectiveness with reasonable processing time in practical systems. Our experimental results showed good accuracy in retrieving similar images and extracting relevant tags from similar images.

Hybrid Tensor Flow DNN and Modified Residual Network Approach for Cyber Security Threats Detection in Internet of Things

  • Alshehri, Abdulrahman Mohammed;Fenais, Mohammed Saeed
    • International Journal of Computer Science & Network Security
    • /
    • 제22권10호
    • /
    • pp.237-245
    • /
    • 2022
  • The prominence of IoTs (Internet of Things) and exponential advancement of computer networks has resulted in massive essential applications. Recognizing various cyber-attacks or anomalies in networks and establishing effective intrusion recognition systems are becoming increasingly vital to current security. MLTs (Machine Learning Techniques) can be developed for such data-driven intelligent recognition systems. Researchers have employed a TFDNNs (Tensor Flow Deep Neural Networks) and DCNNs (Deep Convolution Neural Networks) to recognize pirated software and malwares efficiently. However, tuning the amount of neurons in multiple layers with activation functions leads to learning error rates, degrading classifier's reliability. HTFDNNs ( Hybrid tensor flow DNNs) and MRNs (Modified Residual Networks) or Resnet CNNs were presented to recognize software piracy and malwares. This study proposes HTFDNNs to identify stolen software starting with plagiarized source codes. This work uses Tokens and weights for filtering noises while focusing on token's for identifying source code thefts. DLTs (Deep learning techniques) are then used to detect plagiarized sources. Data from Google Code Jam is used for finding software piracy. MRNs visualize colour images for identifying harms in networks using IoTs. Malware samples of Maling dataset is used for tests in this work.

장르별 협업필터링을 이용한 영화 추천 시스템의 성능 향상 (Performance Improvement of a Movie Recommendation System using Genre-wise Collaborative Filtering)

  • 이재식;박석두
    • 지능정보연구
    • /
    • 제13권4호
    • /
    • pp.65-78
    • /
    • 2007
  • 추천시스템은 개인화 서비스를 구현하는 방법 중의 하나이다. 추천시스템은 다양한 기법을 통해 구축될 수 있는데, 최근 전자상거래 분야에서 사용되는 기법들 중에서 대표적인 것이 협업필터링이다. 협업필터링은 영화나 음악 같이 명시적인 속성만으로 그 특성을 기술하는데 한계가 있는 아이템의 추천문제에 효과적으로 적용되어 왔다. 하지만, 이 기법은 희박성, 확장성 및 투명성 등의 문제점을 가지고 있는데, 본 연구에서는 희박성과 확장성 문제를 극복하는 방안으로 장르별 협업필터링 방법을 제안한다. 장르별 협업필터링 방법은 아이템을 최종적으로 추천하기 전에 아이템의 상위 카테고리, 즉 장르에 대한 정보를 활용하는 방법이다. 본 연구에서 제안하는 방법의 실용성을 보이기 위하여, 영화 추천시스템인 GenreWise_CF를 개발하여, 공개 데이터인 MovieLens Data에 적용하여 평가하였다. 실험 결과, 본 연구에서 제안한 GenreWise_CF가 전통적인 협업 필터링을 적용하여 개발한 추천시스템인 Basic_CF보다 향상된 성능을 보였다.

  • PDF

대용량 악성코드의 특징 추출 가속화를 위한 분산 처리 시스템 설계 및 구현 (Distributed Processing System Design and Implementation for Feature Extraction from Large-Scale Malicious Code)

  • 이현종;어성율;황두성
    • 정보처리학회논문지:컴퓨터 및 통신 시스템
    • /
    • 제8권2호
    • /
    • pp.35-40
    • /
    • 2019
  • 기존 악성코드 탐지는 다형성 또는 난독화 기법이 적용된 변종 악성코드 탐지에 취약하다. 기계학습 알고리즘은 악성코드에 내재된 패턴을 학습시켜 유사 행위 탐지가 가능해 기존 탐지 방법을 대체할 수 있다. 시간에 따라 변화하는 악성코드 패턴을 학습시키기 위해 지속적으로 데이터를 수집해야한다. 그러나 대용량 악성코드 파일의 저장 및 처리 과정은 높은 공간과 시간 복잡도가 수반된다. 이 논문에서는 공간 복잡도를 완화하고 처리 시간을 가속화하기 위해 HDFS 기반 분산 처리 시스템을 설계한다. 분산 처리 시스템을 이용해 2-gram 특징과 필터링 기준에 따른 API 특징 2개, APICFG 특징을 추출하고 앙상블 학습 모델의 일반화 성능을 비교했다. 실험 결과로 특징 추출의 시간 복잡도는 컴퓨터 한 대의 처리 시간과 비교했을 때 약 3.75배 속도가 개선되었으며, 공간 복잡도는 약 5배의 효율성을 보였다. 특징 별 분류 성능을 비교했을 때 2-gram 특징이 가장 우수했으나 훈련 데이터 차원이 높아 학습 시간이 오래 소요되었다.

DCT 변환상에서 방향성 Zonal 필터를 이용한 화상 데이터 압축 (In DCT,Image Data Compression via Directional Zonal Filters)

  • 정동범;김해수;조승환;이근영
    • 한국통신학회논문지
    • /
    • 제16권2호
    • /
    • pp.172-179
    • /
    • 1991
  • In this paper we have proposed an efficient coding algorithm using directional filtering. First an image is transformed by using DCT which has better energy compaction and then the transformed image is divided into a low frequency component and several high frequency components. The transformed coefficients of each parts are transmitted respectively by using huffman code and these are transformed inversely at receiver. For the directional components total edge images are reconstructed at zero crossing points. We are able to reduce the amount of data by getting of complex component and making directional angles 90. As a results, this proposed method is better than that of Kunt in respect of processing time and memories. We have 38dB of image quality with objective measurement of PSNR and 0.26bpp of compression ratio which is acceptable.

  • PDF

DCT를 이용한 영상압축 알고리즘에 관한 연구 (A study of Image Compression Algorithm using DCT)

  • 한동호;이준노
    • 대한의용생체공학회:의공학회지
    • /
    • 제13권4호
    • /
    • pp.323-330
    • /
    • 1992
  • A Study of Image Compression Algorithm using DCT This paper describes the system that implement a JPEG(Joint Photographic Experts Group) algorithm based on DCT(Discrete Cosine Transform) uslng CCD kameva, Image Grabber, and IBM PC. After cosine transforms the acquisited image, this algorithm quantize and entropy encode the coefficients by JPEG code table. The coefficients are reconstructed by the Huffman decoding, dequantized procedure, and Inverse cosine transform. The results obtained from the impleulented system are as follows. (1) For effcient storage and easy implementation, this system save Image as a PCX formal (2) Thls system get 7:1 compression ratio(3.8 RMSE value) without large distortion. (3) With a low pass filtering, thls system eliminate high frequency components and get 20% enhanced compression ratio. (4) Thls system enhance the reconstructed Image using histogram modeling.

  • PDF

Theoretically-based and practice-oriented formulations for the floor spectra evaluation

  • Abbati, Stefania Degli;Cattari, Serena;Lagomarsino, Sergio
    • Earthquakes and Structures
    • /
    • 제15권5호
    • /
    • pp.565-581
    • /
    • 2018
  • This paper proposes a new analytical formulation for computing the seismic input at various levels of a structure in terms of floor response spectra. The approach, which neglects the dynamic interaction between primary structure and secondary element, is particularly useful for the seismic assessment of secondary and non-structural elements. The proposed formulation has a robust theoretical basis and it is based on few meaningful dynamic parameters of the main building. The method has been validated in the linear and nonlinear behavior of the main building through results coming from both experimental tests (available in literature) and parametric numerical analyses. The conditions, for which the Floor Spectrum Approach and its simplified assumptions are valid, have been derived in terms of specific interval ratios between the mass of the secondary element and the participant mass of the main structure. Finally, a practice-oriented formulation has been derived, which could be easily implementable also at code level.