• Title/Summary/Keyword: Code method

Search Result 5,292, Processing Time 0.037 seconds

Low Complexity Video Encoding Using Turbo Decoding Error Concealments for Sensor Network Application (센서네트워크상의 응용을 위한 터보 복호화 오류정정 기법을 이용한 경량화 비디오 부호화 방법)

  • Ko, Bong-Hyuck;Shim, Hyuk-Jae;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.45 no.1
    • /
    • pp.11-21
    • /
    • 2008
  • In conventional video coding, the complexity of encoder is much higher than that of decoder. However, as more needs arises for extremely simple encoder in environments having constrained energy such as sensor network, much investigation has been carried out for eliminating motion prediction/compensation claiming most complexity and energy in encoder. The Wyner-Ziv coding, one of the representative schemes for the problem, reconstructs video at decoder by correcting noise on side information using channel coding technique such as turbo code. Since the encoder generates only parity bits without performing any type of processes extracting correlation information between frames, it has an extremely simple structure. However, turbo decoding errors occur in noisy side information. When there are high-motion or occlusion between frames, more turbo decoding errors appear in reconstructed frame and look like Salt & Pepper noise. This severely deteriorates subjective video quality even though such noise rarely occurs. In this paper, we propose a computationally extremely light encoder based on symbol-level Wyner-Ziv coding technique and a new corresponding decoder which, based on a decision whether a pixel has error or not, applies median filter selectively in order to minimize loss of texture detail from filtering. The proposed method claims extremely low encoder complexity and shows improvements both in subjective quality and PSNR. Our experiments have verified average PSNR gain of up to 0.8dB.

A Study on the Signal Control Unit's Reconstitution to Control the Separated Through/Left(or Right) Turn and the Median Bus Lane Signal for the Standard Traffic Signal Controller (표준규격 교통신호제어기에서 교통류별 전용신호 구현방안 연구)

  • Han, Won-Sub;Lee, Ho-Won;Hyun, Cheol-Seung;Joo, Doo-Hwan;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • According to the change of the traffic conditions, the requirement of controlling the separated left(or right) turn, the median bus lane and bicycle signal is increasing. However, the traffic signal controller standard based on the four-set lights restricts to control the three-set lights which control the separated direction and kind of traffics. This study suggests the method to control the three-set lights signal by improving the hardware and software for the traffic signal controller which is operated currently in the traffic scene. The 6 output ports of Load Signal Unit(LSU) which is consisted of Pedestrian Red, Pedestrian Green, Red, Yellow, Arrow and Green signal reconstitute 2 rows of the Red, Yellow, Green for three-set lights while the Signal Map data's code values which control the signal step of an individual Ring and LSU are established to adjust the LSU's output ports(R1 Y1 G1 R2 Y2 G2) of the three-set lights. The effect of using the separated through/left turn and the median lane bus signal of three-set lights is analyzed from a Mangwoo intersection in Seoul. The results of analysis show that the delay time of the east-west direction where the median bus lane is operated is especially improved with over 70 sec/veh.

  • PDF

Seismic Performance and Damage Prediction of Existing Fire-protection Pipe Systems Installed in RC Frame Structures (철근콘크리트 구조물 내 부착된 수계 관망시스템의 내진거동 및 손상예측)

  • Jung, Woo-Young;Ju, Bu-Seog
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.15 no.3
    • /
    • pp.37-43
    • /
    • 2011
  • Reliability of piping systems is essential to the safety of any important industrial facilities. During an earthquake, damage to the piping system can occur. It can also cause considerable economic losses and the loss of life following earthquakes. Traditionally, the study of the secondary system was less important than primary structure system, however it has recently been emerging as a key issue for the effective maintenance of the structural system and to help reduce nonstructural earthquake damage. The primary objectives of this study are to evaluate seismic design requirements and the seismic performance of gas and fire protection piping systems installed in reinforced concrete (RC) buildings. In order to characterize the seismic behavior of the existing piping system in an official building, 10 simulated earthquakes and 9 recorded real earthquakes were applied to ground level and the building system by the newmark average acceleration time history method. The results developed by this research can be used for the improvement of new seismic code/regulatory guidelines of secondary systems as well as the improvement of seismic retrofitting or the strengthening of the current piping system.

Seismic Performance Evaluation of a Cone-type Friction Pendulum Bearing System (원추형 마찰진자베어링의 내진성능평가)

  • Jeon, Bub-Gyu;Chang, Sung-Jin;Park, Kyung-Rock;Kim, Nam-Sik;Jung, Duk-Young
    • Journal of the Earthquake Engineering Society of Korea
    • /
    • v.15 no.2
    • /
    • pp.23-33
    • /
    • 2011
  • In this study, a CFPBS (Cone-type Friction Pendulum Bearing System) was developed which controls the acceleration delivered to the structure to prevent damage and degradation of the critical communication equipment in case of an earthquake. The isolation performance of the CFPBS was evaluated by numerical analysis. The CFPBS was manufactured in the shape of a cone differenced from the existing FPS (Friction Pendulum System), and a pattern was engraved on the friction surface. The natural frequencies of the CFPBS were evaluated from a free-vibration test with the seismic isolator system consisting of four CFPBSs. In order to verify its earthquake-resistant performance, a numerical analysis program was created from the equation of the CFPBS induced from the equations of motion. A simplified theoretical equation of the CFPBS was proposed to manufacture the equipment which could demonstrate the necessary performance. Artificial seismic waves satisfying the maximum earthquake scale of the Korean Building Code-Structural (KBC-2005) were created and verified to review the earthquake-resistant performance of the CFPBS by numerical analysis. The superstructural mass of the CFPBS and skew angle of the friction surface were considered for numerical analysis with El Centro NS (1940), Kobe NS (1995) and artificial seismic waves. The CFPBS isolation performance evaluation was based on the results of numerical analysis and the executed comparative analysis between the results from numerical analysis and the simplified theoretical equation under the same conditions.

A Numerical Study of Effects of Body Shape on Cavity and Drag of Underwater Vehicle (몸체 형상이 수중운동체의 공동 발달과 항력특성에 미치는 영향에 대한 수치적 연구)

  • Kim, Hyoung-Tae;Kang, Kyung-Tae;Choi, Jung-Kyu;Jung, Young-Rae;Kim, Min-Jae
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.55 no.3
    • /
    • pp.252-264
    • /
    • 2018
  • The calculation of steady-state cavitating flows around Supercavitating Underwater Bodies (SUB's), which consist of a circular disk head (cavitator), a conical fore-body, a cylindrical middle-body and either a boat-tail or a flare-tail, are carried out. To calculate the axisymmetric cavitating flow, used is a commercial computational fluid dynamics code based on the finite volume method, Fluent. From the analysis of numerical results, the cavity and drag, affected by the fore-body and tail of the SUB's, are investigated. Firstly, the effect of the fore-body shape is investigated with the same disk cavitator and a cylindrical rear-body of fixed diameter. Then with the same cavitator and a fixed fore-body, the effect of the rear-body shape is investigated. Before the cavity generated by the cavitator covers the slant of fore-bodies sufficiently, the larger the cone angle of the fore-body(i.e., the shorter the slant length), the larger the drag and the slower the development of cavity. After the cavity covers the fore-body completely so that the pressure drag component of the body is vanished, the characteristics of drag-velocity curves are identical. Also, as the tail angle is bigger, the cavity generated by the cavitator is suppressed further and the drag becomes larger. The peak of the drag appears for the flare-tail, i.e., when the tail angle is positive(+). On the contrary, the trough of the drag appears for the boat-tail, i.e., when the tail angle is negative(-). When the tail angle is 5 degrees, the peak of the drag appears at the body speed of 80m/s and the value of the drag is 43% larger than that at the design speed of 100m/s. When the tail angle is -5 degrees, the trough of the total drag appears at 75m/s and that drag is 30% smaller than that of the cavitator, which means the rest of the body has a negative drag.

A Study of Web Application Attack Detection extended ESM Agent (통합보안관리 에이전트를 확장한 웹 어플리케이션 공격 탐지 연구)

  • Kim, Sung-Rak
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.1 s.45
    • /
    • pp.161-168
    • /
    • 2007
  • Web attack uses structural, logical and coding error or web application rather than vulnerability to Web server itself. According to the Open Web Application Security Project (OWASP) published about ten types of the web application vulnerability to show the causes of hacking, the risk of hacking and the severity of damage are well known. The detection ability and response is important to deal with web hacking. Filtering methods like pattern matching and code modification are used for defense but these methods can not detect new types of attacks. Also though the security unit product like IDS or web application firewall can be used, these require a lot of money and efforts to operate and maintain, and security unit product is likely to generate false positive detection. In this research profiling method that attracts the structure of web application and the attributes of input parameters such as types and length is used, and by installing structural database of web application in advance it is possible that the lack of the validation of user input value check and the verification and attack detection is solved through using profiling identifier of database against illegal request. Integral security management system has been used in most institutes. Therefore even if additional unit security product is not applied, attacks against the web application will be able to be detected by showing the model, which the security monitoring log gathering agent of the integral security management system and the function of the detection of web application attack are combined.

  • PDF

ICFGO : UI Concealing and Dummy Flow Insertion Method for Inter-Procedural Control Flow Graph Obfuscation (ICFGO : Inter-Procedural Control Flow Graph 난독화를 위한 UI 은닉 및 Dummy Flow 삽입 기법)

  • Shim, Hyunseok;Jung, Souhwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.3
    • /
    • pp.493-501
    • /
    • 2020
  • For the obfuscation of Flow Analysis on the Android operating system, the size of the Flow Graph can be large enough to make analysis difficult. To this end, a library in the form of aar was implemented so that it could be inserted into the application in the form of an external library. The library is designed to have up to five child nodes from the entry point in the dummy code, and for each depth has 2n+1 numbers of methods from 100 to 900 for each node, so it consists of a total of 2,500 entry points. In addition, entry points consist of a total of 150 views in XML, each of which is connected via asynchronous interface. Thus, the process of creating a Inter-procedural Control Flow Graph has a maximum of 14,175E+11 additional cases. As a result of applying this to application, the Inter Procedure Control Flow Analysis too generates an average of 10,931 edges and 3,015 nodes with an average graph size increase of 36.64%. In addition, in the APK analyzing process showed that up to average 76.33MB of overhead, but only 0.88MB of execution overhead in the user's ART environment.

A Study on the African Image Expressed in 2005 S/S Collections (2005 S/S 컬렉션에 나타난 아프리카 이미지 연구)

  • Lee, Keum-Hee;Kim, Wan-Joo;Kim, So-Ra
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.31 no.6 s.165
    • /
    • pp.911-922
    • /
    • 2007
  • In this study, for the purpose of correct viewing on the image of Africa and understanding of modem fashion, African image and art, the general characteristics of African costume, the background of fashion subjecting African image, and the trend according to ages were examined based on theoretical background. Then the researcher drew African image by analyzing the works in four 2005 S/S major fashion collections to designers and design factors. The ten voted designers' and brands' works in 2005 S/S collections had four concepts of African image; 'Wild Erotic', 'Abstract Primitive', 'Natural Elegant' and 'Sporty Romantic'. The viewpoint of modem fashion on African image from the aspect of design, designer and fashion trend can be examined as below. First, African costume, which was religious and ceremonial, appeared to emphasize its esthetic side with decorative details in modem fashion design and designers competed to choose a method to harmonize tradition and modem style and by adopting these from occult to decorative meaning, Second, fashion designers presented city unpolished beauty of modem women to a special style and made african image to be recognized as a code of fashion culture by integrating it with modem people's mind to go back to the past and admiration for the purity of nature. Third, thanks to the instinctive vitality hidden in the primitive life, inspiration for creative design that is found in the esthetic mind of the Indians, foreign taste emphasizing ethnic trend, and admiration to naturalism due to the increase of concern over ecology, 'African image' led the beginning of 21C trend by being settled as a in fashion trend.

A study of collection evaluation using conspectus methodology (컨스펙터스방법을 이용한 장서평가연구)

  • 박진희
    • Journal of the Korean Society for information Management
    • /
    • v.15 no.2
    • /
    • pp.163-191
    • /
    • 1998
  • The im of the present study is to introduce and develop the concept and theory of conspectus for the first time in Korea, and to propose a new evaluation model for book collection by actually applying the developed methodology to the collection of a special library dedicated to Biblical Studies. Conspectus is a standardized and objective evaluation method that classifies the main collection according to the division, category, subject, and then gives each collection ots appropriate collection level code by analyzing the classified collection in terms of three different dimensions, which are Current Collection Level(CL), Acquisition Commitment Level(AC), and Collection Goal Level(GL). To evaluate the collection of the sample library, shelflist analysis, list checking, acquisition data in ordering process by their main subject, and survey of its users have been carried out, and all of their results ahve been indicated in terms of eleven collection level codes developed by WLN Conspectus. T e collection of sample library was evaluated as '3cW' for CL, '4W' for AC, and '4W' for GL when the Conspectus methodology was applied for evaluation. This study could be utilized as an collection evaluation model for theological libraries, and become a basis to bring about more active cooperative collection development among related libraries.

  • PDF

Design of T-DMB Automatic Emergency Alert Service Standard: Part 2 Service Model, Transport Channel, and Service Signaling (지상파 DMB 자동재난경보방송표준 설계: 제2부 서비스 모델, 전송 채널, 서비스 시그널링)

  • Choi, Seong-Jong;Kwon, Dae-Bok;Kim, Jae-Yeon;Oh, Keon-Sik;Chang, Tae-Uk;Hahm, Young-Kwon
    • Journal of Broadcast Engineering
    • /
    • v.12 no.6
    • /
    • pp.630-640
    • /
    • 2007
  • This paper presents the design of service model, transport channel, and service signaling for the Terrestrial DMB Automatic Emergency Alert Service (AEAS) Standard. The paper begins with the analysis of technical backgrounds related to the design topics. Next, the raper presents the design of service model for the AEAS. Since, unlike the regular T-DMB services, the AEAS is event-driven and common to all services, some problems have been identified to design a service model conforming to the T-DMB standard. So, the paper proposes a new concept, called the common service, and the AEAS is modeled using the common service. Next, in order to decide the transport channel for the alert information, the paper proposes to divide the alert information into the message which contains code/text-based essential information, and the supplemental multimedia information. Then, the paper tries to find the most efficient transport channels. Emergency Warning Service (EWS) which uses FIG 5/2 is selected for the delivery of the message. The paper proposes no constraints on delivery of supplemental information except that it shall use the MSC. Finally, it proposes the service signaling for the common service and transport channel. Due to the problems of conventional signaling using the MCI, it proposes a new signaling method. The paper will contribute as a guideline to the development for emergency alert service standards fur other broadcasting media.