• 제목/요약/키워드: Connected graph

검색결과 249건 처리시간 0.036초

그래프 컨벌루션 네트워크 기반 주거지역 감시시스템의 얼굴인식 알고리즘 개선 (Improvement of Face Recognition Algorithm for Residential Area Surveillance System Based on Graph Convolution Network)

  • 담하의;민병원
    • 사물인터넷융복합논문지
    • /
    • 제10권2호
    • /
    • pp.1-15
    • /
    • 2024
  • 스마트 지역사회의 구축은 지역사회의 안전을 보장하는 새로운 방법이자 중요한 조치이다. 촬영 각도로 인한 얼굴 기형 및 기타 외부 요인의 영향으로 인한 신원 인식 정확도 문제를 해결하기 위해 이 논문에서는 네트워크 모델을 구축할 때 전체 그래프 컨벌루션 모델을 설계하고, 그래프 컨벌루션 모델에 협력하여 얼굴의 핵심을 추출한다. 또한 얼굴의 핵심을 특정 규칙에 따라 핵심 포인트를 구축하며 이미지 컨벌루션 구조를 구축한 후 이미지 컨벌루션 모델을 추가하여 이미지 특징의 핵심을 개선한다. 마지막으로 두 사람의 얼굴의 이미지 특징 텐서를 계산하고 전체 연결 레이어를 사용하여 집계된 특징을 추출하고 판별하여 인원의 신원이 동일한지 여부를 결정한다. 최종적으로 다양한 실험과 테스트를 거쳐 이 글에서 설계한 네트워크의 얼굴 핵심 포인트에 대한 위치 정확도 AUC 지표는 300W 오픈 소스 데이터 세트에서 85.65%에 도달했다. 자체 구축 데이터 세트에서 88.92% 증가했다. 얼굴 인식 정확도 측면에서 이 글에서 제안한 IBUG 오픈 소스 데이터 세트에서 네트워크의 인식 정확도는 83.41% 증가했으며 자체 구축 데이터 세트의 인식 정확도는 96.74% 증가했다. 실험 결과는 이 글에서 설계된 네트워크가 얼굴을 모니터링하는 데 더 높은 탐지 및 인식 정확도를 가지고 있음을 보여준다.

A Simple Polygon Search Algorithm

  • Lee, Sang-Un
    • 한국컴퓨터정보학회논문지
    • /
    • 제21권5호
    • /
    • pp.41-47
    • /
    • 2016
  • This paper considers simple polygon search problem. How many searchers find a mobile intruder that is arbitrarily faster than the searcher within polygon art gallery? This paper uses the visibility graph that is connected with edges for mutually visible vertices. Given visibility graph, we select vertex u that is conjunction ${\Delta}(G)$ in $N_G(v)$ for $d_G(v){\leq}4$. We decide 1-searchable if $1{\leq}{\mid}u{\mid}{\leq}2$ and 2-searchable if ${\mid}u{\mid}{\geq}3$. We also present searcher's shortest path. This algorithm is verified by varies 1 or 2-searchable polygons.

DEGREE CONDITIONS AND FRACTIONAL k-FACTORS OF GRAPHS

  • Zhou, Sizhong
    • 대한수학회보
    • /
    • 제48권2호
    • /
    • pp.353-363
    • /
    • 2011
  • Let k $\geq$ 1 be an integer, and let G be a 2-connected graph of order n with n $\geq$ max{7, 4k+1}, and the minimum degree $\delta(G)$ $\geq$ k+1. In this paper, it is proved that G has a fractional k-factor excluding any given edge if G satisfies max{$d_G(x)$, $d_G(y)$} $\geq$ $\frac{n}{2}$ for each pair of nonadjacent vertices x, y of G. Furthermore, it is showed that the result in this paper is best possible in some sense.

이벤트 네트워크 상관분석을 이용한 IoT 서비스에서의 침입탐지 (Intrusion Detection on IoT Services using Event Network Correlation)

  • 박보석;김상욱
    • 한국멀티미디어학회논문지
    • /
    • 제23권1호
    • /
    • pp.24-30
    • /
    • 2020
  • As the number of internet-connected appliances and the variety of IoT services are rapidly increasing, it is hard to protect IT assets with traditional network security techniques. Most traditional network log analysis systems use rule based mechanisms to reduce the raw logs. But using predefined rules can't detect new attack patterns. So, there is a need for a mechanism to reduce congested raw logs and detect new attack patterns. This paper suggests enterprise security management for IoT services using graph and network measures. We model an event network based on a graph of interconnected logs between network devices and IoT gateways. And we suggest a network clustering algorithm that estimates the attack probability of log clusters and detects new attack patterns.

Graph Equations Involving Tensor Product of Graphs

  • Patil, H.P.;Raja, V.
    • Kyungpook Mathematical Journal
    • /
    • 제57권2호
    • /
    • pp.301-307
    • /
    • 2017
  • In this paper, we solve the following four graph equations $L^k(G)=H{\oplus}J$; $M(G)=H{\oplus}J$; ${\bar{L^k(G)}}=H{\oplus}J$ and ${\bar{M(G)}}=H{\oplus}J$, where J is $nK_2$ for $n{\geq}1$. Here, the equality symbol = means the isomorphism between the corresponding graphs. In particular, we shall obtain all pairs of graphs (G, H), which satisfy the above mentioned equations, upto isomorphism.

THE ORIENTABLE NUMBERS OF A GRAPH

  • Kim, Byung Kee
    • Journal of applied mathematics & informatics
    • /
    • 제32권3_4호
    • /
    • pp.503-509
    • /
    • 2014
  • For a connected graph G, there are orientations of G have different hull numbers, geodetic numbers, and convexity numbers. The lower orientable hull number $h^-(G)$ is defined as the minimum hull number among all the orientations of G and the upper orientable hull number $h^+(G)$ as the maximum hull number among all the orientations of G. The lower and upper orientable geodetic numbers $g^-(G)$ and $g^+(G)$ are defined similarily. In this paper, We investigate characterizations of the orientable numbers and the conditions that the relation $h^-(G){\leq}g^-(G)$ < $h^+(G){\leq}g^+(G)$ holds.

필기 한글 문자의 모양 분석과 표현 (Shape Analysis and Representation of Handwritten Hangul Characters)

  • 홍기천;오일석
    • 한국정보처리학회논문지
    • /
    • 제7권5호
    • /
    • pp.1579-1586
    • /
    • 2000
  • 본 논문에서는 필기 한글의 모양을 분석하고 그 결과를 표현하는 방법을 제안한다. 하나의 한글 문자를 구성하는 연결 요소 각각은 다수 개의 부품들로 분해되고 분해된 요소들을 표현하기 위해 골격선을 추출하였다. 추출된 골격선으로부터 속성 그래프를 이용하여 필기 한글 문자를 표현하였다.속성 그래프의 노느는 하나의 부품에 해당하고 제지는 그들간의 연결로 관계를 나타낸다. 노드와 에지에는 패턴의 모양을 나타내는 여러 가지 유용한 정보를 저장하였다.

  • PDF

ASIC설계를 위한 하드웨어 할당 및 바인딩 알고리듬 (A Hardware Allocation and Binding Algorithm for ASIC Design)

  • 최지영;인치호;김희석
    • 한국정보처리학회논문지
    • /
    • 제7권4호
    • /
    • pp.1255-1262
    • /
    • 2000
  • This paper proposes a hardware allocation and binding algorithm for ASIC Design. The proposed algorithm works on schedules input graph and simultaneously allocates and binds functional units, interconnections and registers by considering interdependency between operations and storage elements in each control step, in order to share registers and interconnections connected to functional units, as much as possible. Especially, he register allocation is executes the allocation optimal using graph coloring. This paper shows the effectiveness of the algorithm by comparing experiments to determine number of functional unit and register in advance or to separate executing allocation and binding of existing system.

  • PDF

클러스터링을 이용한 경험적 태스크 할당 기법 (A Heuristic Task Allocation Scheme Based on Clustering)

  • 김석일;전중남;김관유
    • 한국정보처리학회논문지
    • /
    • 제6권10호
    • /
    • pp.2659-2669
    • /
    • 1999
  • This paper a heuristic, clustering based task allocation scheme applicable to non-directed task graph on a distributed system. This scheme firstly builds a task-machine graph, and then applies a clustering process where in a pair of tasks that are connected to the highest cost edge is merged into a big one or a task is allocated to a machine. During the process, the proposed scheme figure out a machine onto which the task allocation may cause deduction of large communication overhead that has incurred between the task and tasks that are already allocated to the machine while the computation costs is slightly increased in the machine. Simulation for the various task graphs shows that the scheduling using the proposed scheme result far better than ones by using the traditional schemes. A comparison with optimal task scheduling also promises that our scheme derives optimal results more occasionally than the traditional schemes do.

  • PDF

Separation of Overlapped Objects Using Face Relation Features

  • Song, Pil-Jae;Choi, Hong-Joo;Cha, Hyung-Tai;Hahn, Hern-Soo
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 2001년도 ICCAS
    • /
    • pp.28.3-28
    • /
    • 2001
  • This paper proposes a new algorithm that detects and separates the occluding and occluded objects in a 2D image. An input image is represented by the attributed graph where a node corresponds to a surface and an arc connecting two nodes describes the adjacency of the nodes in the image. Each end of arc is weighted by relation value which tells the number of edges connected to the surface represented by the node in the opposite side of the arc. In attributed graph homogeneous nodes pertained to the same object always construct one of three special patterns which can be simply classified by comparison of relation values of the arcs. The experimental results have shown that the proposed algorithm efficiently separates the objects ...

  • PDF