• Title/Summary/Keyword: Detection Process

Search Result 3,689, Processing Time 0.03 seconds

Space-Time Concatenated Convolutional and Differential Codes with Interference Suppression for DS-CDMA Systems (간섭 억제된 DS-CDMA 시스템에서의 시공간 직렬 연쇄 컨볼루션 차등 부호 기법)

  • Yang, Ha-Yeong;Sin, Min-Ho;Song, Hong-Yeop;Hong, Dae-Sik;Gang, Chang-Eon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.1
    • /
    • pp.1-10
    • /
    • 2002
  • A space-time concatenated convolutional and differential coding scheme is employed in a multiuser direct-sequence code-division multiple-access(DS-CDMA) system. The system consists of single-user detectors (SUD), which are used to suppress multiple-access interference(MAI) with no requirement of other users' spreading codes, timing, or phase information. The space-time differential code, treated as a convolutional code of code rate 1 and memory 1, does not sacrifice the coding efficiency and has the least number of states. In addition, it brings a diversity gain through the space-time processing with a simple decoding process. The iterative process exchanges information between the differential decoder and the convolutional decoder. Numerical results show that this space-time concatenated coding scheme provides better performance and more flexibility than conventional convolutional codes in DS-CDMA systems, even in the sense of similar complexity Further study shows that the performance of this coding scheme applying to DS-CDMA systems with SUDs improves by increasing the processing gain or the number of taps of the interference suppression filter, and degrades for higher near-far interfering power or additional near-far interfering users.

Extraction of Renal Glomeruli Region using Genetic Algorithm (유전적 알고리듬을 이용한 신장 사구체 영역의 추출)

  • Kim, Eung-Kyeu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.2
    • /
    • pp.30-39
    • /
    • 2009
  • Extraction of glomeruli region plays a very important role for diagnosing nephritis automatically. However, it is not easy to extract glomeruli region correctly because the difference between glomeruli region and other region is not obvious, simultaneously unevennesses that is brought in the sampling process and in the imaging process. In this study, a new method for extracting renal glomeruli region using genetic algorithm is proposed. The first, low and high resolution images are obtained by using Laplacian-Gaussian filter with ${\sigma}=2.1$ and ${\sigma}=1.8$, then, binary images by setting the threshold value to zero are obtained. And then border edge is detected from low resolution images, the border of glomeruli is expressed by a closed B-splines' curve line. The parameters that decide the closed curve line with this low resolution image prevent the noises and the border lines from breaking off in the middle by searching using genetic algorithm. Next, in order to obtain more precise border edges of glomeruli, the number of node points is increased and corrected in order from eight to sixteen and thirty two from high resolution images. Finally, the validity of this proposed method is shown to be effective by applying to the real images.

A Study for Co-channel Interference Cancelation Algorithm with Channel Estimation for WBAN System Application (WBAN 환경에서 채널 추정 기반의 공용 채널 간섭 제거 기술)

  • Choi, Won-Seok;Kim, Jeong-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6C
    • /
    • pp.476-482
    • /
    • 2012
  • In this paper, we analyze and compare several co-channel interference mitigation algorithms for WBAN application in 2.4 GHz ISM frequency bands. ML (Maximum Likelihood), OC (Optimal Combining) and MMSE (Minimum Mean Square Error) has been considered for the possible techniques for interference cancellation in view of the trade off between the performance and the complexity of implementation. Based on the channel model of IEEE 802.15.6 standard, simulation results show that ML and OC attains the lower BER performance than that of MMSE if we assume the perfect channel estimation. But, ML and OC have the additional requirement of implementation for his own and other users's channel estimation process, hence, besides the BER performance, the complexity of implementation and the sensitivity to channel estimation error should be considered since it requires the simple and small sized equipment for WBAN system application. In addition, the gap of detection BER performance between ML, OC and MMSE is much decreased under the imperfect channel estimation if we adopt real channel estimation process, therefore, in order to apply to WBAN system, the trade off between the BER performance and complexity of implemetation should be seriously considered to decide the best co-channel interference cancellation for WBAN system application.

Monitoring on Benzo(a)pyrene Content in Oriental medicine (유통 한약재 중 벤조피렌 함유량에 관한 모니터링)

  • Lee, Mi-Yeong;Jung, Sang-Mi;Lee, Gye-Won
    • Journal of Digital Convergence
    • /
    • v.10 no.7
    • /
    • pp.201-206
    • /
    • 2012
  • Benzo(a)pyrene is a polycyclic aromatic hydrocarbons (PAHs) whose metabolites are mutagenic and highly carcinogenic and is listed as a Group 1 carcinogen by the IARC. It has been found at variable concentrations in several foods and is associated with several factors during the process including contaminated raw materials, exposure of environment, and procedure of process or cooking. In this study, benzo(a)pyrene in 45 oriental medicines were determined by HPLC/FLD. The calibration curves of benzo(a)pyrene was linear over the concentration range of 0.5~40 ng/mL with correlation coefficient of above 0.999. The limit of detection (LOD) and limit of quantitation (LOQ) of benzo(a)pyrene were 0.04 and 0.10 ${\mu}g/kg$. Benzo(a)pyrene in 3 samples out of 45 samples was not detected. The level of benzo(a)pyrene in 26 (57.7%), 8 (17.8%) and 7 (15.6%) samples was 0.1~0.5, 0.5~1.0 and 1.0~5.0 ${\mu}g/kg$, respectively. Especially, content of benzo(a)pyrene in Coptis Rhizome is the highest (5.97 ${\mu}g/kg$). In conclusion, these results suggest that could be applied to fundamental study and guideline on drying condition to decrease content of benzo(a)pyrene in oriental medicine.

Keyword Filtering about Disaster and the Method of Detecting Area in Detecting Real-Time Event Using Twitter (트위터를 활용한 실시간 이벤트 탐지에서의 재난 키워드 필터링과 지명 검출 기법)

  • Ha, Hyunsoo;Hwang, Byung-Yeon
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.5 no.7
    • /
    • pp.345-350
    • /
    • 2016
  • This research suggests the keyword filtering about disaster and the method of detecting area in real-time event detecting system by analyzing contents of twitter. The diffusion of smart-mobile has lead to a fast spread of SNS and nowadays, various researches based on studying SNS are being processed. Among SNS, the twitter has a characteristic of fast diffusion since it is written in 140 words of short paragraph. Therefore, the tweets that are written by twitter users are able to perform a role of sensor. By using these features the research has been constructed which detects the events that have been occurred. However, people became reluctant to open their information of location because it is reported that private information leakage are increasing. Also, problems associated with accuracy are occurred in process of analyzing the tweet contents that do not follow the spelling rule. Therefore, additional designing keyword filtering and the method of area detection on detecting real-time event process were required in order to develop the accuracy. This research suggests the method of keyword filtering about disaster and two methods of detecting area. One is the method of removing area noise which removes the noise that occurred in the local name words. And the other one is the method of determinating the area which confirms local name words by using landmarks. By applying the method of keyword filtering about disaster and two methods of detecting area, the accuracy has improved. It has improved 49% to 78% by using the method of removing area noise and the other accuracy has improved 49% to 89% by using the method of determinating the area.

A Path Travel Time Estimation Study on Expressways using TCS Link Travel Times (TCS 링크통행시간을 이용한 고속도로 경로통행시간 추정)

  • Lee, Hyeon-Seok;Jeon, Gyeong-Su
    • Journal of Korean Society of Transportation
    • /
    • v.27 no.5
    • /
    • pp.209-221
    • /
    • 2009
  • Travel time estimation under given traffic conditions is important for providing drivers with travel time prediction information. But the present expressway travel time estimation process cannot calculate a reliable travel time. The objective of this study is to estimate the path travel time spent in a through lane between origin tollgates and destination tollgates on an expressway as a prerequisite result to offer reliable prediction information. Useful and abundant toll collection system (TCS) data were used. When estimating the path travel time, the path travel time is estimated combining the link travel time obtained through a preprocessing process. In the case of a lack of TCS data, the TCS travel time for previous intervals is referenced using the linear interpolation method after analyzing the increase pattern for the travel time. When the TCS data are absent over a long-term period, the dynamic travel time using the VDS time space diagram is estimated. The travel time estimated by the model proposed can be validated statistically when compared to the travel time obtained from vehicles traveling the path directly. The results show that the proposed model can be utilized for estimating a reliable travel time for a long-distance path in which there are a variaty of travel times from the same departure time, the intervals are large and the change in the representative travel time is irregular for a short period.

An Experimental Study on the Effect of Subperiosteal Transplantation of Fracture Site Hematoma: Focus on the Scintigraphic Detection (골절부위에 생긴 혈종의 골막하 이식이 골형성에 미치는 영향에 관한 실험적 연구 - 골스캔 소견을 중심으로 -)

  • Yang, Seoung-Oh;Kang, Hung-Sik;Chang, Kee-Hyun;Lee, Myung-Chul;Koo, Kyung-Hoi;Seung, Sang-Chul;Park, In-Ae
    • The Korean Journal of Nuclear Medicine
    • /
    • v.24 no.1
    • /
    • pp.124-132
    • /
    • 1990
  • It has been reported that hematoma is one of the most crucial factors in fracture healing since callus formation is disturbed by washing out the hematoma near a fracture site. However, it is not clear why the hamatoma is important and how it plays a role during the fracture healing. In order to investigate the role of hematoma in the process of fracture healing, the osteogenic potential by subperiosteal transplantation have been studied. Experimental fractures by operation were made at the mid-shaft of the tibia in New Zealand white rabbits. Removal of hematoma at the fracture site was done after 2 and 3 days from experimental fracture, and the removed hematoma was transplanted into the subperiosteal area at the mid-shaft of the ulna of each rabbit. As control groups, we have performed 3 different procedures 1) the hematoma was transplanted into the muscular layers at the thigh and forearm; 2) autologous blood clots were transplanted into the subperiosteal area of the ulna; and 3) sham operation without a transplantation into the subperiosteal area. After transplantation, serial bone scintigraphy and simple radiography were performed at 4 days, 1 week, and 2 weeks to detect an abnormality. The results of bone scintigraphy were positive in 5 of 6 experimental group. However, all in three control groups were negative. Histological observation of the positive bone revealed new bone formation with trabeculation. These results suggest the hematoma in fracture site has osteogenic potential in the subperiosteal area which can be demonstrable by bone scintigraphy and histologic findings. Therefore, it is considered that hematoma of the fracture site plays an important role in the process of fracture healing. Further biochemical investigation using various experimental models is mandatory to apply this preliminary result to the treatment of clinical delayed union or nonunion.

  • PDF

A Novel of Data Clustering Architecture for Outlier Detection to Electric Power Data Analysis (전력데이터 분석에서 이상점 추출을 위한 데이터 클러스터링 아키텍처에 관한 연구)

  • Jung, Se Hoon;Shin, Chang Sun;Cho, Young Yun;Park, Jang Woo;Park, Myung Hye;Kim, Young Hyun;Lee, Seung Bae;Sim, Chun Bo
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.6 no.10
    • /
    • pp.465-472
    • /
    • 2017
  • In the past, researchers mainly used the supervised learning technique of machine learning to analyze power data and investigated the identification of patterns through the data mining technique. Data analysis research, however, faces its limitations with the old data classification and analysis techniques today when the size of electric power data has increased with the possible real-time provision of data. This study thus set out to propose a clustering architecture to analyze large-sized electric power data. The clustering process proposed in the study supplements the K-means algorithm, an unsupervised learning technique, for its problems and is capable of automating the entire process from the collection of electric power data to their analysis. In the present study, power data were categorized and analyzed in total three levels, which include the row data level, clustering level, and user interface level. In addition, the investigator identified K, the ideal number of clusters, based on principal component analysis and normal distribution and proposed an altered K-means algorithm to reduce data that would be categorized as ideal points in order to increase the efficiency of clustering.

Detection of the Factors Related to spermatization in Sclerotinia trifoliorum -I. Course of Fertilization (Sclerotinia trifoliorum의 Spermatization에 관여하는 요인(要因)의 검색(檢索) -I. 균(菌)의 수정과정(受精過程))

  • Uhm, Jae Youl;Kim, Young Tae
    • Current Research on Agriculture and Life Sciences
    • /
    • v.5
    • /
    • pp.127-133
    • /
    • 1987
  • The process of fertilization and changes in anatomical structure of sclerotia during the apothecial formation in Sclerotinia trifoliorum, the causal fungus of sclerotial rot of forage legumes, were investigated. The time of fertilization could be estimated with fair accuracy by the sequencial spermatization of the sclerotia which kept at 15C in saturated moisture. In the case of one strain used in this experiment, fertilization between the sclerotia and spermatia were estimated to take place at around 18days after the sclerotia were placed under the conditions for apothecial induction (15C, saturated moisture). The fertilizable state was maintained for about 45 days and the spermatization thereafter did not induce the apothecial formation. When the sclerotia reached fertilizable state, a number of interwoven hyphal nests were developed within the medulla of sclerotia, regardless of the sexuality of the cultures. Comparing the process of multiplication and growth of the hyphal nests in homothallic and heterothallic culture, they were identified as ascogonium. These ascogonia were persisted for about 45 days. This observation was well coincided with the duration of fertilizable state elucidated by the sequencial spermatization experiment.

  • PDF

A Macro Attacks Detection Model Based on Trace Back Information (트레이스 백 정보에 기반한 매크로 공격 탐지 모델)

  • Baek, Yong Jin;Hong, Suk Won;Park, Jae Heung;Kang, Gyeong Won;Kim, Sang Bok
    • Convergence Security Journal
    • /
    • v.18 no.5_1
    • /
    • pp.113-120
    • /
    • 2018
  • Today, the development of information and communication technology is rapidly increasing the number of users of network-based service, and enables real-time information sharing among users on the Internet. There are various methods in the information sharing process, and information sharing based on portal service is generally used. However, the process of information sharing serves as a cause of illegal activities in order to amplify the social interest of the relevant stakeholders. Public opinion attack using macro function can distort normal public opinion, so security measures are urgent. Therefore, security measures are urgently needed. Macro attacks are generally defined as attacks in which illegal users acquire multiple IP or ID to manipulate public opinion on the content of a particular web page. In this paper, we analyze network path information based on traceback for macro attack of a specific user, and then detect multiple access of the user. This is a macro attack when the access path information for a specific web page and the user information are matched more than once. In addition, when multiple ID is accessed for a specific web page in the same region, it is not possible to distort the overall public opinion on a specific web page by analyzing the threshold count value.

  • PDF