• Title/Summary/Keyword: FAST 기법

Search Result 2,197, Processing Time 0.03 seconds

Automatic Liver Segmentation Method on MR Images using Normalized Gradient Magnitude Image (MR 영상에서 정규화된 기울기 크기 영상을 이용한 자동 간 분할 기법)

  • Lee, Jeong-Jin;Kim, Kyoung-Won;Lee, Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1698-1705
    • /
    • 2010
  • In this paper, we propose a fast liver segmentation method from magnetic resonance(MR) images. Our method efficiently divides a MR image into a set of discrete objects, and boundaries based on the normalized gradient magnitude information. Then, the objects belonging to the liver are detected by using 2D seeded region growing with seed points, which are extracted from the segmented liver region of the slice immediately above or below the current slice. Finally, rolling ball algorithm, and connected component analysis minimizes false positive error near the liver boundaries. Our method was validated by twenty data sets and the results were compared with the manually segmented result. The average volumetric overlap error was 5.2%, and average absolute volumetric measurement error was 1.9%. The average processing time for segmenting one data set was about three seconds. Our method could be used for computer-aided liver diagnosis, which requires a fast and accurate segmentation of liver.

Bit-Map Based Hybrid Fast IP Lookup Technique (비트-맵 기반의 혼합형 고속 IP 검색 기법)

  • Oh Seung-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.2
    • /
    • pp.244-254
    • /
    • 2006
  • This paper presents an efficient hybrid technique to compact the trie indexing the huge forward table small enough to be stored into cache for speeding up IP lookup. It combines two techniques, an encoding scheme called bit-map and a controlled-prefix expanding scheme to replace slow memory search with few fast-memory accesses and computations. For compaction, the bit-map represents each index and child pointer with one bit respectively. For example, when one node denotes n bits, the bit-map gives a high compression rate by consumes $2^{n-1}$ bits for $2^n$ index and child link pointers branched out of the node. The controlled-prefix expanding scheme determines the number of address bits represented by all root node of each trie's level. At this time, controlled-prefix scheme use a dynamic programming technique to get a smallest trie memory size with given number of trie's level. This paper proposes standard that can choose suitable trie structure depending on memory size of system and the required IP lookup speed presenting optimal memory size and the lookup speed according to trie level number.

  • PDF

Recurrent Neural Network Based Spectrum Sensing Technique for Cognitive Radio Communications (인지 무선 통신을 위한 순환 신경망 기반 스펙트럼 센싱 기법)

  • Jung, Tae-Yun;Jeong, Eui-Rim
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.759-767
    • /
    • 2020
  • This paper proposes a new Recurrent neural network (RNN) based spectrum sensing technique for cognitive radio communications. The proposed technique determines the existence of primary user's signal without any prior information of the primary users. The method performs high-speed sampling by considering the whole sensing bandwidth and then converts the signal into frequency spectrum via fast Fourier transform (FFT). This spectrum signal is cut in sensing channel bandwidth and entered into the RNN to determine the channel vacancy. The performance of the proposed technique is verified through computer simulations. According to the results, the proposed one is superior to more than 2 [dB] than the existing threshold-based technique and has similar performance to that of the existing Convolutional neural network (CNN) based method. In addition, experiments are carried out in indoor environments and the results show that the proposed technique performs more than 4 [dB] better than both the conventional threshold-based and the CNN based methods.

A Method of Performance Improvement for AAA Authentication using Fast Handoff Scheme in Mobile IPv6 (Mobile IPv6에서 Fast Handoff기법을 이용한 AAA 인증 성능 향상 방안)

  • Kim Changnam;Mun Youngsong;Huh Eui-Nam
    • Journal of KIISE:Information Networking
    • /
    • v.31 no.6
    • /
    • pp.566-572
    • /
    • 2004
  • In this paper, we define the secure authentication model to provide a mobile node with global roaming service and integrate the Fast Handoff scheme with our approach to minimize the service latency. By starting the AAA(Authentication, Authorization and Account) procedure with Fast Handoff simultaneously when a roaming occurs, authentication latency is reduced significantly and provision of fast and seamless service is possible. The previous works such as IPsec(Internet Protocol Security), RR (Return Routability) and AAA define the procedures performed after the completion of Layer2 Handoff which leads us to study a way of providing the real time and QoS guaranteed service during this period. The proposed scheme is for this goal and when appling it to roaming environment it shows the cost reduction up to 55% and 17% for the case of the MN receiving the FBACK and not respectively before L2 Handoff occurs.

A Comparative Study of IP Mobility Protocols : Fast Handover vs. Mobile IPv6 (IP 이동성 지원 프로토콜에 대한 비교 연구: Fast Handover 대 Mobile IPv6)

  • 백상헌;최양희
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.6A
    • /
    • pp.651-659
    • /
    • 2004
  • The Fast Handover protocol [1] provides seameless handover in wireless If networks by minimizing handover latency, which uses anticipation based on layer 2 (L2) trigger information. Therefore, it incurs higher signaling costs compared with the basic Mobile U protocol. Furthermore, since the L2 trigger is based on fluctuating wireless channel states, the handover anticipation may sometimes be incorrect. In the case of incorrect anticipation, unnecessary buffer space may be used for the purpose of providing a smooth handover. Therefore, it is essentical to analyze these overhead costs, in order to evaluate and compare the performance of Fast Handover with that of the basic Mobile U protocol. In this paper, we analyzed the overhead associated with Fast Handover including the signaling cost and the packet delivery cost. We formulated these costs based on a timing diagram and compared Fast Handover with basic Mobile Ipv6 in terms of their packet loss rates and buffer requirements. Also, we studied the impact of the L2 triggering time on the total overhead cost.

A Distribution Scheme for Continuous Media Contens over Peer-to-Peer Networks (P2P 네트웍에서 연속형 미디어 컨텐츠의 분산형 배포 기법)

  • Kwon Jin Baek;Yeom Heon Young;Lee Jeong Bae
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.511-520
    • /
    • 2004
  • A peer-to-peer model is very useful in solving the server link bottleneck problem of a client-server model. In this work, we discuss the problems of distributing multimedia content over peer-to-peer network. We focus on two problems in peer-to-peer media content distribution systems. The first is the transmission scheduling of the media data for a multi-source streaming session. We present a sophisticated scheduling scheme called fixed-length slotted scheduling, which results in minimum buffering delay. The second problem is on the fast distribution of media content in the peer-to-peer system that is self-growing. We propose a mechanism accelerating the speed at which the system's streaming ca-pacity increases, called FAST.

Fast and Secure 2-Way Handshake Mechanism using Sequence Number in Wireless LAN (순번을 이용한 고속의 안전한 무선 랜 2-Way 핸드쉐이크 기법)

  • Lim, Jeong-Mi
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.9
    • /
    • pp.1323-1332
    • /
    • 2009
  • In this paper, we analyze security weakness of 4-Way Handshake in IEEE 802.11i and propose fast and secure 2-Way Handshake mechanism. Compute PTK(Pairwise Transient Key) using sequence number instead of random numbers in order to protect Replay attack and DoS attack. Also, proposed 2-Way Handshake mechanism can mutual authenticate between mobile station and access point and derive PTK using modified Re-association Request and Re-association Response frames. And, compare with others which are fast and secure Handoff mechanisms.

  • PDF

Implementation and Analysis of the FMIPv6 (Fast Handover for Mobile IPv6) Using Layer 2 Triggers (제2계층 트리거를 이용한 FMIPv6 구현 및 분석)

  • Oh, Seung-Hun;Lee, Sung-Sik;Kim, Young-Han
    • The KIPS Transactions:PartC
    • /
    • v.12C no.4 s.100
    • /
    • pp.551-558
    • /
    • 2005
  • In this paper, we implement the fast handovers for mobile IPv6 (FMIPv6) on Linux system. Due to its dependency on operations in layer-2 (L2), we have added some functions into the network driver to generate triggers as the mobile node moves. We design and implement the FMIPv6 functions divided into two parts as an access router and a mobile node. We compare the packet loss and delay of the FMIPv6 implementation during the handover period with those of the MIPv6 and investigate the performance improvement.

A Fast Capacitance Extraction Algorithm for Multiple 3-Dimensional Conductors with Dielectrics using Adaptive Triangular Mesh (적응요소 MLFMA를 이용한 유전체층을 가진 3차원 도체의 정전용량계산)

  • Kim, Han;Ahn, Chang-Hoi
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.13 no.1
    • /
    • pp.80-86
    • /
    • 2002
  • This paper describes to extend the MLFMA(Multi-Level Fast Multipole Algorithm) for three-dimensional capacitance computation in the case of conductors embedded in an arbitrary dielectric medium. The triangular meshes are used and refined in the area which has heavy charge density. This technique is applied to the capacitance extraction of three-dimensional structures with multiple dielectrics. The results show good convergence with the comparable accuracy, and this adaptive technique coupled with MLFMA is useful to reduce computing time and the number of elements with least additional computational efforts in large three dimensional problems.

Modeling and Analysis of Radar Target Signatures in the VHF-Band Using Fast Chirplet Decomposition (고속 Chirplet 분리기법을 이용한 VHF 대역 레이더 표적신호 모델링 및 해석)

  • Park, Ji-hoon;Kim, Si-ho;Chae, Dae-Young
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.22 no.4
    • /
    • pp.475-483
    • /
    • 2019
  • Although radar target signatures(RTS), such as range profiles have played an important role for target recognition in the X-band radar, they would be less effective when a target is designed to have low radar cross section(RCS). Recently, a number of research groups have conducted the studies on the RTS in the VHF-band where such targets can be better detected than in the X-band. However, there is a lack of work carried out on the mathematical description of the VHF-band RTS. In this paper, chirplet decomposition is employed for modeling of the VHF-band RTS and its performance is compared with that of existing scattering center model generally used for the X-band. In addition, the discriminative signal analysis is performed by chirplet parameterization of range profiles from in an ISAR image. Because the chirplet decomposition takes long computation time, its fast form is further proposed for enhanced practicality.