• 제목/요약/키워드: ITS 영역

Search Result 4,198, Processing Time 0.033 seconds

An Application of k-domain Discrete Wavelet Transform for the Efficient Representation of Green Function (파수영역 이산 웨이블릿 변환을 이용한 효율적인 그린함수 표현에 관한 연구)

  • 주세훈;김형동
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.12 no.7
    • /
    • pp.1110-1114
    • /
    • 2001
  • The discrete wavelet concept in the k-domain is applied to efficiently represent Green function of integral equations. Application of discrete wavelet concept to Green function in the k-domain can be implemented equivalently by using spatial domain variable-sized windows. The proposed method consists of constant Q-filtering, changing the center of coordinates, and transforming spatially filtered Green functions into those in the k-domain. A mathematical expression of Green function based on the discrete wavelet concept is derived and its characteristics are discussed.

  • PDF

Directional Winger-Ville Distribution and Its Application to Rotating- Machinery (방향성 Winger-Ville 분포와 회전체에의 응용)

  • Kim, Dong-Wan
    • Journal of KSNVE
    • /
    • v.6 no.3
    • /
    • pp.341-347
    • /
    • 1996
  • Vibration analysis is one of the most powerful tools available for the detection and isolation of incipient faults in mechanical systems. The methods of vibration analysis in use today and under continuous study are broad band vibration monitoring, time domain analysis, and frequency domain analysis. In recent years, great interest has been generated concerning the use of time- frequency repesentation and its application for a machinery diagnostics and condition monitoring system. The objective of the study described in this paper was to develop a new diagnostic tool for the rotating machinery. This paper introduces a new time frequency representation. Directional Winger-Ville Distribution, which analyese the time-frequency structure of the rotating machinery vibration.

  • PDF

Car License Plate Extraction Based on Detection of Numeral Regions (숫자 영역 탐색에 기반한 자동차 번호판 추출)

  • Lee, Duk-Ryong;Oh, Il-Seok
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.7 no.1
    • /
    • pp.59-67
    • /
    • 2008
  • In this paper we propose an algorithm to extract the license plate regions from Korean car images. The idea of this paper is that we first find the four digits in the input car image and then segment the plate region using the digit information. Out method has advantage of segmenting simultaneously the plate regions and four digits regions. The first step finds and groups the connected components with proper sizes as candidate digits. The second step applies an serial alignment condition to find out probable 4-digits. In the third step, we recognize the candidate digits and assign the confidence values to each of them. The final step extracts the license plate region which has the highest confidence value. We used the Perfect Metrics classification algorithm to estimate the confidence. In our experiment, we got 97.23% and 95.45% correct detection rates, 0.09% and 0.11% false detection rates for 4,600 daytime and 264 nighttime images, respectively.

  • PDF

Genetic Relationships of Coprinus spp. on the Basis of Sequences in ITS II Region (먹물버섯류(Coprinus spp.)의 ITS II 영역 염기서열에 의한 유연관계 분석)

  • Park, Dong-Suk;Go, Seung-Joo;Kim, Yang-Sup;Seok, Soon-Ja;Song, Jae-Kyeong;Yeo, Yun-Soo;Ryu, Jin-Chang;Sung, Jae-Mo
    • The Korean Journal of Mycology
    • /
    • v.27 no.1 s.88
    • /
    • pp.27-31
    • /
    • 1999
  • The internal transcribed spacer II regions (ITS II) of the ribosomal DNA gene repeat from Coprinus spp. were amplified using polymerase chain reaction (PCR) and sequenced. Sequences from 11 species including Coprinus comatus, C. atramentarius, C. micaceus, C. lagopus, C. cinereus, C. rhizophorus, C. flocculosus, C. radians, and C. echinosporus were compared. The spacer regions of them were $253{\sim}275$ nucleotide in length and partially contained 5.8S and 25S. The reciprocal homologies of each ITS II sequence among these strains were in the range of $50.6{\sim}100%$. According to the analysis of ITS II sequences, Coprinus spp. were classified into three clusters. Cluster I consisted of Coprinus lagopus, C. cinereus, C. echinosporus, C. rhizophorus, C. niveus, and C. atramentarius. Cluster II comprised C. micaceus, C. flocculosus, C. radians, and C. disseminatus. On the other hand C. comatus is in Cluster III even though this species is belonging to the section Coprinus in morphological aspect. These results suggest that Coprinus comatus, which was considered as a type species of the genus Coprinus in morphological classification, gives a doubt of monophyletic evolution and is assumed to be paraphyletic or polyphyletic.

  • PDF

A Study on Extraction of Central Objects in Color Images (칼라 영상에서의 중심 객체 추출에 관한 연구)

  • 김성영;박창민;권규복;김민환
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.6
    • /
    • pp.616-624
    • /
    • 2002
  • An extraction method of central objects in the color images is proposed, in this paper. A central object is defined as a comparatively consist of the central object in the image. First of all. an input image and its decreased resolution images are segmented. Segmented regions are classified as the outer or the inner region. The outer region is adjacent regions are included by a same region in the decreased resolution image. Then core object regions and core background regions are selected from the inner region and the outer region respectively. Core object regions are the representative regions for the object and are selected by using the information about the information about the region size and location. Each inner regions is classified into foreground or background regions by comparing values of a color histogram intersection of the inner region against the core object region and the core background regions. The core object region and foreground regions consist of the central object in the image.

  • PDF

Distributed Address Configuration Mechanism Using Address Pool in MANET (MANET 환경에서 주소 영역기반 주소할당 분산기법)

  • Ahn, Sang-Hyun;Lim, Yu-Jin;Yu, Hyun
    • The KIPS Transactions:PartC
    • /
    • v.16C no.6
    • /
    • pp.753-760
    • /
    • 2009
  • As it becomes increasingly important that Internet access is available anywhere at any time, providing MANET (Mobile Ad-Hoc Network) with the Internet access attracts more attention. The existing DHCP (Dynamic Host Configuration Protocol) address configuration schemes require message exchanges between MANET nodes and the DHCP server through multi-hop routes. Messages can be easily dropped in the wireless multi-hop communication environment and the address configuration may be instable and need long delay. In this paper, we propose a new address configuration scheme using the concept of address pool allocation. In the proposed scheme, the DHCP server assigns a part of its address pool to a node instead of a single address and the node can assign a part of its own address pool to its neighbor nodes. Through simulation studies, we show that our scheme yields about 77% of the address configuration delay and 61% of the control message overhead of the existing DHCP based mechanism.

Sharing the Cyber Threat Intelligence on Cyber Crises: The Appropriate Role of the National Intelligence Agency (사이버위기에 대응하기 위한 국가정보기관의 사이버위협정보 공유 역할에 대한 고찰)

  • Kim, Daegeon;Baek, Seungsoo;Yoo, Donghee
    • Journal of Digital Convergence
    • /
    • v.15 no.6
    • /
    • pp.51-59
    • /
    • 2017
  • The role of government is to defend its lands and people from enemies. The range of that defense has now extended into the cyber domain, regarded as the fourth domain of the conventional defense domains (i.e., land, sea, sky, and universe). Traditionally, a government's intelligence power overrides that of its civilians, and government is exclusively responsible for defense. However, it is difficult for government to take the initiative to defend in the cyber domain because civilians already have a greater means for collecting information, which is known as being "intelligence inverse" in the cyber domain. To this end, we first define the intelligence inverse phenomenon and then analyze its main features. Then we investigate foreign countries' efforts to overcome the phenomenon and look at the current domestic situation. Based on these results, we describe the appropriate role of the National Intelligence Agency to handle cyber threats and offer a cyber threat intelligence model to share with civilians to help protect against these threats. Using the proposed model, we propose that the National Intelligence Agency should establish a base system that will respond to cyber threats more effectively.

Analysis of the RF Link Design for ETCS and Study on the Communication Zone by the Antenna Beam Pattern (ETCS용 RF 링크 설계와 안테나 빔 패턴에 의한 통신 영역 연구)

  • Yim Choon-Sik;Ha Jae-Kwon;Ahn Dong-Hyun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.1 s.4
    • /
    • pp.21-30
    • /
    • 2004
  • This paper describes the design of RF link between RSE and OBU of ETCS and the analysis of the antenna beam pattern to get a proper communication area in the cross direction and traveling direction of lanes. This stage should be performed prior to determination of system requirements of ITS service based on active DSRC. This study is important and fundamental technical analysis to design and implement base station of ETCS.

  • PDF

Brick Path Recognition Using Image Shape Pattern and Texture Feature (영상의 형태 패턴과 텍스처 특징을 이용한 보도블록의 인식방법)

  • Woo, Byung-Seok;Yang, Sung-Min;Jo, Kang-Hyun
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.4
    • /
    • pp.472-484
    • /
    • 2012
  • Raised or plain block is widely used for the pedestrian's safe passage. The insincere construction, insufficient maintenance and obstacle overlaid on the pavement cause pedestrian's accidents. This paper proposes a method to detect brick path by analyzing the shape pattern and texture feature of brick located in visible distance for a safe passage. A brick appears to a regular type because of its specific shape which repeats with its sized gap and its type varies according to the surrounding environment or use. This paper shows a method which extracts the shape pattern by analyzing single surface polygon and its frequency appearing in road area. The shape pattern is used to detect similar shape regions. Some regions are not detected because extraneous substances or chopped bricks distort the original shape. This problem can be solved by analyzing the texture feature vector. The analyzed vector of the previously detected regions yields the Gaussian distribution. This value in each undetected region is computed and checked whether it's satisfied with Gaussian distribution or not. The satisfied region is detected as the brick path. The experiment was performed with the various type's bricks to recognize so that the results showed as accurate as 95.9% in average.

Adaptive Range Aggregation Index Method for Efficient Spatial Range Query in Ubiquitous Sensor Networks (USN환경에서 효율적인 공간영역질의를 위한 적응형 영역 집계 인덱스 기법)

  • Li, Yan;Eo, Sang-Hun;Cho, Sook-Kyoung;Lee, Soon-Jo;Bae, Hae-Yeong
    • Journal of Korea Spatial Information System Society
    • /
    • v.9 no.2
    • /
    • pp.93-107
    • /
    • 2007
  • In this paper, an adaptive range aggregation spatial index method is proposed for spatial range query in ubiquitous sensor networks. As the ubiquitous sensor networks are the new information-oriented paradigm, many energy efficient spatial range query methods in ubiquitous sensor networks environment are studied vigorously. In sensor networks, users can monitor environment scalar data such as temperature and humidity during user defined time and spatial ranges. In order to execute spatial range query efficiently, rectangle based index methods are proposed, such as SPIX. But they define the return path as the opposite of its query transmit path. However, the sensor nodes in queried ranges are closed to each other, they can't aggregate the sensed value in a queried range because their query transmission paths are different. As a result, the previous methods waste energy unnecessarily to aggregate sensing data out of the queried range. In this paper, an adaptive aggregation index method is proposed that can aggregate values in a user defined range adaptively by using its neighbor information. It is shown that sensor power is saved efficiently by using the proposed method over the performance evaluation.

  • PDF