• Title/Summary/Keyword: Multi-Threshold

Search Result 458, Processing Time 0.029 seconds

Galaxy overdensities at intermediate to high redshift

  • Kang, Eu-Gene;Im, Myung-Shin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.36 no.2
    • /
    • pp.52.2-52.2
    • /
    • 2011
  • We searched and studied galaxy overdensities at 0.6 < z < 4.5 in the areas of two GOODS fields. These overdensities are identified by running top-hat filters on the two dimensional spatial distribution of two galaxy samples - a K-band limited, photometric redshift sample at 0.6 < z < 4.5, and BVz-color selected sample targeting overdensities at z ~ 3.7 and z ~ 4.0. Here photometric redshifts are derived from multi-wavelength data ranging from U-band through 8 micron band of the Spitzer. We find 52 overdensities with significances of 3.5-7 ${\sigma}$. The derived masses found to be a > $10^{13}\;M_{\odot}$ with the comoving number density of a few ${\times}10^{-6}\;Mpc^{-3}$ at z ~ 3. In order to understand the high number density of massive overdensities at high redshift, we carried out an analysis of galaxy overdensities using the mock galaxy catalog based on Millennium simulation selected in the same way as the analysis of the observational data. In the simulation, we find 650 galaxy overdensities with a 3.5 ${\sigma}$ detection threshold over $2^{{\circ}2}$ sky field. The number density of the very massive overdensities (M > $10^{14}\;M_{\odot}$) in simulation shows a similar trend with the observation. We further discuss implications of our results.

  • PDF

Study of screw loosening in cementation type implant abutment

  • Hwang, Bo-Yeon;Kim, Yung-Soo;Kim, Chang-Whe
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.38 no.6
    • /
    • pp.765-781
    • /
    • 2000
  • The purpose of this study was to compare the screw loosening characteristics of three avail-able cementation type abutments: one-piece cementation type abutment; two-piece cementation type abutment using titanium abutment screw; two-piece cementation type abutment using gold abutment screw. Two implant supported three-unit superstructures were fabricated using a pair of 3 kinds of abutments for each experimental model. Cyclic loading was applied on the specimen, and made to stop when the superstructure showed movement over threshold range. The loaded cycle was counted until the machine stopped. Frequency analysis was done to measure the change of natural frequency before and after the application of cyclic load and to find the effect of screw loosening on the change of natural frequency. The specimen assembly was modeled to perform the finite element analysis to see the distribution of the stress induced by the application of preload over the screw joint and to compare the pattern of the distribution of stress induced by the external force with the change of the preload condition. The following results were obtained: 1. The failure loading cycle of two-piece cementation type abutment using gold screw was significantly greater than those of the other groups. 2. One-piece cementation type abutment applied to multi-unit restoration case did not show greater resistance to screw loosening compared to two-piece cementation type abutments. 3. Frequency analysis showed decrease in natural frequency when screw loosening occured.

  • PDF

MVL Data Converters Using Neuron MOS Down Literal Circuit (뉴런모스 다운리터럴 회로를 이용한 다치논리용 데이터 변환기)

  • Han, Sung-Il;Na, Gi-Soo;Choi, Young-Hee;Kim, Heung-Soo
    • Journal of IKEEE
    • /
    • v.7 no.2 s.13
    • /
    • pp.135-143
    • /
    • 2003
  • This paper describes the design techniques of the data converters for Multiple-Valued Logic(MVL). A 3.3V low power 4 digit CMOS analog to quaternary converter (AQC) and quaternary to analog converter (QAC) mainly designed with the neuron MOS down literal circuit block has been introduced. The neuron MOS down literal architecture allows the designed AQC and QAC to accept analog and 4 level voltage inputs, and enables the proposed circuits to have the multi-threshold properity. Low power consumption of the AQC and QAC are achieved by utilizing the proposed architecture.

  • PDF

Gradation Image Processing for Text Recognition in Road Signs Using Image Division and Merging

  • Chong, Kyusoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.2
    • /
    • pp.27-33
    • /
    • 2014
  • This paper proposes a gradation image processing method for the development of a Road Sign Recognition Platform (RReP), which aims to facilitate the rapid and accurate management and surveying of approximately 160,000 road signs installed along the highways, national roadways, and local roads in the cities, districts (gun), and provinces (do) of Korea. RReP is based on GPS(Global Positioning System), IMU(Inertial Measurement Unit), INS(Inertial Navigation System), DMI(Distance Measurement Instrument), and lasers, and uses an imagery information collection/classification module to allow the automatic recognition of signs, the collection of shapes, pole locations, and sign-type data, and the creation of road sign registers, by extracting basic data related to the shape and sign content, and automated database design. Image division and merging, which were applied in this study, produce superior results compared with local binarization method in terms of speed. At the results, larger texts area were found in images, the accuracy of text recognition was improved when images had been gradated. Multi-threshold values of natural scene images are used to improve the extraction rate of texts and figures based on pattern recognition.

Two-Channel Noise Reduction Using Beamforming and DOA-Based Masking (빔포밍 및 DOA 기반의 마스킹을 이용한 2채널 잡음제거)

  • Kim, Youngil;Jeong, Sangbae
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.32-40
    • /
    • 2013
  • In this paper, we propose a multi-channel speech enhancement algorithm using beamforming and direction-of-arrival (DOA)-based masking. The proposed algorithm enhances noisy speech basically by the linearly constrained minimum variance (LCMV) algorithm and then a mel-scale Wiener filter designed using DOA-based masking is applied to remove still remaining noises. To improve the performance, we optimize the learning rate of the adaptive filters in LCMV and the DOA threshold to detect target speech spectrum. As performance indices, the perceptual evaluation of speech quality (PESQ) score and output SNRs are measured. Experimantal results show that the proposed algorithm outperforms the conventional LCMV beamformer by 0.09 in PESQ score and 5.75 dB in output SNR, respectively.

퍼지이론을 이용한 유고감지 알고리즘

  • 이시복
    • Proceedings of the KOR-KST Conference
    • /
    • 1995.12a
    • /
    • pp.77-107
    • /
    • 1995
  • This paper documents the development of a fuzzy logic based incident detection model for urban diamond interchanges. Research in incident detection for intersections and arterials is at a very initial stage. Existing algorithms are still far from being robust in dealing with the difficulties related with data availability and the multi-dimensional nature of the incident detection problem. The purpose of this study is to develop a new real-time incident detection model for urban diamond interchanges. The development of the algorithm is based on fuzzy logic. The incident detection model developed through this research is capable of detecting lane¬blocking incidents when their effects are manifested by certain patterns of deterioration in traffic conditions and, thereby, adjustments in signal control strategies are required. The model overcomes the boundary condition problem inherent in conventional threshold-based concepts. The model captures system-wide incident effects utilizing multiple measures for more accurate and reliable detection, and serves as a component module of a real-time traffic adaptive diamond interchange control system. The model is designed to be readily scalable and expandable for larger systems of arterial streets. The prototype incident detection model was applied to an actual diamond interchange to investigate its performance. A simulation study was performed to evaluate the model's performance in terms of detection rate, false alarm rate, and mean time to detect. The model's performance was encouraging, and the fuzzy logic based approach to incident detection is promising.

  • PDF

High-performance thin-film transistor with a novel metal oxide channel layer

  • Son, Dae-Ho;Kim, Dae-Hwan;Kim, Jung-Hye;Sung, Shi-Joon;Jung, Eun-Ae;Kang, Jin-Kyu
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.222-222
    • /
    • 2010
  • Transparent semiconductor oxide thin films have been attracting considerable attention as potential channel layers in thin film transistors (TFTs) owing to their several advantageous electrical and optical characteristics such as high mobility, high stability, and transparency. TFTs with ZnO or similar metal oxide semiconductor thin films as the active layer have already been developed for use in active matrix organic light emitting diode (AMOLED). Of late, there have been several reports on TFTs fabricated with InZnO, AlZnSnO, InGaZnO, or other metal oxide semiconductor thin films as the active channel layer. These newly developed TFTs were expected to have better electrical characteristics than ZnO TFTs. In fact, results of these investigations have shown that TFTs with the new multi-component material have excellent electrical properties. In this work, we present TFTs with inverted coplanar geometry and with a novel HfInZnO active layer co-sputtered at room temperature. These TFTs are meant for use in low voltage, battery-operated mobile and flexible devices. Overall, the TFTs showed good performance: the low sub-threshold swing was low and the $I_{on/off}$ ratio was high.

  • PDF

Electrical characteristics of poly-Si NVM by using the MIC as the active layer

  • Cho, Jae-Hyun;Nguyen, Thanh Nga;Jung, Sung-Wook;Yi, Jun-Sin
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2010.02a
    • /
    • pp.151-151
    • /
    • 2010
  • In this paper, the electrically properties of nonvolatile memory (NVM) using multi-stacks gate insulators of oxide-nitride-oxynitride (ONOn) and active layer of the low temperature polycrystalline silicon (LTPS) were investigated. From hydrogenated amorphous silicon (a-Si:H), the LTPS thin films with high crystalline fraction of 96% and low surface's roughness of 1.28 nm were fabricated by the metal induced crystallization (MIC) with annealing conditions of $650^{\circ}C$ for 5 hours on glass substrates. The LTPS thin film transistor (TFT) or the NVM obtains a field effect mobility of ($\mu_{FE}$) $10\;cm^2/V{\cdot}s$, threshold voltage ($V_{TH}$) of -3.5V. The results demonstrated that the NVM has a memory window of 1.6 V with a programming and erasing (P/E) voltage of -14 V and 14 V in 1 ms. Moreover, retention properties of the memory was determined exceed 80% after 10 years. Therefore, the LTPS fabricated by the MIC became a potential material for NVM application which employed for the system integration of the panel display.

  • PDF

Recoverable Private Key Scheme for Consortium Blockchain Based on Verifiable Secret Sharing

  • Li, Guojia;You, Lin;Hu, Gengran;Hu, Liqin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2865-2878
    • /
    • 2021
  • As a current popular technology, the blockchain has a serious issue: the private key cannot be retrieved due to force majeure. Since the outcome of the blockchain-based Bitcoin, there have been many occurrences of the users who lost or forgot their private keys and could not retrieve their token wallets, and it may cause the permanent loss of their corresponding blockchain accounts, resulting in irreparable losses for the users. We propose a recoverable private key scheme for consortium blockchain based on the verifiable secret sharing which can enable the user's private key in the consortium blockchain to be securely recovered through a verifiable secret sharing method. In our secret sharing scheme, users use the biometric keys to encrypt shares, and the preset committer peers in the consortium blockchain act as the participants to store the users' private key shares. Due to the particularity of the biometric key, only the user can complete the correct secret recovery. Our comparisons with the existing mnemonic systems or the multi-signature schemes have shown that our scheme can allow users to recover their private keys without storing the passwords accurately. Hence, our scheme can improve the account security and recoverability of the data-sharing systems across physical and virtual platforms that use blockchain technology.

Dynamic Threshold Method for Isolation of Worm Hole Attack in Wireless Sensor Networks

  • Surinder Singh;Hardeep Singh Saini
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.5
    • /
    • pp.119-128
    • /
    • 2024
  • The moveable ad hoc networks are untrustworthy and susceptible to any intrusion because of their wireless interaction approach. Therefore the information from these networks can be stolen very easily just by introducing the attacker nodes in the system. The straight route extent is calculated with the help of hop count metric. For this purpose, routing protocols are planned. From a number of attacks, the wormhole attack is considered to be the hazardous one. This intrusion is commenced with the help of couple attacker nodes. These nodes make a channel by placing some sensor nodes between transmitter and receiver. The accessible system regards the wormhole intrusions in the absence of intermediary sensor nodes amid target. This mechanism is significant for the areas where the route distance amid transmitter and receiver is two hops merely. This mechanism is not suitable for those scenarios where multi hops are presented amid transmitter and receiver. In the projected study, a new technique is implemented for the recognition and separation of attacker sensor nodes from the network. The wormhole intrusions are triggered with the help of these attacker nodes in the network. The projected scheme is utilized in NS2 and it is depicted by the reproduction outcomes that the projected scheme shows better performance in comparison with existing approaches.