• Title/Summary/Keyword: Pass-by 방법

Search Result 512, Processing Time 0.058 seconds

Modified Jointly Blue Noise Mask Approach Using S-CIELAB Color Difference (S-CIELAB 색차를 이용한 개선된 혼합 블루 노이즈 마스크)

  • 김윤태;조양호;이철희;하영호
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.4
    • /
    • pp.227-236
    • /
    • 2003
  • This paper proposes a modified jointly-blue noise mask (MJBNM) method using the S-CIELAB color measure as digital color halftoning method. Based on an investigation of the relation between the pattern visibility and the chromatic error, of a blue noise pattern, a halftoning method is proposed that reduces the chromatic error, while preserving a high quality blue noise pattern. Accordingly, to reduce the chrominance error, the low-pass filtered error and S-CIELAB chrominance error are both considered during the mask generation procedure and calculated for single and combined patterns. Using the calculated low-pass filtered error, the patterns are then updated by either adding or removing dots from the multiple binary patterns. Finally, the pattern exhibiting the lower S-CIELAB chrominance error is selected. Experimental results demonstrated that the proposed algorithm can produce a visually pleasing half toned image with a lower chrominance error than the JBNM method.

Modified neocognitron for recognizing multi-patterns (복수 패턴 인식을 위한 변형된 네오코그니트론)

  • 김태우;최병욱
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.10
    • /
    • pp.140-148
    • /
    • 1994
  • In this paepr, the modified neocognitron, which has capability of recognizing multi-patterns in input image in one pass, is proposed. It is the hierarchical neural network composed of S and V layer which are able to extract features and of C layer with little effect from deformation, changes in size, shifts in position. S and V cells extract the features of all patterns in input image by applying DCC(don't care condition) to those cells. S and C cells also have position informations of extracted patterns. Position information is used in extracting good features without extracted features beting interfered one another. The proposed method is shorter in recognition time than the selective attention method with backward connection, because of recognizing multi-patterns in one passe. The modified neocognitron can recognizze attached multi-patterns because of using DCC and position informations.

  • PDF

A Study on Measurement and Automation Method of Cylinder Head Swirl (실린더 헤드 스월 측정 및 자동화 방법에 관한 연구)

  • Lee Choong-Hoon
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.14 no.1
    • /
    • pp.92-99
    • /
    • 2006
  • The swirl ratio of a charge in the cylinder was estimated by calculating the ratio of the rotary speed of charge which could be simulated from the rotary speed of paddle in the swirl measurement apparatus, to the engine speed which could be calculated by measuring intake air flow rate. The automation of the swirl ratio measurement for cylinder head was achieved by controling both valve lift in cylinder head and a suction pressure of surge tank using two step-motors. The number of measurement position for calculating mean swirl ratio was varied by adjusting the interval of valve lift. The mean swirl ratio with varying the number of measurement position showed nearly constant value. Two measurement methods for measuring the swirl ratio were compared, one was to control the suction pressure of the surge tank with PID (proportional, integral, differential) mode with by-pass valve controlled by the step motor and the other did not control the surge tank pressure by fixing the by-pass valve. The difference of the mean swirl ratio between the two measurement methods showed nearly constant value with varying the number of measurement position. This means that the w/o PID control method could be preferred to the PID control method which has been used, due to the simpleness of the swirl measurement.

Analyzing the discriminative characteristic of cover letters using text mining focused on Air Force applicants (텍스트 마이닝을 이용한 공군 부사관 지원자 자기소개서의 차별적 특성 분석)

  • Kwon, Hyeok;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.27 no.3
    • /
    • pp.75-94
    • /
    • 2021
  • The low birth rate and shortened military service period are causing concerns about selecting excellent military officers. The Republic of Korea entered a low birth rate society in 1984 and an aged society in 2018 respectively, and is expected to be in a super-aged society in 2025. In addition, the troop-oriented military is changed as a state-of-the-art weapons-oriented military, and the reduction of the military service period was implemented in 2018 to ease the burden of military service for young people and play a role in the society early. Some observe that the application rate for military officers is falling due to a decrease of manpower resources and a preference for shortened mandatory military service over military officers. This requires further consideration of the policy of securing excellent military officers. Most of the related studies have used social scientists' methodologies, but this study applies the methodology of text mining suitable for large-scale documents analysis. This study extracts words of discriminative characteristics from the Republic of Korea Air Force Non-Commissioned Officer Applicant cover letters and analyzes the polarity of pass and fail. It consists of three steps in total. First, the application is divided into general and technical fields, and the words characterized in the cover letter are ordered according to the difference in the frequency ratio of each field. The greater the difference in the proportion of each application field, the field character is defined as 'more discriminative'. Based on this, we extract the top 50 words representing discriminative characteristics in general fields and the top 50 words representing discriminative characteristics in technology fields. Second, the number of appropriate topics in the overall cover letter is calculated through the LDA. It uses perplexity score and coherence score. Based on the appropriate number of topics, we then use LDA to generate topic and probability, and estimate which topic words of discriminative characteristic belong to. Subsequently, the keyword indicators of questions used to set the labeling candidate index, and the most appropriate index indicator is set as the label for the topic when considering the topic-specific word distribution. Third, using L-LDA, which sets the cover letter and label as pass and fail, we generate topics and probabilities for each field of pass and fail labels. Furthermore, we extract only words of discriminative characteristics that give labeled topics among generated topics and probabilities by pass and fail labels. Next, we extract the difference between the probability on the pass label and the probability on the fail label by word of the labeled discriminative characteristic. A positive figure can be seen as having the polarity of pass, and a negative figure can be seen as having the polarity of fail. This study is the first research to reflect the characteristics of cover letters of Republic of Korea Air Force non-commissioned officer applicants, not in the private sector. Moreover, these methodologies can apply text mining techniques for multiple documents, rather survey or interview methods, to reduce analysis time and increase reliability for the entire population. For this reason, the methodology proposed in the study is also applicable to other forms of multiple documents in the field of military personnel. This study shows that L-LDA is more suitable than LDA to extract discriminative characteristics of Republic of Korea Air Force Noncommissioned cover letters. Furthermore, this study proposes a methodology that uses a combination of LDA and L-LDA. Therefore, through the analysis of the results of the acquisition of non-commissioned Republic of Korea Air Force officers, we would like to provide information available for acquisition and promotional policies and propose a methodology available for research in the field of military manpower acquisition.

A Novel Method for Calculating the Stroke of LPMSM for Driving Linear Compressor Using High Pass Filter (고역필터를 사용한 선형압축기 구동용 LPMSM의 새로운 스트로크 계산 기법)

  • Ahn, Jung-Ryol;Lee, Hong-Hee;Kim, Heung-Gun;Nho, Eui-Cheol;Chun, Tae-Won
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.11 no.1
    • /
    • pp.7-13
    • /
    • 2006
  • Linear compressors with a free piston driven by a linear motor are widely attention in the cooling apparatus such as refrigerator due to the high efficiency The stroke of piston in the linear compressor driven by LPMSM (Linear Permanent-Magnet Synchronous Motor) can be obtained from Integrating the input voltage and current of LPMSM, but it may be diverged due to dc components in the voltage and current. The strategy to prevent the divergence of stroke using both the high-pass filter and do offset compensation was suggested. The equations for the magnitude and phase of the stroke and also dc offset including the stroke are derived as a function of the cut-off frequency of HPF. The accurate stroke of a piston can be calculated by compensating for dc offset. The performance of the newly developed stroke calculation scheme has been verified by experimentally on a linear compressor drive system, where the control was implemented by a 16-bit DSP.

A Performance Analysis for Bandwidth Allocation Algorithm Using Available Bandwidth Information in ATM Networks (ATM 네트워크에서 가용 대역폭 정보를 이용한 대역폭 할당 알고리즘에 대한 성능분석)

  • 한상옥;박광채
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.89-96
    • /
    • 2000
  • ABR service is defined by ATM Forum and ITU for the efficient use of link bandwidth, and 2-pass service policing is proposed for this service. 2-pass service policing is effective by the real-time measurement of the used bandwidth, and this scheme obtains multiplexing gam and control efficiently ABR traffic as dynamically allocating rate by residual bandwidth information. In this study, we propose the real-time bandwidth prediction scheme for ABR traffic control, as using dynamic rate allocation by available bandwidth information. This study can obtain the simple hardware structure by means of as predicting available bandwidth by the total link bandwidth and the sum of transmission rate on the backlogged state connections.

  • PDF

An Intrusion Detection Method by Tracing Root Privileged Processes (Root 권한 프로세스 추적을 통한 침입 탐지 기법)

  • Park, Jang-Su;Ahn, Byoung-Chul
    • The KIPS Transactions:PartC
    • /
    • v.15C no.4
    • /
    • pp.239-244
    • /
    • 2008
  • It is not enough to reduce damages of computer systems by just patching vulnerability codes after incidents occur. It is necessary to detect and block intrusions by boosting the durability of systems even if there are vulnerable codes in systems. This paper proposes a robust real-time intrusion detection method by monitoring root privileged processes instead of system administrators in Linux systems. This method saves IP addresses of users in the process table and monitors IP addresses of every root privileged process. The proposed method is verified to protect vulnerable programs against the buffer overflow by using KON program. A configuration protocol is proposed to manage systems remotely and host IP addresses are protected from intrusions safely through this protocol.

An Adaptive Pruning Threshold Algorithm for the Korean Address Speech Recognition (한국어 주소 음성인식의 고속화를 위한 적응 프루닝 문턱치 알고리즘)

  • 황철준;오세진;김범국;정호열;정현열
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.7
    • /
    • pp.55-62
    • /
    • 2001
  • In this paper, we propose a new adaptative pruning algorithm which effectively reduces the search space during the recognition process. As maximum probabilities between neighbor frames are highly interrelated, an efficient pruning threshold value can be obtained from the maximum probabilities of previous frames. The main idea is to update threshold at the present frame by a combination of previous maximum probability and hypotheses probabilities. As present threshold is obtained in on-going recognition process, the algorithm does not need any pre-experiments to find threshold values even when recognition tasks are changed. In addition, the adaptively selected threshold allows an improvement of recognition speed under different environments. The proposed algorithm has been applied to a Korean Address recognition system. Experimental results show that the proposed algorithm reduces the search space of average 14.4% and 9.14% respectively while preserving the recognition accuracy, compared to the previous method of using fixed pruning threshold values and variable pruning threshold values.

  • PDF

Gray-level Image Watermarking using Wavelet Transform (웨이브렛 변환을 이용한 그레이-레벨 영상 워터마킹)

  • Min, Sun-Jin;Chung, Hoon;Kim, Chung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.487-490
    • /
    • 2001
  • With the establishment of the optimized copyright, digital image watermarking technique is demended to identify the owner of a certain image and to avoid the unauthorized distribution of digital image copies. Also, a robust watermarking approach should survive several possible attacks, such as image processing and lossy image compession. The proposed scheme distributes the 256 gray-level signature information in discrete wavelet transform domain of the host image where is very little visible distortion. While much of the privious work used signature data that is a small fraction of th e host images the proposed approach can easily handle gray-scale Images. As the result, stable reconstruction can be obtained even when the images are transformed, JPEG lossy compression or otherwise modified by low-pass filtering operations.

  • PDF

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.