• Title/Summary/Keyword: Pattern Processing

Search Result 2,352, Processing Time 0.022 seconds

Detection Algorithm of Lenslet Array Spot Pattern for Acquisition of Laser Wavefront (레이저 파면 획득용 Lenslet Array 점 패턴 검출 알고리즘)

  • Lee, Jae-Il;Lee, Young-Cheol;Huh, Joon
    • Journal of the Korea Institute of Military Science and Technology
    • /
    • v.8 no.4 s.23
    • /
    • pp.110-119
    • /
    • 2005
  • In this paper, a new detection algorithm was proposed for finding the position of lenslet array spot pattern used to acquire laser wavefront. Based on the analysis of the required signal processing characteristics, we categorized into and designed four main signal processing functions. The proposed was designed in order to have robust feature against a variation of geometrical form of the spot and also implemented to have semi-automatic thresholding capability based on CCD noise analysis. For performance evaluation, we made qualitative and quantitative comparisons with Carvalho's algorithm which has been published in recent. In the given experimental spot images, the proposed could detect the spots which has 1/3 times lower than the least S/N of which Carvalho's can detect and could reach to a detection precision of 0.1 pixel at the S/N. In functional aspect, the proposed could separate all valid spots locally. From these results, the proposed could have a superior precision of location detection of spot pattern in wider S/N range.

Test Pattern Generation for Combinational Circuits using Inherited Values (전수받은 값을 이용한 조합회로에 대한 검사 패턴 발생)

  • Song, Sang-Hun
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.606-615
    • /
    • 1997
  • This paper proposes an dffcient method for test pattern generation.Current test pattern genration systems generate a test vester for fault $F_{i+l}$ independently of the computation previously done for faults F1,F2...,Fi The proposed algorithm generates a test vector for fault $F_{i+l}$ by inheriting the test vector for fault Fi. A new test vector is grnerated from inherited values by gradually changing the inhderited values .The inherited values may partially activate a fauog and propagate the fault signal,Normally,this reduses the number of decision steps and backtracks in the second search.Experimental results for well-Known benchmark circuts show that the proposed algorithm is very efficient with small backtrack kimit;in combination eith other algorithms,it is very efficient for arbitrary backtrack limits.

  • PDF

Using an Adaptive Search Tree to Predict User Location

  • Oh, Se-Chang
    • Journal of Information Processing Systems
    • /
    • v.8 no.3
    • /
    • pp.437-444
    • /
    • 2012
  • In this paper, we propose a method for predicting a user's location based on their past movement patterns. There is no restriction on the length of past movement patterns when using this method to predict the current location. For this purpose, a modified search tree has been devised. The search tree is constructed in an effective manner while it additionally learns the movement patterns of a user one by one. In fact, the time complexity of the learning process for a movement pattern is linear. In this process, the search tree expands to take into consideration more details about the movement patterns when a pattern that conflicts with an existing trained pattern is found. In this manner, the search tree is trained to make an exact matching, as needed, for location prediction. In the experiments, the results showed that this method is highly accurate in comparison with more complex and sophisticated methods. Also, the accuracy deviation of users of this method is significantly lower than for any other methods. This means that this method is highly stable for the variations of behavioral patterns as compared to any other method. Finally, 1.47 locations were considered on average for making a prediction with this method. This shows that the prediction process is very efficient.

LBP and DWT Based Fragile Watermarking for Image Authentication

  • Wang, Chengyou;Zhang, Heng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.666-679
    • /
    • 2018
  • The discrete wavelet transform (DWT) has good multi-resolution decomposition characteristic and its low frequency component contains the basic information of an image. Based on this, a fragile watermarking using the local binary pattern (LBP) and DWT is proposed for image authentication. In this method, the LBP pattern of low frequency wavelet coefficients is adopted as a feature watermark, and it is inserted into the least significant bit (LSB) of the maximum pixel value in each block of host image. To guarantee the safety of the proposed algorithm, the logistic map is applied to encrypt the watermark. In addition, the locations of the maximum pixel values are stored in advance, which will be used to extract watermark on the receiving side. Due to the use of DWT, the watermarked image generated by the proposed scheme has high visual quality. Compared with other state-of-the-art watermarking methods, experimental results manifest that the proposed algorithm not only has lower watermark payloads, but also achieves good performance in tamper identification and localization for various attacks.

Automatic In-Text Keyword Tagging based on Information Retrieval

  • Kim, Jin-Suk;Jin, Du-Seok;Kim, Kwang-Young;Choe, Ho-Seop
    • Journal of Information Processing Systems
    • /
    • v.5 no.3
    • /
    • pp.159-166
    • /
    • 2009
  • As shown in Wikipedia, tagging or cross-linking through major keywords in a document collection improves not only the readability of documents but also responsive and adaptive navigation among related documents. In recent years, the Semantic Web has increased the importance of social tagging as a key feature of the Web 2.0 and, as its crucial phenotype, Tag Cloud has emerged to the public. In this paper we provide an efficient method of automated in-text keyword tagging based on large-scale controlled term collection or keyword dictionary, where the computational complexity of O(mN) - if a pattern matching algorithm is used - can be reduced to O(mlogN) - if an Information Retrieval technique is adopted - while m is the length of target document and N is the total number of candidate terms to be tagged. The result shows that automatic in-text tagging with keywords filtered by Information Retrieval speeds up to about 6 $\sim$ 40 times compared with the fastest pattern matching algorithm.

Hot Imprinted Hierarchical Micro/Nano Structures on Aluminum Alloy Surfaces (고온 임프린팅을 통한 알루미늄합금 표면의 마이크로/나노 구조 성형 기술)

  • Moon, I.Y.;Lee, H.W.;Oh, Y.S.;Kim, S.J.;Kim, J.H.;Kang, S.H.
    • Transactions of Materials Processing
    • /
    • v.28 no.5
    • /
    • pp.239-246
    • /
    • 2019
  • Various surface texturing techniques have been studied because of the effective applicability of micro or nano scale surface patterns. Particularly, the most promising types of patterns include the hierarchical patterns, which consists of micro/nano structures. Different processes such as MEMS, laser machining, micro cutting and micro grinding have been applied in the production of hierarchical patterns on various material surfaces. This study demonstrates the process of hot imprinting to induce the hierarchical patterns on the Al alloy surfaces. Wire electrical discharge machining (WEDM) process was used to imprint molds with micro scale sinusoidal pattern. In addition, the sinusoidal pattern with rough surface morphology was obtained as a result of the discharge craters. Consequently, the hierarchical patterns consisting of the sinusoidal pattern and the discharge craters were prepared on the imprinting mold surface. Hot imprinting process for the Al plates was conducted on the prepared mold, and the replication performance was analyzed. As a result, it was confirmed that the hierarchical patterns of the mold were effectively duplicated on the surface of Al plate.

Shape Description and Retrieval Using Included-Angular Ternary Pattern

  • Xu, Guoqing;Xiao, Ke;Li, Chen
    • Journal of Information Processing Systems
    • /
    • v.15 no.4
    • /
    • pp.737-747
    • /
    • 2019
  • Shape description is an important and fundamental issue in content-based image retrieval (CBIR), and a number of shape description methods have been reported in the literature. For shape description, both global information and local contour variations play important roles. In this paper a new included-angular ternary pattern (IATP) based shape descriptor is proposed for shape image retrieval. For each point on the shape contour, IATP is derived from its neighbor points, and IATP has good properties for shape description. IATP is intrinsically invariant to rotation, translation and scaling. To enhance the description capability, multiscale IATP histogram is presented to describe both local and global information of shape. Then multiscale IATP histogram is combined with included-angular histogram for efficient shape retrieval. In the matching stage, cosine distance is used to measure shape features' similarity. Image retrieval experiments are conducted on the standard MPEG-7 shape database and Swedish leaf database. And the shape image retrieval performance of the proposed method is compared with other shape descriptors using the standard evaluation method. The experimental results of shape retrieval indicate that the proposed method reaches higher precision at the same recall value compared with other description method.

A Study on Tensile Strength Considering Weight and Printing Time of 3D Infill Patterns using 3D Printing (3D 프린팅을 이용한 3차원 채움 패턴의 중량과 출력시간을 고려한 인장강도 연구)

  • D. H. Na;H. J. Kim;H. J. Kim
    • Transactions of Materials Processing
    • /
    • v.32 no.5
    • /
    • pp.255-267
    • /
    • 2023
  • Recently, 3D printing using a material extrusion method is used in various fields. Since plastic material has lower strength than steel, research to increase the strength is continuously being conducted. This study investigates the lattice structure for additive manufacturing of six 3D infill patterns (octet, quarter cubic, cubic, cubic subdivision, triangles and cross 3D) which consist of tetragons, hexagonal trusses, equilateral triangles and cross shapes. Consequently, in the tensile strength considering the weight and printing time, octet, quarter cubic, cubic and triangles patterns tended to increase linearly as the infill density increased, except for the infill density of 20%. However, the tensile strength/weight performed better than the infill density of 100% when the cubic subdivision pattern had the infill density of 20% and the cross 3D pattern had the infill density of 40%. Considering the weight and printing time, the infill patterns of high tensile strength were octet, quarter cubic, cubic, cubic subdivision, triangles and cross 3D order.

A High-speed Pattern Matching Acceleration System for Network Intrusion Prevention Systems (네트워크 침입방지 시스템을 위한 고속 패턴 매칭 가속 시스템)

  • Kim Sunil
    • The KIPS Transactions:PartA
    • /
    • v.12A no.2 s.92
    • /
    • pp.87-94
    • /
    • 2005
  • Pattern matching is one of critical parts of Network Intrusion Prevention Systems (NIPS) and computationally intensive. To handle a large number of attack signature fattens increasing everyday, a network intrusion prevention system requires a multi pattern matching method that can meet the line speed of packet transfer. In this paper, we analyze Snort, a widely used open source network intrusion prevention/detection system, and its pattern matching characteristics. A multi pattern matching method for NIPS should efficiently handle a large number of patterns with a wide range of pattern lengths and case insensitive patterns matches. It should also be able to process multiple input characters in parallel. We propose a multi pattern matching hardware accelerator based on Shift-OR pattern matching algorithm. We evaluate the performance of the pattern matching accelerator under various assumptions. The performance evaluation shows that the pattern matching accelerator can be more than 80 times faster than the fastest software multi-pattern matching method used in Snort.

Pattern Classification of the QRS-complexes Using Relational Correlation (관계상관식을 이용한 QRS 패턴분류)

  • Hwang, Seon-Cheol;Jeong, Hee-Kyo;Shin, Kun-Soo;Lee, Byung-Chae;Lee, Myoung-Ho
    • Proceedings of the KIEE Conference
    • /
    • 1990.11a
    • /
    • pp.428-431
    • /
    • 1990
  • This paper describes a pattern classification algorithm of QRS-complexes using significant point detection for extracting features of signals. Significant point extraction was processed by zero-crossing method, and decision function based on relational spectrum was used for pattern classification of the QRS-complexes. The hierarchical AND/OR graph was obtained by decomposing the signal, and by use of this graph, QRS's patterns were classified. By using the proposed algorithm, the accuracy of pattern classification and the processing speed were improved.

  • PDF