• Title/Summary/Keyword: Processing window

Search Result 594, Processing Time 0.024 seconds

Design and Implementation of Depth Image Based Real-Time Human Detection

  • Lee, SangJun;Nguyen, Duc Dung;Jeon, Jae Wook
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.14 no.2
    • /
    • pp.212-226
    • /
    • 2014
  • This paper presents the design and implementation of a pipelined architecture and a method for real-time human detection using depth image from a Time-of-Flight (ToF) camera. In the proposed method, we use Euclidean Distance Transform (EDT) in order to extract human body location, and we then use the 1D, 2D scanning window in order to extract human joint location. The EDT-based human extraction method is robust against noise. In addition, the 1D, 2D scanning window helps extracting human joint locations easily from a distance image. The proposed method is designed using Verilog HDL (Hardware Description Language) as the dedicated hardware architecture based on pipeline architecture. We implement the dedicated hardware architecture on a Xilinx Virtex6 LX750 Field Programmable Gate Arrays (FPGA). The FPGA implementation can run 80 MHz of maximum operating frequency and show over 60fps of processing performance in the QVGA ($320{\times}240$) resolution depth image.

A Study on the Development of Structural Analysis Program using MATLAB Language (MATLAB 언어를 이용한 구조해석 프로그램 개발에 관한 연구)

  • 배동명;강상중
    • Journal of the Korean Society of Fisheries and Ocean Technology
    • /
    • v.36 no.4
    • /
    • pp.347-353
    • /
    • 2000
  • The construction and ability of CAE program are presented. The merit and ability of MATLAB which is widely using in the field of recently engineering and natural science are also introduced. Also, analysis program of frame structure used the MATLAB language which is divide in 4th generation language is presented. In this paper, the proposed program using MATLB language to be based upon the composition of general CAE program is composed to preprocess, solver and post-process procedure. And it is able to carried out the static and eigenvalue analysis of truss structure and two dimensional frame structure. Also, for the sample pre-processing and post-processing, it is used the characteristic of input window and plot window to be made of the various GUI function. Each finite elements to be required for analysis is formulated by the Galerkin's method, as a kind of weighted residual method. For check of the results of calculation for program used in this paper, the results to be calculated using program to be developed by the author was compared with its of ANSYS code for general structural analysis about two dimensional truss and frame structure.

  • PDF

A Study on Inrormation Analysis and Automaiton of Objects based on Reusability (재사용에 기반한로서 객체들의 정보 분석과 자동화에 관한 연구)

  • Kim, Jae-Saeng;Song, Yeong-Jae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.2
    • /
    • pp.384-394
    • /
    • 1997
  • Research about Reuse is developed in various direstions, but the sucessful exmples; of the rexuavle objects are very rare in praciice because technical environment to support reuse is short.In this paper we describe a sys-tem for analyxing the information about reusability of C++ objects and for storing and managing the extracted information in information DB.In this development system, user can see the specification information of objects and the quality information of the procedual and object oriented atibutes by browsing.And objests that are not on the reuse unformation DB is analyxed and is tested automatically using the information analyzer by user.We implemented this system using C program in X-Window OSFI/Motif 2.1.1.

  • PDF

A Statistically Model-Based Adaptive Technique to Unsupervised Segmentation of MR Images (자기공명영상의 비지도 분할을 위한 통계적 모델기반 적응적 방법)

  • Kim, Tae-Woo
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.286-295
    • /
    • 2000
  • We present a novel statistically adaptive method using the Minimum Description Length(MDL) principle for unsupervised segmentation of magnetic resonance(MR) images. In the method, Markov random filed(MRF) modeling of tissue region accounts for random noise. Intensity measurements on the local region defined by a window are modeled by a finite Gaussian mixture, which accounts for image inhomogeneities. The segmentation algorithm is based on an iterative conditional modes(ICM) algorithm, approximately finds maximum ${\alpha}$ posteriori(MAP) estimation, and estimates model parameters on the local region. The size of the window for parameter estimation and segmentation is estimated from the image using the MDL principle. In the experiments, the technique well reflected image characteristic of the local region and showed better results than conventional methods in segmentation of MR images with inhomogeneities, especially.

  • PDF

Distributed and Scalable Intrusion Detection System Based on Agents and Intelligent Techniques

  • El-Semary, Aly M.;Mostafa, Mostafa Gadal-Haqq M.
    • Journal of Information Processing Systems
    • /
    • v.6 no.4
    • /
    • pp.481-500
    • /
    • 2010
  • The Internet explosion and the increase in crucial web applications such as ebanking and e-commerce, make essential the need for network security tools. One of such tools is an Intrusion detection system which can be classified based on detection approachs as being signature-based or anomaly-based. Even though intrusion detection systems are well defined, their cooperation with each other to detect attacks needs to be addressed. Consequently, a new architecture that allows them to cooperate in detecting attacks is proposed. The architecture uses Software Agents to provide scalability and distributability. It works in two modes: learning and detection. During learning mode, it generates a profile for each individual system using a fuzzy data mining algorithm. During detection mode, each system uses the FuzzyJess to match network traffic against its profile. The architecture was tested against a standard data set produced by MIT's Lincoln Laboratory and the primary results show its efficiency and capability to detect attacks. Finally, two new methods, the memory-window and memoryless-window, were developed for extracting useful parameters from raw packets. The parameters are used as detection metrics.

An Enhanced Message Priority Mechanism in IEEE 802.11p Based Vehicular Networks

  • Liu, Chang;Chung, Sang-Hwa;Jeong, Han-You;Jung, Ik-Joo
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.465-482
    • /
    • 2015
  • IEEE 802.11p is a standard MAC protocol for wireless access in vehicular environments (WAVEs). If a packet collision happens when a safety message is sent out, IEEE 802.11p chooses a random back-off counter value in a fixed-size contention window. However, depending on the random choice of back-off counter value, it is still possible that less important messages are sent out first while more important messages are delayed longer until sent out. In this paper, we present a new scheme for safety message scheduling, called the enhanced message priority mechanism (EMPM). It consists of the following two components: the benefit-value algorithm, which calculates the priority of the messages depending on the speed, deceleration, and message lifetime; and the back-off counter selection algorithm, which chooses the non-uniform back-off counter value in order to reduce the collision probability and to enhance the throughput of the highly beneficial messages. Numerical results show that the EMPM can significantly improve the throughput and delay of messages with high benefits when compared with existing MAC protocols. Consequently, the EMPM can provide better QoS support for the more important and urgent messages.

Classification of Textured Images Based on Discrete Wavelet Transform and Information Fusion

  • Anibou, Chaimae;Saidi, Mohammed Nabil;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • v.11 no.3
    • /
    • pp.421-437
    • /
    • 2015
  • This paper aims to present a supervised classification algorithm based on data fusion for the segmentation of the textured images. The feature extraction method we used is based on discrete wavelet transform (DWT). In the segmentation stage, the estimated feature vector of each pixel is sent to the support vector machine (SVM) classifier for initial labeling. To obtain a more accurate segmentation result, two strategies based on information fusion were used. We first integrated decision-level fusion strategies by combining decisions made by the SVM classifier within a sliding window. In the second strategy, the fuzzy set theory and rules based on probability theory were used to combine the scores obtained by SVM over a sliding window. Finally, the performance of the proposed segmentation algorithm was demonstrated on a variety of synthetic and real images and showed that the proposed data fusion method improved the classification accuracy compared to applying a SVM classifier. The results revealed that the overall accuracies of SVM classification of textured images is 88%, while our fusion methodology obtained an accuracy of up to 96%, depending on the size of the data base.

Adaptive Contention Window Method for QoS-Multimedia Traffic in WLAN (무선 랜 환경에서 QoS-Multimedia Traffic을 지원하기 위한 Adaptive Contention Window 기법)

  • Seo, Ji-Hun;Cho, Keu-Chul;Han, Ji-Hun;Han, Ki-Jun
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2014.11a
    • /
    • pp.203-206
    • /
    • 2014
  • 무선 LAN(Wireless Local Area Networks 의 DCF(Distributed Coordination Function) 방식은 랜덤 백 오프 방식으로 매체에 접근하기 때문에 지연이 발생하여 정해진 시간 내에 전송을 보장할 수 없다는 단점이 있다. [1] 이는 곧 실시간 멀티미디어 트래픽(비디오, 음성 등)의 QoS(Quality Of Service)를 보장할 수 없다는 것을 뜻한다. 또한 IEEF 802.11e 표준 [2]에서 제공하는 QoS 를 위한 EDCA(Enhanced Distributed Channel Access)라는 프로토콜은 제시되어있으나 실제로 구현되어있는 디바이스의 부재로 QoS 를 지원하기가 어렵다. 따라서 무선 랜에서 IEEE 802.11e 를 지원하지 않는 망내 디바이스, 즉 큐가 1 개인 STA, 즉 기본적인 802.11 표준 기술인 DCF 를 사용하는 STA 을 위해서 멀티미디어 트래픽의 실시간 전송을 보장하기 위한 기법을 제시한다.

$High-J_c\;NdBa_2Cu_3O_{7-{\delta}}$ thin films on $SrTiO_3$(100) substrates prepared by the PLD process

  • Wee, Sung-Hun;Moon, Seung-Hyun;Yoo, Sang-Im
    • Progress in Superconductivity and Cryogenics
    • /
    • v.11 no.2
    • /
    • pp.1-6
    • /
    • 2009
  • We report a successful fabrication of $high-J_c\;NdBa_2Cu_3O_{7-{\delta}}$ (NdBCO) films on $SrTiO_3$(STO) (100) substrates by pulsed laser deposition (PLD) in a relatively wide processing window. Under various oxygen pressures controlled by either 1%$O_2$/Ar mixture gas or pure $O_2$ gas, strongly c-axis oriented NdBCO films were grown at the substrate temperature $(T_s)\;of\;800^{\circ}C$ in 800 mTorr with 1%$O_2$/Ar gas and also in 400 and 800 mTorr with pure $O_2$ gas. These samples exhibited $T_c$ values over 90K and $J_c$ values of $2.8-3.5MA/cm^2$ at 77K in self-field (77K, sf). On the other hand, $J_c$ values over $1A/cm^2$ were obtained at the temperature regions of $700-830^{\circ}C$ in 800 mTorr with 1%$O_2$/Ar gas at those of $750-830^{\circ}C$ in 800 mTorr with pure $O_2$ gas. Unlike previous reports, resent results support that the PLD processing window for high-Jc NdBCO films is not narrow.

Design and Implementation of a Visualization Tool for a Simulator of a Bio-Intrusion Detection System (Bio-IDS 시뮬레이터를 위한 Visualization Tool 의 설계 및 구현)

  • Moon, Joo-Sun;Bae, Jang-Ho;Nang, Jong-Ho
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2007.11a
    • /
    • pp.149-152
    • /
    • 2007
  • 본 논문에서는 대규모 네트워크 상에서 발생되는 시뮬레이션 결과를 효과적으로 보여주기 위한 Visualization Tool 을 제안한다. 복잡하고 다양한 시뮬레이션 결과를 얻기 위해, 생태계 모방형 플랫폼을 이용한 Bio-IDS (Intrusion Detection System) 시뮬레이터의 실험 데이터를 이용하였다. 대규모 네트워크를 모두 보이기에는 화면이 너무 작기 때문에, Visualization Tool 은 화면의 확대 및 축소를 위한 Zoom In/Out 기능, 화면의 Panning 을 위한 Scroll Bar 및 현재 영역의 위치를 알려주는 Mini Map 이 필요하였다. 또한, 사용자가 쉽게 시뮬레이션의 속도를 조절할 수 있도록 Simulation Speed Control 기능을 구현하였으며, 각 노드의 효과적인 정상 및 침입 상태 표시를 위한 Icon, 각 노드의 진화 정도와 침입 탐지 정확도를 알려주는 Evolution Number와 Accuracy Gauge, 해당 시뮬레이션의 결과를 도시하기 위한 Simulation Graph 도 추가하였다. 네트워크 Off-line 환경도 대비하여, DB 로부터의 데이터 입력뿐만 아니라 Log File 을 통한 데이터 입력도 가능하게 하였다. 끝으로, 전체 Node 들의 다양한 상태변화를 확인할 수 있는 Topology Window 와 Simulation Demo Window 간의 Synchronization 을 위한 Socket 통신 등 다양한 기능들이 통합된 Visualization Tool 을 개발함으로써, 대규모 네트워크 시뮬레이션의 효과적인 시뮬레이션이 가능하게 되었다. 이로 인해 대규모 네트워크 상의 복잡한 시뮬레이션 결과도 사용자가 매우 쉽게 파악할 수 있 매우 효과적으로 사용자가 파악할 수 있게 되었다.