• Title/Summary/Keyword: Scalar

Search Result 1,044, Processing Time 0.03 seconds

A Resampling Method for Small Sample Size Problems in Face Recognition using LDA (LDA를 이용한 얼굴인식에서의 Small Sample Size문제 해결을 위한 Resampling 방법)

  • Oh, Jae-Hyun;Kwak, Jo-Jun
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.2
    • /
    • pp.78-88
    • /
    • 2009
  • In many face recognition problems, the number of available images is limited compared to the dimension of the input space which is usually equal to the number of pixels. This problem is called as the 'small sample size' problem and regularization methods are typically used to solve this problem in feature extraction methods such as LDA. By using regularization methods, the modified within class matrix becomes nonsingu1ar and LDA can be performed in its original form. However, in the process of adding a scaled version of the identity matrix to the original within scatter matrix, the scale factor should be set heuristically and the performance of the recognition system depends on highly the value of the scalar factor. By using the proposed resampling method, we can generate a set of images similar to but slightly different from the original image. With the increased number of images, the small sample size problem is alleviated and the classification performance increases. Unlike regularization method, the resampling method does not suffer from the heuristic setting of the parameter producing better performance.

Function Embedding and Projective Measurement of Quantum Gate by Probability Amplitude Switch (확률진폭 스위치에 의한 양자게이트의 함수 임베딩과 투사측정)

  • Park, Dong-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.6
    • /
    • pp.1027-1034
    • /
    • 2017
  • In this paper, we propose a new function embedding method that can measure mathematical projections of probability amplitude, probability, average expectation and matrix elements of stationary-state unit matrix at all control operation points of quantum gates. The function embedding method in this paper is to embed orthogonal normalization condition of probability amplitude for each control operating point into a binary scalar operator by using Dirac symbol and Kronecker delta symbol. Such a function embedding method is a very effective means of controlling the arithmetic power function of a unitary gate in a unitary transformation which expresses a quantum gate function as a tensor product of a single quantum. We present the results of evolutionary operation and projective measurement when we apply the proposed function embedding method to the ternary 2-qutrit cNOT gate and compare it with the existing methods.

Industrial Cluster: Still a Valid Policy Tool for the Creative Economy in Korea? (산업클러스터, 창조경제를 위한 정책수단으로의 가능성)

  • Choo, Sungjae
    • Journal of the Economic Geographical Society of Korea
    • /
    • v.16 no.4
    • /
    • pp.551-566
    • /
    • 2013
  • This study aims to evaluate the industrial cluster policy implemented in Korea during the last decade or so, examine whether it can still be a valid policy measure in the creative economy regime, and propose policy directions for the future. It is evaluated that the cluster policy has contributed to increasing productivity by improving networks between companies, universities and research centers and thus strengthening innovation infrastructure. The policy, however, by its characteristics of government-domination, failed to develop open-ended and flexible spontaneous clusters. Industrial clusters have the capability to contribute to the virtuous circle of creative economy by enhancing creativity and innovativeness, and subsequently by increasing value-added. In order to maximize these positive effects, a few suggestions are made, including being faithful to the very nature of clusters, e.g. geographical proximity and connectedness, intending clusters with creativity well maintained, orienting toward multi-scalar clusters with a mixture of local and global perspectives, and matching regional and industrial policies with regards to clusters.

  • PDF

Creative Place-making for Regional Development in the Era of Glocalization (글로컬라이제이션과 지역발전을 위한 창조적 장소만들기)

  • Lee, Byung Min;Nahm, Kee Bom
    • Journal of the Korean Geographical Society
    • /
    • v.51 no.3
    • /
    • pp.421-439
    • /
    • 2016
  • Global society is shifting and now evolving towards glocalization, meaning the increasing role of region and multi scalar interactions between region and global social world. In this glocalization era, there has been mushrooming literature and much discussions on the impacts of place-branding and place-marketing on regional development both in academia and practical researches. The inclusive and participatory creative place-making process, however, is more quintessential than the resultant place marketing strategy. This paper tries to reassess the creative place-making based on culture-led regional development perspectives. Specifically it compares Korea and Japan's strategies and suggests a hybrid model of place-making-branding-marketing, utilizing cultural content industries. It then stresses the importance of building a virtuous circle of sustainable regional cultural industrial ecosystem including culture-based interpretation of places and improvement of community quality of life.

  • PDF

Interactive G$^1$ Splines with Tangent Specification Method (접선 지정법을 이용한 대화형 G$^1$스플라인)

  • Ju, U-Seok;Park, Gyeong-Hui;Lee, Hui-Seung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.1 no.4
    • /
    • pp.531-540
    • /
    • 1994
  • Spline curve scheme is the most valuable tool for the CAD of industrial products. Hence, the development of a new, effective curve scheme can have immediate impact on the current design industries. This paper develops and implements a new methodology for the implementation of the visually continuous class of splines which can produce a more flexible and diverse curve shapes. This class of splines has advantaged over existing splines in that it can accommodate wider range of shapes while maintaining the interpolators property of the ordinary cardinal splines. Most importantly, we avoid using the previous method of implementing G$^1$ curves, where users must specify scalar values for the control of curve shapes. We derive and implement an easy-to -use transformation between the user-specified graphical tangent vectors and the actual parameters for the resulting curve. Since the resulting curve shape reflects original tangential direction faithfully, CAD users can simply represent approximate curve shapes with proper tangents. Consequently, a simple user interface device such as a mouse can effectively produce a various spline curves using the proposed spline tool.

  • PDF

Hardware Implementation of Chaotic System for Security of JPEG2000 (JPEG2000의 보안을 위한 카오스 시스템의 하드웨어 구현)

  • Seo Young-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.12C
    • /
    • pp.1193-1200
    • /
    • 2005
  • In this paper, we proposed an image hiding method which decreases the amount of calculation encrypting partial data rather than the whole image data using a discrete wavelet transform and a linear scalar quantization which have been adopted as the main technique in JPEG2000 standard and then implemented the proposed algorithm to hardware. A chaotic system was used instead of encryption algorithms to reduce further amount of calculation. It uses a method of random changing method using the chaotic system of the data in a selected subband. For ciphering the quantization index it uses a novel image encryption algorithm of cyclical shifting to the right or left direction and encrypts two quantization assignment method (Top-down coding and Reflection coding), made change of data less. The experiments have been performed with the proposed methods implemented in software for about 500 images. The hardware encryption system was synthesized to find the gate-level circuit with the Samsung $0.35{\mu}m$ Phantom-cell library and timing simulation was performed, which resulted in the stable operation in the frequency above 100MHz.

Design and fabrication of temperature-independent AWG-WDM devices using polymer overcladding (폴리머 상부클래드를 이용한 온도무의존 AWG 파장분할 다중화 소자의 설계 및 제작)

  • Han, Young-Tak;Kim, Duk-Jun;Shin, Jang-Uk;Park, Sang-Ho;Park, Yoon-Jung;Sung, Hee-Kyeng
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.2
    • /
    • pp.135-141
    • /
    • 2003
  • In arrayed waveguide grating (AWG) devices whose waveguides were composed of polymer with negative thermo-optic coefficient as overcladding, and silica with positive thermo-optic coefficient as both core and undercladding, we investigated the temperature dependence of the central wavelength using two-dimensional SFDM. From these results, it was confirmed that the temperature dependence can be nearly eliminated by adjusting the refractive index of the cladding and the thickness of the silica thin film upper-loaded on the core. Based on the numerical calculations, the AWG device with polymer overcladding was fabricated. and its optical characteristics were compared with those of the orginal silica AWG device. The introduction of polymer overcladding decreased the temperature dependence of the central wavelength from 0.0130 nm/$^{\circ}C$ to 0.0028 nm/$^{\circ}C$ without deteriorating the insertion loss and crosstalk characteristics.

Effects of Sweet Bee Venom on the Central Nervous System in Rats -using the Functional Observational Battery- (Sweet BV 시술이 Rat의 중추신경계에 미치는 영향 - 기능관찰 종합평가를 이용하여-)

  • An, Joong-Chul;Kwon, Ki-Rok
    • Journal of Pharmacopuncture
    • /
    • v.14 no.3
    • /
    • pp.19-45
    • /
    • 2011
  • Objectives: This study was performed to analyse the effects of Sweet Bee Venom(Sweet BV-pure melittin, the major component of honey bee venom) on the central nervous system in rats. Methods: All experiments were conducted at Biotoxtech Company, a non-clinical studies authorized institution, under the regulations of Good Laboratory Practice (GLP). Male rats of 5 weeks old were chosen for this study and after confirming condition of rats was stable, Sweet BV was administered in thigh muscle of rats. And checked the effects of Sweet BV on the central nervous system using the functional observational battery (FOB), which is a neuro-toxicity screening assay composed of 30 descriptive, scalar, binary, and continuous endpoints. And home cage observations, home cage removal and handling, open field activity, sensorimotor reflex test/physiological measurements were conducted. Results: 1. In the home cage observation, there was not observed any abnormal signs in rats. 2. In the observation of open field activity, the reduction of number of unit areas crossed and rearing count was observed caused by Sweet BV treatment. 3. In the observation of handling reactivity, there was not observed any abnormal signs in rats. 4. In the observation of sensorimotor reflex tests/physiological measurements, there was not observed any neurotoxic signs in rats. 5. In the measurement of rectal temperature, treatment of Sweet BV did not showed great influences in the body temperature of rats. Conclusions: Above findings suggest that Sweet BV is relatively safe treatment in the central nervous system. But in the using of over dose, Sweet BV may the cause of local pain and disturbance of movement. Further studies on the subject should be conducted to yield more concrete evidences.

Televiewer Rock Strength as an Approach to Estimate the Strength of in situ Rocks (텔레뷰어 암석강도 산출 및 그의 응용성)

  • 김중열;김유성;현혜자
    • Proceedings of the Korean Geotechical Society Conference
    • /
    • 2002.03a
    • /
    • pp.237-244
    • /
    • 2002
  • Televiewer is a logging tool capable of scanning the borehole wall. The tool uses a rotating acoustic beam generator that acts as both a transmitter and receiver. The beams are sent toward the wall. The amplitude of a returning signal from the wall has nearly a linear relationship with the reflection coefficient R of the borehole wall, when the wall is smooth. As R depends only on rock impedance for fixed water impedance, the amplitude is directly associated with mass density and seismic velocity of rock. Meanwhile, the amplitude can be further reduced by wall roughness that may be caused by drilling procedures, differences in rock hardness, because the rough surface can easily scatter the acoustic energy and sometimes the hole becomes elongated in all directions according to the degree of weathering. In this sense, the amplitude is related to the hardness of rocks. For convenience of analysis, the measured amplitude image(2-D data(azimuth ${\times}$ depth)) is converted, with an appropriate algorithm, to the 1-D data(depth), where the amplitude image values along a predetermined fracture signature(sinusoid) are summed up and averaged. The resulting values are subsequently scaled simply by a scalar factor that is possibly consistent with a known strength. This scaled Televiewer reflectivity is named, as a matter of convenience,“Televiewer rock strength”. This paper shows, based on abundant representative case studies from about 8 years of Televiewer surveys, that Televiewer rock strength might be regarded, on a continuous basis with depth, as a quitely robust indicator of rock classification and in most cases as an approximate uniaxial strength that is comparable to the rebound value from Schmidt hammer test.

  • PDF

Development of High Speed Scalar Product Operation System for ECC Public Key (타원곡선 공개키 생성을 위한 고속 스칼라곱 연산 시스템 구현)

  • Kim, Kap-Yol;Lee, Chul-Soo;Park, Seok-Cheon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.394-402
    • /
    • 2010
  • At a recent, enterprises based on online-service are established because of rapid growth of information network. These enterprises collect personal information and do customer management. If customers use a paid service, company send billing information to customer and customer pay it. Such circulation and management of information is big issue but most companies don't care of information security. Actually, personal information that was managed by largest internal open-market was exposed. For safe customer information management, this paper proposes the method that decrease load of RSA cryptography algorithm that is commonly used for preventing from illegal attack or hacking. The method for decreasing load was designed by Binary NAF Method and it can operates modular Exponentiation rapidly. We implemented modular Exponentiation algorithm using existing Binary Method and Windows Method and compared and evaluated it.