• Title/Summary/Keyword: Sequence-based rule

Search Result 92, Processing Time 0.023 seconds

Medical Image Encryption based on C-MLCA and 1D CAT (C-MLCA와 1차원 CAT를 이용한 의료 영상 암호화)

  • Jeong, Hyun-Soo;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.439-446
    • /
    • 2019
  • In this paper, we propose a encryption method using C-MLCA and 1D CAT to secure medical image for efficiently. First, we generate a state transition matrix using a Wolfram rule and create a sequence of maximum length. By operating the complemented vector, it converts an existing sequence to a more complex sequence. Then, we multiply the two sequences by rows and columns to generate C-MLCA basis images of the original image size and go through a XOR operation. Finally, we will get the encrypted image to operate the 1D CAT basis function created by setting the gateway values and the image which is calculated by transform coefficients. By comparing the encrypted image with the original image, we evaluate to analyze the histogram and PSNR. Also, by analyzing NPCR and key space, we confirmed that the proposed encryption method has a high level of stability and security.

Parametric modeling and shape optimization design of five extended cylindrical reticulated shells

  • Wu, J.;Lu, X.Y.;Li, S.C.;Xu, Z.H.;Wang, Z.D.;Li, L.P.;Xue, Y.G.
    • Steel and Composite Structures
    • /
    • v.21 no.1
    • /
    • pp.217-247
    • /
    • 2016
  • Five extended cylindrical reticulated shells are proposed by changing distribution rule of diagonal rods based on three fundamental types. Modeling programs for fundamental types and extended types of cylindrical reticulated shell are compiled by using the ANSYS Parametric Design Language (APDL). On this basis, conditional formulas are derived when the grid shape of cylindrical reticulated shells is equilateral triangle. Internal force analysis of cylindrical reticulated shells is carried out. The variation and distribution regularities of maximum displacement and stress are studied. A shape optimization program is proposed by adopting the sequence two-stage algorithm (RDQA) in FORTRAN environment based on the characteristics of cylindrical reticulated shells and the ideas of discrete variable optimization design. Shape optimization is achieved by considering the objective function of the minimum total steel consumption, global and locality constraints. The shape optimization for three fundamental types and five extended types is calculated with the span of 30 m~80 m and rise-span ratio of 1/7~1/3. The variations of the total steel consumption along with the span and rise-span ratio are analyzed with contrast to the results of shape optimization. The optimal combination of main design parameters for five extended cylindrical reticulated shells is investigated. The total steel consumption affected by distribution rule of diagonal rods is discussed. The results show that: (1) Parametric modeling method is simple, efficient and practical, which can quickly generate different types of cylindrical reticulated shells. (2) The mechanical properties of five extended cylindrical reticulated shells are better than their fundamental types. (3) The total steel consumption of cylindrical reticulated shells is optimized to be the least when rise-span ratio is 1/6. (4) The extended type of three-way grid cylindrical reticulated shell should be preferentially adopted in practical engineering. (5) The grid shape of reticulated shells should be designed to equilateral triangle as much as possible because of its reasonable stress and the lowest total steel consumption.

The Study on matrix based high performance pattern matching by independence partial match (독립 부분 매칭에 의한 행렬 기반 고성능 패턴 매칭 방법에 관한 연구)

  • Jung, Woo-Sug;Kwon, Taeck-Geun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.9B
    • /
    • pp.914-922
    • /
    • 2009
  • In this paper, we propose a matrix based real-time pattern matching method, called MDPI, for real-time intrusion detection on several Gbps network traffic. Particularly, in order to minimize a kind of overhead caused by buffering, reordering, and reassembling under the circumstance where the incoming packet sequence is disrupted, MDPI adopts independent partial matching in the case dealing with pattern matching matrix. Consequently, we achieved the performance improvement of the amount of 61% and 50% with respect to TCAM method efficiency through several experiments where the average length of the Snort rule set was maintained as 9 bytes, and w=4 bytes and w=8bytes were assigned, respectively, Moreover, we observed the pattern scan speed of MDPI was 10.941Gbps and the consumption of hardware resource was 5.79LC/Char in the pattern classification of MDPI. This means that MDPI provides the optimal performance compared to hardware complexity. Therefore, by decreasing the hardware cost came from the increased TCAM memory efficiency, MDPI is proven the cost effective high performance intrusion detection technique.

New Scheme for Smoker Detection (흡연자 검출을 위한 새로운 방법)

  • Lee, Jong-seok;Lee, Hyun-jae;Lee, Dong-kyu;Oh, Seoung-jun
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.9
    • /
    • pp.1120-1131
    • /
    • 2016
  • In this paper, we propose a smoker recognition algorithm, detecting smokers in a video sequence in order to prevent fire accidents. We use description-based method in hierarchical approaches to recognize smoker's activity, the algorithm consists of background subtraction, object detection, event search, event judgement. Background subtraction generates slow-motion and fast-motion foreground image from input image using Gaussian mixture model with two different learning-rate. Then, it extracts object locations in the slow-motion image using chain-rule based contour detection. For each object, face is detected by using Haar-like feature and smoke is detected by reflecting frequency and direction of smoke in fast-motion foreground. Hand movements are detected by motion estimation. The algorithm examines the features in a certain interval and infers that whether the object is a smoker. It robustly can detect a smoker among different objects while achieving real-time performance.

Structural system reliability-based design optimization considering fatigue limit state

  • Nophi Ian D. Biton;Young-Joo Lee
    • Smart Structures and Systems
    • /
    • v.33 no.3
    • /
    • pp.177-188
    • /
    • 2024
  • The fatigue-induced sequential failure of a structure having structural redundancy requires system-level analysis to account for stress redistribution. System reliability-based design optimization (SRBDO) for preventing fatigue-initiated structural failure is numerically costly owing to the inclusion of probabilistic constraints. This study incorporates the Branch-and-Bound method employing system reliability Bounds (termed the B3 method), a failure-path structural system reliability analysis approach, with a metaheuristic optimization algorithm, namely grey wolf optimization (GWO), to obtain the optimal design of structures under fatigue-induced system failure. To further improve the efficiency of this new optimization framework, an additional bounding rule is proposed in the context of SRBDO against fatigue using the B3 method. To demonstrate the proposed method, it is applied to complex problems, a multilayer Daniels system and a three-dimensional tripod jacket structure. The system failure probability of the optimal design is confirmed to be below the target threshold and verified using Monte Carlo simulation. At earlier stages of the optimization, a smaller number of limit-state function evaluation is required, which increases the efficiency. In addition, the proposed method can allocate limited materials throughout the structure optimally so that the optimally-designed structure has a relatively large number of failure paths with similar failure probability.

Acoustic and Pronunciation Model Adaptation Based on Context dependency for Korean-English Speech Recognition (한국인의 영어 인식을 위한 문맥 종속성 기반 음향모델/발음모델 적응)

  • Oh, Yoo-Rhee;Kim, Hong-Kook;Lee, Yeon-Woo;Lee, Seong-Ro
    • MALSORI
    • /
    • v.68
    • /
    • pp.33-47
    • /
    • 2008
  • In this paper, we propose a hybrid acoustic and pronunciation model adaptation method based on context dependency for Korean-English speech recognition. The proposed method is performed as follows. First, in order to derive pronunciation variant rules, an n-best phoneme sequence is obtained by phone recognition. Second, we decompose each rule into a context independent (CI) or a context dependent (CD) one. To this end, it is assumed that a different phoneme structure between Korean and English makes CI pronunciation variabilities while coarticulation effects are related to CD pronunciation variabilities. Finally, we perform an acoustic model adaptation and a pronunciation model adaptation for CI and CD pronunciation variabilities, respectively. It is shown from the Korean-English speech recognition experiments that the average word error rate (WER) is decreased by 36.0% when compared to the baseline that does not include any adaptation. In addition, the proposed method has a lower average WER than either the acoustic model adaptation or the pronunciation model adaptation.

  • PDF

Two-stage ML-based Group Detection for Direct-sequence CDMA Systems

  • Buzzi, Stefano;Lops, Marco
    • Journal of Communications and Networks
    • /
    • v.5 no.1
    • /
    • pp.33-42
    • /
    • 2003
  • In this paper a two-stage maximum-likelihood (ML) detection structure for group detection in DS/CDMA systems is presented. The first stage of the receiver is a linear filter, aimed at suppressing the effect of the unwanted (i.e., out-of-grout) users' signals, while the second stage is a non-linear block, implementing a ML detection rule on the set of desired users signals. As to the linear stage, we consider both the decorrelating and the minimum mean square error approaches. Interestingly, the proposed detection structure turns out to be a generalization of Varanasi's group detector, to which it reduces when the system is synchronous, the signatures are linerly independent and the first stage of the receiver is a decorrelator. The issue of blind adaptive receiver implementation is also considered, and implementations of the proposed receiver based on the LMS algorithm, the RLS algorithm and subspace-tracking algorithms are presented. These adaptive receivers do not rely on any knowledge on the out-of group users' signals, and are thus particularly suited for rejection of out-of-cell interference in the base station. Simulation results confirm that the proposed structure achieves very satisfactory performance in comparison with previously derived receivers, as well as that the proposed blind adaptive algorithms achieve satisfactory performance.

Data Pattern Estimation with Movement of the Center of Gravity

  • Ahn Tae-Chon;Jang Kyung-Won;Shin Dong-Du;Kang Hak-Soo;Yoon Yang-Woong
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.6 no.3
    • /
    • pp.210-216
    • /
    • 2006
  • In the rule based modeling, data partitioning plays crucial role be cause partitioned sub data set implies particular information of the given data set or system. In this paper, we present an empirical study result of the data pattern estimation to find underlying data patterns of the given data. Presented method performs crisp type clustering with given n number of data samples by means of the sequential agglomerative hierarchical nested model (SAHN). In each sequence, the average value of the sum of all inter-distance between centroid and data point. In the sequel, compute the derivation of the weighted average distance to observe a pattern distribution. For the final step, after overall clustering process is completed, weighted average distance value is applied to estimate range of the number of clusters in given dataset. The proposed estimation method and its result are considered with the use of FCM demo data set in MATLAB fuzzy logic toolbox and Box and Jenkins's gas furnace data.

A Study on the Gesture Recognition Based on the Particle Filter Using CONDENSATION Algorithm (CONDENSATION 알고리즘을 이용한 입자필터 기반 동작 인식 연구)

  • Lee, Yang-Weon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.584-591
    • /
    • 2007
  • The recognition of human gestures in image sequences is an important and challenging problem that enables a host of human-computer interaction applications. This paper describes a gesture recognition algorithm based on the particle filters, namely CONDENSATION. The particle filter is more efficient than any other tracking algorithm because the tracking mechanism follows Bayesian estimation rule of conditional probability propagation. We used two models for the evaluation of particle filter and apply the MAILAB for the preprocessing of the image sequence. But we implement the particle filter using the C++ to get the high speed processing. In the experimental results, it is demonstrated that the proposed algorithm prove to be robust in the cluttered environment.

BIM-based Design Verification Performance Analysis with Priority Rules Applied (우선순위 규칙을 적용한 BIM 기반 설계검증 성과 분석)

  • Huh, Seung-Ha;Shim, Jae-Hyeong;Ham, Nam-Hyuk;Kim, Jae-Jun
    • Journal of KIBIM
    • /
    • v.11 no.3
    • /
    • pp.1-11
    • /
    • 2021
  • BIM is one of the means of reducing the economic loss caused by design errors. These features of BIM have led to increased use of BIM. With the increasing use of BIM, several studies have been conducted to analyze the performance of BIM. As the importance of BIM staff is emphasized in the performance analysis of BIM, the human resource allocation of BIM staff can become an important research issue. However, there are few studies to measure the workforce effectiveness of BIM staff. Ham et al (2020) measured BIM workforce efficiency using FCFS queue model rules. Since design errors can have different effects on the project depending on the type, there are design errors that must be dealt with first. Therefore, in this study, a priority queue was used to solve design errors with high priority first. The performance of BIM-based design verification was analyzed by quantitatively analyzing the performance of BIM staff when the priority rule was applied to the design error processing sequence.