• Title/Summary/Keyword: Small computer

Search Result 3,221, Processing Time 0.043 seconds

Dynamic Control of Learning Rate in the Improved Adaptive Gaussian Mixture Model for Background Subtraction (배경분리를 위한 개선된 적응적 가우시안 혼합모델에서의 동적 학습률 제어)

  • Kim, Young-Ju
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.2
    • /
    • pp.366-369
    • /
    • 2005
  • Background subtraction is mainly used for the real-time extraction and tracking of moving objects from image sequences. In the outdoor environment, there are many changeable factor such as gradually changing illumination, swaying trees and suddenly moving objects, which are to be considered for the adaptive processing. Normally, GMM(Gaussian Mixture Model) is used to subtract the background adaptively considering the various changes in the scenes, and the adaptive GMMs improving the real-time performance were worked. This paper, for on-line background subtraction, applied the improved adaptive GMM, which uses the small constant for learning rate ${\alpha}$ and is not able to speedily adapt the suddenly movement of objects, So, this paper proposed and evaluated the dynamic control method of ${\alpha}$ using the adaptive selection of the number of component distributions and the global variances of pixel values.

  • PDF

A study of MIMO Fuzzy system with a Learning Ability (학습기능을 갖는 MIMO 퍼지시스템에 관한 연구)

  • Park, Jin-Hyun;Bae, Kang-Yul;Choi, Young-Kiu
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.3
    • /
    • pp.505-513
    • /
    • 2009
  • Z. Cao had proposed NFRM(new fuzzy reasoning method) which infers in detail using relation matrix. In spite of the small inference rules, it shows good performance than mamdani's fuzzy inference method. But the most of fuzzy systems are difficult to make fuzzy inference rules in the case of MIMO system. The past days, We had proposed the MIMO fuzzy inference which had extended a Z. Cao's fuzzy inference to handle MIMO system. But many times and effort needed to determine the relation matrix elements of MIMO fuzzy inference by heuristic and trial and error method in order to improve inference performances. In this paper, we propose a MIMO fuzzy inference method with the learning ability witch is used a gradient descent method in order to improve the performances. Through the computer simulation studies for the inverse kinematics problem of 2-axis robot, we show that proposed inference method using a gradient descent method has good performances.

Study of Information Maintenance Components in Wireless Network Environment based on Sensors (센서기반 무선 네트워크 환경에서 정보 유지관리에 관한 구성요소 연구)

  • Lee, Hyun-Chang;Xu, Chen-Lin;Shin, Seong-Yoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.11
    • /
    • pp.2640-2644
    • /
    • 2014
  • With the development of technology, wireless sensor networks (WSN) are wireless networks of consisting a large number of small and low-cost sensors. Wireless sensor networks facilitate collaboration to achieve the perception of information collection, processing and transmission tasks in deployment area. They have various purposes such as military, disaster relief, medical rescue, environmental monitoring, precision farming and manufacturing industry etc. Therefore, technologies for data maintaining technologies in sensor network environment is one of essential parts of sensor networks. In this paper, we present the essential particulars about data management technology at wireless sensor network environments and propound the issues. Further, we could organize and develop a systematic approach in solving the issues.

Keeping-ownership Cache Replacement Policies for Remote Access Caches of NUMA System (NUMA 시스템에서 소유권에 근거한 원격 캐시 교체 정책)

  • 신숭현;곽종욱;장성태;전주식
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.31 no.8
    • /
    • pp.473-486
    • /
    • 2004
  • NUMA systems have remote access caches(RAC) in each local node to reduce the overhead for repeated remote memory accesses. By this RAC, memory latency and network traffic can be reduced and the performance of the multiprocessor system can be improved. Until now, several cache replacement policies have been proposed in recent years, and there also is cache replacement policy for multiprocessor systems. In this paper, we propose a cache replacement policy which is based on cache line coherence information. In this policy, the cache line that does not have an ownership is replaced first with respect to cache line that has an ownership. Like this way, the overhead to transfer ownership is avoided and the memory latency can be decreased. We also propose “Keeping-Ownership replacement policy with MRU (KOM)” and “Keeping-Ownership replacement policy with Reference Bit(KORB)” to reduce the frequent replacement penalty of the ownership-lacking cache line. We compare and analyze these with LRU and Pseudo LRU(PLRU). The simulation shows that KOM outperforms the PLRU by 25%, and KORB outperforms the PLRU by 13%. Although the hardware cost of KOM is very small, the performance of KOM is nearly equal to that of the LRU.

A Study on a Reliable Cooperative MAC Protocol for Ad Hoc Networks (채널오류에 강한 애드혹 네트워크용 협력통신 MAC 프로토콜에 관한 연구)

  • Jang, Jae-Shin
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6A
    • /
    • pp.577-584
    • /
    • 2010
  • In this paper, a cooperative MAC protocol that is reliable over bad wireless channel environments and thus can enhance the system performance much more is proposed. Its performance is evaluated with the computer simulation. The system throughput and average waiting delay are used as performance measures. According to numerical results, the proposed MAC protocol provides better system throughput by 24% than the traditional rDCF scheme. From the average waiting delay point of view, when the number of terminals is small, the proposed MAC protocol has the better performance in an average view-point than the rDCF scheme. However, when the number of terminals is large, the proposed MAC protocol provides a little worse performance than the rDCF scheme. That is because, when the number of terminals is large, the dominant factor affecting the system performance is channel contention procedure, which results in lots of collisions. However, if the queuing delays in the waiting buffers are included for calculating the average waiting delay, then the total system delay will be smaller than the rDCF scheme.

Automatic Object Recognition in 3D Measuring Data (3차원 측정점으로부터의 객체 자동인식)

  • Ahn, Sung-Joon
    • The KIPS Transactions:PartB
    • /
    • v.16B no.1
    • /
    • pp.47-54
    • /
    • 2009
  • Automatic object recognition in 3D measuring data is of great interest in many application fields e.g. computer vision, reverse engineering and digital factory. In this paper we present a software tool for a fully automatic object detection and parameter estimation in unordered and noisy point clouds with a large number of data points. The software consists of three interactive modules each for model selection, point segmentation and model fitting, in which the orthogonal distance fitting (ODF) plays an important role. The ODF algorithms estimate model parameters by minimizing the square sum of the shortest distances between model feature and measurement points. The local quadric surface fitted through ODF to a randomly touched small initial patch of the point cloud provides the necessary initial information for the overall procedures of model selection, point segmentation and model fitting. The performance of the presented software tool will be demonstrated by applying to point clouds.

Study on the Femtocell Vulnerability Analysis Using Threat Modeling (위협 모델링 기법을 이용한 펨토셀 취약점 분석에 대한 연구)

  • Kim, Jae-ki;Shin, Jeong-Hoon;Kim, Seung-joo
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.5 no.8
    • /
    • pp.197-210
    • /
    • 2016
  • Lately smartphone uasage is increasing and many Internet of Things (IoT) devices support wireless communications. Accordingly, small base stations which called femtocells are supplied to prevent saturation of existing base stations. However, unlike the original purpose of the femtocell with the advanced hacking technologies, Vulnerability such as gaining the administrator authority was discovered and this can cause serious problems such as the leakage of personal information of femtocell user. Therefore, identify security threats that may occur in the femtocell and it is necessary to ways for systematic vulnerability analysis. In this paper, We analyzed the security threats that can be generated in the femtocell and constructed a checklist for vulnerability analysis using the Threat Modeling method. Then, using the constructed checklist provides a scheme that can improve the safety of the femto cell through the actual analysis and taken the results of the femtocell vulnerabilities analysis.

Realization of a High Precision Inspection System for the SOP Types of ICs (SOP형 IC의 고 정밀 외관검사 시스템 구현)

  • Tae Hyo Kim
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.2
    • /
    • pp.165-171
    • /
    • 2004
  • Owing to small sizes and high density to the semiconductor It, it is difficult to discriminate the defects of ICs by human eyes. High precision inspection system with computer vision is essentially established for the manufacturing process due to the variety of defective parts. Especially it is difficult to implement the algorithm for the coplanarity of IC leads. Therefore in this paper, the inspection system which can detect the defects of the SOP types of ICs having 1cm${\times}$0.5cm of the chip size is implemented and evaluated it's performance. In order to optimally detect various items, some principles of geometry are theoretically presented , length measurement, pitch measurement, angle measurement, brightness of image and correcton of position. The interface circuit is designed for implementation of inspection system and connected the HANDLER. In the result, the system could detect two ICs' defects per second and confirmed the resolution of 20$\mu$m per pixel.

  • PDF

A Study of Dopant Distribution in SiGe Using Ion Implantation and Thermal Annealing (SiGe에 이온 주입과 열처리에 의한 불순물 분포의 연구)

  • Jung, Won-Chae
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.31 no.6
    • /
    • pp.377-385
    • /
    • 2018
  • For the investigation of dopant profiles in implanted $Si_{1-x}Ge_x$, the implanted B and As profiles are measured using SIMS (secondary ion mass spectrometry). The fundamental ion-solid interactions of implantation in $Si_{1-x}Ge_x$ are discussed and explained using SRIM, UT-marlowe, and T-dyn programs. The annealed simulation profiles are also analyzed and compared with experimental data. In comparison with the SIMS data, the boron simulation results show 8% deviations of $R_p$ and 1.8% deviations of ${\Delta}R_p$ owing to relatively small lattice strain and relaxation on the sample surface. In comparison with the SIMS data, the simulation results show 4.7% deviations of $R_p$ and 8.1% deviations of ${\Delta}R_p$ in the arsenic implanted $Si_{0.2}Ge_{0.8}$ layer and 8.5% deviations of $R_p$ and 38% deviations of ${\Delta}R_p$ in the $Si_{0.5}Ge_{0.5}$ layer. An analytical method for obtaining the dopant profile is proposed and also compared with experimental and simulation data herein. For the high-speed CMOSFET (complementary metal oxide semiconductor field effect transistor) and HBT (heterojunction bipolar transistor), the study of dopant profiles in the $Si_{1-x}Ge_x$ layer becomes more important for accurate device scaling and fabrication technologies.

A Numerical Simulation of the 1993 East Sea Tsunami (1993年 동해 쓰나미의 산정)

  • 최병호;우승범;에핌페리높스키
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.6 no.4
    • /
    • pp.404-412
    • /
    • 1994
  • On July 12. 1993 at 22 : 17 local time (-9h. KST). an earthquake of surface magnitude (MS) 7.6 occurred on the west coast of the Hokkaido and small of offshore island of Okushiri in the East Sea. A major tsumani was generated and within 2 to 5 minutes, extremely large tsunami waves engulfed the Okushiri coastal area and the central west roast of the Hokkaido. This tsunami caused tremendous casualities and damage. A giant tsunami runup of more than 30 m in height was recorded. The tsunami crossed the East Sea and feeled at 27 sites of the eastern Korean coast during the survey on 17-19, July, 1993. The observed tsunami runup at southern part of the eastern Korean coast were generally weaker than the 1993 Japan Sea Central Earthquake tsunami and varied from 0.8 m to 2.6 m. The Present Paper intends to understand the propagation on this tsunami with the aid of numerical computation model andd computer graphic aided video animation.

  • PDF