• Title/Summary/Keyword: THRESHOLD DISTANCE

Search Result 358, Processing Time 0.029 seconds

Extraction of a crack opening from a continuous approach using regularized damage models

  • Dufour, Frederic;Pijaudier-Cabot, Gilles;Choinska, Marta;Huerta, Antonio
    • Computers and Concrete
    • /
    • v.5 no.4
    • /
    • pp.375-388
    • /
    • 2008
  • Crack opening governs many transfer properties that play a pivotal role in durability analyses. Instead of trying to combine continuum and discrete models in computational analyses, it would be attractive to derive from the continuum approach an estimate of crack opening, without considering the explicit description of a discontinuous displacement field in the computational model. This is the prime objective of this contribution. The derivation is based on the comparison between two continuous variables: the distribution if the effective non local strain that controls damage and an analytical distribution of the effective non local variable that derives from a strong discontinuity analysis. Close to complete failure, these distributions should be very close to each other. Their comparison provides two quantities: the displacement jump across the crack [U] and the distance between the two profiles. This distance is an error indicator defining how close the damage distribution is from that corresponding to a crack surrounded by a fracture process zone. It may subsequently serve in continuous/discrete models in order to define the threshold below which the continuum approach is close enough to the discrete one in order to switch descriptions. The estimation of the crack opening is illustrated on a one-dimensional example and the error between the profiles issued from discontinuous and FE analyses is found to be of a few percents close to complete failure.

A Pattern-based Query Strategy in Wireless Sensor Network

  • Ding, Yanhong;Qiu, Tie;Jiang, He;Sun, Weifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1546-1564
    • /
    • 2012
  • Pattern-based query processing has not attracted much attention in wireless sensor network though its counterpart has been studied extensively in data stream. The methods used for data stream usually consume large memory and much energy. This conflicts with the fact that wireless sensor networks are heavily constrained by their hardware resources. In this paper, we use piece wise representation to represent sensor nodes' collected data to save sensor nodes' memory and to reduce the energy consumption for query. After getting data stream's and patterns' approximated line segments, we record each line's slope. We do similar matching on slope sequences. We compute the dynamic time warping distance between slope sequences. If the distance is less than user defined threshold, we say that the subsequence is similar to the pattern. We do experiments on STM32W108 processor to evaluate our strategy's performance compared with naive method. The results show that our strategy's matching precision is less than that of naive method, but our method's energy consumption is much better than that of naive approach. The strategy proposed in this paper can be used in wireless sensor network to process pattern-based queries.

Effect of the Lumbar Range of Motion and Back Pain on Kinesiotaping of Erector Spinae Muscle (척주세움근의 키네시오 테이핑이 허리가동범위와 허리통증에 미치는 영향)

  • Park, Jonghang;Kim, Yoonhwan;Lee, Jaejun
    • Journal of The Korean Society of Integrative Medicine
    • /
    • v.3 no.4
    • /
    • pp.53-59
    • /
    • 2015
  • Purpose : To retestify about the changes of the range of motion and pain from kinesiotaping the erector spinae muscle. Method : Targeted the number of 30 people with low back pain and measured lumbar range of motion and pain before kinesiotaping on the erector spinae muscle. After that, the measured value were compared and analyzed. Result : First, before and after kinesiotaping, doing skin distraction test, the changes of the skin distance within each experiment group all statistically showed meaningful differences(p<0.05). Secondly, before and after kinesiotaping and testing pain threshold, it statistically showed meaningful differences(p<0.05). Conclusion : Both two groups showed that the change of the skin distance increased and the pain averagely decreased than before taping. Therefore, kinesiotaping is considered that it affected the low back, the range of motion and pain.

Reconstruction of Head Surface based on Cross Sectional Contours (단면 윤곽선을 기반으로 한 두부표변의 재구성)

  • 한영환;성현경;홍승홍
    • Journal of Biomedical Engineering Research
    • /
    • v.18 no.4
    • /
    • pp.365-373
    • /
    • 1997
  • In this paper, a new method of the 3D(dimensional) image reconstruction is proposed to build up the 3D image from 2D images using digital image processing techniques and computer graphics. First, the new feature extraction algorithm that doesn't need various input parameters and is not affected by threshold is adopted This new algorithm extracts feature points by eliminating some undesirable points on the ground of the connectivity. Second, as the cast function to reconstruct surfaces using extracted feature points, the minimum distance measure between two plane images has been adopted According to this measure, the surface formation algorithm doesn't need complex calculation and takes the form of triangle or trapezoid To investigate usefulness, this approach has been applied to a head CT image and compared with other methods. Experimental comparisons show that the suggested algorithm yields better performance on feature extraction than others. In contrast with the other methods, the complex calculation for surface formation in the proposed algorithm is not necessary.

  • PDF

Robust Image Hashing for Tamper Detection Using Non-Negative Matrix Factorization

  • Tang, Zhenjun;Wang, Shuozhong;Zhang, Xinpeng;Wei, Weimin;Su, Shengjun
    • Journal of Ubiquitous Convergence Technology
    • /
    • v.2 no.1
    • /
    • pp.18-26
    • /
    • 2008
  • The invariance relation existing in the non-negative matrix factorization (NMF) is used for constructing robust image hashes in this work. The image is first re-scaled to a fixed size. Low-pass filtering is performed on the luminance component of the re-sized image to produce a normalized matrix. Entries in the normalized matrix are pseudo-randomly re-arranged under the control of a secret key to generate a secondary image. Non-negative matrix factorization is then performed on the secondary image. As the relation between most pairs of adjacent entries in the NMF's coefficient matrix is basically invariant to ordinary image processing, a coarse quantization scheme is devised to compress the extracted features contained in the coefficient matrix. The obtained binary elements are used to form the image hash after being scrambled based on another key. Similarity between hashes is measured by the Hamming distance. Experimental results show that the proposed scheme is robust against perceptually acceptable modifications to the image such as Gaussian filtering, moderate noise contamination, JPEG compression, re-scaling, and watermark embedding. Hashes of different images have very low collision probability. Tampering to local image areas can be detected by comparing the Hamming distance with a predetermined threshold, indicating the usefulness of the technique in digital forensics.

  • PDF

A New Method of Selecting Cohort for Speaker Verification (화자검증을 위한 새로운 코호트 선택 방법)

  • 김성준;계영철
    • The Journal of the Acoustical Society of Korea
    • /
    • v.22 no.5
    • /
    • pp.383-387
    • /
    • 2003
  • This paper deals with the method of speaker verification based on the conventional cohort of fixed size. In particular, a new cohort of variable size, which makes use of the distance between speaker models, is proposed: The density of neighboring speaker models within the fixed distance from each speaker is taken into account in the proposed method. The high density leads to the increase of cohort size, thus improving the speaker verification rate. On the other hand, the low density leads to its decrease, thus reducing the amount of computations. The simulation results show that the proposed method outperforms the conventional one, achieving a reduction in the EER.

Suitability Analysis of Eco-corridor for Korean Water Deer (Hydropotes Inermis) based on GIS and Fuzzy Function - A Case Study of Chuncheon City - (GIS와 퍼지함수(Fuzzy function)를 활용한 고라니의 생태통로 적지분석 - 춘천시를 대상으로 -)

  • Lee, Do-Hyung;Kil, Sung-Ho;Jeon, Seong-Woo
    • Journal of KIBIM
    • /
    • v.8 no.4
    • /
    • pp.72-79
    • /
    • 2018
  • Rapid developments around the world have resulted in urban expansion, habitat destruction, habitat fragmentation, and pollution problems, which are the main reasons for the decline in biological diversity. The United Nations warns that many animals and plants will die out in the near future if this continues. This study was performed to propose a map of eco-corridor suitability analysis of Korean water deer(Hydropotes Inermis) to enhance biodiversity in Chuncheon city. Eight factors affecting habitat suitability were elevation, aspect, slope, forest type, distance to the road, distance to the stream, land use and green connectivity. Previous study analysis on the mobility behaviour of the Korean water deer(Hydropotes Inermis) produced a habitat suitability map by determining the threshold and assigning a value between 0 and 1 depending on the habitat suitability using the fuzzy function. A method of analysis was proposed for a number of eco-corridor through comparative analysis of the data from the produced habitat suitability map and the road-kill point. The previous studies were focused on Backdudaegan region and national parks except for urban cities. The potential habitat map of Korean water deer could be helpful as a way to prevent habitat disconnection and increase species diversity in urban areas.

Evaluation of the Accuracy and usability of Trigger mode in Respiratory Gated Radiation Therapy (호흡동조방사선치료를 위한 Trigger mode 투시영상 획득 시 호흡 속도에 따른 정확성 평가 - Phantom Study)

  • Park, je wan;Kim, min su;Um, ki cheon;Choi, seong hoon;Song, heung kwon;Yoon, in ha
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.33
    • /
    • pp.25-33
    • /
    • 2021
  • Purpose : The purpose of this study is to evaluate the accuracy and usefulness of the Trigger mode for the Respiratory Gated Radiation Therapy (RGRT) Materials and methods : A QUASAR respiratory phantom that inserted a 3 mm fiducial marker (a gold marker) was used to estimate the accuracy of the Trigger mode. And the 20 bpm was used as reference respiration rate in this study. The marker that placed at the center of the phantom was contoured, and the lower threshold of a gating window was fixed at 2.0 mm using an OBI with Truebeam STxTM. The upper threshold was measured every 0.5 mm from 1.0 mm to 3.0 mm. The respiration rates were changed every 10 bpm from 10 bpm to 60 bpm. We repeatedly measured five times to check the error rate of the trigger mode in the same condition. Result : The differences of a distance from a peak phase to upper threshold, 1.0 to 3.0 mm at a 20 bpm as a reference for 3 days in a row were 0.68±0.05 mm, 0.91±0.03 mm, 1.23±0.03 mm, 1.42±0.04 mm, and 1.66±0.06 mm, respectively. Measurement result of changes in respiratory rate compared to baseline respiratory rate in maximum absolute difference. The coefficient of determination (R2) to estimate the correlation between the respiration velocity and variation of absolute difference was on average 0.838, 0.887, 0.770, 0.850, and 0.906. The p-values of all the variables were below 0.05. Conclusion : Using Trigger mode during respiratory gated radiation therapy (RGRT), accuracy and usefulness of trigger mode at reference breathing rate were confirmed. However, inaccuracies depending on the rate of breathing it could be uncertain in case of respiration rate is faster than 20 bpm as a standard respiration rate compared to slower than 20 bpm. Consequently, when conducting a RGRT using the trigger mode, real time monitoring is required with well educated respiration.

Design of Diversity Vehicle Antennas for FM Radio Reception (FM 라디오 수신을 위한 차량용 다이버시티 안테나 설계)

  • Ahn, Seung-Beom;Noh, Young-Ho;Oh, Jung-Hoon;Choo, Ho-Sung
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.20 no.8
    • /
    • pp.761-769
    • /
    • 2009
  • In this paper, we report on the channel capacity and diversity gain of the vehicle on-glass antenna for FM radio reception. The correlation coefficient and channel capacity were obtained using the simulated 3D radiation pattern of each antenna and the Rayleigh channel model for urban environment. To examine the channel capacity we used two antennas which are a simple straight antenna and L-type antenna. Then we observed the available channel capacity by varying the position of feeds and the shape of the L-type antenna. The sample antenna, which has a maximum feed distance with different polarizations, was built and the receiving performance was measured in the weak FM field area. From the results we confirmed that the distance between the feeds should be placed as far as possible for the high channel capacity. If the distance between the feeds are greater than a certain threshold value than the polarizations of the two antennas are getting more important for determining the channel capacity.

Distance-Based Keystroke Dynamics Smartphone Authentication and Threshold Formula Model (거리기반 키스트로크 다이나믹스 스마트폰 인증과 임계값 공식 모델)

  • Lee, Shincheol;Hwang, Jung Yeon;Lee, Hyungu;Kim, Dong In;Lee, Sung-Hoon;Shin, Ji Sun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.2
    • /
    • pp.369-383
    • /
    • 2018
  • User authentication using PIN input or lock pattern is widely used as a user authentication method of smartphones. However, it is vulnerable to shoulder surfing attacks and because of low complexity of PIN and lock pattern, it has low security. To complement these problems, keystroke dynamics have been used as an authentication method for complex authentication and researches on this have been in progress. However, many studies have used imposter data in classifier training and validation. When keystroke dynamics authentications are actually applied in reality, it is realistic to use only legitimate user data for training, and using other people's data as imposter training data may result in problems such as leakage of authentication data and invasion of privacy. In response, in this paper, we experiment and obtain the optimal ratio of the thresholds for distance based classification. By suggesting the optimal ratio, we try to contribute to the real applications of keystroke authentications.