• Title/Summary/Keyword: Vector Summation

Search Result 22, Processing Time 0.024 seconds

Iris Recognition Using Vector Summation Of Gradient Orientation Vectors (그래디언트 방향 벡터의 벡터합을 이용한 홍채 인식)

  • Choi, Chang-Soo;Yoo, Kwan-Hee;Jun, Byoung-Min
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.8
    • /
    • pp.121-128
    • /
    • 2009
  • Iris recognition is a biometric technology which can identify a person using the iris pattern. Recently, iris information is used in many fields such as access control and information security. It is important for the iris recognition system to extract the feature which is invariant to changes in iris patterns. Those changes can be occurred by the influence of lights, changes in the size of the pupil. In this paper, we propose a novel method based on vector summation of gradient orientation vectors. Experimental results show that the proposed method reduces processing time with simple vector calculation, requires small feature space and has comparable performance to the well-known previous methods.

Vector Analysis of the Xiangsheng Xiangke(相生相剋) of the Yinyang Wuxing(陰陽五行) Theory (음양오행설 상생상극론(相生相剋論)의 벡터 해석(解析))

  • Heo Jae-Soo
    • Journal of Korean Medical classics
    • /
    • v.37 no.1
    • /
    • pp.41-56
    • /
    • 2024
  • Objectives : The purpose of this paper is to model each Xíng(行) of the Yīnyáng Wǔxíng(陰陽五行) theory as a vector, to interpret the Xiāngshēng Xiāngkè(相生相剋) theory as a vector sum, and argue the objectivity and universal applicability of the Xiāngshēng Xiāngkè(相生相剋) theory. Methods : The five xíngs of the Wǔxíng were modeled and expressed as vectors, and the Xiāngshēng Xiāngkè theories were quantitatively explained by vector summation. Results : We calculated the Wǔxíng vectors using the vector sum formula, and found that the Xíng vectors that received mutual support increased in size by about 62%, and the Xíng vectors that received opposition decreased in size by about 38%. Conclusions : This result could be considered as quantitative interpretation of the contents of the Xiāngshēng Xiāngkè(相生相剋) theory which has mostly been explained qualitatively. The results of this study could hopefully provide ideas to quantify various theories based on the Yinyangwuxing theory such as Korean Medicine and other traditional fields in East Asian culture.

A Study on Design and Machining of Conjugate Cam on the Basis of Master Cam (마스트 캠에 의한 컨쥬게이트 캠의 설계 및 가공에 관한 연구)

  • Cho, Hyun Deog
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.2 no.2
    • /
    • pp.52-59
    • /
    • 2003
  • Cam mechanism is a machine part frequently used in machinery. Specially, conjugate cam mechanism is very suitable for the high speed working and the heavy power translation. Then a conjugate cam mechanism need high precision for the relations between cam profiles and follower rollers. So, its design and manufacturing are very difficult. Thus, this study is a branch of exclusive CAM systems for design and NC machining of conjugate earn mechanism based on a master plate earn profile in order to exchange an old plate cam mechanism to a new conjugate earn mechanism. For the design of the other cam profile by using a master cam profile, some calculation processes were used by vector summation methods, from master cam profile data to the center data of master follower, from the center data of master follower to the center data of the other follower considered in link mechanism, and offsetting in the center direction of base circle of the other cam from the center data of the other follower. Finally, a sample conjugate cam was selected and machined m order to prove the contents of this study.

  • PDF

PingPong-128 Keystream Generator (PingPong-128 키수열 발생기)

  • Lee Hoon-jae;Moon Sang-jae;Park Jong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.1C
    • /
    • pp.80-86
    • /
    • 2006
  • In this paper, we propose the PingPong-128(PP-128) keystream generator, based on summation generator. Proposed PingPong-128, a specific cipher of the PingPong Family, takes 128 bits key and 128 bit initial vector, has 258 bit internal state, and achieves a security level of 128 bits. The security analysis of PingPong-128 is presented, including the resistence to known attacks against the summation generator and other clock-controlled generators.

Determination of Member Force Ratios for Self-equilibrium State of Multi-Layered Cable Dome Type Structures (다층 케이블 돔형 구조물의 자기평형을 위한 부재력 비율 결정)

  • Kim, Jae-Yeol
    • Journal of Korean Association for Spatial Structures
    • /
    • v.13 no.2
    • /
    • pp.75-82
    • /
    • 2013
  • For each cable component in a cable dome structure, pre-tension is needed for stability of whole the structure. The summation of these pre-tension at each joint should be zero to achieve the self equilibrium structure. The first step in cable dome structure analysis is to find the ratio of pre-tension in each member which can produce a stable and structure on self-equilibrium. In this paper, a new method based on the basic principle of closed force polygon for equilibrium system is proposed for the determination of self-equilibrium mode of cable dome structure. A single layer cable dome and two multi layer type domes have been analyzed. The ratios of cable members are determined by the presented method, and check the validation of the results by numerical calculation.

Image Based Damage Detection Method for Composite Panel With Guided Elastic Wave Technique Part II. Damage Size Estimation Algorithm (복합재 패널에서 유도 탄성파를 이용한 이미지 기반 손상탐지 기법 개발 Part II. 손상크기 추정 알고리즘)

  • Kim, Changsik;Jeon, Yongun;Park, Jungsun;Cho, Jin Yeon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.1
    • /
    • pp.13-20
    • /
    • 2021
  • In this paper, a new algorithm is proposed to estimate the damage size by combining the reflected area with the reflected position and extracting contours in proportion to the maximum value of pixels from the visible image. The cumulative summation feature vector algorithm is used to obtain the area of the reflected signal. To get the position of the reflected signal, the signal correlation algorithm is used to decompose the reflected signal from the damage. The proposed algorithm is tested and validated for composite panels. Repetitive experiments are performed and it is confirm that the proposed algorithm is reproducible. Further, it is verified that the damage size can be estimated appropriately by the proposed algorithm.

Image Based Damage Detection Method for Composite Panel With Guided Elastic Wave Technique Part I. Damage Localization Algorithm (복합재 패널에서 유도 탄성파를 이용한 이미지 기반 손상탐지 기법 개발 Part I. 손상위치 탐지 알고리즘)

  • Kim, Changsik;Jeon, Yongun;Park, Jungsun;Cho, Jin Yeon
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.1
    • /
    • pp.1-12
    • /
    • 2021
  • In this paper, a new algorithm is proposed to estimate the damage location in the composite panel by extracting the elastic wave signal reflected from the damaged area. The guided elastic wave is generated by a piezoelectric actuator and sensed by a piezoelectric sensor. The proposed algorithm adopts a diagnostic approach. It compares the non-damaged signal with the damaged signal, and extract damage information along with sensor network and lamb wave group velocity estimated by signal correlation. However, it is difficult to clearly distinguish the damage location due to the nonlinear properties of lamb wave and complex information composed of various signals. To overcome this difficulty, the cumulative summation feature vector algorithm(CSFV) and a visualization technique are newly proposed in this paper. CSFV algorithm finds the center position of the damage by converting the signals reflected from the damage to the area of distance at which signals reach, and visualization technique is applied that expresses feature vectors by multiplying damage indexes. Experiments are performed for a composite panel and comparative study with the existing algorithms is carried out. From the results, it is confirmed that the damage location can be detected by the proposed algorithm with more reliable accuracy.

A Study on the Machining of Sculptured Surfaces by 5-Axis CNC Milling (ll) The Prediction of Cusp Heights and Determination of Tool Path interval (5-축 CNC 밀링으로의 자유곡면 가공에 관한 연구 (II) 커섭 높이 예측과 공구경로 결정)

  • 조현덕;전용태;양민양
    • Transactions of the Korean Society of Mechanical Engineers
    • /
    • v.17 no.8
    • /
    • pp.2012-2022
    • /
    • 1993
  • For the machining of the sculptured surfaces on 5-axis CNC milling machine, the milling cutter direction vector was determined in the study (I) with 5-axis post-processing. Thus, it was possible to cut the sculptured surfaces on five-axis CNC milling machine with the end mill cutter. Then, for smooth machined surfaces in five-axis machining of free-from surfaces, this study develops an algorithm for prediction of cusp heights. Also, it generates tool path such that the cusp heights are constrained to a constant value or under a certain value. For prediction of the cusp height between two basis points, a common plane, containing the line crossing two basis points and the summation vector of two normal vectors at two basis points, is defined. The cusp height is the maximum value of scallops on the common plane after end mill cutter passes through the common plane. Sculptured surfaces were machined with CINCINNATI MILACRON 5-axis machining center, model 20V-80, using end mill cutter. Cusp heights were verified by 3-dimensional measuring machine with laser scanner, WEGU Messtechnik GmbH.

Performance Evaluation of Multimodal Biometric System for Normalization Methods and Classifiers (균등화 및 분류기에 따른 다중 생체 인식 시스템의 성능 평가)

  • Go, Hyoun-Ju;Woo, Na-Young;Shin, Yong-Nyuo;Kim, Jae-Sung;Kim, Hak-Il;Chun, Myung-Geun
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.4
    • /
    • pp.377-388
    • /
    • 2007
  • In this paper, we propose a multi-modal biometric system based on face, iris and fingerprint recognition system. To effectively aggregate two systems, we use statistical distribution models based on matching values for genuine and impostor, respectively. And then, We performed reveal fusion algorithms including weighted summation, Support Vector Machine(SVM), Fisher discriminant analysis, Bayesian classifier. From the various experiments, we found that the performance of multi-modal biometric system was influenced with the normalization methods and classifiers.

Multi-Modal Biometrics Recognition Method of Face Recognition using Fuzzy-EBGM and Iris Recognition using Fuzzy LDA (Fuzzy-EBGM을 이용한 얼굴인식과 Fuzzy-LDA를 이용한 홍채인식의 다중생체인식 기법 연구)

  • Go Hyoun-Joo;Kwon Mann-Jun;Chun Myung-Ceun
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2005.11a
    • /
    • pp.299-301
    • /
    • 2005
  • 본 연구는 생체정보를 이용하여 개인을 인증하고 확인하기 위한 방법으로 기존 단일 생체인식 기법의 단점을 보완하기 위해 홍채와 얼굴을 이용한 다중생체인식(Multi-Modal Biometrics Recognition)기법을 연구하였다. 중국 홍채 데이터베이스 CASIA(Chinese Academy of Science)에 Gabor Wavelet과 FLDA(Fuzzy Linear Discriminant Analysis)를 사용하여 특징벡터를 획득하였으며, FERET(FERET(Face Recognition Technology) 얼굴영상데이터를 사용하여 FERET 연구에서 매우 우수한 성능을 보인 EBGM알고리듬으로 특징벡터를 획득하였다. 이로부터 얻어진 두 score 값에 대하여 다양한 균등화 과정을 시도해 보았으며, 등록자와 침입자를 구분하기 위한 Fusion Algorithm으로 Bayesian Classifier, Support vector machine, Fisher's linear discriminant를 사용하였다. 또한, 널리 사용되는 방법 중 Weighted Summation을 이용하여 다중생체인식의 성능을 비교해 보았다.

  • PDF