• Title/Summary/Keyword: We 수

Search Result 86,528, Processing Time 0.076 seconds

Three-dimensional QR Code Using Integral Imaging (집적 영상을 활용한 3차원 QR code)

  • Kim, Youngjun;Cho, Ki-Ok;Han, Jaeseung;Cho, Myungjin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.12
    • /
    • pp.2363-2369
    • /
    • 2016
  • In this paper, we propose three-dimensional (3D) quick-response (QR) code generation technique using passive 3D integral imaging and computational integral imaging reconstruction technique. In our proposed method, we divide 2D QR code into 4 planes with different reconstruction depths and then we generate 3D QR code using synthetic aperture integral imaging and computational reconstruction. In this 3D QR code generation process, we use integral imaging which is one of 3D imaging technologies. Finally, 3D QR code can be scanned by reconstructing and merging 3D QR codes at 4 different planes with computational reconstruction. Therefore, the security level for QR code scanning may be enhanced when QR code is scanned. To show that our proposed method can improve the security level for QR code scanning, in this paper, we carry out the optical experiments and computational reconstruction. In addition, we show that 3D QR code can be scanned when reconstruction depths are known.

Memory Management Model Using Combined ART and Fuzzy Logic (ART와 퍼지를 이용한 메모리 관리 모델)

  • Kim, Joo-Hoon;Kim, Seong-Joo;Choi, Woo-Kyung;Kim, Jong-Soo;Jeon, Hong-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.920-926
    • /
    • 2004
  • The human being receives a new information from outside and the information shows gradual oblivion with time. But the information remains in memory and isn't forgotten for a long time if the information is read several times over. For example, we assume that we memorize a telephone number when we listen and never remind we may forget it soon, but we commit to memory long time by repeating. If the human being received new information with strong stimulus, it could remain in memory without recalling repeatedly. The moments of almost losing one's life in an accident or getting a stroke of luck are rarely forgiven. The human being can keep memory for a long time in spite of the limit of memory for the mechanism mentioned above. In this paper, we propose a model to explain the mechanism mentioned above using a neural network and fuzzy.

A study on MERS-CoV outbreak in Korea using Bayesian negative binomial branching processes (베이지안 음이항 분기과정을 이용한 한국 메르스 발생 연구)

  • Park, Yuha;Choi, Ilsu
    • Journal of the Korean Data and Information Science Society
    • /
    • v.28 no.1
    • /
    • pp.153-161
    • /
    • 2017
  • Branching processes which is used for epidemic dispersion as stochastic process model have advantages to estimate parameters by real data. We have to estimate both mean and dispersion parameter in order to use the negative binomial distribution as an offspring distribution on branching processes. In existing studies on biology and epidemiology, it is estimated using maximum-likelihood methods. However, for most of epidemic data, it is hard to get the best precision of maximum-likelihood estimator. We suggest a Bayesian inference that have good properties of statistics for small-sample. After estimating dispersion parameter we modelled the posterior distribution for 2015 Korea MERS cases. As the result, we found that the estimated dispersion parameter is relatively stable no matter how we assume prior distribution. We also computed extinction probabilities on branching processes using estimated dispersion parameters.

Digital License Prototype for Copyright Management of Software Source Code (소프트웨어 소스 코드의 저작권 관리를 위한 디지털 라이센스 프로토타입)

  • Cha, Byung-Rae;Jeong, Jong-Geun;Oh, Soo-Lyul
    • Journal of Internet Computing and Services
    • /
    • v.7 no.5
    • /
    • pp.95-108
    • /
    • 2006
  • The digital contents expand into software source code and maintenance of technology and IPR about source code have a very important meaning to international competition, The recognition about software security is very low specially among these Intellectual Property Rights. On occurring disputation property, we have to prove the fact, there is a problem to discriminate the original source code, Also, it is hard to accurate decision that is correct to complexity and the lack of read and understand ability even if software is reproduced. In this paper, we don't enforce distinction about software reproduction by one individual code unit. And we developed digital license prototype of XML that can distinguish reproduction based on structural conformability of whole source codes. Software has Context Free Grammar in structure and presents BNF notation type, it is apt to present hierarchical structure. Then, we can express architecture of software source code by hierarchical structure to discriminate structural conformability. In this paper, we make a study of the digital licence prototype for discriminate the original source code. Reserved words of software source code by parsing express to XML file that have hierarchical structure. Then, we can express architecture of software source code by tree structure form instead of complex source code.

  • PDF

Analysis on the upper bound of strong Roman-domination in grid networks (그리드 네트워크의 강한 Roman 지배수 상계에 대한 해석)

  • Lee, Hoon;Sohn, Moo Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.8
    • /
    • pp.1114-1122
    • /
    • 2018
  • In this paper, we propose a theoretical framework for provisioning marginal resources in wired and wireless computer networks which include Internet. In more detail, we propose a mathematical model for the upper bounds of marginal capacity in grid networks, where the resource is designed a priori by normal traffic estimation and marginal resource is prepared for unexpected events such as natural disasters and abrupt flash crowd in public affairs. To be specific, we propose a method to evaluate an upper bound for minimum marginal capacity for an arbitrary grid topology using the concept of a strong Roman domination number. To that purpose, we introduce a graph theory to model and analyze the characteristics of general grid structure networks. After that we propose a new tight upper bound for the strong Roman domination number. Via a numerical example, we show the validity of the proposition.

Modeling and Implementation of IDS for Security System simulation using SSFNet (SSFNet 환경에서 보안시스템 시뮬레이션을 위한 IDS 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Seo, Dong-Il;Kim, Tai-Suk
    • Journal of the Korea Society for Simulation
    • /
    • v.15 no.1
    • /
    • pp.87-95
    • /
    • 2006
  • We need to check into when a security system is newly developed, we against cyber attack which is expected in real network. However it is impossible to check it under the environment of a large-scale distributive network. So it is need to simulate it under the virtual network environment. SSFNet is a event-driven simulator which can be represent a large-scale network. Unfortunately, it doesn't have the module to simulate security functions. In this paper, we added the IDS module to SSFNet. We implement the IDS module by modeling a key functions of Snort. In addition, we developed some useful functions using Java language which can manipulate easily a packet for network simulation. Finally, we performed the simulation to verify the function if our developed IDS and Packets Manipulation. The simulation shows that our expanded SSFNet can be used to further large-scale security system simulator.

  • PDF

Intermediate Scene Interpolation using Bidirectional Disparity (양방향 시차 몰핑을 이용한 중간 시점 영상 보간)

  • Kim, Dae-Hyeon;Yun, Yong-In;Choe, Jong-Su;Kim, Je-U;Choe, Byeong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.2
    • /
    • pp.107-115
    • /
    • 2002
  • In this paper, we describe a novel method to generate an intermediate scene using BDM (Bidirectional Disparity Morphing) from the parallel stereopair. Because an image is composed of several layers and each layer has a similar disparity, it is available to use the block based disparity estimation. In order to prevent the false correspondence, however, we closely investigate the corresponding block as we adaptively vary the block size according to the estimation error. Therefore, we can detect the occlusion because of larger estimation error of the occluded region. We define three occluding patterns, which ate derived from the peculiar property of the disparity map, in order to smooth the computed disparity map. The filtered disparity map using these patterns presents that the false disparities ate well corrected and the boundary between foreground and background becomes sharper. As a result, we can improve the quality of the intermediate scenes.

Model selection method for categorical data with non-response (무응답을 가지고 있는 범주형 자료에 대한 모형 선택 방법)

  • Yoon, Yong-Hwa;Choi, Bo-Seung
    • Journal of the Korean Data and Information Science Society
    • /
    • v.23 no.4
    • /
    • pp.627-641
    • /
    • 2012
  • We consider a model estimation and model selection methods for the multi-way contingency table data with non-response or missing values. We also consider hierarchical Bayesian model in order to handle a boundary solution problem that can happen in the maximum likelihood estimation under non-ignorable non-response model and we deal with a model selection method to find the best model for the data. We utilized Bayes factors to handle model selection problem under Bayesian approach. We applied proposed method to the pre-election survey for the 2004 Korean National Assembly race. As a result, we got the non-ignorable non-response model was favored and the variable of voting intention was most suitable.

A Study on the Residual Astigmatism Appeared after Operating ICL Lens (ICL 렌즈 시술 후 나타나는 잔류난시에 대한 연구)

  • Kim, Dook-Hoon;Lee, Dong-Hee
    • Journal of Korean Ophthalmic Optics Society
    • /
    • v.13 no.4
    • /
    • pp.155-160
    • /
    • 2008
  • Purpose: To develop a program for analyzing the condition of implanted ICL lenses in case the residual astigmatism appears after the implantation. Methods: From analyzing the measured residual astigmatism after operating ICL lens, we could induce formulas that produce the rotating angle and the corresponding MR prescription of the implanted ICL lens. Using the Delphi 6.0 language, we could develop a program by which we conveniently confirm, in the window screen visually, the rotating angle and the corresponding MR prescription of the implanted ICL lens calculated by these formulas. Results: We induced formulas that produce the rotating angle and the corresponding MR prescription of the implanted ICL lens by analyzing the measured residual astigmatism after operating ICL lens and developed a program which can analyze the condition of the implanted ICL lens. By this program we could easily analyze the condition of the implanted ICL lens. Conclusions: Judging from the results of applying this program to many clinical cases, we could conclude that this program is very effective in analyzing the condition of implanted ICL lenses.

  • PDF

A Study on Route Location Using Decision Support System (의사결정체계를 이용한 노선 선정에 관한 연구)

  • Seo Dong Ju;Lee Jong Chool;Roh Tae Ho
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.23 no.2
    • /
    • pp.117-128
    • /
    • 2005
  • This study presented the route location method by applying AHP and evaluating quantitatively. This study developed the program that can be easily applied to this kind of road design, and built the decision support system fur route location. The study results are summarized as follows : We could quantitatively evaluate the appropriateness of exiting routes by applying the AHP based on GIS. If we apply this to the roads that will be newly constructed, we can make the objective and reliable route location when making road plans and basic designs. We improved the technique of route location by applying the decision support system with third-dimensional data, which considers even the vertical alignment plan, to the existing decision support system with second-dimensional data. had, since we call set those data such as vertical slope, earth-volume, structure size, location and construction cost to independent variables, we can make road designs more scientifically and reasonably.