• Title/Summary/Keyword: algorithm advancement

Search Result 119, Processing Time 0.03 seconds

Lossless image compression based Quadtree with F-transform (F-변환을 이용한 Quadtree 기반의 무손실 영상압축)

  • 김능식;윤정오;박영호;황찬식
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.8 no.1
    • /
    • pp.26-32
    • /
    • 2003
  • As the computer communication becomes generalized thanks to the advancement in information technology, the technology to process a large amount of images is much more required. The paper proposed a lossless image compression method using quadtree algorithm and F-transform, which efficiency transmission and storage. The computer simulation shows that compression ratio to make use of proposed method turned out to be improved more significantly compared with the established L-JPEG, LOCO-I, CALIC.

  • PDF

Preliminary Structural Configuration Using 3D Graphic Software (3D 그래픽 S/W이용 초기 구조계획)

  • Kim, Nam-Hee;Koh, Hyung-Moo;Hong, Sung-Gul
    • Proceedings of the Computational Structural Engineering Institute Conference
    • /
    • 2011.04a
    • /
    • pp.504-507
    • /
    • 2011
  • 3D graphic softwares have brought design spaces beyond the limitations of Euclidean space. Moreover, as computational geometry has been considered together with algorithms, generative algorithms are being evolved. Recently 3D graphic softwares with the embedded generative algorithms allow designers to design free form curves and surfaces in a systematic way. While architectural design has been greatly affected by the advancement of 3D graphic technology, such attention has not given in the realm of structural design. Grasshopper is a platform in Rhino to deal with these Generative Algorithms and Associative modelling techniques. This study has tried to develop a module for preliminary structural configuration using Rhino with Grasshopper. To verify the proposed concept in this study, a module for designing a basic type of suspension structure is introduced.

  • PDF

Lens Design of Camera through Optimization of the Third Order Seidel Aberration and Statistical Tolerance Analysis

  • Lee, Kyutae;Kim, Young-Joo;Kim, Youngwoon
    • Journal of the Optical Society of Korea
    • /
    • v.20 no.3
    • /
    • pp.413-426
    • /
    • 2016
  • There has been much advancement in the field of aerial cameras for geographical features with the help of drones, image processing power and computer aided optical programs. In this study, we propose a new optical lens design technique which minimizes the amount of ‘the third order Seidel aberration’ for enhancing MTF. In addition, we suggest a new optical lens design which stabilizes the mass-production yield through R.S.M and has robustness secure through the Taguchi method. Eventually, the image processing algorithm of stereo matching is implemented in order to evaluate whether the proposed lens design result meets adequate specifications for the use of dual aerial photographs or not. This paper provides good guidance for the optical design by development of experiments.

Stabilizing Unstable Matching because of a Varied Preference List in Distributed Stable Marriage Problem

  • Kinjo, Hideki;Nakamura, Morikazu;Onaga, Kenji
    • Proceedings of the IEEK Conference
    • /
    • 2000.07b
    • /
    • pp.1033-1036
    • /
    • 2000
  • A distributed stable marriage problem in extended in this paper. The traditional approach related to the stable matching problem assume that preference lists are fixed. However, in decentralized version this assumption is not reasonable because of the autonomy of members. In this paper, we consider the situation that a preference list can be varied at some stable matching and show the condition to be broken the stability of the original matching. Moreover, we propose a stabilization algorithm to obtain a stable matching by execution with a minimal set of members.

  • PDF

Reassessment of SMES Application Studies and Systematic approach Method under Deregulation (전력계통 제어용 초전도에너지 저장장치(SMES)의 검토사례 분석과 전력시장에서의 적용방안)

  • Lee, Geun-Joon;Yoon, Y.B.;Hwang, S.D.
    • Proceedings of the KIEE Conference
    • /
    • 2003.11a
    • /
    • pp.54-56
    • /
    • 2003
  • With the advancement of superconductor materials, especially in HTC YBCO(Gen II), the feasibility of SMES in power systems become much higher than previous days application[1]. Also, with the de-regulation of electricity market, it is indispensable to have a proper estimation of power quality index and power quality cost calcluation mechanism to stabilize highly industrialized society and to vitalize the investment for electric power system. This paper suggests a comprehensive algorithm[2] to determine the policy of SMES investment with the PQ Indices[3] based on aggregated load CBEMA curve reflecting the voltage characteristics such as volatge sags and interruptions which make electric load in unstable operation.

  • PDF

The Application of FBNWT in Wave Overtopping Analysis

  • Liu, Zhen;Jin, Ji-Yuan;Hyun, Beom-Soo
    • Journal of Ocean Engineering and Technology
    • /
    • v.22 no.1
    • /
    • pp.1-5
    • /
    • 2008
  • A 2-D Fluent-based numerical wave tank(FBNWT) capable of simulating wave propagating and overtopping is presented. The FBNWT model is based on the Reynolds averaged Naiver-Stokes equations and VOF free surface tracking method. The piston wave maker system is realized by dynamic mesh technology(DMT) and user defined function(UDF). The non-iteration time advancement(NITA) PISO algorithm is employed for the velocity and pressure coupling. The FBNWT numerical solutions of linear wave propagation have been validated by analytical solutions. Several overtopping problems are simulated and the prediction results show good agreements with the experimental data, which demonstrates that the present model can be utilized in the corresponding analysis.

Hybridized Decision Tree methods for Detecting Generic Attack on Ciphertext

  • Alsariera, Yazan Ahmad
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.7
    • /
    • pp.56-62
    • /
    • 2021
  • The surge in generic attacks execution against cipher text on the computer network has led to the continuous advancement of the mechanisms to protect information integrity and confidentiality. The implementation of explicit decision tree machine learning algorithm is reported to accurately classifier generic attacks better than some multi-classification algorithms as the multi-classification method suffers from detection oversight. However, there is a need to improve the accuracy and reduce the false alarm rate. Therefore, this study aims to improve generic attack classification by implementing two hybridized decision tree algorithms namely Naïve Bayes Decision tree (NBTree) and Logistic Model tree (LMT). The proposed hybridized methods were developed using the 10-fold cross-validation technique to avoid overfitting. The generic attack detector produced a 99.8% accuracy, an FPR score of 0.002 and an MCC score of 0.995. The performances of the proposed methods were better than the existing decision tree method. Similarly, the proposed method outperformed multi-classification methods for detecting generic attacks. Hence, it is recommended to implement hybridized decision tree method for detecting generic attacks on a computer network.

An Efficient Anonymous Mobile P2P Protocol Reducing Garbage Files (가비지 파일의 수신을 줄여줄 수 있는 효율적인 익명 모바일 P2P 프로토콜)

  • Cui, Yun-Feng;Oh, Hee-Kuk;Kim, Sang-Jin
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2008.05a
    • /
    • pp.706-709
    • /
    • 2008
  • With the increasing popularity of P2P file sharing and advancement of mobile technologies, mobile P2P has revealed its attraction. Anonymity has become an increasing requirement in mobile networks. To reduce receiving garbage files, file validation and filtering are other requirements in the mobile P2P environment. If there are effective file filtering and validation mechanism, nodes' battery duration will be saved. In this paper, we do an analysis of security and anonymity in P2P file sharing and exchange system in mobile ad hoc environment, and propose a new efficient anonymous protocol, which can provide anonymity by broadcasting with a probabilistic algorithm and hiding real hop count information, the file validation by the file's special hash value and file filtering mechanism through the collaboration of middle nodes.

A K-Nearest Neighbour Query Processing Algorithm for Encrypted Spatial Data in Road Network (도로 네트워크 환경에서 암호화된 공간데이터를 위한 K-최근접점 질의 처리 알고리즘)

  • Jang, Mi-Young;Chang, Jae-Woo
    • Spatial Information Research
    • /
    • v.20 no.3
    • /
    • pp.67-81
    • /
    • 2012
  • Due to the recent advancement of cloud computing, the research on database outsourcing has been actively done. Moreover, the number of users who utilize Location-based Services(LBS) has been increasing with the development in w ireless communication technology and mobile devices. Therefore, LBS providers attempt to outsource their spatial database to service provider, in order to reduce costs for data storage and management. However, because unauthorized access to sensitive data is possible in spatial database outsourcing, it is necessary to study on the preservation of a user's privacy. Thus, we, in this paper, propose a spatial data encryption scheme to produce outsourced database from an original database. We also propose a k-Nearest Neighbor(k-NN) query processing algorithm that efficiently performs k-NN by using the outsourced database. Finally, we show from performance analysis that our algorithm outperforms the existing one.

Real-time Recognition and Tracking System of Multiple Moving Objects (다중 이동 객체의 실시간 인식 및 추적 시스템)

  • Park, Ho-Sik;Bae, Cheol-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.7C
    • /
    • pp.421-427
    • /
    • 2011
  • The importance of the real-time object recognition and tracking field has been growing steadily due to rapid advancement in the computer vision applications industry. As is well known, the mean-shift algorithm is widely used in robust real-time object tracking systems. Since the mentioned algorithm is easy to implement and efficient in object tracking computation, many say it is suitable to be applied to real-time object tracking systems. However, one of the major drawbacks of this algorithm is that it always converges to a local mode, failing to perform well in a cluttered environment. In this paper, an Optical Flow-based algorithm which fits for real-time recognition of multiple moving objects is proposed. Also in the tests, the newly proposed method contributed to raising the similarity of multiple moving objects, the similarity was as high as 0.96, up 13.4% over that of the mean-shift algorithm. Meanwhile, the level of pixel errors from using the new method keenly decreased by more than 50% over that from applying the mean-shift algorithm. If the data processing speed in the video surveillance systems can be reduced further, owing to improved algorithms for faster moving object recognition and tracking functions, we will be able to expect much more efficient intelligent systems in this industrial arena.