• Title/Summary/Keyword: connected component analysis

Search Result 210, Processing Time 0.025 seconds

Performance Monitoring Results, Evaluation and Analysis of 50kW Grid-Connected PV System (50kW급 계통연계형 태양광발전시스템의 성능모니터링 결과 및 평가분석)

  • So, Jung-Hun;Yu, Byung-Gyu;Hwang, Hye-MI;Yu, Gwon-Jong;Choi, Ju-Yeop
    • Journal of the Korean Solar Energy Society
    • /
    • v.27 no.2
    • /
    • pp.29-35
    • /
    • 2007
  • Monitoring system is constructed for evaluating and analyzing performance of installed 50kW grid-connected PV system and have been monitored since October 2005. As climatic and irradiation conditions have been varied through long-term operation, there is necessity for evaluating numerical values of PV(Photovoltaic) system performance to observe the overall effect of environmental conditions on their operation characteristics. This paper presents performance monitoring results and analysis on component perspective(PV array and power conditioning system) and global perspective(yield, losses) of PV system for one year monitoring periods.

An Arabic Script Recognition System

  • Alginahi, Yasser M.;Mudassar, Mohammed;Nomani Kabir, Muhammad
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3701-3720
    • /
    • 2015
  • A system for the recognition of machine printed Arabic script is proposed. The Arabic script is shared by three languages i.e., Arabic, Urdu and Farsi. The three languages have a descent amount of vocabulary in common, thus compounding the problems for identification. Therefore, in an ideal scenario not only the script has to be differentiated from other scripts but also the language of the script has to be recognized. The recognition process involves the segregation of Arabic scripted documents from Latin, Han and other scripted documents using horizontal and vertical projection profiles, and the identification of the language. Identification mainly involves extracting connected components, which are subjected to Principle Component Analysis (PCA) transformation for extracting uncorrelated features. Later the traditional K-Nearest Neighbours (KNN) algorithm is used for recognition. Experiments were carried out by varying the number of principal components and connected components to be extracted per document to find a combination of both that would give the optimal accuracy. An accuracy of 100% is achieved for connected components >=18 and Principal components equals to 15. This proposed system would play a vital role in automatic archiving of multilingual documents and the selection of the appropriate Arabic script in multi lingual Optical Character Recognition (OCR) systems.

Performance Analysis and Evaluation of 3kW Grid-Connected PV Systems (3kW급 계통연계형 태양광발전시스템의 성능특성 평가분석)

  • So, Jung-Hun;Jung, Young-Seok;Yu, Gwon-Jong;Choi, Ju-Yeop;Choy, Ick
    • The Transactions of the Korean Institute of Electrical Engineers B
    • /
    • v.53 no.8
    • /
    • pp.509-516
    • /
    • 2004
  • The concerns of distributed generations including photovoltaic(PV) system have been increased around the world since PV system is becoming widespread as a clean and gentle energy source for earth. In the future high density grid-connected PV systems will be interconnected with distribution network. As a result, the stability and long-term reliability of PV systems have become more important issues in this area. Grid-connected PV systems have been installed and monitored at field demonstration test center(FDTC) and also data acquisition system(DAS) has been constructed for measuring and analyzing performance of PV system to observe the overall effect of environmental conditions on their operation characteristics. The performance of PV system has been evaluated and analyzed for component perspective (PV array and power conditioning system) and global perspective (system efficiency, capacity factor, and electrical power energy) by field test and loss factors of PV system.

Automatic Detection of Highlights in Soccer videos based on analysis of scene structure (축구 동영상에서의 장면 구조 분석에 기반한 자동적인 하이라이트 장면 검출)

  • Park, Ki-Tae;Moon, Young-Shik
    • The KIPS Transactions:PartB
    • /
    • v.14B no.1 s.111
    • /
    • pp.1-4
    • /
    • 2007
  • In this paper, we propose an efficient scheme for automatically detecting highlight scenes in soccer videos. Highlights are defined as shooting scenes and goal scenes. Through the analysis of soccer videos, we notice that most of highlight scenes are shown around the goal post area. It is also noticed that the TV camera zooms in a setter player or spectators after the highlight stones. Detection of highlight scenes for soccer videos consists of three steps. The first step is the extraction of the playing field using a statistical threshold. The second step is the detection of goal posts. In the final step, we detect a zooming of a soccer player or spectators by using connected component labeling of non-playing field. In order to evaluate the performance of our method, the precision and the recall are computed. Experimental results have shown the effectiveness of the proposed method, with 95.2% precision and 85.4% recall.

Text Region Detection Method in Mobile Phone Video (휴대전화 동영상에서의 문자 영역 검출 방법)

  • Lee, Hoon-Jae;Sull, Sang-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.47 no.5
    • /
    • pp.192-198
    • /
    • 2010
  • With the popularization of the mobile phone with a built-in camera, there are a lot of effort to provide useful information to users by detecting and recognizing the text in the video which is captured by the camera in mobile phone, and there is a need to detect the text regions in such mobile phone video. In this paper, we propose a method to detect the text regions in the mobile phone video. We employ morphological operation as a preprocessing and obtain binarized image using modified k-means clustering. After that, candidate text regions are obtained by applying connected component analysis and general text characteristic analysis. In addition, we increase the precision of the text detection by examining the frequency of the candidate regions. Experimental results show that the proposed method detects the text regions in the mobile phone video with high precision and recall.

Managing Duplicate Memberships of Websites : An Approach of Social Network Analysis (웹사이트 중복회원 관리 : 소셜 네트워크 분석 접근)

  • Kang, Eun-Young;Kwahk, Kee-Young
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.1
    • /
    • pp.153-169
    • /
    • 2011
  • Today using Internet environment is considered absolutely essential for establishing corporate marketing strategy. Companies have promoted their products and services through various ways of on-line marketing activities such as providing gifts and points to customers in exchange for participating in events, which is based on customers' membership data. Since companies can use these membership data to enhance their marketing efforts through various data analysis, appropriate website membership management may play an important role in increasing the effectiveness of on-line marketing campaign. Despite the growing interests in proper membership management, however, there have been difficulties in identifying inappropriate members who can weaken on-line marketing effectiveness. In on-line environment, customers tend to not reveal themselves clearly compared to off-line market. Customers who have malicious intent are able to create duplicate IDs by using others' names illegally or faking login information during joining membership. Since the duplicate members are likely to intercept gifts and points that should be sent to appropriate customers who deserve them, this can result in ineffective marketing efforts. Considering that the number of website members and its related marketing costs are significantly increasing, it is necessary for companies to find efficient ways to screen and exclude unfavorable troublemakers who are duplicate members. With this motivation, this study proposes an approach for managing duplicate membership based on the social network analysis and verifies its effectiveness using membership data gathered from real websites. A social network is a social structure made up of actors called nodes, which are tied by one or more specific types of interdependency. Social networks represent the relationship between the nodes and show the direction and strength of the relationship. Various analytical techniques have been proposed based on the social relationships, such as centrality analysis, structural holes analysis, structural equivalents analysis, and so on. Component analysis, one of the social network analysis techniques, deals with the sub-networks that form meaningful information in the group connection. We propose a method for managing duplicate memberships using component analysis. The procedure is as follows. First step is to identify membership attributes that will be used for analyzing relationship patterns among memberships. Membership attributes include ID, telephone number, address, posting time, IP address, and so on. Second step is to compose social matrices based on the identified membership attributes and aggregate the values of each social matrix into a combined social matrix. The combined social matrix represents how strong pairs of nodes are connected together. When a pair of nodes is strongly connected, we expect that those nodes are likely to be duplicate memberships. The combined social matrix is transformed into a binary matrix with '0' or '1' of cell values using a relationship criterion that determines whether the membership is duplicate or not. Third step is to conduct a component analysis for the combined social matrix in order to identify component nodes and isolated nodes. Fourth, identify the number of real memberships and calculate the reliability of website membership based on the component analysis results. The proposed procedure was applied to three real websites operated by a pharmaceutical company. The empirical results showed that the proposed method was superior to the traditional database approach using simple address comparison. In conclusion, this study is expected to shed some light on how social network analysis can enhance a reliable on-line marketing performance by efficiently and effectively identifying duplicate memberships of websites.

A Knowledge-Based System for Address Block Location on Korean Envelope Images (우리나라 우편 봉투 영상에서의 주소 영역 추추을 위한 지식 기반 시스템)

  • 김기철;이성환
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.8
    • /
    • pp.137-147
    • /
    • 1994
  • In this paper,we propose a knowledge-based system for locating Destination Address Block(DAB) by analyzing the structure of Korean envelope images. In the proposed system the preprocessing steps such as adaptive binarization connected component extraction and deskewing are carried out first for the effective structure analysis of the envelope image. Then DAB containing address name and zipcode parts of the input envelope image is extracted by an iterative procedure based on the knowledge acquired from the statistical feature analysis of the various envelope images. Most of the system for slocating address blocks on envelopes have extracted DAB by segmenting an envelope image into several candidate blocks followed by selecting one among the candidate blocks. Because it is very difficult to segment a Korean envelope image into several blocks due to the specific writing habits that the addresses on the envelope are written in close proximity to each other the proposed iterative procedure determines DAB by splitting or merging the connected components and verifies the determined DAB without segmentation and selection. Experiments with a great number of the live envelopes provided from Seoul Mail Center in Koorea were carried out. The results reveal that the proposed system is very effective for address block location on Korean envelopes.

  • PDF

Computation of the Current Limiting Behavior of BSCCO-2212 High-Temperature Superconducting Tube with Shunt Coils

  • Kim, H.M.;Park, K.B.;Lee, B.W.;Oh, I.;Sim, J.;Hyun, O.B.
    • Progress in Superconductivity and Cryogenics
    • /
    • v.8 no.4
    • /
    • pp.22-25
    • /
    • 2006
  • This paper deals with the computation of the current limiting behavior of high-temperature superconducting (HTS) modules for the superconducting fault current limiter (SFCL). The SFCL module consists of a monofilar type BSCCO-2212 tube and a shunt coil made of copper or brass. The shunt coil is connected to the monofilar superconducting tube in parallel. Through analysis of the quench behavior of the monofilar component with shunt coils, it is achieved to drive an equivalent circuit equation from the experimental circuit structure. In order to analyze the quench behavior of the SFCL module, we derived a partial differential equation technique. Inductance of the monofilar component and the impedance of the shunt coil are calculated by Bio-Savart and Ohm's formula, respectively. We computed the quench behavior using the calculated values, and compared the results with experimental results for the quench characteristics of a component. The results of computation and test agreed well each other, and it was concluded that the analytic result could be applied effectively to design of the distribution-level SFCL system.

A co-authorship network analysis on mathematics education scholars (수학교육 연구자의 공동출판 연결망)

  • Kim, Sungyeun
    • The Mathematical Education
    • /
    • v.52 no.4
    • /
    • pp.483-496
    • /
    • 2013
  • In this study, we investigated the structure of the mathematics education scholars' co-authorship relationship in papers registered at the National Research Foundation of Korea by social network analysis. The data were 354 scholars from 257 papers in 4 journals from 2009 to 2013 based on 'the 2009 revised Korean National Curriculum'. For the analysis, Pajek3 and UCINET6.3 were used. The results of this study were as follows: First, each of the mathematics education scholars is connected on average with about 5 paths of intermediate collaborators. Second, Analyses of the first component group found distinguishable scholar groups' characteristics depending on their affiliations, majors, and job statuses. Third, there were scholars having high values in network degree centrality measures despite not having high numbers in published papers. On the contrary, there sere scholars having high numbers in published papers despite not having high values in network analysis. Finally, I suggested the directions for the future research with the limitations of this study.

Impact of Trust-based Security Association and Mobility on the Delay Metric in MANET

  • Nguyen, Dang Quan;Toulgoat, Mylene;Lamont, Louise
    • Journal of Communications and Networks
    • /
    • v.18 no.1
    • /
    • pp.105-111
    • /
    • 2016
  • Trust models in the literature of MANETs commonly assume that packets have different security requirements. Before a node forwards a packet, if the recipient's trust level does not meet the packet's requirement level, then the recipient must perform certain security association procedures, such as re-authentication. We present in this paper an analysis of the epidemic broadcast delay in such context. The network, mobility and trust models presented in this paper are quite generic and allow us to obtain the delay component induced only by the security associations along a path. Numerical results obtained by simulations also confirm the accuracy of the analysis. In particular, we can observe from both simulation's and analysis results that, for large and sparsely connected networks, the delay caused by security associations is very small compared to the total delay of a packet. This also means that parameters like network density and nodes' velocity, rather than any trust model parameter, have more impact on the overall delay.