• Title/Summary/Keyword: discrete set

Search Result 419, Processing Time 0.02 seconds

Comparing Survival Functions with Doubly Interval-Censored Data: An Application to Diabetes Surveyed by Korean Cancer Prevention Study (이중구간중도절단된 생존자료의 생존함수 비교를 위한 검정: 한국인 암 예방연구 중 당뇨병에의 응용)

  • Jee, Sun-Ha;Nam, Chung-Mo;Kim, Jin-Heum
    • The Korean Journal of Applied Statistics
    • /
    • v.22 no.3
    • /
    • pp.595-606
    • /
    • 2009
  • Two tests were introduced for comparing several survival functions with doubly interval-censored data and illustrated with data surveyed by Korean Cancer Prevention Study (Jee et al., 2005). The test which extended Kim et al. (2006)'s test to the doubly interval-censored data has an advantage over Sun (2006)'s test in terms of saving computation time because the proposed test only depends on the size of risk set, and also the proposed test is applicable to continuous failure time data as well as discrete failure time data unlike Sun's test. Comparing male with female groups on the incubation time of diabetes was highly different and the survival of female group was longer than that of male one. Regardless of gender, the difference in survival functions of four age groups was highly significant with p-value of less than 0.001. This trend was more remarkable for female group than for male one. Simulation results showed that the significance level of both tests was well controlled and the proposed test was better than Sun's test in terms of power.

Non-ribosomal Ribosome Assembly Factors in Escherichia coli (Escherichia coli 에서 리보솜 조립과정에 관여하는 단백질들)

  • Choi, Eunsil;Hwang, Jihwan
    • Journal of Life Science
    • /
    • v.24 no.8
    • /
    • pp.915-926
    • /
    • 2014
  • The ribosome is a protein synthesizing machinery and a ribonucleoprotein complex that consists of three ribosomal RNAs (23S, 16S and 5S) and 54 ribosomal proteins in bacteria. In the course of ribosome assembly, ribosomal proteins (r-protein) and rRNAs are modified, the r-proteins bind to rRNAs to form ribonucleoprotein complexes which are folded into mature ribosomal subunits. In this process, a number of non-ribosomal trans-acting factors organize the assembly process of the components. Those factors include GTP- and ATP-binding proteins, rRNA and r-protein modification enzymes, chaperones, and RNA helicases. During ribosome biogenesis, they participate in the modifications of ribosomal proteins and RNAs, and the assemblies of ribosomal proteins with rRNAs. Ribosomes can be assembled from a discrete set of components in vitro, and it is notable that in vivo ribosome assembly is much faster than in vitro ribosome assembly. This suggests that non-ribosomal ribosome assembly factors help to overcome several kinetic traps in ribosome biogenesis process. In spite of accumulation of genetic, structural, and biochemical data, not only the entire procedure of bacterial ribosome synthesis but also most of roles of ribosome assembly factors remain elusive. Here, we review ribosome assembly factors involved in the ribosome maturation of Escherichia coli, and summarize the contributions of several ribosome assembly factors which associate with 50S and 30S ribosomal subunits, respectively.

A-team Based Approach for Reactive Power/Voltage Control Considering Steady State Security Assessment (정태 안전성 평가를 고려한 무효전력 전압제어를 위한 A-team기반 접근법)

  • Kim, Doo-Hyun
    • Journal of the Korean Society of Safety
    • /
    • v.11 no.2
    • /
    • pp.150-159
    • /
    • 1996
  • In this paper, an A-team(Asynchronous Team ) based approach for Reactive power and volage control considering static security assessment in a power system with infrastructural deficiencies is proposed. Reactive power and voltage control problem is the one of optimally establishing voltage level given several constraints such as reactive generation, voltage magnitude, line flow, and other switchable reactive power sources. It can be formulated as a mixed-integer linear programming(MILP) problem without deteriorating of solution accuracy to a certain extent. The security assessment is to estimate the relative robustness of the system in Its present state through the evaluation of data provided by security monitoring. Deterministic approach based on AC load flow calculations is adopted to assess the system security, especially voltage security. A security metric, as a standard of measurement for power system security, producting a set of discrete values rather than binary values, is employed. In order to analyze the above two problems, reactive power/voltage control problem and static security assessment problem, in an integrated fashion for real-time operations, a new organizational structure, called an A-team, is adopted. An A-team is an organization for agents which ale all autonomeus, work in parallel and communicate asynchronously, which is well-suited to the development of computer-based, multi-agent systems for operations. This A-team based approach, although it is still in the beginning stage, also has potential for handling other difficult power system problems.

  • PDF

Design of Multiple-symbol Lookup Table for Fast Thumbnail Generation in Compressed Domain (압축영역에서 빠른 축소 영상 추출을 위한 다중부호 룩업테이블 설계)

  • Yoon, Ja-Cheon;Sull, Sanghoon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.413-421
    • /
    • 2005
  • As the population of HDTV is growing, among many useful features of modern set top boxes (STBs) or digital video recorders (DVRs), video browsing, visual bookmark, and picture-in-picture capabilities are very frequently required. These features typically employ reduced-size versions of video frames, or thumbnail images. Most thumbnail generation approaches generate DC images directly from a compressed video stream. A discrete cosine transform (DCT) coefficient for which the frequency is zero in both dimensions in a compressed block is called a DC coefficient and is simply used to construct a DC image. If a block has been encoded with field DCT, a few AC coefficients are needed to generate the DC image in addition to a DC coefficient. However, the bit length of a codeword coded with variable length coding (VLC) cannot be determined until the previous VLC codeword has been decoded, thus it is required that all codewords should be fully decoded regardless of their necessary for DC image generation. In this paper, we propose a method especially for fast DC image generation from an I-frame using multiple-symbol lookup table (mLUT). The experimental results show that the method using the mLUT improves the performance greatly by reducing LUT count by 50$\%$.

Image Compression Using DCT Map FSVQ and Single - side Distribution Huffman Tree (DCT 맵 FSVQ와 단방향 분포 허프만 트리를 이용한 영상 압축)

  • Cho, Seong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2615-2628
    • /
    • 1997
  • In this paper, a new codebook design algorithm is proposed. It uses a DCT map based on two-dimensional discrete cosine of transform (2D DCT) and finite state vector quantizer (FSVQ) when the vector quantizer is designed for image transmission. We make the map by dividing input image according to edge quantity, then by the map, the significant features of training image are extracted by using the 2D DCT. A master codebook of FSVQ is generated by partitioning the training set using binary tree based on tree-structure. The state codebook is constructed from the master codebook, and then the index of input image is searched at not master codebook but state codebook. And, because the coding of index is important part for high speed digital transmission, it converts fixed length codes to variable length codes in terms of entropy coding rule. The huffman coding assigns transmission codes to codes of codebook. This paper proposes single-side growing huffman tree to speed up huffman code generation process of huffman tree. Compared with the pairwise nearest neighbor (PNN) and classified VQ (CVQ) algorithm, about Einstein and Bridge image, the new algorithm shows better picture quality with 2.04 dB and 2.48 dB differences as to PNN, 1.75 dB and 0.99 dB differences as to CVQ respectively.

  • PDF

Design of an Arm Gesture Recognition System Using Feature Transformation and Hidden Markov Models (특징 변환과 은닉 마코프 모델을 이용한 팔 제스처 인식 시스템의 설계)

  • Heo, Se-Kyeong;Shin, Ye-Seul;Kim, Hye-Suk;Kim, In-Cheol
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.2 no.10
    • /
    • pp.723-730
    • /
    • 2013
  • This paper presents the design of an arm gesture recognition system using Kinect sensor. A variety of methods have been proposed for gesture recognition, ranging from the use of Dynamic Time Warping(DTW) to Hidden Markov Models(HMM). Our system learns a unique HMM corresponding to each arm gesture from a set of sequential skeleton data. Whenever the same gesture is performed, the trajectory of each joint captured by Kinect sensor may much differ from the previous, depending on the length and/or the orientation of the subject's arm. In order to obtain the robust performance independent of these conditions, the proposed system executes the feature transformation, in which the feature vectors of joint positions are transformed into those of angles between joints. To improve the computational efficiency for learning and using HMMs, our system also performs the k-means clustering to get one-dimensional integer sequences as inputs for discrete HMMs from high-dimensional real-number observation vectors. The dimension reduction and discretization can help our system use HMMs efficiently to recognize gestures in real-time environments. Finally, we demonstrate the recognition performance of our system through some experiments using two different datasets.

When Disease Defines a Place: Batavia in British Diplomatic and Military Narratives, 1775-1850

  • Keck, Stephen
    • SUVANNABHUMI
    • /
    • v.14 no.2
    • /
    • pp.117-148
    • /
    • 2022
  • The full impact of COVID-19 has yet to be felt: while it may not define the new decade, it is clear that its immediate significance was to test many of the basic operating assumptions and procedures of global civilization. Even as vaccines are developed and utilized and even as it is possible to see the beginning of the end of COVID-19 as a discrete historical event, it remains unclear as to its ultimate importance. That said, it is evident that the academic exploration of Southeast Asia will also be affected by both the global and regional experiences of the pandemic. "Breakthroughs of Area Studies and ASEAN in the Era of Homo Untact" promises to help reconceptualize the study of the region by highlighting the importance of redefined spatial relationships and new potentially depersonalized modes of communication. This paper acknowledges these issues by suggesting that the transformations caused by the pandemic should motivate scholars to raise new questions about how to understand humanity-particularly as it is defined by societies, nations and regions. Given that COVID-19 (and the response to it) has altered many of the fundamental rhythms of globalized regions, there is sufficient warrant for re-examining both the ways in which disease, health and their related spaces affect the perceptions of Southeast Asia. To achieve "breakthroughs" into the investigation of the region, it makes sense to have another glance at the ways in which the discourses about diseases and health may have helped to inscribe definitions of Southeast Asia-or, at the very least, the nations, societies and peoples who live within it. In order to at least consider these larger issues, the discussion will concentrate on a formative moment in the conceptualization of Southeast Asia-British engagement with the region in the late 18th and early 19th centuries. To that end three themes will be highlighted: (1) the role that British diplomatic and military narratives played in establishing the information priorities required for the construction of colonial knowledge; (2) the importance not only of "colonial knowledge" but information making in its own right; (3) in anticipation of the use of big data, the manner in which manufactured information (related to space and disease) could function in shaping early British perceptions of Southeast Asia-particularly in Batavia and Java. This discussion will suggest that rather than see social distancing or increased communication as the greatest outcome of COVID-19, instead it will be the use of data-that is, big, aggregated biometric data which have not only shaped responses to the pandemic, but remain likely to produce the reconceptualization of both information and knowledge about the region in a way that will be at least as great as that which took place to meet the needs of the "New Imperialism." Furthermore, the definition and articulation of Southeast Asia has often reflected political and security considerations. Yet, the experience of COVID-19 could prove that data and security are now fused into a set of interests critical to policy-makers. Given that the pandemic should accelerate many existing trends, it might be foreseen these developments will herald the triumph of homo indicina: an epistemic condition whereby the human subject has become a kind of index for its harvestable data. If so, the "breakthroughs" for those who study Southeast Asia will follow in due course.

Fracture Behaviors of Jointed Rock Model Containing an Opening Under Biaxial Compression Condition (이축압축 조건에서 공동이 존재하는 유사 절리암반 모델의 파괴 거동)

  • SaGong, Myung;Yoo, Jea-Ho;Park, Du-Hee;Lee, J.S.
    • Journal of the Korean Geotechnical Society
    • /
    • v.25 no.10
    • /
    • pp.17-30
    • /
    • 2009
  • Underground construction such as tunneling can induce damages on the surrounding rock mass, due to the stress concentration of in situ stresses and excessive energy input during construction sequence, such as blasting. The developed damage on the rock mass can have substantial influence on the mechanical and hydraulic behaviors of the rock masses around a tunnel. In this study, investigation on the generation of damage around an opening in a jointed rock model under biaxial compression condition was conducted. The joint dip angles employed are 30, 45, and 60 degrees to the horizontal, and the synthetic rock mass was made using early strength cement and water. From the biaxial compression test, initiation and propagation of tensile cracks at norm to the joint angle were found. The propagated tensile cracks eventually developed rock blocks, which were dislodged from the rock mass. Furthermore, the propagation process of the tensile cracks varies with joint angle: lower joint angle model shows more stable and progressive tensile crack propagation. The development of the tensile crack can be explained under the hypothesis that the rock segment encompassed by the joint set is subjected to the developing moment, which can be induced by the geometric irregularity around the opening in the rock model. The experiment results were simulated by using discrete element method PFC 2D. From the simulation, as has been observed from the test, a rock mass with lower joint angle produces wider damage region and rock block by tensile cracks. In addition, a rock model with lower joint angle shows progressive tensile cracks generation around the opening from the investigation of the interacted tensile cracks.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.