• Title/Summary/Keyword: dual detection

Search Result 293, Processing Time 0.02 seconds

Performance Evaluation of TDX-families DTMF Receiver with the QFT (QFT를 이용한 TDX-계열 교환기용 DTMF 수신기의 성능평가)

  • 윤달환
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.133-139
    • /
    • 2001
  • The economical detection of dual-tone multi-frequency(DTMF) signals is an important factor when developing cost-effective telecommunication equipment. Each channel has independently a DTMF receiver, and it informs the detected signal to processors. In order to detect the DTMF signals, this paper analyze the power spectra of the DTMF receiver by using the QFT algorithm. As experimental result, by analyzing 2$\^$M/ real data in terms of ITU-T specification, it show that the QFT algorithm improve the performance of the DTMF receiver and can save memory waste and can the real-time processing.

  • PDF

Spectral Analysis and Performance Evaluation of Multichannel DTMF Receivers based on QFT

  • Koo, Young-Woo;Min, Seung-Gi;Kim, Jeng-Sik;Yoon, Eung-Sik;Yoon, Dal-Hwan
    • Proceedings of the IEEK Conference
    • /
    • 2000.07a
    • /
    • pp.105-108
    • /
    • 2000
  • The economical detection of dual-tone multifrequency(DTMF) signals is an important factor when developing cost-effective telecommunication equipment. Each channel has independently a DTMF receiver, and I t informs the detected signal to processors. This paper analyze the power spectra and evaluate the performance of DTMF receiver by using tile quick Fourier transform(QFT) algorithm. As experimental results, it show the improved performance to the DTMF receivers and reduce memory waste and process the real-time.

  • PDF

Properties of stack filterand edge detector (스택필터의 특성과 윤곽선 검출에 관한 연구)

  • 유지상
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.7
    • /
    • pp.1677-1684
    • /
    • 1996
  • The theory of optimal stack filtering has been used in difference of estimates(DoE) approach to the detection of intensity edges in noisy image. In this approach, stack filters are applied to a noisy image to obtain local estimates of the dilated and eroded versions of the noise-free image. Thresholding the difference between these two estimates produces the estimated edge map. In this paper, the DoE approach is modified by imposing a symmetry condition of the data used to train the two stack filers. Under this condition, the stack filters obtained are duals of each other. Only one filter must therefore be trained;the other is simply its dual. They also produce statistially unbiased estimates. This new technique is called the symmetric Difference of Estimates (SDoE) approach.

  • PDF

A DDoS Protection System Using Dual Filtering Method (이중 필터링을 이용한 분산서비스 거부 방어 시스템 방법)

  • Choi, Ji-Hoon;Jun, Moon-Seog
    • Proceedings of the KAIS Fall Conference
    • /
    • 2010.05a
    • /
    • pp.214-217
    • /
    • 2010
  • DDoS(distributed denial of service)공격은 1990년 중반에 처음 나타나기 시작하여 1,2세대 네트워크 자체에 대한 트래픽 폭주형태의 공격에서부터 3세대 봇넷을 이용하여 특정 서버와 특정서비스를 마비시키기 위한 공격을 거쳐 4세대의 분산 형식의 C&C를 이용하는 공격의 유형으로 발전 하고 있다. DDoS공격은 점점 지능화 되고 있으며 기존의 IDS(Intrusion Detection System) 시스템을 이용한 탐지방법으로 공격을 탐지하기에는 어려움이 존재한다. 본 논문은 IDS시스템을 보다 더 지능화시키기 위한 논문으로 IDS는 내부시스템으로부터 쿼리를 넘겨받아 업데이트를 수행하고 업데이트를 수행함과 동시에 라우터에게 C&C서버로부터 나오는 패킷을 차단하도록 알려 준다. 즉, IDS에서 일어나는 False Negative문제를 줄여줌으로써 DDoS 공격에 대하여 Zombie시스템을 생성하지 못하도록 하고자 하는데 그 목적이 있으며 점점 지능화되어 가고 있는 DDoS공격에 대하여 차단을 하고자 하는 방향성을 제시하고 있다.

  • PDF

Implementation and Validation of Traffic Light Recognition Algorithm for Low-speed Special Purpose Vehicles in an Urban Autonomous Environment (저속 특장차의 도심 자율주행을 위한 신호등 인지 알고리즘 적용 및 검증)

  • Wonsub, Yun;Jongtak, Kim;Myeonggyu, Lee;Wongun, Kim
    • Journal of Auto-vehicle Safety Association
    • /
    • v.14 no.4
    • /
    • pp.6-15
    • /
    • 2022
  • In this study, a traffic light recognition algorithm was implemented and validated for low-speed special purpose vehicles in an urban environment. Real-time image data using a camera and YOLO algorithm were applied. Two methods were presented to increase the accuracy of the traffic light recognition algorithm, and it was confirmed that the second method had the higher accuracy according to the traffic light type. In addition, it was confirmed that the optimal YOLO algorithm was YOLO v5m, which has over 98% mAP values and higher efficiency. In the future, it is thought that the traffic light recognition algorithm can be used as a dual system to secure the platform safety in the traffic information error of C-ITS.

Answers Candidate Detection System using Dual Pointer Network Decoder (듀얼 포인터 네트워크 디코더를 이용한 정답 후보군 탐지 시스템)

  • Jang, Youngjin;Kim, Harksoo;Kim, Jintae;Wang, Jihyun;Lee, Chunghee
    • Annual Conference on Human and Language Technology
    • /
    • 2019.10a
    • /
    • pp.424-426
    • /
    • 2019
  • 정답 후보군 탐지 모델은 최근 활발히 진행되고 있는 질의-응답 데이터 수집 연구의 선행이 되는 연구로 특정 질문에 대한 정답을 주어진 단락에서 추출하는 작업을 말한다. 제안 모델은 포인터 네트워크 디코더를 통하여 기존의 순차 레이블링 모델에서 처리할 수 없었던 정답이 겹치는 문제에 대해서 해결할 수 있게 되었다. 그리고 독립된 두 개의 포인터 네트워크 디코더를 사용함으로써, 단일 포인터 네트워크로 처리할 수 없었던 정답의 탐지가 가능하게 되었다.

  • PDF

A study on Object Contour Detection using improved Dual Active Contour Model (개선된 Dual Active Contour Model을 이용한 물체 윤곽선 검출에 관한 연구)

  • 문창수;유봉길;이웅기
    • Journal of the Korea Society of Computer and Information
    • /
    • v.3 no.1
    • /
    • pp.81-94
    • /
    • 1998
  • In order to extract the contour of interesting object in the image, Kass suggested the Active Contour Model called "Snakes". Snakes is a model which defines the contour of image energy. It also can find the contour of object by minimizing these energy functions. The speed of this model is slow and this model is sensitive of initialization. In order to improve these problems, Gunn extracted the accurate contour by using two initialization. and operated to less sensitive of initialization. This method could extract more accurate contour than the existing method, but it had no effect in the speed and it was sensitive of noise. This paper applied to the Energy Minimization Algorithm about only the pixel within the window applying the window of 8$\times$8 size at each contour point consisting Snakes in order to solve these problems. The method offered in this paper is applied to extract the contour of original image and cup image added to gaussian noise. By tracking the face using this offered method, it is applied to virtual reality and motion tracking. tracking.

  • PDF

A Real-time Audio Surveillance System Detecting and Localizing Dangerous Sounds for PTZ Camera Surveillance (PTZ 카메라 감시를 위한 실시간 위험 소리 검출 및 음원 방향 추정 소리 감시 시스템)

  • Nguyen, Viet Quoc;Kang, HoSeok;Chung, Sun-Tae;Cho, Seongwon
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.11
    • /
    • pp.1272-1280
    • /
    • 2013
  • In this paper, we propose an audio surveillance system which can detect and localize dangerous sounds in real-time. The location information about dangerous sounds can render a PTZ camera to be directed so as to catch a snapshot image about the dangerous sound source area and send it to clients instantly. The proposed audio surveillance system firstly detects foreground sounds based on adaptive Gaussian mixture background sound model, and classifies it into one of pre-trained classes of foreground dangerous sounds. For detected dangerous sounds, a sound source localization algorithm based on Dual delay-line algorithm is applied to localize the sound sources. Finally, the proposed system renders a PTZ camera to be oriented towards the dangerous sound source region, and take a snapshot against over the sound source region. Experiment results show that the proposed system can detect foreground dangerous sounds stably and classifies the detected foreground dangerous sounds into correct classes with a precision of 79% while the sound source localization can estimate orientation of the sound source with acceptably small error.

A Comparative Study on BMD of Lumbar Spine and Proximal Femur in Post-Menopausal Women Using Dual Energy X-ray Absorptiometry (이중에너지 X선 흡수계측법을 이용한 폐경기 여성의 요추 및 근위 대퇴부의 골밀도 비교 연구)

  • Yoon, Han-Sik;Mo, Eun-Hee
    • Journal of radiological science and technology
    • /
    • v.22 no.2
    • /
    • pp.41-46
    • /
    • 1999
  • Osteoporosis, which causes mainly fracture of the spine, proximal femur and distal radius by minimal trauma, is a major public health problem and its prevalence is steadily increasing in Korea according to the development of public health care. There are reliable methods for diagnosis based on bone densitometry. Early detection and intervention are important for reducing the incidence of fractures. A consensus definition of osteoporosis, based on bone density measurement, has been developed by the World Health Organization(WHO). In this study, bone mineral density(RMD) was measured by dual energy x-ray absorptiometry(DEXA) at the proximal femur and lumbar spine in 132 post-menopausal women. The purpose of this study is to find influential factors on the BMD of the proximal femur and the lumbar spine and to analyze correlation between BMD and the problematic factors. We obtained the following results : 1. Mean BMD score, T-score and Z-score of the proximal femur were $0.81(g/cm^2)$, -2.45(S.D.) and -2.09(S.D.) respectively and in the lumbar spine were $0.83(g/cm^2)$, -2.02(S.D.), -2.43(S.D.) respectively. 2. In correlation analysis between BMD and many factors, correlation coefficients were -0.467, 0.212, -0.321 and 0.241 in age, height, duration after menopause respectively. BMI and the residuals were comparatively small. 3. Correlation coefficients to age matched BMD, in height and body weight were 0.222 and 0.241, in age and duration after menopause were -0.268, -0.282. 4. The fracture threshold of proximal femur BMD to the 90th percentile was $0.845(g/cm^2)$. 5. At the result of multiple regression analysis, age, body weight, $BMI(kg/m^2)$ and duration after menopause described as significant variables.

  • PDF

A Study on Reliability Evaluation Using Dynamic Fault Tree Algorithm (시스템 신뢰도 평가를 위한 동적 결함 트리(Dynamic Fault Tree) 알고리듬 연구)

  • 김진수;양성현;이기서
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.10A
    • /
    • pp.1546-1554
    • /
    • 1999
  • In this paper, Dynamic Fault Tree algorithm(DFT algorithm) is presented. This algorithm provides a concise representation of dynamic fault tolerance system including fault recovery techniques with fault detection, mask and switching function. And this algorithm define FDEP, CSP, SEQ, PAG gate which captures the dynamic characteristics of system. It show that this algorithm solved the constraints to satisfy the dynamic characteristics of system which there are in Markov and also this is able to satisfy the dynamic characteristics of system which there are in Markov and also this is able to covered the disadvantage of Fault tree methods. To show the key advantage of this algorithm, a traditional method, that is, Markov and Fault Tree, applies to TMR and Dual-Duplex systems with the dynamic characteristic and a presented method applies to those. He results proved that the DFT algorithm for solving the problems of the system is more effective than the Markov and Fault tree analysis model..

  • PDF