• Title/Summary/Keyword: dynamic threshold

Search Result 455, Processing Time 0.031 seconds

A Flame-Detection System Robust to Lighting and Environments (조명과 환경 변화에 강건한 화염 검출 시스템)

  • Park, Jang-Sik;Kim, Hyun-Tae;Park, Soo-Chang;Son, Kyung-Sik
    • Fire Science and Engineering
    • /
    • v.22 no.1
    • /
    • pp.68-75
    • /
    • 2008
  • In this paper, we introduce a fire-detection system which is robust to light sources and environment changing. We can decide the threshold values that classify the regions between a fire flame and light sources by analyzing them in RGB color space. But we could not discriminate quasi-flame region from fire flame region with the value. The difference of mean-histogram technique make it possible to extract flame region more efficient because fire flame is continuously changing after it occurs. In order to validate real fire, this paper uses regional compactness in the end of process. Computer simulation show that proposed method make more robust to light sources and environment changing.

Comparison of Drain-Induced-Barrier-Lowering (DIBL) Effect by Different Drain Engineering

  • Choi, Byoung-Seon;Choi, Pyung-Ho;Choi, Byoung-Deog
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2012.02a
    • /
    • pp.342-343
    • /
    • 2012
  • We studied the Drain-Induced-Barrier-Lowering (DIBL) effect by different drain engineering. One other drain engineering is symmetric source-drain n-channel MOSFETs (SSD NMOSs), the other drain engineering is asymmetric source-drain n-channel MOSFETs (ASD NMOSs). Devices were fabricated using state of art 40 nm dynamic-random-access-memory (DRAM) technology. These devices have different modes which are deep drain junction mode in SSD NMOSs and shallow drain junction mode in ASD NMOSs. The shallow drain junction mode means that drain is only Lightly-Doped-Drain (LDD). The deep drain junction mode means that drain have same process with source. The threshold voltage gap between low drain voltage ($V_D$=0.05V) and high drain voltage ($V_D$=3V) is 0.088V in shallow drain junction mode and 0.615V in deep drain junction mode at $0.16{\mu}m$ of gate length. The DIBL coefficients are 26.5 mV/V in shallow drain junction mode and 205.7 mV/V in deep drain junction mode. These experimental results present that DIBL effect is higher in deep drain junction mode than shallow drain junction mode. These results are caused that ASD NMOSs have low drain doping level and low lateral electric field.

  • PDF

Enhanced-xVSB Development for Next Generation Terrestrial DTV Transmission System (차세대 지상파 DTV 전송방식 시스템을 위한 Enhanced-xVSB 개발)

  • Kim Sung-Hoon;Ji Kum-Ran;Lee Jae-Youn;Kim Seung-Won;Lee Soo-In;Kim Chang-Joong;Lee Ho-Kyoung
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2004.11a
    • /
    • pp.281-284
    • /
    • 2004
  • This paper described an Enhanced-xVSB system for improving mobile/pedestrian reception performance to the ATSC DTV 8-VSB transmission standard. E-xVSB system can transmit a mixture of normal (8-VSB) stream and enhanced (robust) stream. The robust stream has a higher threshold of visibility (TOV) compared to the standard stream, and legacy receivers ignore the robust packets. Thus, Enhanced-xVSB system is fully backward compatible with a current ATSC standard. for mobile and portable reception support, E-xVSB system adopts a reduced constellation method as well as enhanced trellis-coded modulation scheme. E-xVSB system supports a variety of enhanced modulation schemes: Pseudo-2VSB, Enhanced-4VSB, modified Enhanced-8VSB and Hybrid-VSB. Proposed E-xVSB system performs well under serious dynamic multipath reception environment.

  • PDF

A Pattern-based Query Strategy in Wireless Sensor Network

  • Ding, Yanhong;Qiu, Tie;Jiang, He;Sun, Weifeng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.6
    • /
    • pp.1546-1564
    • /
    • 2012
  • Pattern-based query processing has not attracted much attention in wireless sensor network though its counterpart has been studied extensively in data stream. The methods used for data stream usually consume large memory and much energy. This conflicts with the fact that wireless sensor networks are heavily constrained by their hardware resources. In this paper, we use piece wise representation to represent sensor nodes' collected data to save sensor nodes' memory and to reduce the energy consumption for query. After getting data stream's and patterns' approximated line segments, we record each line's slope. We do similar matching on slope sequences. We compute the dynamic time warping distance between slope sequences. If the distance is less than user defined threshold, we say that the subsequence is similar to the pattern. We do experiments on STM32W108 processor to evaluate our strategy's performance compared with naive method. The results show that our strategy's matching precision is less than that of naive method, but our method's energy consumption is much better than that of naive approach. The strategy proposed in this paper can be used in wireless sensor network to process pattern-based queries.

Human Visual System based Automatic Underwater Image Enhancement in NSCT domain

  • Zhou, Yan;Li, Qingwu;Huo, Guanying
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.2
    • /
    • pp.837-856
    • /
    • 2016
  • Underwater image enhancement has received considerable attention in last decades, due to the nature of poor visibility and low contrast of underwater images. In this paper, we propose a new automatic underwater image enhancement algorithm, which combines nonsubsampled contourlet transform (NSCT) domain enhancement techniques with the mechanism of the human visual system (HVS). We apply the multiscale retinex algorithm based on the HVS into NSCT domain in order to eliminate the non-uniform illumination, and adopt the threshold denoising technique to suppress underwater noise. Our proposed algorithm incorporates the luminance masking and contrast masking characteristics of the HVS into NSCT domain to yield the new HVS-based NSCT. Moreover, we define two nonlinear mapping functions. The first one is used to manipulate the HVS-based NSCT contrast coefficients to enhance the edges. The second one is a gain function which modifies the lowpass subband coefficients to adjust the global dynamic range. As a result, our algorithm can achieve contrast enhancement, image denoising and edge sharpening automatically and simultaneously. Experimental results illustrate that our proposed algorithm has better enhancement performance than state-of-the-art algorithms both in subjective evaluation and quantitative assessment. In addition, our algorithm can automatically achieve underwater image enhancement without any parameter tuning.

A Fuzzy Identity-Based Signcryption Scheme from Lattices

  • Lu, Xiuhua;Wen, Qiaoyan;Li, Wenmin;Wang, Licheng;Zhang, Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.11
    • /
    • pp.4203-4225
    • /
    • 2014
  • Fuzzy identity-based cryptography introduces the threshold structure into identity-based cryptography, changes the receiver of a ciphertext from exact one to dynamic many, makes a cryptographic scheme more efficient and flexible. In this paper, we propose the first fuzzy identity-based signcryption scheme in lattice-based cryptography. Firstly, we give a fuzzy identity-based signcryption scheme that is indistinguishable against chosen plaintext attack under selective identity model. Then we apply Fujisaki-Okamoto method to obtain a fuzzy identity-based signcryption scheme that is indistinguishable against adaptive chosen ciphertext attack under selective identity model. Thirdly, we prove our scheme is existentially unforgeable against chosen message attack under selective identity model. As far as we know, our scheme is the first fuzzy identity-based signcryption scheme that is secure even in the quantum environment.

Real-Time Implementation of Speaker Dependent Speech Recognition Hardware Module Using the TMS320C32 DSP : VR32 (TMS320C32 DSP를 이용한 실시간 화자종속 음성인식 하드웨어 모듈(VR32) 구현)

  • Chung, Ik-Joo;Chung, Hoon
    • The Journal of the Acoustical Society of Korea
    • /
    • v.17 no.4
    • /
    • pp.14-22
    • /
    • 1998
  • 본 연구에서는 Texas Instruments 사의 저가형 부동소수점 디지털 신호 처리기 (Digital Singnal Processor, DSP)인 TMS320C32를 이용하여 실시간 화자종속 음성인식 하 드웨어 모듈(VR32)을 개발하였다. 하드웨어 모듈의 구성은 40MHz의 TMS320C32 DSP, 14bit 코덱인 TLC32044(또는 8bit μ-law PCM 코덱), EPROM과 SRAM 등의 메모리와 호 스트 인터페이스를 위한 로직 회로로 이루어졌다. 뿐만 아니라 이 하드웨어 모듈을 PC사에 서 평가해보기 위한 PC 인터페이스용 보드 및 소프트웨어도 개발하였다. 음성인식 알고리 즘의 구성은 에너지와 ZCR을 기반으로 한 끝점검출(Endpoint Detection) 침 10차 가중 LPC 켑스터럼(Weighted LPC Cepstrum) 분석이 실시간으로 이루어지며 이후 Dynamic Time Warping(DTW)를 통하여 최고 유사 단어를 결정하고 다시 검증과정을 거쳐 최종 인식을 수행한다. 끝점검출의 경우 적응 문턱값(Adaptive threshold)을 이용하여 잡음에 강인한 끝 점검출이 가능하며 DTW 알고리즘의 경우 C 및 어셈블리를 이용한 최적화를 통하여 계산 속도를 대폭 개선하였다. 현재 인식률은 일반 사무실 환경에서 통상 단축다이얼 용도로 사 용할 수 있는 30 단어에 대하여 95% 이상으로 매우 높은 편이며, 특히 배경음악이나 자동 차 소음과 같은 잡음환경에서도 잘 동작한다.

  • PDF

ASSESSMENT OF STABILITY MAPS FOR HEATED CHANNELS WITH SUPERCRITICAL FLUIDS VERSUS THE PREDICTIONS OF A SYSTEM CODE

  • Ambrosini, Walter;Sharabi, Medhat Beshir
    • Nuclear Engineering and Technology
    • /
    • v.39 no.5
    • /
    • pp.627-636
    • /
    • 2007
  • The present work is aimed at further discussing the effectiveness of dimensionless parameters recently proposed for the analysis of flow stability in heated channels with supercritical fluids. In this purpose, after presenting the main motivations for the introduction of these parameters in place of previously proposed ones, additional information on the theoretical bases and on the consequences of this development is provided. Stability maps, generated by an in-house program adapted from a previous application to boiling channels, are also shown for different combinations of the operating parameters. The maps are obtained as contour plots of an amplification parameter obtained from numerical discretization and subsequent linearization of governing equations; as such, they provide a quantitatively clear perspective of the effect of different boundary conditions on the stability of heated channels with supercritical fluids. In order to assess the validity of the assumptions at the basis of the in-house model, supporting calculations have been performed making use of the RELAP5/MOD3.3 computer code, detecting the values of the dimensionless parameters at the threshold for the occurrence of instability for a heated channel representative of SCWR proposed core configurations. The obtained results show reasonable agreement with the maps, supporting the applicability of the proposed scaling parameters for describing the dynamic behaviour of heated channels with supercritical fluids.

A Congestion Control Mechanism for Supporting Differentiated Service in Mobile Ad hoc Networks

  • Kim Jin-Nyun;Ha Nam-Koo;Cho Dong-Hoon;Kim Hyun-Sook;Han Ki-Jun
    • Proceedings of the IEEK Conference
    • /
    • summer
    • /
    • pp.143-146
    • /
    • 2004
  • Differentiated services (DiffServ) has been widely accepted as the service model to adopt for providing quality-of­service (QoS) over the next-generation IP networks. There is a growing need to support QoS in mobile ad hoc networks. Supporting DiffServ in mobile ad hoc networks, however, is very difficult because of the dynamic nature of mobile ad hoc networks, which causes network congestion. The network congestion induces long transfer packet delay and low throughput which make it very difficult to support QoS in mobile ad hoc networks. We propose DiffServ module to support differentiated service in mobile ad hoc networks through congestion control. Our DiffServ module uses the periodical rate control for real time traffic and also uses the best effort bandwidth concession when network congestion occurs. Network congestion is detected by measuring the packet transfer delay or bandwidth threshold of real time traffic. We evaluate our mechanism via a simulation study. Simulation results show our mechanism may offer a low and stable delay and a stable throughput for real time traffic in mobile ad hoc networks.

  • PDF

Energy-factor-based damage-control evaluation of steel MRF systems with fuses

  • Ke, Ke;Yam, Michael C.H.
    • Steel and Composite Structures
    • /
    • v.22 no.3
    • /
    • pp.589-611
    • /
    • 2016
  • The primary objectives of this research are to investigate the energy factor response of steel moment resisting frame (MRF) systems equipped with fuses subject to ground motions and to develop an energy-based evaluation approach for evaluating the damage-control behavior of the system. First, the energy factor of steel MRF systems with fuses below the resilience threshold is derived utilizing the energy balance equation considering bilinear oscillators with significant post-yielding stiffness ratio, and the effect of structural nonlinearity on the energy factor is investigated by conducting a parametric study covering a wide range of parameters. A practical transformation approach is also proposed to associate the energy factor of steel MRF systems with fuses with classic design spectra based on elasto-plastic systems. Then, the energy balance is extended to structural systems, and an energy-based procedure for damage-control evaluation is proposed and a damage-control index is also derived. The approach is then applied to two types of steel MRF systems with fuses to explore the applicability for quantifying the damage-control behavior. The rationality of the proposed approach and the accuracy for identifying the damage-control behavior are demonstrated by nonlinear static analyses and incremental dynamic analyses utilizing prototype structures.