• Title/Summary/Keyword: reconstruction scheme

Search Result 253, Processing Time 0.029 seconds

A performance enhancement scheme for Jacobian matrix via cluster computing on ET image reconstruction procedure (ET 영상복원에서 클러스터 컴퓨팅에 의한 자코비안 계산의 속도 향상 기법)

  • 이정훈;손수방
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2002.10c
    • /
    • pp.343-345
    • /
    • 2002
  • 본 논문은 차원이 큰 행렬 연산 때문에 많은 계산 시간을 필요로 하는 ET 영상 복원 응용의 속도를 개선하기 위하여 3 대의 PC로 구성된 클러스터를 구축하고 복원 과정 중 가장 많은 시간을 차지하는 자코비언 행렬 계산에 대해 병렬 계산 기법을 제시한다. 각 노드는 리눅스 운영체제, MPI, 산술 계산 라이브러리 등을 탑재하여 C 언어로 옹용이 작성될 수 있으며 자코비언 행렬은 각 계산 루프의 데이터 독립성이 강하므로 병렬 계산의 장점을 최대화 할 수 있다. 구현된 클러스터 자코비언 프로그램은 주어진 인자를 분석하여 MPI 프리미티브에 의해 각각의 노드에 분배시키고 각 노드들로 하여금 자신의 계산 라이브러리를 이용하여 계산하게 한 다음 이 부분 결과를 모아 최종적인 자코비언 행렬을 생성한다. 이 프로그램을 클러스터에서 수행시키고 그 수행시간을 측정한 결과 기존의 자코비언 프로그램에 비해 최대 40% 까지 수행시간을 단축시킬 수 있었으며 추후 행렬의 차원이 증가할 경우 클러스터 컴퓨팅에 의한 성능 개선을 기할 수 있다.

  • PDF

3D Image Analysis of Liver and Blood Vessels using MDCT (MDCT를 이용한 간과 혈관의 3D 영상분석)

  • Yang, Fei;Park, Jong Won
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2009.04a
    • /
    • pp.155-156
    • /
    • 2009
  • In this paper we present 3D image analysis of liver and blood vessels using MDCT. The purpose is to enhance the performance of clinician in assessing anatomical information of liver and blood vessels. The system consists of two parts: 3D image reconstruction and analysis of the 3D liver and blood vessel image. The central vein of the liver is the most important blood vessel for the liver transplantation. We will find the central vein's location and characteristic, and will scheme out a computer assistant liver transplantation planning. It will be an effective tool for interventional radiology, surgical planning, and quantitative diagnosis.

Electrophysiological and Morphological Classification of Inhibitory Interneurons in Layer II/III of the Rat Visual Cortex

  • Rhie, Duck-Joo;Kang, Ho-Young;Ryu, Gyeong-Ryul;Kim, Myung-Jun;Yoon, Shin-Hee;Hahn, Sang-June;Min, Do-Sik;Jo, Yang-Hyeok;Kim, Myung-Suk
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.7 no.6
    • /
    • pp.317-323
    • /
    • 2003
  • Interneuron diversity is one of the key factors to hinder understanding the mechanism of cortical neural network functions even with their important roles. We characterized inhibitory interneurons in layer II/III of the rat primary visual cortex, using patch-clamp recording and confocal reconstruction, and classified inhibitory interneurons into fast spiking (FS), late spiking (LS), burst spiking (BS), and regular spiking non-pyramidal (RSNP) neurons according to their electrophysiological characteristics. Global parameters to identify inhibitory interneurons were resting membrane potential (>-70 mV) and action potential (AP) width (<0.9 msec at half amplitude). FS could be differentiated from LS, based on smaller amplitude of the AP (<∼50 mV) and shorter peak-to-trough time (P-T time) of the afterhyperpolarization (<4 msec). In addition to the shorter AP width, RSNP had the higher input resistance (>200 $M{Omega}$) and the shorter P-T time (<20 msec) than those of regular spiking pyramidal neurons. Confocal reconstruction of recorded cells revealed characteristic morphology of each subtype of inhibitory interneurons. Thus, our results provide at least four subtypes of inhibitory interneurons in layer II/III of the rat primary visual cortex and a classification scheme of inhibitory interneurons.

Design and Implementation of ECQV Implicit Certificate (ECQV 묵시적 인증서의 설계 및 구현에 관한 연구)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.744-752
    • /
    • 2017
  • ECQV implicit certificate reconstructs the public key from the certificate without validation of the signature unlike the explicit certificate. Like this, the certificate and the public key is implicitly validated when a public key is reconstructed from a certificate. Hence, ECQV implicit certificate is shorter than the explicit certificate due to be only comprised of the public key reconstruction data instead of the signature and the public key, and faster to reconstruct the public key from the certificate than validating the signature. Furthermore, ECQV is well suited for environments and application that resources such as memory and bandwidth are limited because it is shorter the key length, and faster the performance than other cipher cryptography due to be run on ECC. In this paper, we describe prerequisites of ECQV specified in the SECG SEC 4 and issuance of an implicit certificate, reconstruction of the public key from an implicit certificate. Also we designed and implemented ECQV, and measured the performance of it.

Stereo Object Tracking System using Multiview Image Reconstruction Scheme (다시점 영상복원 기법을 이용한 스테레오 물체추적 시스템)

  • Ko, Jung-Hwan;Ohm, Woo-Young
    • 전자공학회논문지 IE
    • /
    • v.43 no.2
    • /
    • pp.54-62
    • /
    • 2006
  • In this paper, a new stereo object tracking system using the disparity motion vector is proposed. In the proposed method, the time-sequential disparity motion vector can be estimated from the disparity vectors which are extracted from the sequence of the stereo input image pair and then using these disparity motion vectors, the area where the target object is located and its location coordinate are detected from the input stereo image. Basing on this location data of the target object, the pan/tilt embedded in the stereo camera system can be controlled and as a result, stereo tracking of the target object can be possible. From some experiments with the 2 frames of the stereo image pairs having $256\times256$ pixels, it is shown that the proposed stereo tracking system can adaptively track the target object with a low error ratio of about 3.05 % on average between the detected and actual location coordinates of the target object.

VLSI Architecture Design of Reconstruction Filter for Morphological Image Segmentation (형태학적 영상 분할을 위한 재구성 필터의 VLSI 구조 설계)

  • Lee, Sang-Yeol;Chung, Eui-Yoon;Lee, Ho-Young;Kim, Hee-Soo;Ha, Yeong-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.12
    • /
    • pp.41-50
    • /
    • 1999
  • In this paper, the new VLSI architecture of a reconstruction filter for morphological image segmentation is proposed. The filter, based on the $h_{max}$ operation, simplifies the interior of each region while preserving the boundary information. The proposed architecture adopts a partitioned memory structure and an efficient image scanning strategy to reduce the operations. The proposed memory partitioning scheme makes it possible that every data required for processing can be read from each memory at a time, resulting in parallel data processing. By the extended connectivity consideration, the operation is much decreased because more simplification is achieved in scanning stage. The selective raster scan strategy endows the satisfactory noise removal capability with negligible hardware complexity increase. The proposed architecture is designed using VHDL, and functional evaluation is performed by the CAD tool, Mentor. The experiment results show that the proposed architecture can simplify image profile with less than 18% operations of the conventional method.

  • PDF

APOLLO2 YEAR 2010

  • Sanchez, Richard;Zmijarevi, Igor;Coste-Delclaux, M.;Masiello, Emiliano;Santandrea, Simone;Martinolli, Emanuele;Villate, Laurence;Schwartz, Nadine;Guler, Nathalie
    • Nuclear Engineering and Technology
    • /
    • v.42 no.5
    • /
    • pp.474-499
    • /
    • 2010
  • This paper presents the mostortant developments implemented in the APOLLO2 spectral code since its last general presentation at the 1999 M&C conference in Madrid. APOLLO2 has been provided with new capabilities in the domain of cross section self-shielding, including mixture effects and transfer matrix self-shielding, new or improved flux solvers (CPM for RZ geometry, heterogeneous cells for short MOC and the linear-surface scheme for long MOC), improved acceleration techniques ($DP_1$), that are also applied to thermal and external iterations, and a number of sophisticated modules and tools to help user calculations. The method of characteristics, which took over the collision probability method as the main flux solver of the code, allows for whole core two-dimensional heterogeneous calculations. A flux reconstruction technique leads to fast albeit accurate solutions used for industrial applications. The APOLLO2 code has been integrated (APOLLO2-A) within the $ARCADIA^{(R)}$ reactor code system of AREVA as cross section generator for PWR and BWR fuel assemblies. APOLLO2 is also extensively used by Electricite de France within its reactor calculation chain. A number of numerical examples are presented to illustrate APOLLO2 accuracy by comparison to Monte Carlo reference calculations. Results of the validation program are compared to the measured values on power plants and critical experiments.

Detection of Disguised Packet and Valid Reconstruction Identification Using Network Coding in IoT Environment (IoT 환경에서 네트워크 코딩의 위장패킷 탐지와 유효한 복구의 식별 알고리즘)

  • Lee, Yong
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.1
    • /
    • pp.29-37
    • /
    • 2020
  • Work to improve network throughput has been focused on network coding as the utilization of IoT-based application services increases and network usage increases rapidly. In network coding, nodes transform packets received from neighboring nodes into a combination of encoded packets for transmission and decoding at the destination. This scheme is based on trust among nodes, but in the IoT environment where nodes are free to join, a malicious node can fabricate the packet if it legally participates in the configuration. It is difficult to identify the authenticity of the encoded packet since the packet received at destination is not a single source but a combination of packets generated by several nodes. In this paper, we propose a method to detect "look-like-valid" packets that have been attacked and disguised in packets received at destination, and to identify valid messages in the reconstructions. This method shows that network coding performance is significantly improved because the destination can reconstruct a valid message with only received packets without retransmission with a high probability, despite the presence of disguised packets.

Composition of efficient monitoring system using an interpolation (보간법을 이용한 효율적인 모니터링 시스템 구성)

  • Lee, Sang-Hyeok;Kang, Feel-Soon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.2
    • /
    • pp.290-298
    • /
    • 2008
  • This paper presents an efficient data storage and reconstruction method in data acquisition and processing of monitoring system. The proposed method extracts minimum data using an interpolation from raw data which are acquired from a target system. They are transferred and saved in a monitoring PC via TCP/IP communication, and then reconstructed as original signals. Therefore, it is possible to design an efficient monitoring system by the improved data communication speed due to the reduced communication packet, and it reduces the storage space. The algorithm for data acquisition and reconstruction is based on Cubic Hermite interpolation. To verify the validity of the proposed scheme, we presents simulation results compared with other interpolation based approaches. Finally, it is applied to a monitoring system for grid-connected photovoltaic power generation system to prove the high-performance of the proposed method.

High Resolution Reconstruction of Multispectral Imagery with Low Resolution (저해상도 Multispectral 영상의 고해상도 재구축)

  • Lee, Sang-Hoon
    • Korean Journal of Remote Sensing
    • /
    • v.23 no.6
    • /
    • pp.547-552
    • /
    • 2007
  • This study presents an approach to reconstruct high-resolution imagery for multispectral imagery of low-resolution using panchromatic imagery of high-resolution. The proposed scheme reconstructs a high-resolution image which agrees with original spectral values. It uses a linear model of high-and low- resolution images and consists of two stages. The first one is to perform a global estimation of the least square error on the basis of a linear model of low-resolution image associated with high-resolution feature, and next local correction then makes the reconstructed image locally fit to the original spectral values. In this study, the new method was applied to KOMPSAT-1 EOC image of 6m and LANDSAT ETM+ of 30m, and an 1m RGB image was also generated from 4m IKONOS multispectral data. The results show its capability to reconstruct high-resolution imagery from multispectral data of low-resolution.