• Title/Summary/Keyword: reconstruction scheme

Search Result 253, Processing Time 0.035 seconds

Depth Averaged Numerical Model for Sediment Transport by Transcritical Flows (급변류에 의한 하상변동 예측을 위한 수심적분 수치모형)

  • Kim, Boram;Kim, Dae-Hong
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.11
    • /
    • pp.1061-1066
    • /
    • 2014
  • A stable second-order finite volume method was proposed to predict sediment transport under rapidly varied flow conditions such as transcritical flow. For the use under unsteady flow conditions, a sediment transport model was coupled with shallow water equations. HLLC approximate Riemann solver based on a monotone upstream-centered schemes for conservation laws (MUSCL) reconstruction was used for the computation of the flux terms. From the comparisons of dam break flow experiments on erodible beds in one- and two-dimensional channels, good agreements were obtained when proper parameters were provided. Lastly, dam surface erosion problem by overtopped water was simulated. Overall, the numerical solutions showed reasonable results, which demonstrated that the proposed numerical scheme could provide stable and physical results in the cases of subcritical and supercritical flow conditions.

An Iterative Side Information Refinement Based on Block-Adaptive Search in Distributed Video Coding (분산 비디오 부호화에서 블록별 적응적 탐색에 기초한 반복적인 보조정보 보정기법)

  • Kim, Jin-Soo;Yun, Mong-Han;Kim, Jae-Gon;Seo, Kwang-Deok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.2
    • /
    • pp.355-363
    • /
    • 2011
  • Recently, as one of several methods to improve the performance of DVC(Distributed Video Coding) system, many research works are focusing on the iterative refinement of side information. Most of the conventional techniques are mainly based on the relationship between the reconstruction level and side information, or the vector median filtering of motion vectors, but, their performance improvements are restricted. In order to overcome the performance limit of the conventional schemes, in this paper, a side information generation scheme is designed by measuring the block-cost estimation. Then, by adaptively selecting the compensation mode using the received bit-plane information, we propose a block-adaptive iterative refinement which is efficient for non-symmetric moving objects. Computer simulations show that, by using the proposed refinement method, the performance can be improved up to 0.2 dB in rate-distortion.

지구물리탐사자료의 지리정보시스템 해석

  • Han, Su-Hyeong;Kim, Ji-Su;Sin, Jae-U;Gwon, Il-Ryong
    • Journal of the Korean Geophysical Society
    • /
    • v.5 no.1
    • /
    • pp.29-39
    • /
    • 2002
  • Geophysical data sets from the Chojeong area in the Chungbok-Do are compositely studied in terms of multi-attribute interpretations for the subsurface mappings of shallow fracture zones, associated with groundwater reservoir. Utilizing a GIS software, the attribute data were implemented to a database; a lineament from the satellite image, electrical resistivities and its standard deviation, radioactivity, seismic velocity, and bedrock depth. In an attempt to interpret 1-D electrical sounding data in 3-D views, 1-D data are firstly performed horizontal and vertical inter- and extrapolation. Reconstruction of a resistivity volume is found to be an effective scheme for subsurface mapping of shallow fracture zones. Shallow fracture zones are located in the southeastern part of the study area, which are commonly correlated with the various exploration data.

  • PDF

Numerical evaluation of gamma radiation monitoring

  • Rezaei, Mohsen;Ashoor, Mansour;Sarkhosh, Leila
    • Nuclear Engineering and Technology
    • /
    • v.51 no.3
    • /
    • pp.807-817
    • /
    • 2019
  • Airborne Gamma Ray Spectrometry (AGRS) with its important applications such as gathering radiation information of ground surface, geochemistry measuring of the abundance of Potassium, Thorium and Uranium in outer earth layer, environmental and nuclear site surveillance has a key role in the field of nuclear science and human life. The Broyden-Fletcher-Goldfarb-Shanno (BFGS), with its advanced numerical unconstrained nonlinear optimization in collaboration with Artificial Neural Networks (ANNs) provides a noteworthy opportunity for modern AGRS. In this study a new AGRS system empowered by ANN-BFGS has been proposed and evaluated on available empirical AGRS data. To that effect different architectures of adaptive ANN-BFGS were implemented for a sort of published experimental AGRS outputs. The selected approach among of various training methods, with its low iteration cost and nondiagonal scaling allocation is a new powerful algorithm for AGRS data due to its inherent stochastic properties. Experiments were performed by different architectures and trainings, the selected scheme achieved the smallest number of epochs, the minimum Mean Square Error (MSE) and the maximum performance in compare with different types of optimization strategies and algorithms. The proposed method is capable to be implemented on a cost effective and minimum electronic equipment to present its real-time process, which will let it to be used on board a light Unmanned Aerial Vehicle (UAV). The advanced adaptation properties and models of neural network, the training of stochastic process and its implementation on DSP outstands an affordable, reliable and low cost AGRS design. The main outcome of the study shows this method increases the quality of curvature information of AGRS data while cost of the algorithm is reduced in each iteration so the proposed ANN-BFGS is a trustworthy appropriate model for Gamma-ray data reconstruction and analysis based on advanced novel artificial intelligence systems.

Compression Method for MPEG CDVA Global Feature Descriptors (MPEG CDVA 전역 특징 서술자 압축 방법)

  • Kim, Joonsoo;Jo, Won;Lim, Guentaek;Yun, Joungil;Kwak, Sangwoon;Jung, Soon-heung;Cheong, Won-Sik;Choo, Hyon-Gon;Seo, Jeongil;Choi, Yukyung
    • Journal of Broadcast Engineering
    • /
    • v.27 no.3
    • /
    • pp.295-307
    • /
    • 2022
  • In this paper, we propose a novel compression method for scalable Fisher vectors (SCFV) which is used as a global visual feature description of individual video frames in MPEG CDVA standard. CDVA standard has adopted a temporal descriptor redundancy removal technique that takes advantage of the correlation between global feature descriptors for adjacent keyframes. However, due to the variable length property of SCFV, the temporal redundancy removal scheme often results in inferior compression efficiency. It is even worse than the case when the SCFVs are not compressed at all. To enhance the compression efficiency, we propose an asymmetric SCFV difference computation method and a SCFV reconstruction method. Experiments on the FIVR dataset show that the proposed method significantly improves the compression efficiency compared to the original CDVA Experimental Model implementation.

De-Obfuscated Scheme for Obfuscation Techniques Based on Trampoline Code (트램폴린 코드 기반의 난독화 기법을 위한 역난독화 시스템)

  • Minho Kim;Jeong Hyun Yi;Haehyun Cho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.33 no.6
    • /
    • pp.1043-1053
    • /
    • 2023
  • Malware analysts work diligently to analyze and counteract malware, while developers persistently devise evasion tactics, notably through packing and obfuscation techniques. Although previous works have proposed general unpacking approaches, they inadequately address techniques like OEP obfuscation and API obfuscation employed by modern packers, leading to occasional failures during the unpacking process. This paper examines the OEP and API obfuscation techniques utilized by various packers and introduces a system designed to automatically de-obfuscate them. The system analyzes the memory of packed programs, detects trampoline codes, and identifies obfuscated information, for program reconstruction. Experimental results demonstrate the effectiveness of our system in de-obfuscating programs that have undergone OEP and API obfuscation techniques.

Complexity-based Sample Adaptive Offset Parallelism (복잡도 기반 적응적 샘플 오프셋 병렬화)

  • Ryu, Eun-Kyung;Jo, Hyun-Ho;Seo, Jung-Han;Sim, Dong-Gyu;Kim, Doo-Hyun;Song, Joon-Ho
    • Journal of Broadcast Engineering
    • /
    • v.17 no.3
    • /
    • pp.503-518
    • /
    • 2012
  • In this paper, we propose a complexity-based parallelization method of the sample adaptive offset (SAO) algorithm which is one of HEVC in-loop filters. The SAO algorithm can be regarded as region-based process and the regions are obtained and represented with a quad-tree scheme. A offset to minimize a reconstruction error is sent for each partitioned region. The SAO of the HEVC can be parallelized in data-level. However, because the sizes and complexities of the SAO regions are not regular, workload imbalance occurs with multi-core platform. In this paper, we propose a LCU-based SAO algorithm and a complexity prediction algorithm for each LCU. With the proposed complexity-based LCU processing, we found that the proposed algorithm is faster than the sequential implementation by a factor of 2.38 times. In addition, the proposed algorithm is faster than regular parallel implementation SAO by 21%.

Segmentation of tooth using Adaptive Optimal Thresholding and B-spline Fitting in CT image slices (적응 최적 임계화와 B-spline 적합을 사용한 CT영상열내 치아 분할)

  • Heo, Hoon;Chae, Ok-Sam
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.41 no.4
    • /
    • pp.51-61
    • /
    • 2004
  • In the dental field, the 3D tooth model in which each tooth can be manipulated individually is an essential component for the simulation of orthodontic surgery and treatment. To reconstruct such a tooth model from CT slices, we need to define the accurate boundary of each tooth from CT slices. However, the global threshold method, which is commonly used in most existing 3D reconstruction systems, is not effective for the tooth segmentation in the CT image. In tooth CT slices, some teeth touch with other teeth and some are located inside of alveolar bone whose intensity is similar to that of teeth. In this paper, we propose an image segmentation algorithm based on B-spline curve fitting to produce smooth tooth regions from such CT slices. The proposed algorithm prevents the malfitting problem of the B-spline algorithm by providing accurate initial tooth boundary for the fitting process. This paper proposes an optimal threshold scheme using the intensity and shape information passed by previous slice for the initial boundary generation and an efficient B-spline fitting method based on genetic algorithm. The test result shows that the proposed method detects contour of the individual tooth successfully and can produce a smooth and accurate 3D tooth model for the simulation of orthodontic surgery and treatment.

Ciphering Scheme and Hardware Implementation for MPEG-based Image/Video Security (DCT-기반 영상/비디오 보안을 위한 암호화 기법 및 하드웨어 구현)

  • Park Sung-Ho;Choi Hyun-Jun;Seo Young-Ho;Kim Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.2 s.302
    • /
    • pp.27-36
    • /
    • 2005
  • This thesis proposed an effective encryption method for the DCT-based image/video contents and made it possible to operate in a high speed by implementing it as an optimized hardware. By considering the increase in the amount of the calculation in the image/video compression, reconstruction and encryption, an partial encryption was performed, in which only the important information (DC and DPCM coefficients) were selected as the data to be encrypted. As the result, the encryption cost decreased when all the original image was encrypted. As the encryption algorithm one of the multi-mode AES, DES, or SEED can be used. The proposed encryption method was implemented in software to be experimented with TM-5 for about 1,000 test images. From the result, it was verified that to induce the original image from the encrypted one is not possible. At that situation, the decrease in compression ratio was only $1.6\%$. The hardware encryption system implemented in Verilog-HDL was synthesized to find the gate-level circuit in the SynopsysTM design compiler with the Hynix $0.25{\mu}m$ CMOS Phantom-cell library. Timing simulation was performed by Verilog-XL from CadenceTM, which resulted in the stable operation in the frequency above 100MHz. Accordingly, the proposed encryption method and the implemented hardware are expected to be effectively used as a good solution for the end-to-end security which is considered as one of the important problems.

Changing Face of the British Social Housing Policy - Under the Conservative Government, 1979-1997 (영국 사회주택정책의 변화 연구 - 보수당 집권기간(1979-1997)을 중심으로 -)

  • Lee, Young-Hwan
    • Korean Journal of Social Welfare
    • /
    • v.35
    • /
    • pp.289-317
    • /
    • 1998
  • This study aims to review and evaluate the changes of the British social housing policy under the Conservative government(1979-1997), and to get some implications for the Korean case. The Conservatives tried to diminish the role of state in the realm of social welfare :in general, and to retreat the social housing policy in particular as a reaction to the' welfare state crisis' started from the early 1970s. In the realm of housing policy, privatisation and marketisation including the massive sale of council houses were driven enthusiastically. Public expenditure cut and redirection of the housing subsidy scheme were also implemented according to the changed policy orientation. The clear visible results of the policy changes can be seen as follows; radical changes of the housing tenure distribution, changing role of local authorities, and the worsening housing problems- housing shortages, residualisation, affordability problem, deepening dependency and the negative distribution of housing subsidy etc. Furthermore the goal of public expenditure cut, in fact, was not accomplished successfully. The results of this study support the argument that the Neo-liberalistic approach to the 'welfare state crisis' have resulted in reconstruction and redirection rather than total abolition of the role of state in welfare provision. This conclusion could provide important implications to Korean case, especially concerning the role of state in the social housing policy.

  • PDF