• Title/Summary/Keyword: threshold approach

Search Result 511, Processing Time 0.033 seconds

Image Be-noising Using Lifting Scheme (Lifting Scheme을 이용한 이미지 잡음 제거)

  • Park, Young-Seok;Kwak, Hoon-Sung
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1731-1734
    • /
    • 2003
  • In this paper, we describe an approach for image denoising using the lifting construction, with the spatial adaptive wavelet transform. The adaptive lifting scheme is implemented in spatial domain to be adjusted thresholds to reduce noise. In this approach we represent adaptive characteristics of biorthogonal wavelets for choosing predictors effectively. Predict filter is changed from sample to sample according to local signal features with their vanishing moments. We in this approach have implemented and applied to image denoising by finding a relevant minimax threshold. Experimental results show that the adaptive method of denoising process is compared with existing ones, such as non-adaptive wavelet, CRF(13, 7) and SWE(13, 7) wavelets used by JPEG2000.

  • PDF

A Structural Representation of Handwritings for Automatic On-line Signature Verification (온라인 서명 검증을 위한 필기의 구조적 표현)

  • Kim, Seong-Hoon
    • Journal of the Korea Society for Simulation
    • /
    • v.14 no.3
    • /
    • pp.147-154
    • /
    • 2005
  • In conventional approaches such as a functinal approach or a parametric approach to online signature verification, which could not deal with the local shape of signature, much various important informations inherent in the local part of signature shape have been overlooked. In this paper, we try a structural approach in which a signature is represented as a structural form of handwriting primitives and the local parts along a signature handwriting can be selectively compared according to their discrimination power in the process of signature verification, As a result, the error rate is diminished in the case that the weights of subpattern units is applied into comparing process, which is the degree of discrimination power of local part. And also, the global variation and complexity of each signature extracted from the analysis of local shape is found useful in determining the decision threshold more precisely.

  • PDF

Influence of fluidelastic vibration frequency on predicting damping controlled instability using a quasi-steady model in a normal triangular tube array

  • Petr Eret
    • Nuclear Engineering and Technology
    • /
    • v.56 no.4
    • /
    • pp.1454-1459
    • /
    • 2024
  • Researchers have applied theoretical and CFD models for years to analyze the fluidelastic instability (FEI) of tube arrays in steam generators and other heat exchangers. The accuracy of each approach has typically been evaluated using the discrepancy between the experimental critical flow velocity and the predicted value. In the best cases, the predicted critical flow velocity was within an order of magnitude comparable to the measured one. This paper revisits the quasi-steady approach for damping controlled FEI in a normal triangular array with a pitch ratio of P/d = 1.375. The method addresses the fluidelastic frequency at the stability threshold as an input parameter for the approach. The excellent agreement between the estimated stability thresholds and the equivalent experimental results suggests that the fluidelastic frequency must be included in the quasi-steady analysis, which requires minimal computing time and experimental data. In addition, the model allows a simple time delay analysis regarding flow convective and viscous effects.

Differential Authentication Scheme for Electric Charging System through Light Gradient Boosting Machine

  • Byung-Hyun Lim;Ismatov, Akobir;Ki-Il Kim
    • Journal of information and communication convergence engineering
    • /
    • v.22 no.3
    • /
    • pp.199-206
    • /
    • 2024
  • The network security of Plug-and-Charge (PnC) technology in electric vehicle charging systems is typically achieved through the well-known Transport Layer Security (TLS) protocol, which causes high communication overhead. To reduce this overhead, a differential authentication method employing different schemes for individual users has been proposed. However, decisions use a simple threshold approach and no quantitative performance evaluation should be made. In this study, we determined each user's trust using several machine learning algorithms with their charging patterns and compared them. The experimental results reveal that the proposed approach outperforms the conventional approach by 41.36% in terms of round-trip time efficiency, demonstrating its effectiveness in reducing the TLS overhead. In addition, we show the simulation results for three user authentication methods and capture the performance variations under CPU busy waiting scenarios.

Binary Mask Estimation using Training-based SNR Estimation for Improving Speech Intelligibility (음성 명료도 향상을 위한 학습 기반의 신호 대 잡음 비 추정을 이용한 이산 마스크 추정 방법)

  • Kim, Gibak
    • Journal of Broadcast Engineering
    • /
    • v.17 no.6
    • /
    • pp.1061-1068
    • /
    • 2012
  • This paper deals with a noise reduction algorithm which uses the binary masking approach in the time-frequency domain to improve speech intelligibility. In the binary masking approach, the noise-corrupted speech is decomposed into time-frequency units. Noise-dominant time-frequency units are removed by setting the corresponding binary masks as "0"s and target-dominant units are retained untouched by assigning mask "1"s. We propose a binary mask estimation by comparing the local signal-to-noise ratio (SNR) to a threshold. The local SNR is estimated by a training-based approach. An optimal threshold is proposed, which is obtained from observing the distribution of the training database. The proposed method is evaluated by normal-hearing subjects and the intelligibility scores are computed by counting the number of words correctly recognized.

Extreme Value Analysis of Statistically Independent Stochastic Variables

  • Choi, Yongho;Yeon, Seong Mo;Kim, Hyunjoe;Lee, Dongyeon
    • Journal of Ocean Engineering and Technology
    • /
    • v.33 no.3
    • /
    • pp.222-228
    • /
    • 2019
  • An extreme value analysis (EVA) is essential to obtain a design value for highly nonlinear variables such as long-term environmental data for wind and waves, and slamming or sloshing impact pressures. According to the extreme value theory (EVT), the extreme value distribution is derived by multiplying the initial cumulative distribution functions for independent and identically distributed (IID) random variables. However, in the position mooring of DNVGL, the sampled global maxima of the mooring line tension are assumed to be IID stochastic variables without checking their independence. The ITTC Recommended Procedures and Guidelines for Sloshing Model Tests never deal with the independence of the sampling data. Hence, a design value estimated without the IID check would be under- or over-estimated because of considering observations far away from a Weibull or generalized Pareto distribution (GPD) as outliers. In this study, the IID sampling data are first checked in an EVA. With no IID random variables, an automatic resampling scheme is recommended using the block maxima approach for a generalized extreme value (GEV) distribution and peaks-over-threshold (POT) approach for a GPD. A partial autocorrelation function (PACF) is used to check the IID variables. In this study, only one 5 h sample of sloshing test results was used for a feasibility study of the resampling IID variables approach. Based on this study, the resampling IID variables may reduce the number of outliers, and the statistically more appropriate design value could be achieved with independent samples.

An Interactive Multi-criteria Group Decision Making with the Minimum Distance Measure (최소 거리척도를 이용한 대화형 다기준 그룹 의사결정)

  • Cho, Namwoong;Kim, Jaehee;Kim, Sheung-Kown
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.32 no.1
    • /
    • pp.42-50
    • /
    • 2006
  • The multi-criteria group decision making (MCGDM) problem is to determine the best compromise solution in a set of competing alternatives that are evaluated under conflicting criteria by decision maker (DM)s. In this paper, we propose a mixed-integer programming (MIP) model to solve MCGDM. The existing method based on minimizing a distance measure such as Median Approach can not guarantee the best compromise solution because the element of median point vector is defined with respect to each criteria separately. However, by considering all criteria simultaneously, we generate median point that is better for locating the best compromise solution. We also utilize the concept of spatial dispersion index (SDI) to produce a threshold value, which is used as a guideline to choose either the Utopian Approach or the Median Approach. And we suggest using CBITP (Convex hull of individual maxima Based Interactive Tchebycheff Procedure) to provide DMs with various Pareto-optimal solutions so that DMs have broad range of selection.

New Approach for the Efficient Sensor Deployment in Sensor Networks (센서 네트워크에서 효율적인 센서 배치 문제의 새로운 접근 방향)

  • Lee, Cheol-Ki;Lee, Seung-Hak;Yoon, Hyun-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2007.06d
    • /
    • pp.551-554
    • /
    • 2007
  • We propose the new approach for the efficient sensor deployment in sensor networks. In the existing works, they use the approach that guarantee the sensing ability T for any point in the sensor field. However, if the shape of the sensor field is changed or it is composed of the sections that have different importance each other, the previous approach is not efficient. So, in this work, we propose the approach that maximize the average sensing ability and it's necessity.

  • PDF

Energy-factor-based damage-control evaluation of steel MRF systems with fuses

  • Ke, Ke;Yam, Michael C.H.
    • Steel and Composite Structures
    • /
    • v.22 no.3
    • /
    • pp.589-611
    • /
    • 2016
  • The primary objectives of this research are to investigate the energy factor response of steel moment resisting frame (MRF) systems equipped with fuses subject to ground motions and to develop an energy-based evaluation approach for evaluating the damage-control behavior of the system. First, the energy factor of steel MRF systems with fuses below the resilience threshold is derived utilizing the energy balance equation considering bilinear oscillators with significant post-yielding stiffness ratio, and the effect of structural nonlinearity on the energy factor is investigated by conducting a parametric study covering a wide range of parameters. A practical transformation approach is also proposed to associate the energy factor of steel MRF systems with fuses with classic design spectra based on elasto-plastic systems. Then, the energy balance is extended to structural systems, and an energy-based procedure for damage-control evaluation is proposed and a damage-control index is also derived. The approach is then applied to two types of steel MRF systems with fuses to explore the applicability for quantifying the damage-control behavior. The rationality of the proposed approach and the accuracy for identifying the damage-control behavior are demonstrated by nonlinear static analyses and incremental dynamic analyses utilizing prototype structures.

Study for Determination of Management Thresholds of Bridge Structural Health Monitoring System based on Probabilistic Method (확률론적 방법에 의한 교량계측시스템의 관리기준치 설정에 관한 연구)

  • Kim, Haeng-Bae;Song, Jae-Ho
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.20 no.3
    • /
    • pp.103-110
    • /
    • 2016
  • Recently, structural health monitoring system(SHMS) has been appled cable bridges as the effective maintenance tool and the management threshold is considered to assess the status of the bridge in SHMS. The threshold is generally determined by the allowable limit based on design specification because there is no method and standard for threshold calculation. In case of the conventional thresholds, it is difficult to recognize the event, abnormal behavior and gradual damage within the threshold. Therefore, this study reviewed the problem of previous methods and proposed the advanced methodologies based on probabilistic approach for threshold calculation which can be applied to practice work. Gumbel distribution is adopted in order to calculate the threshold for caution and warning states considering the expectations for return periods of 50 and 100 years. The thresholds were individually determined for measurement data and data variation to detect the various abnormal behaviors within allowable range. Finally, it has confirmed that the thresholds by the proposed method is detectable the abnormal behavior of real-time measuring data from SHMS.