• Title/Summary/Keyword: 갱신과정

Search Result 406, Processing Time 0.025 seconds

Collaborative Local Active Appearance Models for Illuminated Face Images (조명얼굴 영상을 위한 협력적 지역 능동표현 모델)

  • Yang, Jun-Young;Ko, Jae-Pil;Byun, Hye-Ran
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.10
    • /
    • pp.816-824
    • /
    • 2009
  • In the face space, face images due to illumination and pose variations have a nonlinear distribution. Active Appearance Models (AAM) based on the linear model have limits to the nonlinear distribution of face images. In this paper, we assume that a few clusters of face images are given; we build local AAMs according to the clusters of face images, and then select a proper AAM model during the fitting phase. To solve the problem of updating fitting parameters among the models due to the model changing, we propose to build in advance relationships among the clusters in the parameter space from the training images. In addition, we suggest a gradual model changing to reduce improper model selections due to serious fitting failures. In our experiment, we apply the proposed model to Yale Face Database B and compare it with the previous method. The proposed method demonstrated successful fitting results with strongly illuminated face images of deep shadows.

환경분야를 위한 공간정보 분석 기술의 동향과 전망 - 지구통계학을 중심으로

  • Park, No-Uk
    • Proceedings of the Korean Association of Geographic Inforamtion Studies Conference
    • /
    • 2010.06a
    • /
    • pp.187-187
    • /
    • 2010
  • 공간자료를 다루는 일반적인 과정은 연구자의 정의에 따라 달라질 수 있지만, 일반적으로 자료 수집, 자료 구축, 분석 및 결과 도출의 일반적인 과학/공학적 분석 절차와 유사하다. 산업체의 관점에서 볼 때, 1990년대 초기 국가GIS 사업이 시작될때부터 현재까지는 공인된 자료 구축에 많은 주안점을 두어서 기존 아날로그 자료의 디지털화, 자료 가공, 데이터베이스 구축, 자료의 시각화 등의 일반적인 자료 구축 및 도시에 주안점을 두어왔다. 또한 다양한 공간해상도의 원격탐사 자료와 같이 다중 근원 자료의 이용이 빈번해짐에 따라 공간자료의 갱신 또한 중요한 부분을 차지하고 있다. 그러나, 공간자료를 다루는 일련의 과정이 궁극적으로는 특정 분야에서의 의사 결정보조자료의 제공 등을 지향한다고 간주할 때, "from data to information to knowledge"의 중간 혹은 최종 단계의 결과물을 산출하기 위한 적절한 분석 기술의 개발 및 적용 또한 중요한 부분을 차지한다. 공간분석을 별도의 학문분야로 간주하느냐 아니냐의 문제와는 상관없이, 최근 20년간 공간분석은 GIS 및 원격탐사 분야뿐만 아니라 기본적으로 공간자료를 다루는 많은 응용분야에서 공간자료의 이해와 부가정보의 생산을 위한 중요한 기술 분야로 간주되어 왔다. 공간분석의 여러 응용 분야중에서 환경분야에의 적용 연구는 또한 환경과학이라는 별도의 분야 뿐만 아니라, 기존 학문들인 지리학, 생태학, 지구과학, 사회학, 경제학, 도시 계획 등의 하위분야에서 중요한 방법론으로 자리 잡고 있다. 이 기술 세미나에서는 환경분야에 직간접적으로 활용이 가능한 공간정보 분석 기술의 동향을 지구통계학을 중심으로 소개하고자 한다. 국내에서 크리깅으로 대표되어온 지구통계학은 적용하는 학문 분야에 따라 보다 넓은 의미를 가지는 공간 통계학이라는 용어로 사용되고 있지만, 보다 학문적/기술적 의미로 살펴보면 공간분석의 특화된 분야로 간주할 수 있다. 1950년대 알려진 광상의 위치 정보를 이용하여 은둔 광상의 위치를 추정하기 위해 기본 개념이 소개된 이후에 수학적으로 이론이 1960년대 정립된 지구통계학은 많은 발전을 이루어 현재 다양한 분야에서 적용되고 있다. 그러나 외국과 달리 국내에서는 크리깅을 고급 내삽 기법으로만 간주하여 단순 주제도 작성에 제한적으로 사용하고 있다. 이 기술 세미나에서는 특정 학문분야에서 적용되기 보다는 일반적으로 통용될 수 있는 지구통계학의 기본 개념을 우선 소개한 후에, 국내외 학계에서의 환경주제도 제작과 관련된 주요 응용분야를 소개하고자 한다. 이후에 지구통계학이 적용될 수 있으면서, 다학제적 관점에서의 이슈가 될 수 있는 분야를 제시하고자 한다.

  • PDF

A study on construction simulation of road tunnel using Decision Aids for Tunneling (DAT) (터널의사결정체계 (DAT)를 이용한 도로터널의 시공 시뮬레이션 연구)

  • Min, Sangyoon;Kim, Taek Kon;Einstein, H.H.;Lee, Jun S.;Kim, Ho Young
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.5 no.2
    • /
    • pp.161-174
    • /
    • 2003
  • Applicability of the Decision Aids for Tunneling (DAT) technique is investigated in this study to better understand the efficiency of the decision making process during tunnel construction. For this, a traffic tunnel under construction is adopted and information on the construction procedure, i.e., overall geology, unit cost and construction time for each excavation process, is provided periodically. Various scattergrams in which cost-time simulation results are plotted are obtained according to the simulation methods and final prediction on the construction time/cost is made. It is found that the uncertainty in the cost distribution is greater than the uncertainty in the time distribution for each cycle simulation and the uncertainties in time and cost for the one time simulations are comparable. Future work will be concentrated on the updating scheme using the face mapping data and various parametric studies will also be performed.

  • PDF

Design of an Efficient Binary Arithmetic Encoder for H.264/AVC (H.264/AVC를 위한 효율적인 이진 산술 부호화기 설계)

  • Moon, Jeon-Hak;Kim, Yoon-Sup;Lee, Seong-Soo
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.46 no.12
    • /
    • pp.66-72
    • /
    • 2009
  • This paper proposes an efficient binary arithmetic encoder for CABAC which is used one of the entropy coding methods for H.264/AVC. The present binary arithmetic encoding algorithm requires huge complexity of operation and data dependency of each step, which is difficult to be operated in fast. Therefore, renormalization exploits 2-stage pipeline architecture for efficient process of operation, which reduces huge complexity of operation and data dependency. Context model updater is implemented by using a simple expression instead of transIdxMPS table and merging transIdxLPS and rangeTabLPS tables, which decreases hardware size. Arithmetic calculator consists of regular mode, bypass mode and termination mode for appearance probability of binary value. It can operate in maximum speed. The proposed binary arithmetic encoder has 7282 gate counts in 0.18um standard cell library. And input symbol per cycle is about 1.

Autonomous Self-Estimation of Vehicle Travel Times in VANET Environment (VANET 환경에서 자율적 자가추정(Self-Estimation) 통행시간정보 산출기법 개발)

  • Im, Hui-Seop;O, Cheol;Gang, Gyeong-Pyo
    • Journal of Korean Society of Transportation
    • /
    • v.28 no.4
    • /
    • pp.107-118
    • /
    • 2010
  • Wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-infrastructure (V2I) enable the development of more sophisticated and effective traffic information systems. This study presents a method to estimate vehicular travel times in a vehicular ad hoc network (VANET) environment. A novel feature of the proposed method is estimating individual vehicle travel times through advanced on-board units in each vehicle, referred to as self-estimated travel time in this study. The method uses travel information including vehicle position and speed at each given time step transmitted through the V2V and V2I communications. Vehicle trajectory data obtained from the VISSIM simulator is used for evaluating the accuracy of estimated travel times. Relevant technical issues for successful field implementation are also discussed.

Search Tree Generation for Efficient Management of Business Process Repository in e-commerce Delivery Exception Handling (전자상거래 배송업무의 예외처리용 프로세스 저장소의 효과적 관리를 위한 검색트리 생성)

  • Choi, Doug-Won;Shin, Jin-Gyu
    • Journal of Intelligence and Information Systems
    • /
    • v.14 no.4
    • /
    • pp.147-160
    • /
    • 2008
  • BPMS(business process management system) facilitates defining new processes or updating existing processes. However, processing of exceptional or nonroutine task requires the intervention of domain experts or introduction of the situation specific resolution process. This paper assumes sufficient amount of business process exception handling cases are stored in the process repository. Since the retrieval of the best exception handling process requires a good understanding about the exceptional situation, context awareness is an important issue. To facilitate the understanding of exceptional situation and to enable the efficient selection of the best exception handling process, we adopted the 'situation variable' and 'decision variable' construct. A case example for exception handling in the e-commerce delivery process is provided to illustrate how the proposed construct works. Application of the C5.0 algorithm guarantees the construction of an optimum search tree. It also implies that an efficient search path has been identified for the context aware selection of the best exception handling process.

  • PDF

Design and Implementation of on XML Data Encryption System considering Validation (유효성을 고려한 XML 데이타 암호화 시스템의 설계 및 구현)

  • 남궁영환;박대하;허승호;백두권
    • Journal of KIISE:Databases
    • /
    • v.29 no.6
    • /
    • pp.417-428
    • /
    • 2002
  • XML(extensible Markup Language) is effective to information retrieval and sharing but has defects related to the data security. And, as a solution of this problem, the current XML security researches such as XML digital signature, XML data encryption, and XML access control exclude the validation property of XML document. The validation of XML should be considered for the secure information sharing in the XML-based environment. In this paper, we design and implement the system to support both security and validation to XML document. Our system performs data encryption and maintenance of valid status of XML document by referencing new XML schema namespace. In addition, it also provides the XML schema security function through the XML schema digital signature. During generating XML schema digital signature, DOMHash method which has the advantage of the faster speed than canonical XML method is applied to XML schema. In conclusion, our system shows the improved functions in flexibility, scalability, and reliability compared with the existing XML security researches.

An Internet Gateway Based Link State Routing for Infrastructure-Based Mobile Ad Hoc Networks (인프라구조 기반의 이동 애드혹 네트워크를 위한 인터넷 게이트웨이 중심의 링크상태 라우팅 프로토콜)

  • Lee, Sung Uk;Ngo, Chi-Trung;Han, Trung-Dinh;Kim, Je-Wook;Oh, Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.10
    • /
    • pp.859-876
    • /
    • 2012
  • Since the existing protocols separated mobility management part and routing protocol part in their design and used a flooding, they suffer from the high control overhead, thereby limiting performance. In this paper, we use a tree-based mobility management method and present a simple and efficient routing protocol that exploits the topology information which is built additionally through mobility management. Thus, the mobility management and the routing protocol closely cooperate to optimize control overhead. Furthermore, we use a progressive path discovery method to alleviate traffic congestion around IG and a unicast-based broadcast method to increase the reliability of message delivery and to judge link validity promptly. The proposed protocol reduces control overhead greatly and works in a stable manner even with the large number of nodes and high mobility. This was proven by comparing with the AODV protocol that employs the hybrid mobility management protocol.

A Weighted Fuzzy Min-Max Neural Network for Pattern Classification (패턴 분류 문제에서 가중치를 고려한 퍼지 최대-최소 신경망)

  • Kim Ho-Joon;Park Hyun-Jung
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.8
    • /
    • pp.692-702
    • /
    • 2006
  • In this study, a weighted fuzzy min-max (WFMM) neural network model for pattern classification is proposed. The model has a modified structure of FMM neural network in which the weight concept is added to represent the frequency factor of feature values in a learning data set. First we present in this paper a new activation function of the network which is defined as a hyperbox membership function. Then we introduce a new learning algorithm for the model that consists of three kinds of processes: hyperbox creation/expansion, hyperbox overlap test, and hyperbox contraction. A weight adaptation rule considering the frequency factors is defined for the learning process. Finally we describe a feature analysis technique using the proposed model. Four kinds of relevance factors among feature values, feature types, hyperboxes and patterns classes are proposed to analyze relative importance of each feature in a given problem. Two types of practical applications, Fisher's Iris data and Cleveland medical data, have been used for the experiments. Through the experimental results, the effectiveness of the proposed method is discussed.

Design of MBB System for provide Mobility continuity in Environment IPSec (IPSec 환경에서 연속적인 이동성 제공을 위한 MBB 시스템 설계)

  • Kim, Seon-Young;Jo, In-June
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.3
    • /
    • pp.478-484
    • /
    • 2008
  • When a mobile node moves, MIPv6 operates an authentication process for the new connection. These kinds of frequent binding update and authentication processes cause much traffic and delay the service. To solve this problem, PMIPv6 provides a network-based mobility protocol in order to lessen the load on a mobile node. However, when it is moved from a domain to a domain or in a domain, there still lies a need fDr a new address, so MIPv6's demerit still exists. In IPsec, too, a new negotiation should be made when it is moved to WAN(Wide Area Network). This causes load to the mobile node. In this paper suggests MBB(Make Before Break) system to eliminate disconnections or delays resulted from the address change or renegotiation for security. When the mobile node receives a CoA address, IPsec negotiation gets operated. Its identity is authenticated by sending the identifier used for the prior negotiation to CN(Correspondent Node) through the BID message suggested. After that, negotiation Bets simplified that disconnections can be eliminated, and in the IPsec negotiation, the load on the mobile node can be lessened as well; moreover, two addresses are used for the communication simultaneously, so the probability of packet loss can be reduced.