• Title/Summary/Keyword: 계층 알고리즘

Search Result 1,086, Processing Time 0.027 seconds

3D Automatic Skeleton Extraction of Coronary Artery for Interactive Shape Analysis (관상동맥의 인터랙티브 형상 분석을 위한 3차원 골격의 자동 생성)

  • Lee, Jae-Jin;Kim, Jeong-Sik;Choi, Soo-Mi
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.541-546
    • /
    • 2006
  • 3차원 관상동맥을 분석하기 위해서는 혈관의 분기점, 극단점, 혈관의 계층적 구조 관계를 함축적으로 표현하는 것이 매우 중요하다. 본 논문에서는3차원 CT 혈관 조영 영상으로부터 관상동맥의 3차원 골격을 자동으로 추출하는 방법을 개발하였다. 먼저, CT혈관 조영술에 의해 획득된 슬라이스 이미지로부터 3차원 조작 및 수술 시뮬레이션 등을 위하여 혈관의 3차원 표면에 대한 메쉬 모델을 생성한다. 생성된 메쉬 모델이 임의로 변형된 후에도 자동으로 골격을 쉽게 추출할 수 있도록 메쉬 모델을 복셀화하는 단계를 거친다. 이렇게 얻어진 복셀 모델로부터 표면복셀을 결정하고 표면 복셀로부터 객체 복셀까지의 유클리드 거리값를 계산하여 유클리드 거리맵(EDM)을 계산한다. 계산된 EDM 으로부터 객체 복셀이 가지게 되는 최대 내접 구를 계산하여 Discrete Medial Surface을 생성하게 되는데 이것은 골격의 후보가 된다. 골격의 후보집합 복셀에 대하여 Dijkstra 최단 경로 결정 알고리즘을 적용하여 골격을 자동으로 추출하게 된다. 이렇게 추출된 3차원 골격은 관상동맥 수술 시뮬레이션 등의 다양한 형상 분석에 유용하게 사용될 수 있다.

  • PDF

Noise-tolerant Image Restoration with Similarity-learned Fuzzy Association Memory

  • Park, Choong Shik
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.51-55
    • /
    • 2020
  • In this paper, an improved FAM is proposed by adopting similarity learning in the existing FAM (Fuzzy Associative Memory) used in image restoration. Image restoration refers to the recovery of the latent clean image from its noise-corrupted version. In serious application like face recognition, this process should be noise-tolerant, robust, fast, and scalable. The existing FAM is a simple single layered neural network that can be applied to this domain with its robust fuzzy control but has low capacity problem in real world applications. That similarity measure is implied to the connection strength of the FAM structure to minimize the root mean square error between the recovered and the original image. The efficacy of the proposed algorithm is verified with significant low error magnitude from random noise in our experiment.

Performance Evaluation of Interference Alignment Technique in Wireless LAN Environment (무선랜 환경에서 간섭정렬 기술의 성능 평가)

  • Yoon, Seokhyun;Shin, Won-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.41 no.11
    • /
    • pp.1639-1644
    • /
    • 2016
  • In this paper, we consider the performance improvement that can be obtained with interference alignment (IA) technique applied to 802.11ac based multi-BSS WiFi service. To this end, we developed a system simulator consisting of a link-level PHY simulator, based on 802.11ac specification, and multi-BSS proportional-fair scheduler. Specifically, assuming perfect channel side information and synchronization of signals from multiple APs, we used a SLNR based interference alignment algorithm proposed in [13] and compared its performance with that of multiuser beamforming based time-sharing system. The performance was evaluated in terms of average throughput per BSS and 5% worst user throughput. The results show that 70 to 100% throughput gain can be obtained in this ideal scenario.

Ring Embedding in (n.K) Star Graphs with Faulty Nodes (결함 노드를 갖는 (n,K)-스타 그래프에서의 링 임베딩)

  • Chang, Jung-Hwan;Kim, Jin-Soo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.1
    • /
    • pp.22-34
    • /
    • 2002
  • In this paper, we consider ring embeding problem in faulty (n,k) star graphs which is recently proposed as an alternative interconnection network topology, By effectively utilizing such strategies as series of dimension expansions and even distribution of faulty nodes into sub-stars in graph itself. we prove that it is possible to construct a maximal fault-free ring excluding only faulty nodes when the number of faults is no more than n-3 and $n-k{\geq}2$, and also propose an algorithm which can embed the corresponding ring in (n.k)-star graphs This results will be applied into the multicasting applications that the underlying cycle properties on the multi-computer system.

Integrated Method Based on Rough Sets for Knowledge Discovery (지식 발견을 위한 라프셋 중심의 통합 방법 연구)

  • Chung, Hong;Chung, Hwan-Mook
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.8 no.6
    • /
    • pp.27-36
    • /
    • 1998
  • This paper suggests an integrated method based on rough sets for discovering useful knowledge from a large databse. Our approach applies attribute-oriented concept hierarchy ascension technique to extract generalized data from actual data in database, induction of decision trees to measure the information gain, and knowledge reduction method of rough set theory to remove superfluous attributes and attribute values. The integrated algorithm first reduces the size of database through the concept generalization, reduces the number of attributes by means of eliminating condition attributes which have little influence on decision attribute, and finally induces simplified decision rules by removing the superfluous attribute values by analyzing the dependency relationships among the attributes.

  • PDF

Object Tracking Using Information Fusion (정보융합을 이용한 객체 추적)

  • Lee, Jin-Hyung;Jo, Seong-Won;Kim, Jae-Min;Chung, Sun-Tae
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.18 no.5
    • /
    • pp.666-671
    • /
    • 2008
  • In this paper, we propose a new method for tracking objects continously and successively based on fusion of region information, color information and motion template when multiple objects are occluded and splitted. For each frame, color template is updated and compared with the present object. The predicted region, dynamic template and color histogram are used to classify the objects. The vertical histogram of the silhouettes is analyzed to determine whether or not the foreground region contains multiple objects. The proposed method can recognize more correctly the objects to be tracked.

A New Low-Skew Clock Network Design Method (새로운 낮은 스큐의 클락 분배망 설계 방법)

  • 이성철;신현철
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.41 no.5
    • /
    • pp.43-50
    • /
    • 2004
  • The clock skew is one of the major constraints for high-speed operation of synchronous integrated circuits. In this paper, we propose a hierarchical partitioning based clock network design algorithm called Advanced Clock Tree Generation (ACTG). Especially new effective partitioning and refinement techniques have been developed in which the capacitance and edge length to each sink are considered from the early stage of clock design. Hierarchical structures obtained by parhtioning and refinement are utilized for balanced clock routing. We use zero skew routing in which Elmore delay model is used to estimate the delay. An overlap avoidance routing algorithm for clock tree generation is proposed. Experimental results show significant improvement over conventional methods.

Design and Implementation of Outer Join for the ODYSSEUS Object-Relational DBMS (오디세우스 객체관계형 DBMSffm 위한 외부 조인의 설계 및 구현)

  • Kim, In-Joong;Lee, Ki-Hoon;Whang, Kyu-Young
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.10c
    • /
    • pp.149-153
    • /
    • 2006
  • 외부 조인은 조인에 참여하는 릴레이션들에서 조인 조건을 만족하지 않는 한쪽 또는 양쪽 튜플들도 결과로 반환하는 조인 연산으로 OLAP 질의 처리, 계층적 뷰 처리, 중첩 질의 처리 등의 다양한 고급 데이타베이스 응용에서 널리 사용된다. 많은 상용 DBMS에서 외부 조인을 지원하고 있으나, 상세한 구현 방법은 공개되어 있지 않다. 본 논문에서는 한국과학기술원 멀티미디어 및 데이타베이스 연구실에서 개발하고 있는 오디세우스 객체관계형 DBMS를 위한 외부 조인을 설계하고 구현한다. 본 논문에서는 거의 모든 DBMS에서 제공 되는 가장 기본적인 조인 방법인 중첩 루프 조인 알고리즘을 확장하여 외부 조인 연산을 구현한다. 그리고, 외부 조인이 포함된 질의를 최적화하기 위해 조인 연산의 결과를 임시 릴레이션에 저장하는 대신에 다음 조인 연산의 입력으로 파이프라이닝시키는 것을 최대화 하는 방법을 제안한다.

  • PDF

High Throughput Parallel KMP Algorithm Considering CPU-GPU Memory Hierarchy (CPU-GPU 메모리 계층을 고려한 고처리율 병렬 KMP 알고리즘)

  • Park, Soeun;Kim, Daehee;Lee, Myungho;Park, Neungsoo
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.67 no.5
    • /
    • pp.656-662
    • /
    • 2018
  • Pattern matching algorithm is widely used in many application fields such as bio-informatics, intrusion detection, etc. Among many string matching algorithms, KMP (Knuth-Morris-Pratt) algorithm is commonly used because of its fast execution time when using large texts. However, the processing speed of KMP algorithm is also limited when the text size increases significantly. In this paper, we propose a high throughput parallel KMP algorithm considering CPU-GPU memory hierarchy based on OpenCL in GPGPU (General Purpose computing on Graphic Processing Unit). We focus on the optimization for the allocation of work-times and work-groups, the local memory copy of the pattern data and the failure table, and the overlapping of the data transfer with the string matching operations. The experimental results show that the execution time of the optimized parallel KMP algorithm is about 3.6 times faster than that of the non-optimized parallel KMP algorithm.

Hierarchical Authentication Algorithm Using Curvature Based Fiducial Point Extraction of ECG Signals (곡률기반 기준점 검출을 이용한 계층적 심전도 신호 개인인증 알고리즘)

  • Kim, Jungjoon;Lee, SeungMin;Ryu, Gang-Soo;Lee, Jong-Hak;Park, Kil-Houm
    • Journal of Korea Multimedia Society
    • /
    • v.20 no.3
    • /
    • pp.465-473
    • /
    • 2017
  • Electrocardiogram(ECG) signal is one of the unique bio-signals of individuals and is used for personal authentication. The existing studies on personal authentication method using ECG signals show a high detection rate for a small group of candidates, but a low detection rate and increased execution time for a large group of candidates. In this paper, we propose a hierarchical algorithm that extracts fiducial points based on curvature of ECG signals as feature values for grouping candidates ​and identifies candidates using waveform-based comparisons. As a result of experiments on 74 ECG signal records of QT-DB provided by Physionet, the detection rate was about 97% at 3-heartbeat input and about 99% at 5-heartbeat input. The average execution time was 22.4 milliseconds. In conclusion, the proposed method improves the detection rate by the hierarchical personal authentication process, and also shows reduced amount of computation which is plausible in real-time personal authentication usage in the future.