• Title/Summary/Keyword: 공간 복잡도

Search Result 1,901, Processing Time 0.027 seconds

Suboptimal Receiver Combining Adaptive Array Antenna and Orthogonal Decision-Feedback Detector (적응 배열 안테나에 부귀환 직교 다중사용자 검출기를 결합한 준 최적 수신기)

  • Jo, Yeong-Pil;Kim, Jong-Mun;Gwak, Gyeong-Seop
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.39 no.8
    • /
    • pp.26-32
    • /
    • 2002
  • In this paper, we propose a suboptimal receiver combining adaptive array antenna and orthogonal decision-feedback detector in DS/CDMA system. Adaptive way antenna can cancel out undesired signal using beamforming scheme. However, if there are interfering signals from undesired users with the same incident angle as that of a desired user, an adaptive array antenna cannot suppress them. The proposed receiver can cancel out remaining interference from users having nearly the same beam pattern. And we employ Orthogonal Decision-Feedback Detector (ODFD) as Multiuser detection. The ODFD performs as good as the decorrelating decision -feedback detector (DDFD) with much less complexity. Simulation results show that the proposed system provides a significantly enhanced performance.

Partial Image Retrieval Using an Efficient Pruning Method (효율적인 Pruning 기법을 이용한 부분 영상 검색)

  • 오석진;오상욱;김정림;문영식;설상훈
    • Journal of Broadcast Engineering
    • /
    • v.7 no.2
    • /
    • pp.145-152
    • /
    • 2002
  • As the number of digital images available to users is exponentially growing due to the rapid development of digital technology, content-based image retrieval (CBIR) has been one of the most active research areas. A variety of image retrieval methods have been proposed, where, given an input query image, the images that are similar to the input are retrieved from an image database based on low-level features such as colors and textures. However, most of the existing retrieval methods did not consider the case when an input query image is a part of a whole image in the database due to the high complexity involved in partial matching. In this paper, we present an efficient method for partial image matching by using the histogram distribution relationships between query image and whole image. The proposed approach consists of two steps: the first step prunes the search space and the second step performs block-based retrieval using partial image matching to rank images in candidate set. The experimental results demonstrate the feasibility of the proposed algorithm after assuming that the response tune of the system is very high while retrieving only by using partial image matching without Pruning the search space.

Implementation of H.264/SVC Decoder Based on Embedded DSP (임베디드 DSP 기반 H.264/SVC 복호기 구현)

  • Kim, Youn-Il;Baek, Doo-San;Kim, Jae-Gon;Kim, Jin-Soo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.1018-1025
    • /
    • 2011
  • Scalable Video Coding (SVC) extension of H.264/AVC is a new video coding standard for media convergence by providing diverse videos of different spatial-temporal-quality layers with a single bitstream. Recently, real-time SVC codecs are being developed for the application areas of surveillance video and mobile video, etc. This paper presents the design and implementation of a H.264/SVC decoder based on an embedded DSP using Open SVC Decoder (OSD) which is a real-time software decoder designed for the PC environment. The implementation consists of porting C code of the OSD software from PC to DSP environment, profiling the complexity performance of OSD with further optimization, and integrating the optimized decoder into the TI Davinci EVM (Evaluation Module). 50 QCIF/CIF frames or 15 SD frames per second can be decoded with the implemented DSP-based SVC decoder.

New Observational Design and Construction Method for Rock Block Evaluation of Tunnels in Discontinuous Rock Masses (불연속성 암반에서의 터널의 암반블럭 평가를 위한 신 정보화설계시공법)

  • Hwang Jae-Yun
    • Tunnel and Underground Space
    • /
    • v.16 no.1 s.60
    • /
    • pp.1-10
    • /
    • 2006
  • Rock masses in nature include various rock discontinuities such as faults, joints, bedding planes, fractures, cracks, schistosities, and cleavages. The behavior of rock structures, therefore, is mainly controlled by various rock discontinuities. In many tunnels, enormous cost and time are consumed to cope with the failing or sliding of rock blocks, which cannot be predicted because of the complexity of rock discontinuities. It is difficult to estimate the properties of rock masses before the rock excavation. The observational design and construction method of tunnels in rock masses is becoming important recently. In this paper, a new observational design and construction method for rock block evaluation of tunnels in discontinuous rock masses is proposed, and then applied to the tunnel based on actual rock discontinuity information observed in the field. It is possible to detect key blocks all along the tunnel exactly by using the numerical analysis program developed far the new observational design and construction method. This computer simulation method with user-friendly interfaces can calculate not only the stability of rock blocks but also the design of supplementary supports. The effectiveness of the proposed observational design and construction method has been verified by the confirmation of key block during the enlargement excavation.

Optimal Control of Voltage and Reactive Power in Local Area Using Genetic Algorithm (유전알고리즘을 이용한 지역계통의 전압 및 무효전력 최적제어)

  • 김종율;김학만;남기영
    • Journal of Energy Engineering
    • /
    • v.12 no.1
    • /
    • pp.42-48
    • /
    • 2003
  • In system planing and operation, voltage and reactive power control is very important. The voltage deviation and system losses can be reduced through control of reactive power sources. In general, there are several different reactive power sources, we used switched shunt capacitor to improve the voltage profile and to reduce system losses. Since there are many switched shunt capacitors in power system, so it if necessary to coordinate these switched shunt capacitors. In this study, Genetic Algorithm (GA) is used to find optimal coordination of switched shunt capacitors in a local area of power system. In case study, the effectiveness of the proposed method is demonstrated in KEPCO's power system. The simulation is performed by PSS/E and the results of simulation are compared with sensitivity method.

Performance of Cooperative Networks with Differential Distributed Modulation using Mixed Signaling Scheme (혼합된 신호 방식을 적용한 차등 분산 변조 협력 네트워크의 성능)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1061-1068
    • /
    • 2019
  • Cooperative networks transmit signals form the source node to the destination node via several relay node where the combining and demodulation of relay aided signals provide the benefit of performance enhancement and data rate increment. In general, a repetitive manner transmission scheme in which the received signal from the source node is amplified/re-generated and forward to the destination node is widely used. In this paper, we analyzed the performance of cooperative networks using the mixed transmission scheme. The conventional modulation scheme is used in the source-relay links, and space-time code is applied in the relay-destination links. To reduce the complexity of the overall system, we adopt differential modulation which bypasses channel state information. We analyze bit error rate (BER) of the proposed system by considering the number of relay nodes, and the performances depending on the strength of transmission signal in the source-relays and rely-destination links are compared. In addition, we also discuss the system performance with the signal strength and the number of relay nodes simultaneously.

Meta-Modeling to Detect Attack Behavior for Security (보안을 위한 공격 행위 감지 메타-모델링)

  • On, Jinho;Choe, Yeongbok;Lee, Moonkun
    • Journal of KIISE
    • /
    • v.41 no.12
    • /
    • pp.1035-1049
    • /
    • 2014
  • This paper presents a new method to detect attack patterns in security-critical systems, based on a new notion of Behavior Ontology. Generally security-critical systems are large and complex, and they are subject to be attacked in every possible way. Therefore it is very complicated to detect various attacks through a semantic structure designed to detect such attacks. This paper handles the complication with Behavior Ontology, where patterns of attacks in the systems are defined as a sequences of actions on the class ontology of the systems. We define the patterns of attacks as sequences of actions, and the attack patterns can then be abstracted in a hierarchical order, forming a lattice, based on the inclusion relations. Once the behavior ontology for the attack patterns is defined, the attacks in the target systems can be detected both semantically and hierarchically in the ontology structure. When compared to other attack models, the behavior ontology analysis proposed in this paper is found to be very effective and efficient in terms of time and space.

Design and Implementation of a Digital Asset Manager for Contents Authoring Applications (컨텐츠 저작 응용을 위한 디지털 자산 관리자의 설계 및 구현)

  • Kim, Jong-Soo;Bang, Su-Ho;Chung, Yon-Dohn;Lee, Jae-Hyung;Kim, Min-Jung;Kim, Myoung-Ho;Chang, Duk-Ho;Park, Jong-Seung;Oh, Hwang-Seok
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.3
    • /
    • pp.288-298
    • /
    • 2000
  • Digital assets denote multimedia information that exists in the form of digitized materials such as images, audio, and video. The management of digital assets demands much effort because of a huge amount of storage space requirement and multidimensional characteristics of the information needed to describe their contents. In this paper, we design and implement a Digital Asset Manager that stores and manages digital assets efficiently. Among the various types of digital assets, we focus on the video asset which has the highest complexity. Our Digital Asset Manager provides various facilities for digital contents authoring applications. In the Digital Asset Manager, video assets are managed by using a hierarchical model in order to ensure efficient accesses to any part of a video asset. Our system also guarantees the independence from the storage platform, and provides a fast content-based similarity search method on the digital assets.

  • PDF

Performance Comparison of Fast Distributed Video Decoding Methods Using Correlation between LDPCA Frames (LDPCA 프레임간 상관성을 이용한 고속 분산 비디오 복호화 기법의 성능 비교)

  • Kim, Man-Jae;Kim, Jin-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.4
    • /
    • pp.31-39
    • /
    • 2012
  • DVC(Distributed Video Coding) techniques have been attracting a lot of research works since these enable us to implement the light-weight video encoder and to provide good coding efficiency by introducing the feedback channel. However, the feedback channel causes the decoder to increase the decoding complexity and requires very high decoding latency because of numerous iterative decoding processes. So, in order to reduce the decoding delay and then to implement in a real-time environment, this paper proposes several parity bit estimation methods which are based on the temporal correlation, spatial correlation and spatio-temporal correlations between LDPCA frames on each bit plane in the consecutive video frames in pixel-domain Wyner-Ziv video coding scheme and then the performances of these methods are compared in fast DVC scheme. Through computer simulations, it is shown that the adaptive spatio-temporal correlation-based estimation method and the temporal correlation-based estimation method outperform others for the video frames with the highly active contents and the low active contents, respectively. By using these results, the proposed estimation schemes will be able to be effectively used in a variety of different applications.

WWCLOCK: Page Replacement Algorithm Considering Asymmetric I/O Cost of Flash Memory (WWCLOCK: 플래시 메모리의 비대칭적 입출력 비용을 고려한 페이지 교체 알고리즘)

  • Park, Jun-Seok;Lee, Eun-Ji;Seo, Hyun-Min;Koh, Kern
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.15 no.12
    • /
    • pp.913-917
    • /
    • 2009
  • Flash memories have asymmetric I/O costs for read and write in terms of latency and energy consumption. However, the ratio of these costs is dependent on the type of storage. Moreover, it is becoming more common to use two flash memories on a system as an internal memory and an external memory card. For this reason, buffer cache replacement algorithms should consider I/O costs of device as well as possibility of reference. This paper presents WWCLOCK(Write-Weighted CLOCK) algorithm which directly uses I/O costs of devices along with recency and frequency of cache blocks to selecting a victim to evict from the buffer cache. WWCLOCK can be used for wide range of storage devices with different I/O cost and for systems that are using two or more memory devices at the same time. In addition to this, it has low time and space complexity comparable to CLOCK algorithm. Trace-driven simulations show that the proposed algorithm reduces the total I/O time compared with LRU by 36.2% on average.