• Title/Summary/Keyword: 그런지

Search Result 798, Processing Time 0.029 seconds

Robust Parameter Estimation using Fuzzy RANSAC (퍼지 RANSAC을 이용한 강건한 인수 예측)

  • Lee Joong-Jae;Jang Hyo-Jong;Kim Gye-Young;Choi Hyung-il
    • Journal of KIISE:Software and Applications
    • /
    • v.33 no.2
    • /
    • pp.252-266
    • /
    • 2006
  • Many problems in computer vision are mainly based on mathematical models. Their optimal solutions can be found by estimating the parameters of each model. However, provided an input data set is involved outliers which are relative]V larger than normal noises, they lead to incorrect results. RANSAC is a representative robust algorithm which is used to resolve the problem. One major problem with RANSAC is that it needs priori knowledge(i.e. a percentage of outliers) of the distribution of data. To solve this problem, we propose a FRANSAC algorithm which improves the rejection rate of outliers and the accuracy of solutions. This is peformed by categorizing all data into good sample set, bad sample set and vague sample set using a fuzzy classification at each iteration and sampling in only good sample set. In the experimental results, we show that the performance of the proposed algorithm when it is applied to the linear regression and the calculation of a homography.

A Comparative Study on the Determinant of Fire Service Budget and Police Service Budget (소방예산과 경찰예산의 결정요인에 관한 비교연구)

  • Kim, Jin-Dong
    • Fire Science and Engineering
    • /
    • v.24 no.3
    • /
    • pp.119-130
    • /
    • 2010
  • In the fire and disaster prevention administration of which is not developed in comparison with any other administrative system, the systematic improvement is necessary. For system's more development, financial resource of fire service must be increased sufficiently. If fire service's budget is not allocated sufficiently, fire and disaster were not prevented effectively. This study set up hypothesis based on theoretical background and past research. In this study, dependent variables are fire service budget and police service budget per person Whereas independent variables include demand characteristics, economical characteristics, political characteristics, and previous fiscal year's budget. Statistical methods for the hypothesis's verification are regression analysis, correlation analysis and t-test. The major finding on this study are as follows: First, regression analysis showed that significant variable were past budget variable and economical variable. But political variable and demand variable were not significant except for a emergency medical variable. Second, fire service budget's average was not different significantly from police service budget's average. The above result are contingent upon the theory described in this research. A sustained research and development effort will be necessary if substantial and meaningful progress is to be made in fire service budget.

A Study on the Stone Circles of the Mound Tombs Dated the Three Kingdoms Period -A New Discovery from Mound Tombs at Seongsan-dong, Seongju County- (삼국시대 봉토분의 호석에 대하여 - 성주 성산동고분군의 신자료를 중심으로-)

  • Kim Se-Ki
    • KOMUNHWA
    • /
    • no.57
    • /
    • pp.41-75
    • /
    • 2001
  • In the Yeongnam region, many clusters of large scaled mound tombs dated the Three Kingdoms Period have been found to be distributed over many places. Such mound tombs usually have stone circles. These stone circles function to prevent from tomb mound coll

  • PDF

Performance Analysis of the WDM Protocol for the Multicast Traffics (멀티캐스트 트래픽 처리를 위한 WDM 프로토콜의 성능분석)

  • 정길현;이정규
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.11C
    • /
    • pp.64-74
    • /
    • 2001
  • In this paper, a dynamic minislot reservation protocol(DMRP) is proposed and analyzed to improve the performance of the multicast traffic processing in wavelength division multiplexing(WDM) networks. For the proposed protocol analysis, the WDM network architecture with a passive star coupler is used. One pair of transceiver is used for a control channel and the ocher pair of transceiver with one fixed transmitter and one tunable receiver are used for data transmission. In this protocol. the packets which fail to have successful transmission in the present time slot due to data channel and destination collisions, have priority to have successful reservation in the contention-less minislots of the next time slot. Therefore, protocols have improved the throughput and the system delay performance caused by the reduced probabilities of control channel contentions and destination collisions probability. Today, the efficient protocol that can handle the various types of data traffic is needed. As results, the DMRP is useful to improve the performance of throughput and system delay characteristics regardless of the kinds of traffic.

  • PDF

Reduction of Speckle Noise in Images Using Homomorphic Wavelet-Based MMSE Filter with Edge Detection (에지 영역을 고려한 호모모르픽 웨이브렛 기반 MMSE 필터를 이용한 영상 신호의 스펙클 잡음 제거)

  • 박원용;장익훈;김남철
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.11C
    • /
    • pp.1098-1110
    • /
    • 2003
  • In this paper, we propose a homomorphic wavelet-based MMSE filter with edge detection to restore images degraded by speckle noise. In the proposed method, a noisy image is first transformed into logarithmic domain. Each pixel in the transformed image is then classified into flat and edge regions by applying DIP operator to the image restored by homomorphic directional MMSE filter. Each pixel in flat region is restored by homomorphic wavelet-based MMSE filter. Each pixel in edge region is restored by the weighted sum of the output of homomorphic wavelet-based MMSE filtering and that of homomorphic directional MMSE filtering. The restored image in spatial domain is finally obtained by applying the exponential function to the restored image in logarithmic domain. Experimental results show that the restored images by the proposed method have ISNR improvement of 3.3-4.0 ㏈ and ${\beta}$, a measurement parameter on edge preservation, improvement of 0.0103-0.0126 and superior subjective image quality over those by conventional methods.

Automatic Payload Signature Update System for Classification of Recent Network Applications (최신 네트워크 응용 분류를 위한 자동화 페이로드 시그니쳐 업데이트 시스템)

  • Shim, Kyu-Seok;Goo, Young-Hoon;Lee, Sung-Ho;Sija, Baraka D.;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.42 no.1
    • /
    • pp.98-107
    • /
    • 2017
  • In these days, the increase of applications that highly use network resources has revealed the limitations of the current research phase from the traffic classification for network management. Various researches have been conducted to solutions for such limitations. The representative study is automatic finding of the common pattern of traffic. However, since the study of automatic signature generation is a semi-automatic system, users should collect the traffic. Therefore, these limitations cause problems in the traffic collection step leading to untrusted accuracy of the signature verification process because it does not contain any of the generated signature. In this paper, we propose an automated traffic collection, signature management, signature generation and signature verification process to overcome the limitations of the automatic signature update system. By applying the proposed method in the campus network, actual traffic signatures maintained the completeness with no false-positive.

An Improved Dynamic Quantum-Size Pfair Scheduling for the Mode Change Environments (Mode Change 환경을 위한 개선된 동적 퀀텀 크기 Pfair 스케줄링)

  • Cha, Seong-Duk;Kim, In-Guk
    • Journal of Digital Contents Society
    • /
    • v.8 no.3
    • /
    • pp.279-288
    • /
    • 2007
  • Recently, Baruah et. al. proposed an optimal Pfair scheduling algorithm in the real-time multiprocessor system environments, and several variants of it were presented. All these algorithms assume the fixed unit quantum size. However, under Pfair based scheduling algorithms that are global scheduling technique, quantum size has direct influence on the scheduling overheads such as task switching and cache reload. We proposed a method for deciding the optimal quantum size[2] and an improved method for the task set whose utilization e is less than or equal to $e\;{\leq}\;p/3+1$[3]. However, these methods use repetitive computation of the task's utilization to determine the optimal quantum size. In this paper, we propose a more efficient method that can determine the optimal quantum size in constant time.

  • PDF

A Study on New Treatment Way of a Malicious Code to Use a DLL Injection Technique (DLL injection 기법을 이용하는 악성코드의 새로운 치료 방법 연구)

  • Park, Hee-Hwan;Park, Dea-Woo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.5 s.43
    • /
    • pp.251-258
    • /
    • 2006
  • A Malicious code is used to SMiShing disguised as finance mobile Vishing, using Phishing, Pharming mail, VoIP service etc. to capture of personal information. A Malicious code deletes in Anti-Virus Spyware removal programs, or to cure use. By the way, the Malicious cord which is parasitic as use a DLL Injection technique, and operate are Isass.exe, winlogon.exe, csrss.exe of the window operating system. Be connected to the process that you shall be certainly performed of an exe back, and a treatment does not work. A user forces voluntarily a process, and rebooting occurs, or a blue screen occurs, and Compulsory end, operating system everyone does. Propose a treatment way like a bird curing a bad voice code to use a DLL Injection technique to occur in these fatal results. Click KILL DLL since insert voluntarily an end function to Thread for a new treatment, and Injection did again the Thread which finish an action of DLL, and an end function has as control Thread, and delete. The cornerstone that the treatment wav that experimented on at these papers and a plan to solve will become a researcher of the revolutionary dimension that faced of a computer virus, and strengthen economic financial company meeting Ubiquitous Security will become.

  • PDF

Classification of Malicious Web Pages by Using SVM (SVM을 활용한 악성 웹 페이지 분류)

  • Hwang, Young-Sup;Moon, Jae-Chan;Cho, Seong-Je
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.3
    • /
    • pp.77-83
    • /
    • 2012
  • As web pages provide various services, the distribution of malware via the web pages is being also increased. Malware can make personal information leak, system mal-function and system be zombie. To protect this damages, we should block the malicious web pages. Because the malicious codes embedded in web pages are obfuscated or transformed, it is difficult to detect them using signature-based approaches which are used by current anti-virus software. To overcome this problem, we extracted features to classify malicious web pages and benign ones by analyzing web pages. And we propose a classification method using SVM which is widely used in machine learning. Experimental results show that the proposed method is better than other methods. The proposed method could classify malicious web pages correctly and be helpful to block the distribution of malicious codes.

Detection of Gradual Scene Boundaries with Linear and Circular Moving Borders (선형 및 원형의 이동경계선을 가지는 점진적 장면경계 추출)

  • Jang, Seok-Woo;Cho, Sung-Youn
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.4
    • /
    • pp.41-49
    • /
    • 2012
  • This paper proposes a detection method of wipes including horizontal wipes with linear moving borders, such as horizontal or vertical wipes, Barn Doors, and Iris Rounds with circular moving borders. The suggested method first obtains a difference image between two adjacent frames, and extracts lines and circles by applying Hough transformation to the extracted difference image. Then, we detect wipe transitions by employing an evaluation function that analyzes the number of moving trajectories of lines or circles, their moving direction and magnitude. To evaluate the performance of the suggested algorithm, experimental results show that the proposed method can effectively detect wipe transitions with linear and circular moving borders rather than some existing methods.