• Title/Summary/Keyword: 기술트리

Search Result 970, Processing Time 0.035 seconds

Morphable Model to Interpolate Difference between Number of Pixels and Number of Vertices (픽셀 수와 정점들 간의 차이를 보완하는 Morphable 모델)

  • Ko, Bang-Hyun;Moon, Hyeon-Joon;Kim, Yong-Guk;Moon, Seung-Bin;Lee, Jong-Weon
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.3
    • /
    • pp.1-8
    • /
    • 2007
  • The images, which were acquired from various systems such as CCTV and Robot, include many human faces. Because of a rapid increase in visual data, we cannot process these manually; rather we need to do these automatically. Furthermore, companies require automatic security systems to protect their new technology. There are various options available to us, including face recognition, iris recognition and fingerprint recognition. Face recognition is preferable since it does not require direct contact. However, the standard 2-Dimensional method is limited, so Morphable Models may be recommended as an alternative. The original morphable model, made by MPI, contains a large quantity of data such as texture and geometry data. This paper presents a Geometrix-based morphable model designed to reduce this data capacity.

A study on the ideal structure of feed sprue in the investment casting process (정밀주조 프로세스에서 피드 스프루의 이상적 구조에 관한 연구)

  • Lee, Kwang-Yeol
    • Journal of the Korean Crystal Growth and Crystal Technology
    • /
    • v.22 no.2
    • /
    • pp.105-113
    • /
    • 2012
  • Maintenance training is generally provided to teach employees new knowledge and techniques in order to increase their qualities. It means that the purpose of maintenance training is to increase an employee's knowledge or technique level and to maintain or increase their performance level through continuous training in their field, and the methods, contents and the level of training vary depending on the type of job they perform. Maintenance training is more important for jobs that require continuous technical increases or research, or for professional jobs that continuously require new knowledge and techniques. The purpose of this study is to provide quality service to consumers by responding to the rapidly changing jewelry distribution environment and to quickly and accurately acquire new and advanced jewelry inspection and appraisal techniques, and to contribute to the healthy consumption culture through a general quality increase in the jewelry industry.

Fractal Image Coding Based On Variable Block (가변 블록 기반 프랙탈 영상 부호화)

  • 노근수;조성환
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.15-24
    • /
    • 1998
  • In this paper, we present new method of fractal image coding based on iterated function system(IFS) suggested by Barnsley. In previous Fractal coding using full searching algorithm, the quality of reconstructed image was better than other fractal coding method's, but it took a long time in that algorithm for searching domain blocks matched. And it is performed through linear affine transform, therefore it is difficult to approximate the complex range blocks. In this paper, using quadtree partitioning, complex blocks are divided into more smaller blocks, and simple blocks are merged to more larger blocks. So, we can got more precisely approximated range blocks and reduce the number of transformations. Hence, we have improved the compression ratio. In addition, we restrict the region of searching domains in order to reduce the searching time and coding time. Compared with full searching algorithm, we reduced coding time drastically, and quality of reconstructed image was better in terms subjective criteria. And compared with Monro's, our method is slower, but we could obtain a reconstructed image with better quality.

  • PDF

A Cluster-Based Multicast Routing for Mobile Ad-hoc Networks (모바일 Ad-hoc 네트워크를 위한 클러스터 기반 멀티캐스트 라우팅)

  • An, Beong-Ku;Kim, Do-Hyeun
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.9 s.339
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper, we propose a Cluster-based Multicast Routing (CMR) suitable for mobile ad-hoc networks. The main features that our proposed method introduces are the following: a) mobility-based clustering and group based hierarchical structure in order to effectively support stability and scalability, b) group based mesh structure and forwarding tree concepts in order to support the robustness of the mesh topologies which provides limited redundancy and the efficiency of tree forwarding simultaneously, and c) combination of proactive and reactive concepts which provide low route acquisition delay and low overhead. The performance evaluation of the proposed protocol is achieved via modeling and simulation. The corresponding results demonstrate the Proposed multicast protocol's efficiency in terms of packet delivery ratio, scalability, control overhead, end-to-end delay, as a function of mobility, multicast group size, and number of senders.

Improved variable bits M-ary QT conflict resolution algorithm for discrete m-bits recognition in RFID system (RFID 시스템에서 불연속 m-bits 인식을 위한 개선된 가변비트 M-ary QT 충돌해소 알고리즘)

  • Kim, Kwan-woong;Kim, Byun-gon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.10
    • /
    • pp.1887-1894
    • /
    • 2016
  • In the RFID system, the reader transmits a query message to tags in order to identify a unique ID of tags within its detection range. The procedures for arbitrating a collision is essential because the multiple tags can response simultaneously in the same to the query of the Reader. This procedure is known as conflict resolution algorithm and it is a key technology in the RFID system. In this paper, we proposed a variable bits M-ary QT algorithm based on Manchester coding techniques. The proposed algorithm use the location information of the collision bits in the reader and tags. The proposed algorithm can reduce the number of the query-response cycle because it is capable of recognizing discontinuous bits and a variable number of bits. From computer simulation, the proposed method give better performance than the conventional M-ary QT techniques in terms of response, recognition efficiency, communication overhead.

A simulation technique to create dataset of RFID business events (RFID 비즈니스 이벤트 데이터셋의 생성을 위한 시뮬레이션 기법)

  • Ryu, Wooseok
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.10a
    • /
    • pp.289-291
    • /
    • 2013
  • As an wireless identification technology, RFID is now extending its application area including logistics, medicine, and healthcare. Adoption of RFID demands high cost such as h/w, s/w, and so on. To adopt RFID, we need to evaluate validity of application area and feasibility of RFID S/W such as EPC Information Service (EPCIS), which demands a variety of RFID test datasets. In this paper, I propose a novel method for generating RFID business events dataset by means of the simulation of RFID application environment. Proposed method can generate near-real RFID event dataset by means of representing various RFID application environment into abstract network model based on petri-net. In addition, it can also be useful when determining adoption of RFID as well as when evaluating RFID system.

  • PDF

Deciding Priority of Safety Messages using Decision Tree in IEEE 802.11p/1609.4 Vehicular Network (802.11p/1609 차량네트워크에서 Decision Tree를 이용한 안전메세지 우선순위 결정 기법)

  • Baik, Hyein;Kwon, YongHo;Rhee, Byung Ho
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.794-797
    • /
    • 2015
  • As the interest in VANET is increased, a study on the beacon message transmission between vehicles is actively being made. IEEE 802.11p/1609.4 standard is based on a multichannel system consisting of multiple service channels (SCH) and a control channel (CCH). Multiple SCHs are defined for nonsafety data transfer, while the CCH is used to broadcast safety messages called beacons and control messages (i.e., service advertisement messages). However, most messages broadcast in the only one CCH belong to safety application that must be contested in dense vehicular network. This paper suggests safety message transfer algorithm in dense vehicular congestion. The proposed algorithm is that the priority of safety messages is decided by decision tree and messages are stored in proper queues according to their priorities. Then, safety messages with higher priorities are sent in turn by CCH in the assigned time. The proposed algorithm decreases the beacon transmission delay and increase on the probability of a successful beacon reception in an IEEE 802.11p/1609.4-based network.

  • PDF

A Study on the Development of Educational Program for Invention on the Basis of TRIZ (TRIZ(트리즈)를 활용한 발명교육프로그램 개발 연구)

  • Cho, Seung-ho;Jung, Jong-wan
    • 대한공업교육학회지
    • /
    • v.31 no.1
    • /
    • pp.86-109
    • /
    • 2006
  • The purpose of this study was to reform the existing state of educational program for invention by TRIZ, theory of inventive problem solving. Major findings of the study were follows : First, students had a chance to get a inventive solution from the problem they were inventing. Second, the new educational program for invention was developed according to the procedures on the standpoint of pedagogy with the TRIZ. Third, according to the survey of the new educational program for invention has found that as follows: -Students were of help to know the invention, to be beneficial, but the basic concepts of TRIZ were not easy to them. -Student wished to advice their colleague the new program for invention, because they had chances to overcome a fixed idea, extend creativity and think. Fourth, TRIZ, the systematic method of problem solving for invention, provide students with the thinking method to overcome fixed ideas and the tool of knowledge.

Terminology Recognition System based on Machine Learning for Scientific Document Analysis (과학 기술 문헌 분석을 위한 기계학습 기반 범용 전문용어 인식 시스템)

  • Choi, Yun-Soo;Song, Sa-Kwang;Chun, Hong-Woo;Jeong, Chang-Hoo;Choi, Sung-Pil
    • The KIPS Transactions:PartD
    • /
    • v.18D no.5
    • /
    • pp.329-338
    • /
    • 2011
  • Terminology recognition system which is a preceding research for text mining, information extraction, information retrieval, semantic web, and question-answering has been intensively studied in limited range of domains, especially in bio-medical domain. We propose a domain independent terminology recognition system based on machine learning method using dictionary, syntactic features, and Web search results, since the previous works revealed limitation on applying their approaches to general domain because their resources were domain specific. We achieved F-score 80.8 and 6.5% improvement after comparing the proposed approach with the related approach, C-value, which has been widely used and is based on local domain frequencies. In the second experiment with various combinations of unithood features, the method combined with NGD(Normalized Google Distance) showed the best performance of 81.8 on F-score. We applied three machine learning methods such as Logistic regression, C4.5, and SVMs, and got the best score from the decision tree method, C4.5.

Advanced Key Management Architecture Based on Tree Structure for Secure SCADA Communications (안전한 SCADA 통신을 위한 트리 기반의 효율적인 키 관리 구조)

  • Choi, Dong-Hyun;Lee, Sung-Jin;Jeong, Han-Jae;Kang, Dong-Joo;Kim, Hak-Man;Kim, Kyung-Sin;Won, Dong-Ho;Kim, Seung-Joo
    • The KIPS Transactions:PartC
    • /
    • v.16C no.1
    • /
    • pp.37-50
    • /
    • 2009
  • The SCADA(Supervisory Control And Data Acquisition) system is a control system for infrastructure of nation. In the past, the SCADA system was designed without security function because of its closed operating environment. However, the security of the SCADA system has become an issue with connection to the open network caused by improved technology. In this paper we review the constraints and security requirements for SCADA system and propose advanced key management architecture for secure SCADA communications. The contributions of the present work are that our scheme support both message broadcasting and secure communications, while the existing key management schemes for SCADA system don't support message broadcasting. Moreover, by evenly spreading much of the total amount of computation across high power nodes (MTU or SUB-MTU), our protocol avoids any potential performance bottleneck of the system while keeping the burden on low power (RTU) nodes at minimal.