• Title/Summary/Keyword: 데몬 알고리즘

Search Result 10, Processing Time 0.037 seconds

Nonrigid Lung Registration between End-Exhale and End-Inhale CT Scans Using a Demon Algorithm (데몬 알고리즘을 이용한 호기-흡기 CT 영상 비강체 폐 정합)

  • Yim, Ye-Ny;Hong, Helen;Shin, Yeong-Gil
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.1
    • /
    • pp.9-18
    • /
    • 2010
  • This paper proposes a deformable registration method using a demon algorithm for aligning the lungs between end-exhale and end-inhale CT scans. The lungs are globally aligned by affine transformation and locally deformed by a demon algorithm. The use of floating gradient force allows a fast convergence in the lung regions with a weak gradient of the reference image. The active-cell-based demon algorithm helps to accelerate the registration process and reduce the probability of deformation folding because it avoids unnecessary computation of the displacement for well-matched lung regions. The performance of the proposed method was evaluated through comparisons of methods that use a reference gradient force or a combined gradient force as well as methods with and without active cells. The results show that the proposed method can accurately register lungs with large deformations and can reduce the processing time considerably.

LOFAR/DEMON grams compression method for passive sonars (수동소나를 위한 LOFAR/DEMON 그램 압축 기법)

  • Ahn, Jae-Kyun;Cho, Hyeon-Deok;Shin, Donghoon;Kwon, Taekik;Kim, Gwang-Tae
    • The Journal of the Acoustical Society of Korea
    • /
    • v.39 no.1
    • /
    • pp.38-46
    • /
    • 2020
  • LOw Frequency Analysis Recording (LOFAR) and Demodulation of Envelop Modulation On Noise (DEMON) grams are bearing-time-frequency plots of underwater acoustic signals, to visualize features for passive sonar. Those grams are characterized by tonal components, for which conventional data coding methods are not suitable. In this work, a novel LOFAR/DEMON gram compression algorithm based on binary map and prediction methods is proposed. We first generate a binary map, from which prediction for each frequency bin is determined, and then divide a frame into several macro blocks. For each macro block, we apply intra and inter prediction modes and compute residuals. Then, we perform the prediction of available bins in the binary map and quantize residuals for entropy coding. By transmitting the binary map and prediction modes, the decoder can reconstructs grams using the same process. Simulation results show that the proposed algorithm provides significantly better compression performance on LOFAR and DEMON grams than conventional data coding methods.

Biological Early Warning Systems using UChoo Algorithm (UChoo 알고리즘을 이용한 생물 조기 경보 시스템)

  • Lee, Jong-Chan;Lee, Won-Don
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.1
    • /
    • pp.33-40
    • /
    • 2012
  • This paper proposes a method to implement biological early warning systems(BEWS). This system generates periodically data event using a monitoring daemon and it extracts the feature parameters from this data sets. The feature parameters are derived with 6 variables, x/y coordinates, distance, absolute distance, angle, and fractal dimension. Specially by using the fractal dimension theory, the proposed algorithm define the input features represent the organism characteristics in non-toxic or toxic environment. And to find a moderate algorithm for learning the extracted feature data, the system uses an extended learning algorithm(UChoo) popularly used in machine learning. And this algorithm includes a learning method with the extended data expression to overcome the BEWS environment which the feature sets added periodically by a monitoring daemon. In this algorithm, decision tree classifier define class distribution information using the weight parameter in the extended data expression. Experimental results show that the proposed BEWS is available for environmental toxicity detection.

The Useful Load Balancing Algorithm For Overloaded Daemon In WDCS (회선분배장치에서 과부하 데몬의 효율적인 부하분산 알고리즘)

  • 문형섭;노봉남
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2000.10c
    • /
    • pp.487-489
    • /
    • 2000
  • 회선분배장치를 제어관리하는 W/S의 Daemon 중에서 Event 처리를 담당하는 EvtProc Daemon의 경우를 들어 효율적인 부하 분산 알고리즘을 제안하였다. 본 논문에서는 대량의 Event 발생 시 담당 프로세스가 연속적으로 fork, exec 하지 않고 일정시간 대기함으로써 fork와 exec의 오버헤드를 줄이고 같은 Op Code의 연이은 Even 발생에 대기중인 프로세스가 이를 처리함으로써 더욱더 오버헤드를 줄일 수 있다. 그리고 Event를 처리하는 Child 생성에 있어 주 Child가 부하분산을 담당하게 함으로써 효율적이고 안정적으로 관리할 수 있는 방안을 제시하였다.

  • PDF

An Implementation and Analysis of load Balancing Mechanism for Over loaded Daemon In WDCS (회선분배장치 과부하 데몬을 위한 부하분산 방법의 구현과 분석)

  • Moon, Hyeong-Sub;Noh, Bong-Nam
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2000.10a
    • /
    • pp.669-672
    • /
    • 2000
  • 회선분배장치를 제어관리하는 W/S의 Daemon 중에서 Event 처리를 담당하는 EvtProc Daemon의 경우를 들어 효율적인 부하 분산 알고리즘을 설계하였다. 본 논문에서는 대량의 Event 발생 시 담당 프로세스가 연속적으로 fork, exec 하지 않고 일정시간 대기하므로써 fork 와 exec 의 오버헤드를 줄이고 같은 Op Code의 연이은 Event 발생에 대기중인 프로세스가 이를 처리함으로써 더욱더 오버헤드를 줄일 수 있다. 그리고 Event를 처리하는 Child 생성에 있어 주 Child 가 부하분산을 담당하게 함으로써 효율적이고 안정적으로 관리할 수 있는 방안을 제시하였고 이를 구현 분석하였다.

  • PDF

A Proposition and Analysis of Useful Load Balancing Algorithm For Overloaded Daemon In WDCS (WDCS 에서 과부하 데몬을 위한 효율적인 부하분산 알고리즘 제안과 분석)

  • 문형섭;이홍도
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2000.10a
    • /
    • pp.292-295
    • /
    • 2000
  • This paper presents effective Load Balancing Algorithm by exampling EvtProc Daemon controlling the Event handling among the W/S Daemon which manages and controls Digital Cross Connect Systems. In this paper, when a lot of event occur, charging process waits regular times instead of executing consecutive exec process. so, We can reduce overheads of fork and exec process. another method of reducing the overheads is it that waiting process handles consecutives events of Op Code. And We also presents effective and stable management scheme of event handling , for the generation of event handling Child process by charging the Load Balancing to the main child process

  • PDF

An Implementation of Security Key Management System by LDAP (LDAP을 이용한 보안 키 관리 시스템 구현)

  • Yoon, Sung-Jung;Kim, Geon-Ung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.3
    • /
    • pp.437-445
    • /
    • 2006
  • The security key management function is a key element to secure network environment, and many protocols include IPSec, HIP, etc. demand this function. There are two solutions to provide the key management function in the network layer, one is a method for storing security key material in the directory, and the other is a method for storing security key material in DNS. In this paper we present an implementation of key management system by LDAP. We deployed the open source solutions for directory service(OpenLDAP), cryptographic algorithm (FLINT/C), IPSec(FreeS/WAN), and verified the key management system by the encrypted message exchange and the interoperability test by un daemon.

The Segmented Polynomial Curve Fitting for Improving Non-linear Gamma Curve Algorithm (비선형 감마 곡선 알고리즘 개선을 위한 구간 분할 다항식 곡선 접합)

  • Jang, Kyoung-Hoon;Jo, Ho-Sang;Jang, Won-Woo;Kang, Bong-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.12 no.3
    • /
    • pp.163-168
    • /
    • 2011
  • In this paper, we proposed non-linear gamma curve algorithm for gamma correction. The previous non-linear gamma curve algorithm is generated by the least square polynomial using the Gauss-Jordan inverse matrix. However, the previous algorithm has some weak points. When calculating coefficients using inverse matrix of higher degree, occurred truncation errors. Also, only if input sample points are existed regular interval on 10-bit scale, the least square polynomial is accurately works. To compensate weak-points, we calculated accurate coefficients of polynomial using eigenvalue and orthogonal value of mat11x from singular value decomposition (SVD) and QR decomposition of vandemond matrix. Also, we used input data part segmentation, then we performed polynomial curve fitting and merged curve fitting results. When compared the previous method and proposed method using the mean square error (MSE) and the standard deviation (STD), the proposed segmented polynomial curve fitting is highly accuracy that MSE under the least significant bit (LSB) error range is approximately $10^{-9}$ and STD is about $10^{-5}$.

Fault Tolerance for IEEE 1588 Based on Network Bonding (네트워크 본딩 기술을 기반한 IEEE 1588의 고장 허용 기술 연구)

  • Altaha, Mustafa;Rhee, Jong Myung
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.11 no.4
    • /
    • pp.331-339
    • /
    • 2018
  • The IEEE 1588, commonly known as a precision time protocol (PTP), is a standard for precise clock synchronization that maintains networked measurements and control systems. The best master clock (BMC) algorithm is currently used to establish the master-slave hierarchy for PTP. The BMC allows a slave clock to automatically take over the duties of the master when the slave is disconnected due to a link failure and loses its synchronization; the slave clock depends on a timer to compensate for the failure of the master. However, the BMC algorithm does not provide a fast recovery mechanism in the case of a master failure. In this paper, we propose a technique that combines the IEEE 1588 with network bonding to provide a faster recovery mechanism in the case of a master failure. This technique is implemented by utilizing a pre-existing library PTP daemon (Ptpd) in Linux system, with a specific profile of the IEEE 1588 and it's controlled through bonding modes. Network bonding is a process of combining or joining two or more network interfaces together into a single interface. Network bonding offers performance improvements and redundancy. If one link fails, the other link will work immediately. It can be used in situations where fault tolerance, redundancy, or load balancing networks are needed. The results show combining IEEE 1588 with network bonding enables an incredible shorter recovery time than simply just relying on the IEEE 1588 recovery method alone.

Cavitation signal detection based on time-series signal statistics (시계열 신호 통계량 기반 캐비테이션 신호 탐지)

  • Haesang Yang;Ha-Min Choi;Sock-Kyu Lee;Woojae Seong
    • The Journal of the Acoustical Society of Korea
    • /
    • v.43 no.4
    • /
    • pp.400-405
    • /
    • 2024
  • When cavitation noise occurs in ship propellers, the level of underwater radiated noise abruptly increases, which can be a critical threat factor as it increases the probability of detection, particularly in the case of naval vessels. Therefore, accurately and promptly assessing cavitation signals is crucial for improving the survivability of submarines. Traditionally, techniques for determining cavitation occurrence have mainly relied on assessing acoustic/vibration levels measured by sensors above a certain threshold, or using the Detection of Envelop Modulation On Noise (DEMON) method. However, technologies related to this rely on a physical understanding of cavitation phenomena and subjective criteria based on user experience, involving multiple procedures, thus necessitating the development of techniques for early automatic recognition of cavitation signals. In this paper, we propose an algorithm that automatically detects cavitation occurrence based on simple statistical features reflecting cavitation characteristics extracted from acoustic signals measured by sensors attached to the hull. The performance of the proposed technique is evaluated depending on the number of sensors and model test conditions. It was confirmed that by sufficiently training the characteristics of cavitation reflected in signals measured by a single sensor, the occurrence of cavitation signals can be determined.