• Title/Summary/Keyword: 인식 오차

Search Result 660, Processing Time 0.021 seconds

Comparison of Pollination Efficiency on Different Pollination Methods in Yellow poplar (Liriodendron tulipifera) (백합나무의 인공교배 방법에 따른 교배 효율성 비교)

  • Ryu, Keun-Ok;Kwon, Hae-Yun;Choi, Hyung-Soon;Kim, In-Sik;Cho, Do-Hyun
    • Journal of Korean Society of Forest Science
    • /
    • v.98 no.6
    • /
    • pp.696-702
    • /
    • 2009
  • Yellow poplar (Liriodendron tulipifera L.) is an insect-pollinated tree species with large, perfect flower, and its seed sets average only about 10 percent naturally. In its controlled pollination, pollination bags are usually taken to prevent unwanted pollination, but bagging is an expensive and time-consuming process. Therefore, this study was conducted to determine the need of pollination bag by estimating how much unintended pollination would occur when different cross methods were applied. Five different pollination methods were applied as follows: 1) natural open pollination (i.e. insect pollination) as a reference, 2) self-pollination; no removing reproductive organs with bagging, 3) open pollination; emasculated(removing sepal, petal and stamen) without bagging, 4) controlled pollination; emasculated with bagging and 5) controlled pollination; emasculated without bagging. Very low value of full seed rate (0.2%) was observed in method 3, it was suggested that removing stamen and petal restrict the activity of pollen vectors like bee. Difference in the full seed rate between method 4 and method 5 was not significant (27.9% versus 24.0%, respectively). Consequently, controlled pollination without bagging might be an alternative method for extensive breeding and mass production of seeds in yellow poplar.

Modification of the Fixed Coefficient Method for the Parameter Estimation of Storage Function Method (저류함수법의 매개변수 추정을 위한 상수고정법의 개선)

  • Chung, Gunhui;Park, Hee-Seong
    • Journal of Korea Water Resources Association
    • /
    • v.46 no.1
    • /
    • pp.73-85
    • /
    • 2013
  • The researches on the parameter estimation for storage function method have been conducted for a long time using different methods. However, the determination of the optimal parameters takes a long time and there is a controversy that the proposed optimal parameters do not likely represent the physical characteristics of watershed. In this study, the characteristics of the continuity and storage function equation was analyzed and sensitivities were evaluated. As the result, the only optimal solution is suggested among several local optimums. It is also shown that the lag time is able to be determined using the direct runoff starting time of the watershed. From the sensitivity analysis, it is also proved that the determination of the lag time is very important and the only optimal solution could be found easily after selecting the lag time. Therefore, unlike the traditional optimization method, the proposed method does not take a long time to find the optimal solution which is depending on the characteristics of the rainfall events. The fixed coefficient method which is a method to estimate the optimal parameters of storage function method has been modified using the proposed method. Therefore, the practical efficiency to apply storage function method could be enhanced by applying the proposed method. While the traditional method takes care only the error of the runoff hydrograph, it is very important that the proposed method considers the characteristics of the watershed.

Timestamps based sequential Localization for Linear Wireless Sensor Networks (선형 무선 센서 네트워크를 위한 시각소인 기반의 순차적 거리측정 기법)

  • Park, Sangjun;Kang, Jungho;Kim, Yongchul;Kim, Young-Joo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.10
    • /
    • pp.1840-1848
    • /
    • 2017
  • Linear wireless sensor networks typically construct a network topology with a high reliability through sequential 1:1 mapping among sensor nodes, so that they are used in various surveillance applications of major national infrastructures. Most existing techniques for identifying sensor nodes in those networks are using GPS, AOA, and RSSI mechanisms. However, GPS or AOA based node identification techniques affect the size or production cost of the nodes so that it is not easy to construct practical sensor networks. RSSI based techniques may have a high deviation regrading location identification according to propagation environments and equipment quality so that complexity of error correction algorithm may increase. We propose a timestamps based sequential localization algorithm that uses transmit and receive timestamps in a message between sensor nodes without using GPS, AOA, and RSSI techniques. The algorithms for distance measurement between each node are expected to measure distance within up to 1 meter in case of an crystal oscillator of 300MHz or more.

The development of asynchronous ranging scheme based on the virtual slot (가상슬롯 기반의 비동기 거리 추정 기법 개발)

  • Ko, Young-Wook;Kim, Hwan-Yong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.17 no.8
    • /
    • pp.31-37
    • /
    • 2016
  • Ranging is divided into a synchronous scheme and an asynchronous scheme according to the presence of global synchronization between nodes. In general, the asynchronous ranging is preferred over synchronous ranging because it does not require an expensive high-precision oscillator for the global synchronization. On the other hand, in a conventional asynchronous ranging scheme, the packets, which are generated by all nodes in a positioning system of a large-scale infrastructure and need to be sent for localization by reference nodes, are considerable, which cause an increase in network traffic as the number of nodes increases. The traffic congestion lowers the throughput of the network leading to a considerable loss of energy. To solve this problem, this paper proposes a ranging scheme, in which virtual transmission slots randomly and discretely selected by a plurality of nodes are used to reduce the overheads needed in synchronizing the nodes, and the ranging is performed asynchronously based on the virtual transmission slots, thereby decreasing the network traffic. In addition, a performance test proved that the proposed ranging scheme was stronger than the TWR and SDS-TWR on an error range, even though the intensity of traffic was very low.

A Fast and Accurate Face Detection and Tracking Method by using Depth Information (깊이정보를 이용한 고속 고정밀 얼굴검출 및 추적 방법)

  • Bae, Yun-Jin;Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.7A
    • /
    • pp.586-599
    • /
    • 2012
  • This paper proposes a fast face detection and tracking method which uses depth images as well as RGB images. It consists of the face detection procedure and the face tracking procedure. The face detection method basically uses an existing method, Adaboost, but it reduces the size of the search area by using the depth image. The proposed face tracking method uses a template matching technique and incorporates an early-termination scheme to reduce the execution time further. The results from implementing and experimenting the proposed methods showed that the proposed face detection method takes only about 39% of the execution time of the existing method. The proposed tracking method takes only 2.48ms per frame with $640{\times}480$ resolution. For the exactness, the proposed detection method showed a little lower in detection ratio but in the error ratio, which is for the cases when a detected one as a face is not really a face, the proposed method showed only about 38% of that of the previous method. The proposed face tracking method turned out to have a trade-off relationship between the execution time and the exactness. In all the cases except a special one, the tracking error ratio is as low as about 1%. Therefore, we expect the proposed face detection and tracking methods can be used individually or in combined for many applications that need fast execution and exact detection or tracking.

Evaluation of Resistance Spot Weldability of SGAFC1180 Steel (SGAFC1180 TRIP강재의 저항 점용접성 평가)

  • Shin, Seok-Woo;Lee, Jong-Hun;Kim, Dae-Hwan;Park, Sang-Heup
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.12
    • /
    • pp.644-649
    • /
    • 2017
  • In the automobile industry, there is growing demand for lightweight vehicles due to environmental problems and rising oil prices. Therefore, aluminum alloys and special materials are being used to reduce the weight of vehicles, but there are still many difficulties to overcome in terms of cost and strength. Therefore, the application of advanced high strength steel (AHSS)is increasing. AHSS has good strength and formability.Safety regulations are becoming stricter, and 1.2-GPa super-high-strength steels are gradually being applied for the center pillar and roof rails. Thus, the application of different kinds of steels in automobile bodiesis also increasing gradually. This study evaluates the resistance point weldability and the characteristics of a welded part of SGAFC1180 1.2t steel. A simulation was used to observe the nugget formation and its growth behavior. The prediction performance showed a similar tendency within an error rate of 10%. Also, the effect of this behavior on the process resistance and dynamic resistance was investigated,along with the correlation between the shear tensile strength and nugget diameter.

Evaluation of Size for Crack around Rivet Hole Using Lamb Wave and Neural Network (초음파 판파와 신경회로망 기법을 적용한 리뱃홀 부위의 균열 크기 평가)

  • Choi, Sang-Woo;Lee, Joon-Hyun
    • Journal of the Korean Society for Nondestructive Testing
    • /
    • v.21 no.4
    • /
    • pp.398-405
    • /
    • 2001
  • The rivet joint has typical structural feature that can be initiation site for the fatigue crack due to the combination of local stress concentration around rivet hole and the moisture trapping. From a viewpoint of structural assurance, it is crucial to evaluate the size of crack around the rivet holes by appropriate nondestructive evaluation techniques. Lamb wave that is one of guided waves, offers a more efficient tool for nondestructive inspection of plates. The neural network that is considered to be the most suitable for pattern recognition has been used by researchers in NDE field to classify different types of flaws and flaw sizes. In this study, clack size evaluation around the rivet hole using the neural network based on the back-propagation algorithm has been tarried out by extracting some features from the ultrasonic Lamb wave for A12024-T3 skin panel of aircraft. Special attention was paid to reduce the coupling effect between the transducer and the specimen by extracting some features related to time md frequency component data in ultrasonic waveform. It was demonstrated clearly that features extracted from the time and frequency domain data of Lamb wave signal were very useful to determine crack size initiated from rivet hole through neural network.

  • PDF

Performance Analysis of Noncoherent OOK UWB Transceiver for LR-WPAN (저속 WPAN용 비동기 OOK 방식 UWB 송수신기 성능 분석)

  • Ki Myoungoh;Choi Sungsoo;Oh Hui-Myoung;Kim Kwan-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.1027-1034
    • /
    • 2005
  • IEEE802.15.4a, which is started to realize the PHY layer including high precision ranging/positioning and low data rate communication functions, requires a simple and low power consumable transceiver architecture. To satisfy this requirements, the simple noncoherent on-off keying (OOK) UWB transceiver with the parallel energy window banks (PEWB) giving high precision signal processing interface is proposed. The flexibility of the proposed system in multipath fading channel environments is acquired with the pulse and bit repetition method. To analyze the bit error rate (BER) performance of this proposed system, a noise model in receiver is derived with commonly used random variable distribution, chi-square. BER of $10^{-5}$ under the line-of-sight (LOS) residential channel is achieved with the integration time of 32 ns and signal to noise ratio (SNR) of 15.3 dB. For the non-line-of-sight (NLOS) outdoor channel, the integration time of 72 ns and SNR of 16.2 dB are needed. The integrated energy to total received energy (IRR) for the best BER performance is about $86\%$.

Performance Analysis of Optimal Neural Network structural BPN based on character value of Hidden node (은닉노드의 특징 값을 기반으로 한 최적신경망 구조의 BPN성능분석)

  • 강경아;이기준;정채영
    • Journal of the Korea Society of Computer and Information
    • /
    • v.5 no.2
    • /
    • pp.30-36
    • /
    • 2000
  • The hidden node plays a role of the functional units that classifies the features of input pattern in the given question. Therefore, a neural network that consists of the number of a suitable optimum hidden node has be on the rise as a factor that has an important effect upon a result. However there is a problem that decides the number of hidden nodes based on back-propagation learning algorithm. If the number of hidden nodes is designated very small perfect learning is not done because the input pattern given cannot be classified enough. On the other hand, if designated a lot, overfitting occurs due to the unnecessary execution of operation and extravagance of memory point. So, the recognition rate is been law and the generality is fallen. Therefore, this paper suggests a method that decides the number of neural network node with feature information consisted of the parameter of learning algorithm. It excludes a node in the Pruning target, that has a maximum value among the feature value obtained and compares the average of the rest of hidden node feature value with the feature value of each hidden node, and then would like to improve the learning speed of neural network deciding the optimum structure of the multi-layer neural network as pruning the hidden node that has the feature value smaller than the average.

  • PDF

A Social Historical Study on Security System of Goryo Period (고려시대(高麗時代) 시위제도(侍衛制度)에 관한 사적고찰(史的考察))

  • Kim, Chang-Ho;Min, Jae-Ki
    • Korean Security Journal
    • /
    • no.15
    • /
    • pp.107-128
    • /
    • 2008
  • It was started that Shiwe-goon was organized from Shilla-end to Goryeo foundation a country in powerful families existence merely royal household by stably plan means in the reign of Taejo. Generally Shiwe-goon was dutie king' personal danger of protection. Shiwe-goon was organized castle of guarding, stand by king and royal household side armed strength to going on a trip and general armed-organization was collapsed for Goryeo-end continued existence. Goryeo era of Shiwe-organization was divided central army and region army. Two-goon(Eungyang-goon, Yongho-goon) was undertaken king of Shiwe army and six-we(Chunwoo-we, Geumoh-we, Gammoon-we, Jeoawoo-we, Shinoh-we, Hongwe-we) was undertaked capital of guard and the border of defense duty. Central army of commanders was called Sangjanggoon, Daejanggoon. Sangjanggoon and Daejanggoon was discussed military officer of conference apparatus in Jungbang. Jungbang was got afterward Mooshinjungbeon happened military of statesman grasping political power with authority a main stay. Mooshinjungkwen era was appeared modernistic mean of privately guarding organization in Dobang and Naedobang. According as Shiwe-organization was charged military organization as a part of sovereign power and grasping strength of authority- maintenance for security and guarding duty. As a conclusion, national sovereign of guard was achieved not only personal life and body guard protection but also country of welfare protection in country-welfare dimension an inch of non-error. Also national sovereign of guard was considered guarding apparatus of allowance the largest duty and country-welfare direct connection with actual fact recognition in constancy effort.

  • PDF