• Title/Summary/Keyword: 자동정렬

Search Result 199, Processing Time 0.024 seconds

Effective Picture Search in Lifelog Management Systems using Bluetooth Devices (라이프로그 관리 시스템에서 블루투스 장치를 이용한 효과적인 사진 검색 방법)

  • Chung, Eun-Ho;Lee, Ki-Yong;Kim, Myoung-Ho
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.16 no.4
    • /
    • pp.383-391
    • /
    • 2010
  • A Lifelog management system provides users with services to store, manage, and search their life logs. This paper proposes a fully-automatic collecting method of real world social contacts and lifelog search engine using collected social contact information as keyword. Wireless short-distance network devices in mobile phones are used to detect social contacts of their users. Human-Bluetooth relationship matrix is built based on the frequency of a human-being and a Bluetooth device being observed at the same time. Results show that with 20% of social contact information out of full social contact information of the observation times used for calculation, 90% of human-Bluetooth relationship can be correctly acquired. A lifelog search-engine that takes human names as keyword is suggested which compares two vectors, a row of Human-Bluetooth matrix and a vector of Bluetooth list scanned while a lifelog was created, using vector information retrieval model. This search engine returns more lifelog than existing text-matching search engine and ranks the result unlike existing search-engine.

Automated Detecting and Tracing for Plagiarized Programs using Gumbel Distribution Model (굼벨 분포 모델을 이용한 표절 프로그램 자동 탐색 및 추적)

  • Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The KIPS Transactions:PartA
    • /
    • v.16A no.6
    • /
    • pp.453-462
    • /
    • 2009
  • Studies on software plagiarism detection, prevention and judgement have become widespread due to the growing of interest and importance for the protection and authentication of software intellectual property. Many previous studies focused on comparing all pairs of submitted codes by using attribute counting, token pattern, program parse tree, and similarity measuring algorithm. It is important to provide a clear-cut model for distinguishing plagiarism and collaboration. This paper proposes a source code clustering algorithm using a probability model on extreme value distribution. First, we propose an asymmetric distance measure pdist($P_a$, $P_b$) to measure the similarity of $P_a$ and $P_b$ Then, we construct the Plagiarism Direction Graph (PDG) for a given program set using pdist($P_a$, $P_b$) as edge weights. And, we transform the PDG into a Gumbel Distance Graph (GDG) model, since we found that the pdist($P_a$, $P_b$) score distribution is similar to a well-known Gumbel distribution. Second, we newly define pseudo-plagiarism which is a sort of virtual plagiarism forced by a very strong functional requirement in the specification. We conducted experiments with 18 groups of programs (more than 700 source codes) collected from the ICPC (International Collegiate Programming Contest) and KOI (Korean Olympiad for Informatics) programming contests. The experiments showed that most plagiarized codes could be detected with high sensitivity and that our algorithm successfully separated real plagiarism from pseudo plagiarism.

Optical Design of the Integrated Triplexer Fabricated by Micro Block Stacking Method (MBS 방법으로 제작한 집적형 Triplexer의 광학 설계)

  • Yoon, Hyun-Jae;Kim, Jong-Hyuk
    • Korean Journal of Optics and Photonics
    • /
    • v.22 no.4
    • /
    • pp.191-197
    • /
    • 2011
  • In this paper, we have designed an integrated triplexer which is the basic component for a FTTH(Fiber To The Home) system which can transmit CATV and voice/data at the same time in a single fiber. The integrated triplexer can be fabricated with a novel technique of "Micro-Block Stacking (MBS)" method which automatically aligns the optical components in the optical beam pass using accurate ceramic holders. We analyze the displacement of the optical focus according to the tolerances of the component dimensions and the assembly process using code V simulator. For the transmitter, the most serious shift of the focal points is caused by the displacements of the LD spot. So the focal point moves up to $72{\mu}m$ from the center point for ${\pm}25{\mu}m$, ${\pm}25{\mu}m$, ${\pm}30{\mu}m$ displacements. For the receiver the most serious shift of the focal points is caused by the displacements of a 0.8mm ball lens (for the analog receiving part) and a micro ball lens (for the digital receiving part), and the focal point moves up to $55{\mu}$ for ${\pm}55{\mu}m$, ${\pm}5{\mu}m$, ${\pm}55{\mu}m$ micro ball lens displacements.

Polymer-based Large Core Optical Splitter for Multimode Optical Networks (멀티모드 광네트워크용 폴리머기반 대구경 광분배기)

  • An, Jong Bae;Lee, Woo-Jin;Hwang, Sung Hwan;Kim, Gye Won;Kim, Myoung Jin;Jung, Eun Joo;Moon, Jong Ha;Kim, Jin Hyeok;Rho, Byung Sup
    • Korean Journal of Optics and Photonics
    • /
    • v.24 no.4
    • /
    • pp.184-188
    • /
    • 2013
  • Two types of polymer-based optical splitters with $200{\mu}m$ large core are presented for optical multimode networks, such as smart home networks, intelligent automotive networks, etc. Optical splitters that have 1:1 symmetric and 9:1 asymmetric structure were fabricated by a ultra violet(UV)-imprint technology using a deep etched Si(silicon) master by the Bosch process. In this paper, we successfully fabricated the symmetric and asymmetric optical splitters with suitable optical network applications.

Exploring Usability of Mobile Text Messaging Interfaces (휴대폰 문자메시지 기능의 인터페이스 이용성에 관한 연구)

  • Lee, Jee-Yeon
    • Journal of Information Management
    • /
    • v.35 no.4
    • /
    • pp.1-16
    • /
    • 2004
  • In this paper, we outline the user interface problems that the text messaging users face to provide empirical basis for developing better improved mobile text messaging system. Our initial hypothesis was that the majority of the problems that the text messaging users face, namely, 1) difficulty in correctly understanding the intent of the incoming messages and 2) problem with frequently mis-addressing the recipient of the outgoing messages, can be accounted for by the poor usability of the text messaging user interface. Our analysis is based on the text message-based communication diaries, which were recorded for one week by each and every one of 75 college students, and survey taken from the same subjects. The data was collected in 2004. The students listed various difficulties including the limited message length, obscure input method, lack of mean to express emotional content, lack of receipt confirmation, lack of auto save feature when preparing messages to send, and lack of means to permanently save messages. Some of these problems were also identified in the previous studies. However, we were able to gather additional problems that the users face and also elicit potential solutions to remedy the problems. From these findings and analysis, we attempted to provide ways to improve the text messaging user interface.

Improved Security for Fuzzy Fingerprint Vault Using Secret Sharing over a Security Token and a Server (비밀분산 기법을 이용한 보안토큰 기반 지문 퍼지볼트의 보안성 향상 방법)

  • Choi, Han-Na;Lee, Sung-Ju;Moon, Dae-Sung;Choi, Woo-Yong;Chung, Yong-Wha;Pan, Sung-Bum
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.1
    • /
    • pp.63-70
    • /
    • 2009
  • Recently, in the security token based authentication system, there is an increasing trend of using fingerprint for the token holder verification, instead of passwords. However, the security of the fingerprint data is particularly important as the possible compromise of the data will be permanent. In this paper, we propose an approach for secure fingerprint verification by distributing both the secret and the computation based on the fuzzy vault(a cryptographic construct which has been proposed for crypto-biometric systems). That is, a user fingerprint template which is applied to the fuzzy vault is divided into two parts, and each part is stored into a security token and a server, respectively. At distributing the fingerprint template, we consider both the security level and the verification accuracy. Then, the geometric hashing technique is applied to solve the fingerprint alignment problem, and this computation is also distributed over the combination of the security token and the server in the form of the challenge-response. Finally, the polynomial can be reconstructed from the accumulated real points from both the security token and the server. Based on the experimental results, we confirm that our proposed approach can perform the fuzzy vault-based fingerprint verification more securely on a combination of a security token and a server without significant degradation of the verification accuracy.

A Modified grid-based KIneMatic wave STOrm Runoff Model (ModKIMSTORM) (I) - Theory and Model - (격자기반 운동파 강우유출모형 KIMSTORM의 개선(I) - 이론 및 모형 -)

  • Jung, In Kyun;Lee, Mi Seon;Park, Jong Yoon;Kim, Seong Joon
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.28 no.6B
    • /
    • pp.697-707
    • /
    • 2008
  • The grid-based KIneMatic wave STOrm Runoff Model (KIMSTORM) by Kim (1998) predicts the temporal variation and spatial distribution of overland flow, subsurface flow and stream flow in a watershed. The model programmed with C++ language on Unix operating system adopts single flowpath algorithm for water balance simulation of flow at each grid element. In this study, we attempted to improve the model by converting the code into FORTRAN 90 on MS Windows operating system and named as ModKIMSTORM. The improved functions are the addition of GAML (Green-Ampt & Mein-Larson) infiltration model, control of paddy runoff rate by flow depth and Manning's roughness coefficient, addition of baseflow layer, treatment of both spatial and point rainfall data, development of the pre- and post-processor, and development of automatic model evaluation function using five evaluation criteria (Pearson's coefficient of determination, Nash and Sutcliffe model efficiency, the deviation of runoff volume, relative error of the peak runoff rate, and absolute error of the time to peak runoff). The modified model adopts Shell Sort algorithm to enhance the computational performance. Input data formats are accepted as raster and MS Excel, and model outputs viz. soil moisture, discharge, flow depth and velocity are generated as BSQ, ASCII grid, binary grid and raster formats.

Speech Recognition Using Linear Discriminant Analysis and Common Vector Extraction (선형 판별분석과 공통벡터 추출방법을 이용한 음성인식)

  • 남명우;노승용
    • The Journal of the Acoustical Society of Korea
    • /
    • v.20 no.4
    • /
    • pp.35-41
    • /
    • 2001
  • This paper describes Linear Discriminant Analysis and common vector extraction for speech recognition. Voice signal contains psychological and physiological properties of the speaker as well as dialect differences, acoustical environment effects, and phase differences. For these reasons, the same word spelled out by different speakers can be very different heard. This property of speech signal make it very difficult to extract common properties in the same speech class (word or phoneme). Linear algebra method like BT (Karhunen-Loeve Transformation) is generally used for common properties extraction In the speech signals, but common vector extraction which is suggested by M. Bilginer et at. is used in this paper. The method of M. Bilginer et al. extracts the optimized common vector from the speech signals used for training. And it has 100% recognition accuracy in the trained data which is used for common vector extraction. In spite of these characteristics, the method has some drawback-we cannot use numbers of speech signal for training and the discriminant information among common vectors is not defined. This paper suggests advanced method which can reduce error rate by maximizing the discriminant information among common vectors. And novel method to normalize the size of common vector also added. The result shows improved performance of algorithm and better recognition accuracy of 2% than conventional method.

  • PDF

Evaluation of the usefulness of IGRT(Image Guided Radiation Therapy) for markerless patients using SGPS(Surface-Guided Patient Setup) (표면유도환자셋업(Surface-Guided Patient Setup, SGPS)을 활용한 Markerless환자의 영상유도방사선치료(Image Guided Radiation Therapy, IGRT)시 유용성 평가)

  • Lee, Kyeong-jae;Lee, Eung-man;Lee, Jeong-su;Kim, Da-yeon;Ko, Hyeon-jun;Choi, Shin-cheol
    • The Journal of Korean Society for Radiation Therapy
    • /
    • v.33
    • /
    • pp.109-116
    • /
    • 2021
  • Purpose: The purpose of this study is to evaluate the usefulness of Surface-Guided Patient Setup by comparing the patient positioning accuracy when image-guided radiation therapy was used for Markerless patients(unmarked on the skin) using Surface-Guided Patient Setup and Marker patients(marked on the skin) using Laser-Based Patient Setup. Materials And Methods: The position error during IGRT was compared between a Markerless patient initially set up with SGPS using an optical surface scanning system using three cameras and a Marker patient initially set up with LBPS that aligns the laser with the marker drawn on the patient's skin. Both SGPS and LBPS were performed on 20 prostate cancer patients and 10 Stereotactic Radiation Surgery patients, respectively, and SGPS was performed on an additional 60 breast cancer patients. All were performed IGRT using CBCT or OBI. Position error of 6 degrees of freedom was obtained using Auto-Matching System, and comparison and analysis were performed using Offline-Review in the treatment planning system. Result: The difference between the root mean square (RMS) of SGPS and LBPS in prostate cancer patients was Vrt -0.02cm, Log -0.02cm, Lat 0.01cm, Pit -0.01°, Rol -0.01°, Rtn -0.01°, SRS patients was Vrt 0.02cm, Log -0.05cm, Lat 0.00cm, Pit -0.30°, Rol -0.15°, Rtn -0.33°. there was no significant difference between the two regions. According to the IGRT standard of breast cancer patients, RMS was Vrt 0.26, Log 0.21, Lat 0.15, Pit 0.81, Rol 0.49, Rtn 0.59. Conclusion:. As a result of this study, the position error value of SGPS compared to LBPS did not show a significant difference between prostate cancer patients and SRS patients. In the case of additionally performed SGPS breast cancer patients, the position error value was not large based on IGRT. Therefore, it is considered that it will be useful to replace LBPS with SGPS, which has the great advantage of not requiring patient skin marking..