• Title/Summary/Keyword: 프로세스 필터링

Search Result 35, Processing Time 0.026 seconds

A Study on the Pixel-Paralled Image Processing System for Image Smoothing (영상 평활화를 위한 화소-병렬 영상처리 시스템에 관한 연구)

  • Kim, Hyun-Gi;Yi, Cheon-Hee
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.11
    • /
    • pp.24-32
    • /
    • 2002
  • In this paper we implemented various image processing filtering using the format converter. This design method is based on realized the large processor-per-pixel array by integrated circuit technology. These two types of integrated structure are can be classify associative parallel processor and parallel process DRAM(or SRAM) cell. Layout pitch of one-bit-wide logic is identical memory cell pitch to array high density PEs in integrate structure. This format converter design has control path implementation efficiently, and can be utilize the high technology without complicated controller hardware. Sequence of array instruction are generated by host computer before process start, and instructions are saved on unit controller. Host computer is executed the pixel-parallel operation starting at saved instructions after processing start. As a result, we obtained three result that 1)simple smoothing suppresses higher spatial frequencies, reducing noise but also blurring edges, 2) a smoothing and segmentation process reduces noise while preserving sharp edges, and 3) median filtering, like smoothing and segmentation, may be applied to reduce image noise. Median filtering eliminates spikes while maintaining sharp edges and preserving monotonic variations in pixel values.

Single chip multi-function peripheral image processor with unified binarization architecture (통합된 이진화 구조를 가진 복합기용 1-Chip 영상처리 프로세서의 개발)

  • Park, Chang-Dae;Lee, Eul-Hwan;Kim, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.34-43
    • /
    • 1999
  • A high-speed image processor (HIP) is implemented for a high-speed multi-function peripheral. HIP has a binarization architecture with unified data path. It has the pixel-by-pixel pipelined processing to minimize size of the external memory. It performs pre-processing such as shading correction, automatic gain control (AGC), and gamma correction, and also drives external CCD or CIS modules. The pre-processed data can be enlarged or reduced. Various binarizatin algorithms can be processed in the unified archiecture. The embedded binarization algorithms are simple thresholding, high pass filtering, dithering, error diffusion, and thershold modulated error diffusion. These binarization algorithms are unified based on th threshold modulated error diffusion. The data path is designed to share the common functional block of the binarization algorithms. The complexity of the controls and the gate counts is greatly reduced with this novel architecture.

  • PDF

The Research about the Improvement of Design Process for Improving Quality of Product - With Emphasis on Decision Making Efficiency based on AHP Technique - (제품의 품질확보를 위한 디자인 프로세스 개선에 관한 연구 - AHP기법을 통한 디자인 의사결정 효율화를 중심으로 -)

  • Lee, Jong-Suk;Shin, Soo-Gil
    • Archives of design research
    • /
    • v.18 no.3 s.61
    • /
    • pp.15-24
    • /
    • 2005
  • There is a large waste of time, money, and production through the infelicitous product design process in small and medium enterprises. They don't possess enough career-manpower with respect to design. Especially, the objective and scientific approach process isn't presented very well on the 'establishment concept' of the embodiment phase or 'Sketch and Rendering' of the development phase which are the most important design processes. So, this research is applied to the conception of the AHP method. It uses the basic concept of relativity to decrease risk from the calculational quantity data, and supplement the decision making phase. Generally, human beings can conclude by relative judgement which is more influenceable than absolute judgement. So we must use the relative comparison concept rather than the comparison of two items with variable sketches based on characteristics of human beings. Thus, efficiency judgement is dependent on design sketch comparisons which help the consistency progress of variable alternative plans. We can decrease risk when we chose the final design and increase efficiency of the design decision making. That is now a perfect selection of each alternative's ranking and sensitive design result but this research will provide consistency criterion on filtering and lead to variable design alternatives. The significance of this research is the efficiency method that overcomes differences of character and sensitivity on many phases of the process. Finally, this research proposes a new ideal process that where applied improves quality and evidence of propriety through comparison to existing methods result in method application research for improvement quality.

  • PDF

The Proactive Threat Protection Method from Predicting Resignation Throughout DRM Log Analysis and Monitor (DRM 로그분석을 통한 퇴직 징후 탐지와 보안위협 사전 대응 방법)

  • Hyun, Miboon;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.2
    • /
    • pp.369-375
    • /
    • 2016
  • Most companies are willing to spend money on security systems such as DRM, Mail filtering, DLP, USB blocking, etc., for data leakage prevention. However, in many cases, it is difficult that legal team take action for data case because usually the company recognized that after the employee had left. Therefore perceiving one's resignation before the action and building up adequate response process are very important. Throughout analyzing DRM log which records every single file's changes related with user's behavior, the company can predict one's resignation and prevent data leakage before those happen. This study suggests how to prevent for the damage from leaked confidential information throughout building the DRM monitoring process which can predict employee's resignation.

A Study on the Development of the Position Detection System of Small Vessels for Collision Avoidance (충돌 회피를 위한 소형 선박의 위치 검출 시스템 개발에 관한 연구)

  • Le, Dang-Khanh;Nam, Teak-Kun
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.20 no.2
    • /
    • pp.202-209
    • /
    • 2014
  • In this paper, a developed device for detecting target's location and avoiding collision is proposed. Velocity and acceleration model of target are derived to estimate target's information, i.e. position, velocity and acceleration considering process and measurement noise. Kalman filtering method applied to the estimation process and its results was confirmed by simulation. The distance measurements system using laser sensor for moving target system is also developed to confirm the effectiveness of the proposed scheme. Experiments to get information of moving target with velocity and acceleration model was executed. The data with filtering and without filtering was compared by experiments. Discontinuous measured data was changed to smooth and continuous data by Kalman filtering. It is confirmed that desired data was obtained by applying proposed scheme. UI for measuring and monitoring the target data is developed and visual and auditory alarm function is attached on the system Finally, position estimation system of moving target with good performance is achieved by low price equipments.

Conceptual eco-hydrological model reflecting the interaction of climate-soil-vegetation-groundwater table in humid regions (습윤 지역의 기후-토양-식생-지하수위 상호작용을 반영한 개념적인 생태 수문 모형)

  • Choi, Jeonghyeon;Kim, Sangdan
    • Journal of Korea Water Resources Association
    • /
    • v.54 no.9
    • /
    • pp.681-692
    • /
    • 2021
  • Vegetation processes have a significant impact on rainfall runoff processes through evapotranspiration control, but are rarely considered in the conceptual lumped hydrological model. This study evaluated the model performance of the Hapcheon Dam watershed by integrating the ecological module expressing the leaf area index data sensed remotely from the satellite into the hydrological partition module. The proposed eco-hydrological model has three main features to better represent the eco-hydrological process in humid regions. 1) The growth rate of vegetation is constrained by water shortage stress in the watershed. 2) The maximum growth of vegetation is limited by the energy of the watershed climate. 3) The interaction of vegetation and aquifers is reflected. The proposed model simultaneously simulates hydrologic components and vegetation dynamics of watershed scale. The following findings were found from the validation results using the model parameters estimated by the SCEM algorithm. 1) Estimating the parameters of the eco-hydrological model using the leaf area index and streamflow data can predict the streamflow with similar accuracy and robustness to the hydrological model without the ecological module. 2) Using the remotely sensed leaf area index without filtering as input data is not helpful in estimating streamflow. 3) The integrated eco-hydrological model can provide an excellent estimate of the seasonal variability of the leaf area index.

Experiments on An Network Processor-based Intrusion Detection (네트워크 프로세서 기반의 침입탐지 시스템 구현)

  • Kim, Hyeong-Ju;Kim, Ik-Kyun;Park, Dae-Chul
    • The KIPS Transactions:PartC
    • /
    • v.11C no.3
    • /
    • pp.319-326
    • /
    • 2004
  • To help network intrusion detection systems(NIDSs) keep up with the demands of today's networks, that we the increasing network throughput and amount of attacks, a radical new approach in hardware and software system architecture is required. In this paper, we propose a Network Processor(NP) based In-Line mode NIDS that supports the packet payload inspection detecting the malicious behaviors, as well as the packet filtering and the traffic metering. In particular, we separate the filtering and metering functions from the deep packet inspection function using two-level searching scheme, thus the complicated and time-consuming operation of the deep packet inspection function does not hinder or flop the basic operations of the In-line mode system. From a proto-type NP-based NIDS implemented at a PC platform with an x86 processor running Linux, two Gigabit Ethernet ports, and 2.5Gbps Agere PayloadPlus(APP) NP solution, the experiment results show that our proposed scheme can reliably filter and meter the full traffic of two gigabit ports at the first level even though it can inspect the packet payload up to 320 Mbps in real-time at the second level, which can be compared to the performance of general-purpose processor based Inspection. However, the simulation results show that the deep packet searching is also possible up to 2Gbps in wire speed when we adopt 10Gbps APP solution.

Social Network Analysis for New Product Recommendation (신상품 추천을 위한 사회연결망분석의 활용)

  • Cho, Yoon-Ho;Bang, Joung-Hae
    • Journal of Intelligence and Information Systems
    • /
    • v.15 no.4
    • /
    • pp.183-200
    • /
    • 2009
  • Collaborative Filtering is one of the most used recommender systems. However, basically it cannot be used to recommend new products to customers because it finds products only based on the purchasing history of each customer. In order to cope with this shortcoming, many researchers have proposed the hybrid recommender system, which is a combination of collaborative filtering and content-based filtering. Content-based filtering recommends the products whose attributes are similar to those of the products that the target customers prefer. However, the hybrid method is used only for the limited categories of products such as music and movie, which are the products whose attributes are easily extracted. Therefore it is essential to find a more effective approach to recommend to customers new products in any category. In this study, we propose a new recommendation method which applies centrality concept widely used to analyze the relational and structural characteristics in social network analysis. The new products are recommended to the customers who are highly likely to buy the products, based on the analysis of the relationships among products by using centrality. The recommendation process consists of following four steps; purchase similarity analysis, product network construction, centrality analysis, and new product recommendation. In order to evaluate the performance of this proposed method, sales data from H department store, one of the well.known department stores in Korea, is used.

  • PDF

Modeling and Implementation of Firewall and IPS for Security Simulation on Large-scale Network Using SSFNet (SSFNet을 이용한 대규모 네트워크상에서의 보안 시뮬레이션을 위한 방화벽과 IPS모듈의 모델링 및 구현)

  • Kim, Yong-Tak;Kwon, Oh-Jun;Kim, Tai-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1037-1044
    • /
    • 2006
  • It's difficult to check cyber attacks and the performance of a security system in a real large-scale network. Generally, a new security system or the effect of a new security attack are checked by simulation. We use SSFNet to simulate our security system and cyber attack. SSFNet is an event-driven simulation tools based on process, which has a strength to be capable of expressing a large-scale network. But it doesn't offer any API's which can manipulate not only the related function of security but also the packet. In this paper, we developed a firewall and IPS class, used for a security system, and added to them components of SSFNet. The firewall is modelled a security system based on packet filtering. We checked the function of the firewall and the IPS with network modelled as using our SSFNet. The firewall blocks packets through rules of an address and port of packets. The result of this simulation shows that we can check a status of packets through a log screen of IPS installed in a router and confirm abnormal packet to be dropped.

  • PDF

Hazardous Area Identification Model using Automated Data Collection(ADC) based on BIM (BIM기반 자동화 데이터 수집기술을 활용한 위험지역 식별 모델)

  • Kim, Hyun-Soo;Lee, Hyun-Soo;Park, Moon-Seo;Lee, Kwang-Pyo;Pyeon, Jae-Ho
    • Korean Journal of Construction Engineering and Management
    • /
    • v.11 no.6
    • /
    • pp.14-23
    • /
    • 2010
  • A considerable number of construction disasters occurs on pathway. A safety management in construction sites is usually performed to prevent accidents in activity areas. This means that safety management level of hazards on pathway is relatively minified. Many researchers have introduced that a hazard identification is fundamental of safety management. Thus, algorithms for helping safety managers' hazardous area identification is developed using automated data collection technology. These algorithms primarily search potential hazardous area by comparing workers' location logs based on real-time locating system and optimal routes based on BIM. And potential hazardous areas is filtered by identified hazardous areas and activity areas. After that, safety managers are provided with information about potential hazardous areas and can establish proper safety countermeasures. This can help improving safety in construction sites.