• Title/Summary/Keyword: 해결책

Search Result 2,020, Processing Time 0.027 seconds

Efficient Rotation-Invariant Boundary Image Matching Using the Envelope-based Lower Bound (엔빌로프 기반 하한을 사용한 효율적인 회전-불변 윤곽선 이미지 매칭)

  • Kim, Sang-Pil;Moon, Yang-Sae;Hong, Sun-Kyong
    • The KIPS Transactions:PartD
    • /
    • v.18D no.1
    • /
    • pp.9-22
    • /
    • 2011
  • In this paper we present an efficient solution to rotation?invariant boundary image matching. Computing the rotation-invariant distance between image time-series is a time-consuming process since it requires a lot of Euclidean distance computations for all possible rotations. In this paper we propose a novel solution that significantly reduces the number of distance computations using the envelope-based lower bound. To this end, we first present how to construct a single envelope from a query sequence and how to obtain a lower bound of the rotation-invariant distance using the envelope. We then show that the single envelope-based lower bound can reduce a number of distance computations. This approach, however, may cause bad performance since it may incur a larger lower bound by considering all possible rotated sequences in a single envelope. To solve this problem, we present a concept of rotation interval, and using the rotation interval we generalize the envelope-based lower bound by exploiting multiple envelopes rather than a single envelope. We also propose equi-width and envelope minimization divisions as the method of determining rotation intervals in the multiple envelope approach. Experimental results show that our envelope-based solutions outperform existing solutions by one or two orders of magnitude.

Improvement of a Verified Secure Key Distribution Protocol Between RFID and Readers (RFID와 리더간의 안전성이 검증된 키 분배 프로토콜의 개선)

  • Bae, Woo-Sik;Lee, Jong-Yun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.331-338
    • /
    • 2011
  • The RFID system includes a section of wireless communication between the readers and the tags. Because of its vulnerability in terms of security, this part is always targeted by attackers and causes various security problems including the leakage of secret and the invasion of privacy. In response to these problems, various protocols have been proposed, but because many of them have been hardly implementable they have been limited to theoretical description and theorem proving without the accurate verification of their safety. Thus, this study tested whether the protocol proposed by Kenji et al. satisfies security requirements, and identified its vulnerabilities such as the exposure of IDs and messages. In addition, we proposed an improved RFID security protocol that reduced the number of public keys and random numbers. As one of its main characteristics, the proposed protocol was designed to avoid unnecessary calculations and to remove vulnerabilities in terms of security. In order to develop and verify a safe protocol, we tested the protocol using Casper and FDR(Failure Divergence Refinements) and confirmed that the proposed protocol is safe in terms of security. Furthermore, the academic contributions of this study are summarized as follows. First, this study tested the safety of a security protocol through model checking, going beyond theorem proving. Second, this study suggested a more effective method for protocol development through verification using FDR.

A Tree-structured XPath Query Reduction Scheme for Enhancing XML Query Processing Performance (XML 질의의 수행성능 향상을 위한 트리 구조 XPath 질의의 축약 기법에 관한 연구)

  • Lee, Min-Soo;Kim, Yun-Mi;Song, Soo-Kyung
    • The KIPS Transactions:PartD
    • /
    • v.14D no.6
    • /
    • pp.585-596
    • /
    • 2007
  • XML data generally consists of a hierarchical tree-structure which is reflected in mechanisms to store and retrieve XML data. Therefore, when storing XML data in the database, the hierarchical relationships among the XML elements are taken into consideration during the restructuring and storing of the XML data. Also, in order to support the search queries from the user, a mechanism is needed to compute the hierarchical relationship between the element structures specified by the query. The structural join operation is one solution to this problem, and is an efficient computation method for hierarchical relationships in an in database based on the node numbering scheme. However, in order to process a tree structured XML query which contains a complex nested hierarchical relationship it still needs to carry out multiple structural joins and results in another problem of having a high query execution cost. Therefore, in this paper we provide a preprocessing mechanism for effectively reducing the cost of multiple nested structural joins by applying the concept of equivalence classes and suggest a query path reduction algorithm to shorten the path query which consists of a regular expression. The mechanism is especially devised to reduce path queries containing branch nodes. The experimental results show that the proposed algorithm can reduce the time requited for processing the path queries to 1/3 of the original execution time.

Monitoring-Based Secure Data Aggregation Protocol against a Compromised Aggregator in Wireless Sensor Networks (무선 센서 네트워크에서 Compromised Aggregator에 대응을 위한 모니터링 기반 시큐어 데이터 병합 프로토콜)

  • Anuparp, Boonsongsrikul;Lhee, Kyung-Suk;Park, Seung-Kyu
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.303-316
    • /
    • 2011
  • Data aggregation is important in wireless sensor networks. However, it also introduces many security problems, one of which is that a compromised node may inject false data or drop a message during data aggregation. Most existing solutions rely on encryption, which however requires high computation and communication cost. But they can only detect the occurrence of an attack without finding the attacking node. This makes sensor nodes waste their energy in sending false data if attacks occur repeatedly. Even an existing work can identify the location of a false data injection attack but it has a limitation that at most 50% of total sensor nodes can participate in data transmission. Therefore, a novel approach is required such that it can identify an attacker and also increase the number of nodes which participate in data transmission. In this paper, we propose a monitoring-based secure data aggregation protocol to prevent against a compromised aggregator which injects false data or drops a message. The proposed protocol consists of aggregation tree construction and secure data aggregation. In secure data aggregation, we use integration of abnormal data detection with monitoring and a minimal cryptographic technique. The simulation results show the proposed protocol increases the number of participating nodes in data transmission to 95% of the total nodes. The proposed protocol also can identify the location of a compromised node which injects false data or drops a message. A communication overhead for tracing back a location of a compromised node is O(n) where n is the total number of nodes and the cost is the same or better than other existing solutions.

Bootstrap estimation of the standard error of treatment effect with double propensity score adjustment (이중 성향점수 보정 방법을 이용한 처리효과 추정치의 표준오차 추정: 붓스트랩의 적용)

  • Lim, So Jung;Jung, Inkyung
    • The Korean Journal of Applied Statistics
    • /
    • v.30 no.3
    • /
    • pp.453-462
    • /
    • 2017
  • Double propensity score adjustment is an analytic solution to address bias due to incomplete matching. However, it is difficult to estimate the standard error of the estimated treatment effect when using double propensity score adjustment. In this study, we propose two bootstrap methods to estimate the standard error. The first is a simple bootstrap method that involves drawing bootstrap samples from the matched sample using the propensity score as well as estimating the standard error from the bootstrapped samples. The second is a complex bootstrap method that draws bootstrap samples first from the original sample and then applies the propensity score matching to each bootstrapped sample. We examined the performances of the two methods using simulations under various scenarios. The estimates of standard error using the complex bootstrap were closer to the empirical standard error than those using the simple bootstrap. The simple bootstrap methods tended to underestimate. In addition, the coverage rates of a 95% confidence interval using the complex bootstrap were closer to the advertised rate of 0.95. We applied the two methods to a real data example and found also that the estimate of the standard error using the simple bootstrap was smaller than that using the complex bootstrap.

Introduction to Geophysical Exploration Data Denoising using Deep Learning (심층 학습을 이용한 물리탐사 자료 잡음 제거 기술 소개)

  • Caesary, Desy;Cho, AHyun;Yu, Huieun;Joung, Inseok;Song, Seo Young;Cho, Sung Oh;Kim, Bitnarae;Nam, Myung Jin
    • Geophysics and Geophysical Exploration
    • /
    • v.23 no.3
    • /
    • pp.117-130
    • /
    • 2020
  • Noises can distort acquired geophysical data, leading to their misinterpretation. Potential noises sources include anthropogenic activity, natural phenomena, and instrument noises. Conventional denoising methods such as wavelet transform and filtering techniques, are based on subjective human investigation, which is computationally inefficient and time-consuming. Recently, many researchers attempted to implement neural networks to efficiently remove noise from geophysical data. This study aims to review and analyze different types of neural networks, such as artificial neural networks, convolutional neural networks, autoencoders, residual networks, and wavelet neural networks, which are implemented to remove different types of noises including seismic, transient electromagnetic, ground-penetrating radar, and magnetotelluric surveys. The review analyzes and summarizes the key challenges in the removal of noise from geophysical data using neural network, while proposes and explains solutions to the challenges. The analysis support that the advancement in neural networks can be powerful denoising tools for geophysical data.

A method of the performance of Sijo in the twenty first century (21세기(世紀) 시조문학(時調文學)의 연행양식(演行樣式))

  • Lee, Chan-Wook
    • Sijohaknonchong
    • /
    • v.26
    • /
    • pp.55-75
    • /
    • 2007
  • Sijo is the essence of Korean literature and the most ideal poetic form through which we can express our images gracefully in three lines. Hence it deserves special emphasis either in creative writing and appreciating it from elementary school to middle school. In this paper observes how Sijo is taught in the schools and suggests the direction of educating Sijo. There may be three kinds of Sijo performance, namely, recitation, reading, and singing. In this paper. it is claimed that the performance of Sijo in the twenty first century should be recitation. Sijo education may be effective when it focuses on a way of recitation in which, with natural and long breath, a piece of Sijo is recited at length. Nevertheless, it is not practiced as the way of recitation because of following two reasons. Firstly. the analysis on rhythm, which is on the base of its recitation, is extremely difficult. Secondly, the theoretical ways, which is obsolete and lacks vividness, are ineffective in education. By these reasons. 1 studied how to give a recitation following my preceding studies on rhythm and rhythmical reading of Sijo. As a result, this paper suggests a reading method as a solution to the problems. In fact, we Korean can discipline our mind and body through reciting Sijo to the rhythm which is transcendental to Korean and at the same time, Sijo education helps to enhance our pride as koreans in the process of studying Sijo.

  • PDF

Current Status and Perspectives of Weed Science in Asia-Pacific Area (아시아·태평양지역의 잡초연구 동향과 전망)

  • Lee, In-Yong;Kim, Jin-Won;Kim, Sang-Su;Yoo, Hong-Jae;Hwang, In-Seong;Lee, Kye-Hwan;Cho, Nam-Gyu;Lee, Dong-Guk;Hwang, Ki-Hwan;Won, Ok Jae;Jia, Weiqiang;Ko, Young-Kwan;Choi, Jung-Sup;Yeom, Hyun-Suk;Park, Kee Woong
    • Weed & Turfgrass Science
    • /
    • v.6 no.4
    • /
    • pp.292-305
    • /
    • 2017
  • This paper provides the current status of weed science and prospects for the development of weed science based on the research trends presented at the 26th Asian Pacific Weed Science Conference in 2017. Approximately 458 researchers from 25 countries, including Korea, participated in the conference and presented 325 papers in 20 research areas. Major research topics were herbicide resistance, herbicide use, herbicide development, weed ecology, allelopathy, weed management, and exotic weeds. Particularly, there were many presentations and interesting to researchers about the development and use of new herbicides, such as florpyauxifen-benzyl ester, triafamone, fenquinotrione, and tolpyralate. Development of new herbicide formulations and spray methods were suggested as a solution for the population decline in rural area and low labor quality especially in Asia and Pacific regions. In future weedy rice and exotic weeds will be a serious problem in this area so we need to cooperate to make good technical and practical solutions.

A Study on the Development of Training Systems for Marine Engines Using Virtual Reality (가상현실(VR)을 이용한 선박주기관 교육·훈련 시스템 개발에 관한 연구)

  • Roh, Beom-Seok;Lee, Won-Ju;Lee, Ji-Woong;Kim, Jae-Ho;Kim, Dae-Hee;Choi, Jae-Hyuk
    • Journal of the Korean Society of Marine Environment & Safety
    • /
    • v.25 no.6
    • /
    • pp.735-742
    • /
    • 2019
  • The need for education and training on engine-part maintenance is rising in order to prevent marine accidents occurring due to a surge in engine-part damages. However, practical training using actual equipment is difficult due to the size and location of the equipment. Therefore, the necessity of developing a training system for marine engines using virtual reality (VR) is intensifying. The purpose of this paper is to develop an optimized system for marine engine education and training using existing VR programs and equipment. To this end, we selected and modeled the marine engine and education target suitable for the class, and developed the system using VR development software. The developed VR education and training system is designed to experience content that is otherwise difficult to train or practice in the curriculum through virtual reality. In fact, fourth grade students from Maritime University were taught using marine engine VR educational equipment, and it confirmed that there was an educational effect on the class. In the future, the introduction of an education and training system using VR in the field of marine engines can improve their maintenance and repairing capacity, and aid in reducing marine accidents.need for education and training on engine part maintenance is increasing to prevent marine accidents.

Performance Analysis of Reverse Link Synchronous Transmission for a DS/CDMA System Subject to Handover Effect (DS/CDMA시스템에서 역방향 링크 동기식 전송 기법의 성능과 핸드오버 영향을 고려한 성능 분석)

  • An, Byeong-Cheol;Hwang, Seon-Han;Hong, In-Gi;Jo, Gyeong-Rok;Yu, Yeong-Gap
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.2
    • /
    • pp.54-67
    • /
    • 2000
  • It is known that the performance of a DS-CDMA system mainly depends on Multiple Access Interference(MAI). The effect of MAI in a reverse link is larger than that of a forward link because of the absence of orthogonality among mobile stations. In this paper we investigate the effect of synchronous transmission in the reverse link, which is compared to the performance of asynchronous transmission in the reverse link. In addition, we consider the effect of interference from Mobile Stations(MSs) in a hand-over region. That is, if we assume that a MS is moving from a serving base station(sowing BS) to a target base station(target BS), the signal of the MS is not orthogonal with the signals of all other MSs within the target BS because the MS is only synchronized with the serving BS. Finally we suggest an interference cancellation scheme to reduce the interference from MSs in the region of hand-over, which can be one of solutions for the capacity degradation due to interference from the MSs in the hand-over region in reverse link synchronous transmission.

  • PDF