• Title/Summary/Keyword: 회복 알고리즘

Search Result 103, Processing Time 0.023 seconds

Image Processing Using Multiplierless Binomial QMF-Wavelet Filters (곱셈기가 없는 이진수 QMF-웨이브렛 필터를 사용한 영상처리)

  • 신종홍;지인호
    • Journal of Broadcast Engineering
    • /
    • v.4 no.2
    • /
    • pp.144-154
    • /
    • 1999
  • The binomial sequences are family of orthogonal sequences that can be generated with remarkable simplicity-no multiplications are necessary. This paper introduces a class of non-recursive multidimensional filters for frequency-selective image processing without multiplication operations. The magnitude responses are narrow-band. approximately gaussian-shaped with center frequencies which can be positioned to yield low-pass. band-pass. or high-pass filtering. Algorithms for the efficient implementation of these filters in software or in hardware are described. Also. we show that the binomial QMFs are the maximally flat magnitude square Perfect Reconstruction paraunitary filters with good compression capability and these are shown to be wavelet filters as well. In wavelet transform the original image is decomposed at different scales using a pyramidal algorithm architecture. The decomposition is along the vertical and horizontal direction and maintains constant the number of pixels required to describe the images. An efficient perfect reconstruction binomial QMF-Wavelet signal decomposition structure is proposed. The technique provides a set of filter solutions with very good amplitude responses and band split. The proposed binomial QMF-filter structure is efficient, simple to implement on VLSl. and suitable for multi-resolution signal decomposition and coding applications.

  • PDF

Shape Optimization of High Power Centrifugal Compressor Using Multi-Objective Optimal Method (다목적 최적화 기법을 이용한 고출력 원심압축기 형상 최적설계)

  • Kang, Hyun Su;Lee, Jeong Min;Kim, Youn Jea
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.39 no.5
    • /
    • pp.435-441
    • /
    • 2015
  • In this study, a method for optimal design of impeller and diffuser blades in the centrifugal compressor using response surface method (RSM) and multi-objective genetic algorithm (MOGA) was evaluated. A numerical simulation was conducted using ANSYS CFX with various values of impeller and diffuser parameters, which consist of leading edge (LE) angle, trailing edge (TE) angle, and blade thickness. Each of the parameters was divided into three levels. A total of 45 design points were planned using central composite design (CCD), which is one of the design of experiment (DOE) techniques. Response surfaces that were generated on the basis of the results of DOE were used to determine the optimal shape of impeller and diffuser blade. The entire process of optimization was conducted using ANSYS Design Xplorer (DX). Through the optimization, isentropic efficiency and pressure recovery coefficient, which are the main performance parameters of the centrifugal compressor, were increased by 0.3 and 5, respectively.

Development of Needs Assessment tool and Extraction Algorithm Fitting for Individuals in Care Management for the disabled in Home (재가장애인 사례관리의 욕구사정 정확도 향상을 위한 사정도구 개발과 욕구추출 알고리즘 과정 연구 - 데이터 마이닝 분석기법을 활용하여 -)

  • Kim, Young-Sook;Jung, Kook-In
    • Korean Journal of Social Welfare
    • /
    • v.60 no.2
    • /
    • pp.155-173
    • /
    • 2008
  • The study aims to develop a assessment tool to provide the in-home disabled in a local community with appropriate services in consideration of physical, emotional, social and environmental circumstances. After collection of assesment data of 200 in-home disabled through use of the tool, a desire-extracting algorithm was developed to provide a service to real needs through the use of decision tree analysis on data mining. The study was conducted for Five months from June 2006 through October 2006, and it is divided into development of an assessment tool and extraction of real needs through the use of the tool. The basic framework of the development of the tool was established through the examination of related literature, the subjective satisfaction of the assessment tool and items were developed through the use of a focus group and experts, and verification was implemented through the use of statistics to confirm the validity of the tool. As a result of the verification, the tool secured following validity and credibility as seen in

    and
    . In addition, real needs-extraction algorithm was established through the use of the assessment tool, and the algorithm according each desire was suggested as seen in . The assessment tool and algorithm suggested as a result of the study can be used as data to conduct systematic management of examples through the confirmation of objective desire of in-home disabled.

  • PDF
  • Applicability of Emergency Preemption Signal Control under UTIS (UTIS를 이용한 긴급차량 우선신호 제어방안)

    • Park, Soon-Yong;Kim, Dong-Nyong;Kim, Myung-Soo;Lee, Jung-Beom
      • The Journal of The Korea Institute of Intelligent Transport Systems
      • /
      • v.11 no.5
      • /
      • pp.27-37
      • /
      • 2012
    • Even thought the firefighters have to hurry to the scene to extinguish the blaze, the fire engines could not rushed out due to the worst of traffic condition. Traffic signal control is one of the most important methods to minimize the fire engines's travel time. The focus of this paper is to develop a traffic control strategy, which is emergency vehicle preemption algorithm considering pedestrian in order to reduce travel time of emergency vehicle. This algorithm also includes recovering strategy after preemption signal to minimize the other vehicle's delay. In order to estimate the effectiveness of traffic control, traffic simulation was performed using VISSIM micro simulation tool for two different kinds of networks, which were non-coordinated corridor and coordinated corridor. The differences of travel time and average delay between emergency vehicle and ordinary vehicle were respectively estimated under pre-existed pretimed signal and preemption traffic control at two respective networks. The results of the simulation for the emergency vehicle, travel time was reduced to 36.8~43.3% under "Add or Subtract" method whereas it was reduced to 30.7~46.0% under "Dwell" method. In addition, in non-coordinated corridor case of ordinary vehicle, average control delay of "Dwell" method was increased 33.5% whereas it grew 0.5% under coordinated corridor. And "Add or Subtract" method was confirmed that average control delay of ordinary vehicle was increased 0.7% under non-coordinated corridor whereas it swelled 4.5% under coordinated corridor.

    Garbage Collection Protocol of Fault Tolerance Information in Multi-agent Environments (멀티에이전트 환경에서 결함 포용 정보의 쓰레기 처리 기법)

    • 이대원;정광식;이화민;신상철;이영준;유헌창;이원규
      • Journal of KIISE:Computer Systems and Theory
      • /
      • v.31 no.3_4
      • /
      • pp.204-212
      • /
      • 2004
    • Existing distributed systems have higher probability of failures occurrence than stand-alone system, so many fault tolerant techniques have been developed. Because of insufficient storage resulting from the increased fault tolerance information stored, the performance of system has been degraded. To avoid performance degradation, it needs delete useless fault tolerance information. In this paper, we propose a garbage collection algorithm for fault tolerance information. And we define and design the garbage collection agent for garbage collection of fault tolerance information, the information agent for management of fault tolerant data, and the facilitator agent for communication between agents. Also, we propose the garbage collection algorithm using the garbage collection agent. For rollback recovery, we use independent checkpointing protocol and sender based pessimistic message logging protocol. In our proposed garbage collection algorithm, the garbage collection, information, and facilitator agent is created with process, and the information agent constructs domain knowledge with its checkpoints and non-determistic events. And the garbage collection agent decides garbage collection time, and it deletes useless fault tolerance information in cooperation with the information and facilitator agent. For propriety of proposed garbage collection technique using agents, we compare domain knowledge of system that performs garbage collection after rollback recovery and domain knowledge of system that doesn't perform garbage collection.

    Inline Binding For XNL DataInline Binding For XML Data (XML 데이터의 인라인 바인딩 방법)

    • Lee Eun-Jung;Yoo Ga-Yeon
      • The KIPS Transactions:PartA
      • /
      • v.13A no.1 s.98
      • /
      • pp.71-78
      • /
      • 2006
    • For using XML data in programming languages, there is a data binding method, which generates classes from XML type definitions. However, since existing binding frameworks for this method generate all classes for element definitions, the number of generated classes becomes large and the complexity of the overall application system gets high. In this research, we propose an inline binding method for selecting necessary classes from element definitions. In the proposed method, classes are created only for elements with repetitions and recursions, and they include fields for values of terminal elements. We introduce a generation algorithm for binding classes and the marshaling methods for recovering the omitted paths. We develop IBinder system to validate the proposed method and compare the generated codes with the ones of existing systems. As a result, we carl show that the number of generated classes decrease substantially compared to other systems.

    Efficient Resource Management Framework on Grid Service (그리드 서비스 환경에서 효율적인 자원 관리 프레임워크)

    • Song, Eun-Ha;Jeong, Young-Sik
      • Journal of KIISE:Computer Systems and Theory
      • /
      • v.35 no.5
      • /
      • pp.187-198
      • /
      • 2008
    • This paper develops a framework for efficient resource management within the grid service environment. Resource management is the core element of the grid service; therefore, GridRMF(Grid Resource Management Framework) is modeled and developed in order to respond to such variable characteristics of resources as accordingly as possible. GridRMF uses the participation level of grid resource as a basis of its hierarchical management. This hierarchical management divides managing domains into two parts: VMS(Virtual Organization Management System) for virtual organization management and RMS(Resource Management System) for metadata management. VMS mediates resources according to optimal virtual organization selection mechanism, and responds to malfunctions of the virtual organization by LRM(Local Resource Manager) automatic recovery mechanism. RMS, on the other hand, responds to load balance and fault by applying resource status monitoring information into adaptive performance-based task allocation algorithm.

    New Z-Cycle Detection Algorithm Using Communication Pattern Transformation for the Minimum Number of Forced Checkpoints (통신 유형 변형을 이용하여 검사점 생성 개수를 개선한 검사점 Z-Cycle 검출 기법)

    • Woo Namyoon;Yeom Heon Young;Park Taesoon
      • Journal of KIISE:Computer Systems and Theory
      • /
      • v.31 no.12
      • /
      • pp.692-703
      • /
      • 2004
    • Communication induced checkpointing (CIC) is one of the checkpointing techniques to provide fault tolerance for distributed systems. Independent checkpoints that each distributed process produces without coordination are likely to be useless. Useless checkpoints, which cannot belong to any consistent global checkpoint sets, induce nondeterminant rollback. To prevent the useless checkpoints, CIC forces processes to take additional checkpoints at proper moment. The number of those forced checkpoints is the main source of failure-free overhead in CIC. In this paper, we present two new CIC protocols which satisfy 'No Z-Cycle (NZC)'property. The proposed protocols reduce the number of forced checkpoints compared to the existing protocols with the drawback of the increase in message delay. Our simulation results with the synthetic data show that the proposed protocols have lower failure-free overhead than the existing protocols. Additionally, we show that the classical 'index-based checkpointing' protocols are inefficient in constructing the consistent global cut in distributed executions.

    Deep learning algorithms for identifying 79 dental implant types (79종의 임플란트 식별을 위한 딥러닝 알고리즘)

    • Hyun-Jun, Kong;Jin-Yong, Yoo;Sang-Ho, Eom;Jun-Hyeok, Lee
      • Journal of Dental Rehabilitation and Applied Science
      • /
      • v.38 no.4
      • /
      • pp.196-203
      • /
      • 2022
    • Purpose: This study aimed to evaluate the accuracy and clinical usability of an identification model using deep learning for 79 dental implant types. Materials and Methods: A total of 45396 implant fixture images were collected through panoramic radiographs of patients who received implant treatment from 2001 to 2020 at 30 dental clinics. The collected implant images were 79 types from 18 manufacturers. EfficientNet and Meta Pseudo Labels algorithms were used. For EfficientNet, EfficientNet-B0 and EfficientNet-B4 were used as submodels. For Meta Pseudo Labels, two models were applied according to the widen factor. Top 1 accuracy was measured for EfficientNet and top 1 and top 5 accuracy for Meta Pseudo Labels were measured. Results: EfficientNet-B0 and EfficientNet-B4 showed top 1 accuracy of 89.4. Meta Pseudo Labels 1 showed top 1 accuracy of 87.96, and Meta pseudo labels 2 with increased widen factor showed 88.35. In Top5 Accuracy, the score of Meta Pseudo Labels 1 was 97.90, which was 0.11% higher than 97.79 of Meta Pseudo Labels 2. Conclusion: All four deep learning algorithms used for implant identification in this study showed close to 90% accuracy. In order to increase the clinical applicability of deep learning for implant identification, it will be necessary to collect a wider amount of data and develop a fine-tuned algorithm for implant identification.

    A Study on Improving TCP Performance over ABR/UBR Services in ATM Network (ATM 망에서 ABR/UBR 서비스상의 TCP 성능 향상에 관한 연구)

    • 김명희;박승섭
      • Journal of Internet Computing and Services
      • /
      • v.1 no.2
      • /
      • pp.1-10
      • /
      • 2000
    • ATM network technology is generally used for the solution of integrating multimedia service in high-speed Internet. In Internet protocol based on ATM services, If single cell is lost in ATM layer, the entire TCP packet will be lost. Therefore, TCP performance will be degraded. In order to reduce cell loss, when congestion occur, UBR+EPD mechanism is proposed to improve the throughput in TCP over UBR, and ER scheme is suggested in TCP over ABR. In this paper, we analyzed the performance improvement effect of UBR+EPD with FRR (Fast Retransmission and Recovery), the adjusting EPD threshold parameter (R), and variation of MTU (Maximum Transport Unit) size. As a result, through the analysis of performance, we know that the improved throughput and fairness are shown by the proposed scheme.

    • PDF

    (34141) Korea Institute of Science and Technology Information, 245, Daehak-ro, Yuseong-gu, Daejeon
    Copyright (C) KISTI. All Rights Reserved.