• Title/Summary/Keyword: 2중타원

Search Result 78, Processing Time 0.026 seconds

Extraction of lipoma Using ART2 from Ultrasonic Images (초음파 영상에서 ART2를 이용한 지방종 추출)

  • Lim, Hyo-Bin;Kim, Kwang Baek
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2015.10a
    • /
    • pp.507-509
    • /
    • 2015
  • 본 논문에서는 지방종 초음파 영상에서 지방종을 자동적으로 추출하는 방법을 제안한다. 제안된 방법은 초음파 영상에 Monotone Cubic Spline 보간법을 이용하여 ROI영역을 추출한다. 추출된 ROI 영역에 Fuzzy Stretching 기법을 적용하여 명암 대비를 강조한 후, ART2 알고리즘과 8방향 윤곽선 추적 알고리즘을 적용하여 잡음을 제거한 후에 지방종의 후보 영역을 추출한다. 추출된 지방종의 후보 영역 중에서 형태학적으로 타원 형태를 띠거나 가장 큰 후보 영역의 정보를 이용하여 Labeling 기법을 적용하여 최종적으로 지방종 영역을 추출한다. 제안된 방법을 지방종 초음파 영상에 실험한 결과, 지방종 영역이 비교적 정확히 추출되는 것을 실험을 통하여 확인하였다.

  • PDF

A Real-Time Head Tracking Algorithm Using Mean-Shift Color Convergence and Shape Based Refinement (Mean-Shift의 색 수렴성과 모양 기반의 재조정을 이용한 실시간 머리 추적 알고리즘)

  • Jeong Dong-Gil;Kang Dong-Goo;Yang Yu Kyung;Ra Jong Beom
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.6
    • /
    • pp.1-8
    • /
    • 2005
  • In this paper, we propose a two-stage head tracking algorithm adequate for real-time active camera system having pan-tilt-zoom functions. In the color convergence stage, we first assume that the shape of a head is an ellipse and its model color histogram is acquired in advance. Then, the min-shift method is applied to roughly estimate a target position by examining the histogram similarity of the model and a candidate ellipse. To reflect the temporal change of object color and enhance the reliability of mean-shift based tracking, the target histogram obtained in the previous frame is considered to update the model histogram. In the updating process, to alleviate error-accumulation due to outliers in the target ellipse of the previous frame, the target histogram in the previous frame is obtained within an ellipse adaptively shrunken on the basis of the model histogram. In addition, to enhance tracking reliability further, we set the initial position closer to the true position by compensating the global motion, which is rapidly estimated on the basis of two 1-D projection datasets. In the subsequent stage, we refine the position and size of the ellipse obtained in the first stage by using shape information. Here, we define a robust shape-similarity function based on the gradient direction. Extensive experimental results proved that the proposed algorithm performs head hacking well, even when a person moves fast, the head size changes drastically, or the background has many clusters and distracting colors. Also, the propose algorithm can perform tracking with the processing speed of about 30 fps on a standard PC.

Field Investigation of Bridge Scours in Small and Medium Streams(2) (우리나라 중.소 하천의 세굴특성 조사연구(2))

  • Yeo, Un-Gwang;Gang, Jun-Gu
    • Journal of Korea Water Resources Association
    • /
    • v.32 no.1
    • /
    • pp.49-59
    • /
    • 1999
  • In order to understand the present situation of bridge scouring and to provide the fundamental information for bridge design, in-situ measured data is analyzed for bridge scours at small and medium streams in the heartland of Korea. The physical parameters affecting the bridge scouring such as flow depth, velocity, pier length and width, scouring depth, and the angle between flow and pier are extensively surveyed and measured. According to the locality and the pier type data are classified to analyze. With these data, some important factors for the scour depth such as flow depth, angle and Froude number are investigated and applied to existing formulas proposed by many researchers. In addition, the computational results are compared with the measured and some of the applicable formulas in this region are recommended.

  • PDF

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.

Influence of Radome Types on GNSS Antenna Phase Center Variation (GNSS 안테나 위상중심변동에 레이돔이 미치는 영향)

  • Yun, Seonghyeon;Lee, Hungkyu
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.38 no.1
    • /
    • pp.11-21
    • /
    • 2020
  • This paper deals with the impact of a GNSS (Global Navigation Satellite System) antenna radome on the PCV (Phase Center Variations) and the estimated kinematic coordinates. For the Trimble and Leica antennas, specially set up CORS (Continuously Operation Reference Stations) in Korea, the PCC (Phase Center Corrections) were calculated and compared for NONE, SCIS, SCIT, and TZGD radome from the PCV model published by the IGS (International GNSS Services). The results revealed that the PCC differences compared to the NONE were limited to about 1mm in the horizontal component while those of the vertical direction ranged from a few millimeters to a maximum of 7mm. Among the radomes of which PCV were compared, the SCIT had the most significant influence on the vertical component, and its GPS (Global Positioning System) L2 and L2 PCC (Phase Center Corrections) had opposite direction. As a result of comparing the kinematic coordinates estimated by the baseline processing of 7 CORSs with an application of the PCV models of the various radomes, the SCIS which was actually installed at CORS in Korea showed 3.4mm bias, the most substantial impact on the ellipsoidal height estimation whereas the SCIT model resulted in relatively small biases.

Mutual Authentication and Key Establishment Mechanism for Secure Data Sharing in M2M Environment (M2M 환경에서 안전한 데이터 공유를 위한 상호인증 및 키 교환 기법)

  • Park, JungOh;Kim, Sangkun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.4
    • /
    • pp.33-41
    • /
    • 2015
  • With rapid rise of virtualization technology from diverse types of cloud computing service, security problems such as data safety and reliability are the issues at stake. Since damage in virtualization layer of cloud service can cause damage on all host (user) tasks, Hypervisor that provides an environment for multiple virtual operating systems can be a target of attackers. This paper propose a security structure for protecting Hypervisor from hacking and malware infection.

Analysis of Flow Characteristics Around Floating Structure Using 3D Numerical Simulation (3차원 수치모의를 이용한 부유 구조물 주변 흐름특성 분석)

  • Kim, Myoung-Hwan;Cho, Won-Cheol;Lee, Du-Han;Rhee, Dong-Sup
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2011.05a
    • /
    • pp.146-150
    • /
    • 2011
  • 본 연구에서는 길이 35.6m, 폭 4m, 사행도 1.8의 2회 사행하는 복단면 사행하도의 상류 직선부와 만곡 정점부 6개 지점에 폭 0.4m, 길이 0.8m의 타원기둥 형태의 부유 구조물을 구성하여, 0.25m, 0.40m의 수심 조건으로 수치모의를 수행하였다. 수치모의 결과자료 중에서 부유 구조물 주변의 흐름특성을 국부적으로 분석해 본 결과 부유 구조물이 없을 때의 흐름과는 상당히 다른 흐름특성들이 발견되었는데, 특히 그 중에서도 부유 구조물 아래에서 작용하는 상승류와 부유 구조물로 인한 단면 이차류의 분리가 두드러졌다. 이와 함께 수로 유입부와 유출부 사이의 총 수두 값 변화도 수로 내 부유 구조물의 유무에 따라 다르게 나타났다. 그리고 이러한 결과들 모두 동일 측선 상에서라도 부유 구조물의 위치가 바뀌면 다른 양상으로 나타났다. 본 연구에서는 하도 내에 부유 구조물이 있을 때 부유 구조물의 위치에 따른 통수능 및 흐름특성의 변화를 3차원 수치모의 결과를 통하여 보여준다. 그리고 그 결과들은 하도 내 부유 구조물을 설치 할 때, 검토대상에 부유 구조물 뿐 아니라 하도형태 및 하천의 흐름특성도 함께 포함되어야 함을 뒷받침해준다.

  • PDF

Study on the Improvement about User Authentication of Android Third Party Application Through the Vulnerability in Google Voice (구글 보이스 취약점을 통한 안드로이드 서드 파티 어플리케이션의 사용자 인증 개선방안 연구)

  • Lee, Seyeong;Park, Jaekyun;Hong, Sungdae;Choi, Hyoungki
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • In the Android market, a large portion of the market share consists of third party applications, but not much research has been performed in this respect. Of these applications, mobile Voice Over IP (VoIP) applications are one of the types of applications that are used the most. In this paper, we focus on user authentication methods for three representative applications of the Google Voice service, which is a famous mobile VoIP application. Then, with respect to the Android file system, we developed a method to store and to send user information for authentication. Finally, we demonstrate a vulnerability in the mechanism and propose an improved mechanism for user authentication by using hash chaining and an elliptic curve Diffie-Hellman key exchange.

A Fundamental Study on the Fracture Mechanism of Steel Plates under Completely Alternating Load (완전교번하중하(完全交番荷重下)에서의 강판(鋼板)의 파괴기구(破壞機構)에 관한 기차적(基磋的) 연구(研究))

  • Chang, Dong Il;Chung, Yeong Wha
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.2 no.3
    • /
    • pp.1-13
    • /
    • 1982
  • Transition process of plastic region. displacements, stresses and strains ahead the flaw tips were analysed by the finite element method on the steel plate with the circular hole and the one with the elliptical hole under completely alternating load (repetition of tensile loading, unloading and compressive loading). As the results, the followings were obtained. Transition process of elastic failure (yielding) region was estimated. From this the tendency was confirmed that the fracture would be initiated from ahead the flaw tip, and propagated along the $45^{\circ}$ direction. The fundamental data available in estimating the stress intensity factor that was considered as the core in analysing the fracture mechanism of steel plates were obtained. It was indicated that when unloading after tension the effect of compressive loading, and even the compressive reyield, was occured ahead the flaw tip. Similarly it was indicated that when unloading after compression the effect of tensile loading, and even the tensile reyield, was occured ahead the flaw tip. It was considered that these phenomena were occured because the unloading effect was constrained by the residual strains when unloading. It was considered that the fatigue phenomenon was occured ahead, the flaw tip by repetition of tensile yield, the above compressive reyield, compressive yeild and the above tensile reyield. In addition, the tendency was confirmed that the fracture ahead the flaw tip was occured as the flaw was changed from the circular hole to the elliptical hole and became to be the crack lastly.

  • PDF

A password-based mutual authentication and key-agreement protocol (패스워드 기반의 상호 인증 및 키 교환 프로토콜)

  • 박호상;정수환
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.37-43
    • /
    • 2002
  • This paper proposes a password-based mutual authentication and key agreement protocol, which is designed by applying ECDSA and ECDH. The proposed protocol, AKE-ECC, computes 2 times of point multiplication over ECC on each of client and server, and generates the key pairs(public key. private key) and a common session key using ECDH that is different compare to previously proposed protocol. It is against common attacks include a dictionary attack and the security of proposed protocol is based on the ECDLP, ECDH.