• Title/Summary/Keyword: Binary sequence

Search Result 280, Processing Time 0.025 seconds

A New High speed, Low Power TFT-LCD Driving Method (새로운 고속, 저전력 TFT-LCD 구동 방법)

  • Park, Soo-Yang;Son, Sang-Hee;Chung, Won-Sup
    • Journal of IKEEE
    • /
    • v.10 no.2 s.19
    • /
    • pp.134-140
    • /
    • 2006
  • This paper proposed a low power resource allocation algorithm for the minimum switching activity of operators in high level synthesis. In this paper, the proposed method finds switching activity in circuit each functional unit exchange for binary sequence length and value bit are logic one value. To use the switching activity was found the allocation with minimal power consumption, the proposed method visits all control steps one by one and determines the allocation with minimal power consumption at each control step. As the existing method, the execution time can be fast according to use the number of operator and maximal control step. And it is the reduction effect from 8.5% to 9.3%.

  • PDF

An X-masking Scheme for Logic Built-In Self-Test Using a Phase-Shifting Network (위상천이 네트워크를 사용한 X-마스크 기법)

  • Song, Dong-Sup;Kang, Sung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.44 no.2
    • /
    • pp.127-138
    • /
    • 2007
  • In this paper, we propose a new X-masking scheme for utilizing logic built-in self-test The new scheme exploits the phase-shifting network which is based on the shift-and-add property of maximum length pseudorandom binary sequences(m-sequences). The phase-shifting network generates mask-patterns to multiple scan chains by appropriately shifting the m-sequence of an LFSR. The number of shifts required to generate each scan chain mask pattern can be dynamically reconfigured during a test session. An iterative simulation procedure to synthesize the phase-shifting network is proposed. Because the number of candidates for phase-shifting that can generate a scan chain mask pattern are very large, the proposed X-masking scheme reduce the hardware overhead efficiently. Experimental results demonstrate that the proposed X-masking technique requires less storage and hardware overhead with the conventional methods.

Vehicle Speed Measurement using SAD Algorithm (SAD 알고리즘을 이용한 차량 속도 측정)

  • Park, Seong-Il;Moon, Jong-Dae;Ko, Young-Hyuk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.14 no.5
    • /
    • pp.73-79
    • /
    • 2014
  • In this paper, we proposed the mechanism which can measure traffic flow and vehicle speed on the highway as well as road by using the video and image processing to detect and track cars in a video sequence. The proposed mechanism uses the first few frames of the video stream to estimate the background image. The visual tracking system is a simple algorithm based on the sum of absolute frame difference. It subtracts the background from each video frame to produce foreground images. By thresholding and performing morphological closing on each foreground image, the proposed mechanism produces binary feature images, which are shown in the threshold window. By measuring the distance between the "first white line" mark and the "second white line"mark proceeding, it is possible to find the car's position. Average velocity is defined as the change in position of an object divided by the time over which the change takes place. The results of proposed mechanism agree well with the measured data, and view the results in real time.

Detection and Molecular Identification of Human Enteric Viruses in Urban Rivers in Korea

  • Lee, Cheong-Hoon;Kim, Sang-Jong
    • Proceedings of the Microbiological Society of Korea Conference
    • /
    • 2008.05a
    • /
    • pp.171-171
    • /
    • 2008
  • We monitored the occurrence of human enteric viruses in urban rivers by cell culture-PCR and RT-nested PCR. Water samples were collected monthly or semimonthly between May 2002 and March 2003 in four urban tributaries. Enteric viruses were detected by RT-nested PCR and cell culture-PCR based on a combination of Buffalo Green monkey kidney (BGMK) and A549 cell lines, followed by phylogenetic analysis of amplicons. By RT-nested PCR analysis, 45 (77.6%), 32 (55.2%), 32 (55.2%), 26 (44.8%), 12 (20.7%), 2 (3.4%), 4 (6.9%), and 4 (6.9%) of 58 samples showed positive results with adenoviruses, enteroviruses, noroviruses (NV) genogroup I (GI) and II (GII), reoviruses, hepatitis A viruses, rotaviruses and sapoviruses, respectively. Adenoviruses were most often detected and only eight (13.8%) samples were negative for adenoviruses and positive for other enteric viruses in the studied sites. Thirty-one (77.5%) of the 40 samples were positive for infectious adenoviruses and/or enteroviruses based on cell culture-PCR, and the frequency of positive samples grown on A549 and BGMK (65.0%) was higher than that grown on BGMK alone (47.5%). The occurrence of each enteric virus, except reoviruses and hepatitis A viruses was not statistically correlated with the water temperature and levels of fecal coliforms according to Binary logistic regression model. By sequence analysis, most strains of adenoviruses and enteroviruses detected in this study are similar to the causative agent of viral diseases in Korea and most NV GI- and GII-grouped strains were closely related to the reference strains from China and Japan, and GII/4-related strains had similar sequences to strains recognized as a worldwide epidemic outbreak. Our results suggested that monitoring human enteric viruses is necessary to improve microbial quality and cell culture-PCR using the combination of A549 and BGMK cells and the adenovirus detection by PCR could be useful for monitoring viral contamination in the aquatic environment.

  • PDF

A Video Watermarking Based on Wavelet Transform Using Spread Spectrum Technique (대역확산방법을 이용한 웨이블릿 기반의 비디오 워터마킹)

  • Kim, Seung-Jin;Kim, Tae-Su;Lee, Kuhn-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.11-18
    • /
    • 2005
  • In this paper, we proposed a video watermarking algerian based on wavelet transform using statistical characteristic of video according to the energy distribution and the spread spectrum technique. In the proposed method, the original video is splitted by spatial difference metric and classified into the motion region and the motionless region according to the motion degree. The motion region is decomposed into 3-levels using 3D DWT and the motionless region is decomposed into 2-levels using 2D DWT The baseband of the wavelet-decomposed image is not utilized because of the image quality. So that the standard deviation of the highest subband coefficients except for the baseband is used to determine the threshold. Binary video watermarks preprocessed by the random permutation and the spread spectrum technique are embedded into selected coefficients. In computer experiments, the proposed algorithm was found to be more invisible and robust than the conventional algorithms.

On the Analysis of DS/CDMA Multi-hop Packet Radio Network with Auxiliary Markov Transient Matrix. (보조 Markov 천이행렬을 이용한 DS/CDMA 다중도약 패킷무선망 분석)

  • 이정재
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.5
    • /
    • pp.805-814
    • /
    • 1994
  • In this paper, we introduce a new method which is available for analyzing the throughput of the packet radio network by using the auxiliary Markov transient matrix with a failure state and a success state. And we consider the effect of symbol error for the network state(X, R) consisted of the number of transmitting PRU X and receiving PRU R. We examine the packet radio network of a continuous time Markov chain model, and the direct sequence binary phase shift keying CDMA radio channel with hard decision Viterbi decoding and bit-by-bit changing spreading code. For the unslotted distributed multi-hop packet radio network, we assume that the packet error due to a symbol error of radio channel has Poisson process, and the time period of an error occurrence is exponentially distributed. Through the throughputs which are found as a function of radio channel parameters, such as the received signal to noise ratio and chips of spreading code per symbol, and of network parameters, such as the number of PRU and offered traffic rate, it is shown that this composite analysis enables us to combine the Markovian packet radio network model with a coded DS/BPSK CDMA radio channel.

  • PDF

Efficient Evaluation of Path Expressions Using Connectivity of Nodes (노드의 연결성을 이용한 패스 표현의 효과적인 처리)

  • Lee, Tae-Gyeong
    • The KIPS Transactions:PartD
    • /
    • v.9D no.3
    • /
    • pp.337-344
    • /
    • 2002
  • Recently, there has been a lot of research on graph-type data because it can model seamless the application domains such as GIS, network, WWW, multimedia presentations etc., and domain in which the data sequence is important. In this paper, an efficient code system, called node code system, is proposed to evaluate paths of DAG in a multimedia presentation graph. The node code system assigns a unique binary string to each node of a graph. The comparison of node codes of two nodes tells the connectivity between the nodes without actual traversal of a graph. The method using the property of the node code system allows us to construct the paths between two nodes more efficiently than the method using conventional graph traversals. The algorithms to construct paths using the node code system are provided.

The prediction of appearance of jellyfish through Deep Neural Network (심층신경망을 통한 해파리 출현 예측)

  • HWANG, CHEOLHUN;Han, Myung-Mook
    • Journal of Internet Computing and Services
    • /
    • v.20 no.5
    • /
    • pp.1-8
    • /
    • 2019
  • This paper carried out a study to reduce damage from jellyfish whose population has increased due to global warming. The emergence of jellyfish on the beach could result in casualties from jellyfish stings and economic losses from closures. This paper confirmed from the preceding studies that the pattern of jellyfish's appearance is predictable through machine learning. This paper is an extension of The prediction model of emergence of Busan coastal jellyfish using SVM. In this paper, we used deep neural network to expand from the existing methods of predicting the existence of jellyfish to the classification by index. Due to the limitations of the small amount of data collected, the 84.57% prediction accuracy limit was sought to be resolved through data expansion using bootstraping. The expanded data showed about 7% higher performance than the original data, and about 6% better performance compared to the transfer learning. Finally, we used the test data to confirm the prediction performance of jellyfish appearance. As a result, although it has been confirmed that jellyfish emergence binary classification can be predicted with high accuracy, predictions through indexation have not produced meaningful results.

Study on the comparison result of Machine code Program (실행코드 비교 감정에서 주변장치 분석의 유효성)

  • Kim, Do-Hyeun;Lee, Kyu-Tae
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.1
    • /
    • pp.37-44
    • /
    • 2020
  • The similarity of the software is extracted by the verification of comparing with the source code. The source code is the intellectual copyright of the developer written in the programming language. And the source code written in text format contains the contents of the developer's expertise and ideas. The verification for judging the illegal use of software copyright is performed by comparing the structure and contents of files with the source code of the original and the illegal copy. However, there is hard to do the one-to-one comparison in practice. Cause the suspected source code do not submitted Intentionally or unconsciously. It is now increasing practically. In this case, the comparative evaluation with execution code should be performed, and indirect methods such as reverse assembling method, reverse engineering technique, and sequence analysis of function execution are applied. In this paper, we analyzed the effectiveness of indirect comparison results by practical evaluation . It also proposes a method to utilize to the system and executable code files as a verification results.

Observational Feature of Ejecta-Companion Interaction of A Type Ia SN 2021hpr Via The Very Early Light Curve

  • Lim, Gu;Im, Myungshin;Paek, Gregory S.H;Yoon, Sung-Chul;Choi, Changsu;Kim, Sophia;Seo, Jinguk;Kang, Wonseok;Kim, Taewoo;Sung, Hyun-Il;Kim, Yonggi;Yoon, Joh-Na
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.46 no.2
    • /
    • pp.50.3-51
    • /
    • 2021
  • The progenitor of Type Ia supernovae is largely expected as a close binary system of a carbon/oxygen white dwarf (WD) primary and its secondary non-degenerate (single degenerate; SD) or degenerate companion (double degenerate; DD). Here we present a high-cadence monitoring observation of SN 2021hpr in a spiral galaxy, NGC 3147. SN 2021hpr shows typical characteristics as a normal type Ia supernova from its photometric (Δm15(B)=1.01±0.03, dust free MB,max=-19.45±0.02) and spectroscopic data. To investigate its progenitor system, we fit the early part of BVRI-band light curve simultaneously with a combined version of ejecta-companion and simple power-law model. As a result, we found a significant feature of an early excess possibly from a 7.63±0.52R-sized companion at the optimal viewing angle while the fit is not successful at the common viewing angle. No possible red sources brighter than F555W=-7.01 AB mag is detected at the SN location in Hubble Space Telescope (HST) pre-explosion images, excluding massive stars with initial mass of >16M as companions. We suggest the progenitor system of SN 2021hpr can be a fairly large companion such as a main sequence, a low mass subgiant, and a helium giant star. In addition, a possibility of the ejecta-Disk Originated Matter (DOM) interaction for the DD scenario considering linearly-rising early flux still remains.

  • PDF