• Title/Summary/Keyword: Generate Data

Search Result 3,065, Processing Time 0.037 seconds

Clustering based on Dependence Tree in Massive Data Streams

  • Yun, Hong-Won
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.2
    • /
    • pp.182-186
    • /
    • 2008
  • RFID systems generate huge amount of data quickly. The data are associated with the locations and the timestamps and the containment relationships. It is requires to assure efficient queries and updates for product tracking and monitoring. We propose a clustering technique for fast query processing. Our study presents the state charts of temporal event flow and proposes the dependence trees with data association and uses them to cluster the linked events. Our experimental evaluation show the power of proposing clustering technique based on dependence tree.

WeXGene: Web-based XML Data Generator (WeXGene: 웹 기반 XML 데이터 생성기)

  • Shin Sun Mi;Jeong Hoe Jin;Lee Sang Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.2 s.98
    • /
    • pp.199-210
    • /
    • 2005
  • We need XML generate various kinds of XML data to evaluate XML database systems. Existing XML data generators are developed to generate XML data that are suitable for particular evaluation methods, and their functionalities are limited in terms of generating XML data This paper introduces a new XML data generator, WeXGene, that not only improves the drawbacks of existing data generators but also adds new data generation functionalities. For generating XML data WeXGene uses the user data files and the structure definition files, which specify SDTD(Symbolic DTD) or input parameters. The user data file is a text data file that has column data or row data. It is also possible that WeXGene generates XML data without accessing the user data file. This paper presents the design details, overall system architecture, and data generation process of WeXGene. An analytic comparison with other XML data generators is also presented.

Finite Element Modeling of the Rat Cervical Spine and Adjacent Tissues from MRI Data (MRI 데이터를 이용한 쥐의 경추와 인접한 조직의 유한요소 모델화)

  • Chung, Tae-Eun
    • Korean Journal of Computational Design and Engineering
    • /
    • v.17 no.6
    • /
    • pp.436-442
    • /
    • 2012
  • Traumatic loading during car accidents or sports activities can lead to cervical spinal cord injury. Experiments in spinal cord injury research are mainly carried out on rabbit or rat. Finite element models that include the rat cervical spinal cord and adjacent soft tissues should be developed for efficient studies of mechanisms of spinal cord injury. Images of a rat were obtained from high resolution MRI scanner. Polygonal surfaces were extracted structure by structure from the MRI data using the ITK-SNAP volume segmentation software. These surfaces were converted to Non-uniform Rational B-spline surfaces by the INUS Rapidform rapid prototyping software. Rapidform was also used to generate a thin shell surface model for the dura mater which sheathes the spinal cord. Altair's Hypermesh pre-processor was used to generate finite element meshes for each structure. These processes in this study can be utilized in modeling of other biomedical tissues and can be one of examples for reverse engineering on biomechanics.

A Study on the Non-Authority Control System (무전거시스템에 관한 연구)

  • Choi Suk-Doo
    • Journal of the Korean Society for Library and Information Science
    • /
    • v.25
    • /
    • pp.233-264
    • /
    • 1993
  • The authorized form is called the heading must be unique and consistent. Without both uniqueness and cosistency, retrieval from the bibliographic database will not be optimal and in some cases may even be impossible. But the authority control is extremely expensive, because it is labour-intensive and dependent on professional investigation and judgement. In fact, it is by far the most expensive function in all of bibliographic control. The processes used to determine the form of access points. maintain. use. and evaluate very accurate authority records reduce the efficiency to generate or merge bibliographic items without modification from any national level bibliographic utilities as well as individual library. In this paper non-authority control system was suggested to solve the disadvantages of authority work. The apparent advantages of the non-authority control system are it is easy to determine the heading, input the bibliographic data. integrate the access points into an existing file, and generate and merge bibliographic data without modification. In addition, non-authority control system can be transmitted into online information retrieval system conducted with a mixture of controlled vocabularies and natural language.

  • PDF

Generation of Forest Leaf Area Index (LAI) Map Using Multispectral Satellite Data and Field Measurements

  • Lee, Kyu-Sung;Kim, Sun-Hwa;Park, Yoon-Il;Jang, Ki-Chang
    • Korean Journal of Remote Sensing
    • /
    • v.19 no.5
    • /
    • pp.371-380
    • /
    • 2003
  • The primary objective of this study is to develop a suitable methodology to generate forest leaf area index (LAI) map at regional and local scales. To build empirical models, we collected the LAI values at 30 sample plots over the forest within the kyongan watershed area by the field measurements using an optical instrument. Landsat-7 ETM+ multispectral data obtained at the same growing season with the field LAI measurement were used. Three datasets of remote sensing signal were prepared for analyzing the relationship with the field measured LAI value and they include raw DN, atmospherically corrected reflectance, and topographically corrected reflectance. From the correlation analysis and regression model development, we found that the radiometric correction of topographic effects was very critical step to increase the sensitivity of the multispectral reflectance to LAI. In addition, the empirical model to generate forest LAI map should be separately developed for each of coniferous and deciduous forest.

Attentive Transfer Learning via Self-supervised Learning for Cervical Dysplasia Diagnosis

  • Chae, Jinyeong;Zimmermann, Roger;Kim, Dongho;Kim, Jihie
    • Journal of Information Processing Systems
    • /
    • v.17 no.3
    • /
    • pp.453-461
    • /
    • 2021
  • Many deep learning approaches have been studied for image classification in computer vision. However, there are not enough data to generate accurate models in medical fields, and many datasets are not annotated. This study presents a new method that can use both unlabeled and labeled data. The proposed method is applied to classify cervix images into normal versus cancerous, and we demonstrate the results. First, we use a patch self-supervised learning for training the global context of the image using an unlabeled image dataset. Second, we generate a classifier model by using the transferred knowledge from self-supervised learning. We also apply attention learning to capture the local features of the image. The combined method provides better performance than state-of-the-art approaches in accuracy and sensitivity.

CAD Based Robot Off-line Programming for Shoe Adhesive Application System (신발 접착제 도포 시스템을 위한 CAD 기반 로봇 오프라인 프로그래밍)

  • 윤중선;차동혁;김진영
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.10 no.7
    • /
    • pp.643-648
    • /
    • 2004
  • Most of shoes manufacturing processes are not yet automated, which puts restrictions on the increase of productivity. Among them, adhesive application processes particularly are holding the most workers and working hours. In addition, its working conditions are very poor due to the toxicity of adhesive agents. In case of automating adhesive application processes by using robots, the robot teaching by playback is difficult to produce high productivity because the kinds of shoes to be taught mount up to several thousands. Therefore, it is essential to generate the robot working paths automatically according to the kind, the size, and the right and left of shoes, and also to teach them to the robot automatically. This study deals with automated adhesive spraying to shoe outsoles and uppers by using a robot, and develops the program to generate three-dimensional robot working paths off-line based on CAD data. First, the three-dimensional data of an outsole outline or an upper profiling line are extracted from the two-dimensional CAD drawing file or the three-dimensional scanner. Next, based on the extracted data and the nozzle conditions for adhesive spraying, a robot working path is generated automatically. This research work is the core in automating adhesive spraying processes, and will do much for increasing productivity of shoes manufacturing.

Large eddy simulation of a square cylinder flow: Modelling of inflow turbulence

  • Tutar, M.;Celik, I.
    • Wind and Structures
    • /
    • v.10 no.6
    • /
    • pp.511-532
    • /
    • 2007
  • The present study aims to generate turbulent inflow data to more accurately represent the turbulent flow around a square cylinder when the inflow turbulence level is significant. The modified random flow generation (RFG) technique in conjunction with a previously developed LES code is successfully adopted into a finite element based fluid flow solver to generate the required inflow turbulence boundary conditions for the three-dimensional (3-D) LES computations of transitional turbulent flow around a square cylinder at Reynolds number of 22,000. The near wall region is modelled without using wall approximate conditions and a wall damping coefficient is introduced into the calculation of sub-grid length scale in the boundary layer of the cylinder wall. The numerical results obtained from simulations are compared with each other and with the experimental data for different inflow turbulence boundary conditions in order to discuss the issues such as the synthetic inflow turbulence effects on the 3-D transitional flow behaviour in the near wake and the free shear layer, the basic mechanism by which stream turbulence interacts with the mean flow over the cylinder body and the prediction of integral flow parameters. The comparison among the LES results with and without inflow turbulence and the experimental data emphasizes that the turbulent inflow data generated by the present RFG technique for the LES computation can be a viable approach in accurately predicting the effects of inflow turbulence on the near wake turbulent flow characteristics around a bluff body.

Wavelet-Monte Carlo Simulation for Virtual Fabric Imaging (웨이블릿-몬테 카를로법을 이용한 가상 직물이미지의 모사)

  • Joo-Yong, Kim
    • Science of Emotion and Sensibility
    • /
    • v.7 no.3
    • /
    • pp.1-6
    • /
    • 2004
  • The algorithm developed in this paper allows us to generate or synthesize a large amount of data sets using only a small amount of signal features obtained from the original data set. Because the simulated density profiles of yarns retain the original features without a significant loss of information on the location of imperfections, the resulting fabric images are likely to resemble the original images. The data expansion system developed could generate a large area of fabric images by combining the Monte Carlo simulation and the wavelet sub-band exchange algorithm developed. The system has proven effective for simulating realistic fabric images by retaining the location of imperfections such as neps, thin and thick places.

  • PDF

Cryptographic Key Generation Method Using Biometrics and Multiple Classification Model (생체 정보와 다중 분류 모델을 이용한 암호학적 키 생성 방법)

  • Lee, Hyeonseok;Kim, Hyejin;Nyang, DaeHun;Lee, KyungHee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1427-1437
    • /
    • 2018
  • While biometric authentication system has been in general use, research is ongoing to apply biometric data to public key infrastructure. It is a significant task to generate a cryptographic key from biometrics in setting up a public key of Bio-PKI. Methods for generating the key by quantization of feature vector can cause data loss and degrade the performance of key extraction. In this paper, we suggest a new method for generating a cryptographic key from classification results of biometric data using multiple classifying models. Our proposal does not cause data loss of feature vector so it showed better performance in key extraction. Also, it uses the multiple models to generate key blocks which produce sufficient length of the key.