• Title/Summary/Keyword: Input information

Search Result 10,129, Processing Time 0.038 seconds

Efficient Color Image Segmentation using SOM and Grassfire Algorithm (SOM과 grassfire 기법을 이용한 효율적인 컬러 영상 분할)

  • Hwang, Young-Chul;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.08a
    • /
    • pp.142-145
    • /
    • 2008
  • This paper proposes a computationally efficient algorithm for color image segmentation using self-organizing map(SOM) and grassfire algorithm. We reduce a computation time by decreasing the number of input neuron and input data which is used for learning at SOM. First converting input image to CIE $L^*u^*v^*$ color space and run the learning stage with the SOM-input neuron size is three and output neuron structure is 4by4 or 5by5. After learning, compute output value correspondent with input pixel and merge adjacent pixels which have same output value into segment using grassfire algorithm. The experimental results with various images show that proposed method lead to a good segmentation results than others.

  • PDF

Secure Fingerprint Identification System based on Optical Encryption (광 암호화를 이용한 안전한 지문 인식 시스템)

  • 한종욱;김춘수;박광호;김은수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2415-2423
    • /
    • 1999
  • We propose a new optical method which conceals the data of authorized persons by encryption before they are stored or compared in the pattern recognition system for security systems. This proposed security system is made up of two subsystems : a proposed optical encryption system and a pattern recognition system based on the JTC which has been shown to perform well. In this system, each image of authorized persons as a reference image is stored in memory units through the proposed encryption system. And if a fingerprint image is placed in the input plane of this security system for access to a restricted area, the image is encoded by the encryption system then compared with the encrypted reference image. Therefore because the captured input image and the reference data are encrypted, it is difficult to decrypt the image if one does not know the encryption key bit stream. The basic idea is that the input image is encrypted by performing optical XOR operations with the key bit stream that is generated by digital encryption algorithms. The optical XOR operations between the key bit stream and the input image are performed by the polarization encoding method using the polarization characteristics of LCDs. The results of XOR operations which are detected by a CCD camera should be used as an input to the JTC for comparison with a data base. We have verified the idea proposed here with computer simulations and the simulation results were also shown.

  • PDF

A Study on Minimization Algorithm for ESOP of Multiple - Valued Function (다치 논리 함수의 ESOP 최소화 알고리즘에 관한 연구)

  • Song, Hong-Bok
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.7
    • /
    • pp.1851-1864
    • /
    • 1997
  • This paper presents an algorithm simplifying the ESOP function by several rules. The algorithm is repeatedly performing operations based on the state of each terms by the product transformation operation of two functions and thus it is simplifying the ESOP function through the reduction of the product terms. Through the minimization of the product terms of the multi-valued input binary multi-output function, an optimization of the input has been done using EXOR PLA with input decoder. The algorithm when applied to four valued arithmetic circuit has been used for a EXOR logic circuit design and the two bits input decoder has been used for a EXOR-PLA design. It has been found from a computer simulation(IBM PC486) that the suggested algorithm can reduce the product terms of the output function remarkably regardless of the number of input variables when the variable AND-EXOR PLA is applied to the poperation circuit.

  • PDF

Scalable Broadcast Switch Architecture (가변형 방송 스위치 구조)

  • 정갑중;이범철
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.291-294
    • /
    • 2004
  • In this paper, we consider the broadcast switch architecture for hish performance multicast packet switching. In input and output buffered switch, we propose a new switch architecture which supports high throughput in broadcast packet switching with switch planes of single input and multiple output crossbars. The proposed switch architecture has a central arbiter that arbitrates requests from plural input ports and generates multiple grant signals to multiple output ports in a packet transmission slot. It provides high speed pipelined arbitration and large scale switching capacity.

  • PDF

Vehicle-Level Traffic Accident Detection on Vehicle-Mounted Camera Based on Cascade Bi-LSTM

  • Son, Hyeon-Cheol;Kim, Da-Seul;Kim, Sung-Young
    • Journal of Advanced Information Technology and Convergence
    • /
    • v.10 no.2
    • /
    • pp.167-175
    • /
    • 2020
  • In this paper, we propose a traffic accident detection on vehicle-mounted camera. In the proposed method, the minimum bounding box coordinates the central coordinates on the bird's eye view and motion vectors of each vehicle object, and ego-motions of the vehicle equipped with dash-cam are extracted from the dash-cam video. By using extracted 4 kinds features as the input of Bi-LSTM (bidirectional LSTM), the accident probability (score) is predicted. To investigate the effect of each input feature on the probability of an accident, we analyze the performance of the detection the case of using a single feature input and the case of using a combination of features as input, respectively. And in these two cases, different detection models are defined and used. Bi-LSTM is used as a cascade, especially when a combination of the features is used as input. The proposed method shows 76.1% precision and 75.6% recall, which is superior to our previous work.

Artificial Neural Networks for Flood Forecasting Using Partial Mutual Information-Based Input Selection

  • Jae Gyeong Lee;Li Li;Kyung Soo Jun
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2023.05a
    • /
    • pp.363-363
    • /
    • 2023
  • Artificial Neural Networks (ANN) is a powerful tool for addressing various practical problems and it has been extensively applied in areas of water resources. In this study, Artificial Neural Networks (ANNs) were developed for flood forecasting at specific locations on the Han River. The Partial Mutual Information (PMI) technique was used to select input variables for ANNs that are neither over-specified nor under-specified while adequately describing the underlying input-output relationships. Historical observations including discharges at the Paldang Dam, flows from tributaries, water levels at the Paldang Bridge, Banpo Bridge, Hangang Bridge, and Junryu gauge station, and time derivatives of the observed water levels were considered as input candidates. Lagged variables from current time t to the previous five hours were assumed to be sufficient in this study. A three-layer neural network with one hidden layer was used and the neural network was optimized by selecting the optimal number of hidden neurons given the selected inputs. Given an ANN architecture, the weights and biases of the network were determined in the model training. The use of PMI-based input variable selection and optimized ANNs for different sites were proven to successfully predict water levels during flood periods.

  • PDF

Implementation of Property Input Automation Program for Building Information Modeling (BIM) Property Set (BIM 속성분류체계 구축을 위한 속성입력 자동화 프로그램 구현)

  • Nam, Jeong-Yong;Joo, Jae-Ha;Kim, Tae-Hyung
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.33 no.2
    • /
    • pp.73-79
    • /
    • 2020
  • Building Information Modeling (BIM) tools have not only increased the use of technology in the design process, but also increased the need for more information standard systems. The object classification system consists of 327 types of construction results obtained from 25 kinds of facilities, 174 types of parts, and 207 types of construction parts. In the previous study, the property classification system was developed into 4 major classifications, 13 middle classifications, 58 small classifications (category), and 333 attribution information of roads and rivers. It is extremely difficult to input the property information according to such extensive object classification. In addition, the development of external applications such as Revit plug-ins has created a need to automate specific and repetitive tasks. Therefore, following the BIM property classification system, an attribute input program was implemented for the system to enhance the productivity and convenience of the BIM users.

A study on Password Input Method to Protect Keyboard hooking (Keyboard hooking 방지를 위한 패스워드 입력 방법 연구)

  • Kang, Seung-Gu;Kwak, Jin-Suk;Lee, Young-Sil;Lee, Hoon-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2011.10a
    • /
    • pp.241-244
    • /
    • 2011
  • Recently, Due to development of Internet techniques, user suddenly increased that Used of Web services and with out constraints of place and time has been provided. typically, Web services used ID/Password authentication. User confirmed personal data Stored on Web servers after user authorized. web service provider is to provide variety security techniques for the protection personal information. However, recently accident has happened is the malicious attackers may capture user information such as users entered personal information through new keyboard hooking. In this paper, we propose a keyboard hooking protected password input method using CAPTCHA. The proposed password input method is based on entering the password using mouse click or touch pad on the CAPTCHA image. The mapping of CAPTCHA image pixels is random.

  • PDF

Privacy-Preserving k-means Clustering of Encrypted Data (암호화된 데이터에 대한 프라이버시를 보존하는 k-means 클러스터링 기법)

  • Jeong, Yunsong;Kim, Joon Sik;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.6
    • /
    • pp.1401-1414
    • /
    • 2018
  • The k-means clustering algorithm groups input data with the number of groups represented by variable k. In fact, this algorithm is particularly useful in market segmentation and medical research, suggesting its wide applicability. In this paper, we propose a privacy-preserving clustering algorithm that is appropriate for outsourced encrypted data, while exposing no information about the input data itself. Notably, our proposed model facilitates encryption of all data, which is a large advantage over existing privacy-preserving clustering algorithms which rely on multi-party computation over plaintext data stored on several servers. Our approach compares homomorphically encrypted ciphertexts to measure the distance between input data. Finally, we theoretically prove that our scheme guarantees the security of input data during computation, and also evaluate our communication and computation complexity in detail.

Improving Malicious Web Code Classification with Sequence by Machine Learning

  • Paik, Incheon
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.3 no.5
    • /
    • pp.319-324
    • /
    • 2014
  • Web applications make life more convenient. Many web applications have several kinds of user input (e.g. personal information, a user's comment of commercial goods, etc.) for the activities. On the other hand, there are a range of vulnerabilities in the input functions of Web applications. Malicious actions can be attempted using the free accessibility of many web applications. Attacks by the exploitation of these input vulnerabilities can be achieved by injecting malicious web code; it enables one to perform a variety of illegal actions, such as SQL Injection Attacks (SQLIAs) and Cross Site Scripting (XSS). These actions come down to theft, replacing personal information, or phishing. The existing solutions use a parser for the code, are limited to fixed and very small patterns, and are difficult to adapt to variations. A machine learning method can give leverage to cover a far broader range of malicious web code and is easy to adapt to variations and changes. Therefore, this paper suggests the adaptable classification of malicious web code by machine learning approaches for detecting the exploitation user inputs. The approach usually identifies the "looks-like malicious" code for real malicious code. More detailed classification using sequence information is also introduced. The precision for the "looks-like malicious code" is 99% and for the precise classification with sequence is 90%.