• Title/Summary/Keyword: M-algorithm

Search Result 3,973, Processing Time 0.035 seconds

Computer Simulation for X-ray Breast Elastography (X선 유방 탄성 영상을 위한 컴퓨터 모의 실험)

  • Kim, Hyo-Geun;Aowlad Hossain, A.B.M.;Lee, Soo-Yeol;Cho, Min-Hyoung
    • Journal of Biomedical Engineering Research
    • /
    • v.32 no.2
    • /
    • pp.158-164
    • /
    • 2011
  • Breast cancer is the most frequently appearing cancer in women, these days. To reduce mortality of breast cancer, periodic check-up is strongly recommended. X-ray mammography is one of powerful diagnostic imaging systems to detect 50~100 um micro-calcification which is the early sign of breast cancer. Although x-ray mammography has very high spatial resolution, it is not easy yet to distinguish cancerous tissue from normal tissues in mammograms and new tissue characterizing methods are required. Recently ultrasound elastography technique has been developed, which uses the phenomenon that cancerous tissue is harder than normal tissues. However its spatial resolution is not enough to detect breast cancer. In order to develop a new elastography system with high resolution we are developing x-ray elasticity imaging technique. It uses the small differences of tissue positions with and without external breast compression and requires an algorithm to detect tissue displacement. In this paper, computer simulation is done for preliminary study of x-ray elasticity imaging. First, 3D x-ray breast phantom for modeling woman's breast is created and its elastic model for FEM (finite element method) is generated. After then, FEM experiment is performed under the compression of the breast phantom. Using the obtained displacement data, 3D x-ray phantom is deformed and the final mammogram under the compression is generated. The simulation result shows the feasibility of x-ray elasticity imaging. We think that this preliminary study is helpful for developing and verifying a new algorithm of x-ray elasticity imaging.

A Study on Distance Relay of Transmission UPFC Using Artificial Neural Network (신경회로망을 이용한 UPFC가 연계된 송전선로의 거리계전기에 관한 연구)

  • Lee, Jun-Kyong;Park, Jeong-Ho;Lee, Seung-Hyuk;Kim, Jin-O
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.6
    • /
    • pp.37-44
    • /
    • 2004
  • This paper represents a new approach for the protective relay of power transmission lines using a Artificial Neural Network(ANN). A different fault m transmission lines need to be detected classified and located accurately and cleared as fast as possible. However, The protection range of the distance relay is always designed on the basis of fixed settings, and unfortunately these approach do not have the ability to adapt dynamically to the system operating condition. ANN is suitable for the adaptive relaying and the detection of complex faults. The backpropagation algerian based multi-layer protection is utilized for the teaming process. It allows to make control to various protection functions. As expected, the simulation result demonstrate that this approach is useful and satisfactory.

2,048 bits RSA public-key cryptography processor based on 32-bit Montgomery modular multiplier (32-비트 몽고메리 모듈러 곱셈기 기반의 2,048 비트 RSA 공개키 암호 프로세서)

  • Cho, Wook-Lae;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.8
    • /
    • pp.1471-1479
    • /
    • 2017
  • This paper describes a design of RSA public-key cryptography processor supporting key length of 2,048 bits. A modular multiplier that is core arithmetic function in RSA cryptography was designed using word-based Montgomery multiplication algorithm, and a modular exponentiation was implemented by using Left-to-Right (LR) binary exponentiation algorithm. A computation of a modular multiplication takes 8,386 clock cycles, and RSA encryption and decryption requires 185,724 and 25,561,076 clock cycles, respectively. The RSA processor was verified by FPGA implementation using Virtex5 device. The RSA cryptographic processor synthesized with 100 MHz clock frequency using a 0.18 um CMOS cell library occupies 12,540 gate equivalents (GEs) and 12 kbits memory. It was estimated that the RSA processor can operate up to 165 MHz, and the estimated time for RSA encryption and decryption operations are 1.12 ms and 154.91 ms, respectively.

A Study on Development of Automatic Westing Software by Vectorizing Technique (벡터라이징을 이용한 자동부재배치 소프트웨어 개발에 관한 연구)

  • Lho T.J.;Kang D.J.;Kim M.S.;Park Jun-Yeong;Park S.W.
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2005.10a
    • /
    • pp.748-753
    • /
    • 2005
  • Among processes to manufacture parts from footwear materials like upper leathers, one of the most essential processes is the cutting one optimally arranging lots of parts on raw footwear materials and cutting. A new nesting strategy was proposed for the 2-dimensional part layout by using a two-stage approach, where which can be effectively used for water jet cutting. In the initial layout stage, a SOAL(Self-Organization Assisted Layout) based on the combination of FCM(Fuzzy C-Means) and SOM was adopted. In the layout improvement stage, SA(Simulated Annealing) based approach was adopted for a finer layout. The proposed approach saves much CPU time through a two-stage approach scheme, while other annealing-based algorithm so far reported fur a nesting problem are computationally expensive. The proposed nesting approach uses the stochastic process, and has a much higher possibility to obtain a global solution than the deterministic searching technique. We developed the automatic nesting software of NST(ver.1.1) software for footwear industry by implementing of these proposed algorithms. The NST software was applied by the optimized automatic arrangement algorithm to cut without the loss of leathers. if possible, after detecting damage areas. Also, NST software can consider about several features in not only natural loathers but artificial ones. Lastly, the NST software can reduce a required time to implement generation of NC code. cutting time, and waste of raw materials because the NST software automatically performs parts arrangement, cutting paths generation and finally NC code generation, which are needed much effect and time to generate them manually.

  • PDF

A Design of AES-based Key Wrap/Unwrap Core for WiBro Security (와이브로 보안용 AES기반의 Key Wrap/Unwrap 코어 설계)

  • Kim, Jong-Hwan;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1332-1340
    • /
    • 2007
  • This paper describes an efficient hardware design of key wrap/unwrap algorithm for security layer of WiBro system. The key wrap/unwrap core (WB_KeyWuW) is based on AES (Advanced Encryption Standard) algorithm, and performs encryption/decryption of 128bit TEK (Traffic Encryption Key) with 128bit KEK (Key Encryption Key). In order to achieve m area-efficient implementation, two design techniques are considered; First, round transformation block within AES core is designed using a shared structure for encryption/decryption. Secondly, SubByte/InvSubByte blocks that require the largest hardware in AES core are implemented by using field transformation technique. As a result, the gate count of the WB_KeyWuW core is reduced by about 25% compared with conventional LUT (Lookup Table)-based design. The WB_KeyWuW con designed in Verilog-HDL has about 14,300 gates, and the estimated throughput is about $16{\sim}22-Mbps$ at 100-MHz@3.3V, thus the designed core can be used as an IP for the hardware design of WiBro security system.

Effect of the Number of Detectors on Performance of Industrial SPECT (산업용 SPECT의 검출기 개수가 영상 해상도에 미치는 영향 평가)

  • Park, Jang Guen;Kim, Chan Hyeong;Kim, Jong Bum;Moon, Jinho;Jung, Sung-Hee
    • Journal of Radiation Industry
    • /
    • v.5 no.4
    • /
    • pp.325-330
    • /
    • 2011
  • To predict the details of flow in industrial process unit, single photon emission computed tomography (SPECT) is a promising technique. Recently, industrial SPECT based on medical system has developed by researchers of the Korea Atomic Energy Research Institute (KAERI) and Hanyang University. In the present study, to confirm the effect of the number of detectors on image quality, and determine the optimal number of detectors in industrial SPECT, industrial SPECT system with various geometries were evaluated by the Monte Carlo simulation. CsI(Tl) detectors ($12mm{\times}12mm{\times}20mm$) with collimators (the geometric resolution of collimator $R_g$ was 4 cm at the center of the 30 cm diameter cylindrical vessel object) were modeled in a hexagonal array, and the point sources of $^{99m}Tc$, $^{68}Ga$, and $^{137}Cs$ were simulated at the center of the cylindrical vessel object using the MCNPX code. Then, the reconstruction images of each geometry were reconstructed using the expectation maximization (EM) algorithm. In this study, the reciprocity theorem was used to improve computation time required for system matrix of the EM algorithm. The result shows that the resolution of the reconstructed image was significantly improved by increasing the number of detectors in industrial SPECT system and more than 60 detectors will be required for the resolution of the reconstructed image.

Numerical Computation of Radar Scattering Coefficient for Randomly Rough Dielectric Surfaces (불규칙적으로 거친 유전체 표면에서의 레이더 산란계수 수치해석적 계산)

  • 차형준;오이석
    • Korean Journal of Remote Sensing
    • /
    • v.16 no.1
    • /
    • pp.65-72
    • /
    • 2000
  • Scattering coefficients of randomly rough lossy dielectric surfaces were computed by using the FDTD(Finite-Difference Time-Domain) method and the Monte Carlo method in this paper. The FDTD method was applied to compute electromagnetic wave scattering characteristics at any incident angles, any linear polarizations by dividing the computation region into the total-field region and the scattered-field region. The radar cross sections(RCS) of conducting cylinders have been computed and compared with theoretical results, measurement data and the results from the method of moment(MoM) to verify the FDTD algorithm. Then, to apply the algorithm to compute scattering coefficients of distributed targets, a two-dimensionally rough surface was generated numerically for given roughness characteristics. The far-zone scattered fields of 50 statistically independent dielectric rough surfaces were computed and the scattering coefficient of the surface was calculated from the scattered fields by using the Monte Carlo method. It was found that these scattering coefficients agree well with the SPM(Small Pertubation Method) model in its validity region.

Damage detection on a full-scale highway sign structure with a distributed wireless sensor network

  • Sun, Zhuoxiong;Krishnan, Sriram;Hackmann, Greg;Yan, Guirong;Dyke, Shirley J.;Lu, Chenyang;Irfanoglu, Ayhan
    • Smart Structures and Systems
    • /
    • v.16 no.1
    • /
    • pp.223-242
    • /
    • 2015
  • Wireless sensor networks (WSNs) have emerged as a novel solution to many of the challenges of structural health monitoring (SHM) in civil engineering structures. While research projects using WSNs are ongoing worldwide, implementations of WSNs on full-scale structures are limited. In this study, a WSN is deployed on a full-scale 17.3m-long, 11-bay highway sign support structure to investigate the ability to use vibration response data to detect damage induced in the structure. A multi-level damage detection strategy is employed for this structure: the Angle-between-String-and-Horizon (ASH) flexibility-based algorithm as the Level I and the Axial Strain (AS) flexibility-based algorithm as the Level II. For the proposed multi-level damage detection strategy, a coarse resolution Level I damage detection will be conducted first to detect the damaged region(s). Subsequently, a fine resolution Level II damage detection will be conducted in the damaged region(s) to locate the damaged element(s). Several damage cases are created on the full-scale highway sign support structure to validate the multi-level detection strategy. The multi-level damage detection strategy is shown to be successful in detecting damage in the structure in these cases.

Numerical Investigation of Dual Mode Ramjet Combustor Using Quasi 1-Dimensional Solver (근사 1차원 솔버를 이용한 이중모드 램제트 연소실 해석)

  • Yang, Jaehoon;Nam, Jaehyun;Kang, Sanghun;Yoh, Jai-ick
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.49 no.11
    • /
    • pp.909-917
    • /
    • 2021
  • In this work, a one-dimensional combustor solver was constructed for the scramjet control m odel. The governing equations for fluid flow, Arrhenius based combustion kinetics, and the inje ction model were implemented into the solver. In order to validate the solver, the zero-dimensi onal ignition delay problem and one-dimensional scramjet combustion problem were considered and showed that the solver successfully reproduced the results from the literature. Subsequentl y, a ramjet analysis algorithm under subsonic speed conditions was constructed, and a study o n the inlet Mach number of the combustor was carried out through the thermal choking locatio ns at ram conditions. In such conditions, a model for precombustion shock train analysis was i mplemented, and the algorithm for transition section analysis was introduced. In addition, in or der to determine the appropriateness of the ram mode analysis in the code, the occurrence of a n unstart was studied through the length of the pseudo-shock in the isolator. A performance a nalysis study was carried out according to the geometry of the combustor.

Pedestrian-Based Variational Bayesian Self-Calibration of Surveillance Cameras (보행자 기반의 변분 베이지안 감시 카메라 자가 보정)

  • Yim, Jong-Bin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.9
    • /
    • pp.1060-1069
    • /
    • 2019
  • Pedestrian-based camera self-calibration methods are suitable for video surveillance systems since they do not require complex calibration devices or procedures. However, using arbitrary pedestrians as calibration targets may result in poor calibration accuracy due to the unknown height of each pedestrian. To solve this problem in the real surveillance environments, this paper proposes a novel Bayesian approach. By assuming known statistics on the height of pedestrians, we construct a probabilistic model that takes into account uncertainties in both the foot/head locations and the pedestrian heights, using foot-head homology. Since solving the model directly is infeasible, we use variational Bayesian inference, an approximate inference algorithm. Accordingly, this makes it possible to estimate the height of pedestrians and to obtain accurate camera parameters simultaneously. Experimental results show that the proposed algorithm is robust to noise and provides accurate confidence in the calibration.