• Title/Summary/Keyword: Multiplication formula

Search Result 34, Processing Time 0.02 seconds

Jointly Learning of Heavy Rain Removal and Super-Resolution in Single Images

  • Vu, Dac Tung;Kim, Munchurl
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2020.11a
    • /
    • pp.113-117
    • /
    • 2020
  • Images were taken under various weather such as rain, haze, snow often show low visibility, which can dramatically decrease accuracy of some tasks in computer vision: object detection, segmentation. Besides, previous work to enhance image usually downsample the image to receive consistency features but have not yet good upsample algorithm to recover original size. So, in this research, we jointly implement removal streak in heavy rain image and super resolution using a deep network. We put forth a 2-stage network: a multi-model network followed by a refinement network. The first stage using rain formula in the single image and two operation layers (addition, multiplication) removes rain streak and noise to get clean image in low resolution. The second stage uses refinement network to recover damaged background information as well as upsample, and receive high resolution image. Our method improves visual quality image, gains accuracy in human action recognition task in datasets. Extensive experiments show that our network outperforms the state of the art (SoTA) methods.

  • PDF

A Study on the mathematical notation of expression in terms of skipping the parenthesis (괄호 생략 관점에서 식의 표기에 관한 고찰)

  • Kim, Chang Su;Kang, Jeong Gi
    • Journal of the Korean School Mathematics Society
    • /
    • v.19 no.1
    • /
    • pp.1-19
    • /
    • 2016
  • This study investigated the mathematical notation used today in terms of skip ping the parenthesis. At first we have studied the elementary and secondary curriculum content related to omitted rules. As a result, it is difficult to find explicit evidence to answer that question 'What is the calculation of the $48{\div}2(9+3)$?'. In order to inquire the notation fundamentally, we checked the characteristics on prefix, infix and postfix, and looked into the advantages and disadvantages on infix. At the same time we illuminated the development of mathematical notation from the point of view of skipping the parenthesis. From this investigation, we could check that this interpretation was smooth in the point of view that skipping the parentheses are the image of the function. Through this we proposed some teaching methods including 'teaching mathematical notation based on historic genetic principle', 'reproduction of efforts to overcome the disadvantages of infix and understand the context to choose infix', 'finding the omitted parentheses to identify the fundamental formula' and 'specifying the viewpoint that skipping the multiplication notation can be considered as an image of the function'.

Analysis of the Sixth Graders' Strategies and Errors of Division-With-Remainder Problems (나머지가 있는 나눗셈 문장제에 대한 초등학교 6학년 학생들의 해결 전략 및 오류 분석)

  • Ha, Mihyun;Chang, Hyewon
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.20 no.4
    • /
    • pp.717-735
    • /
    • 2016
  • For teaching division-with-remainder(DWR) problems, it is necessary to know students' strategies and errors about DWR problems. The purpose of this study is to investigate and analyze students' strategies and errors of DWR problems and to make some meaningful suggestions for teaching various methods of solving DWR problems. We constructed a test which consists of fifteen DWR problems to investigate students' solving strategies and errors. These problems include mathematical as well as syntactic structures. To apply this test, we selected 177 students from eight elementary schools in various districts of Seoul. The results were analyzed both qualitatively and quantitatively. The sixth graders' strategies can be classified as follows : Single strategies, Multi strategies and Assistant strategies. They used Division(D) strategy, Multiplication(M) strategy, and Additive Approach(A) strategy as sub-strategies. We noticed that frequently used strategies do not coincide with strategies for their success. While students in middle group used Assistant strategies frequently, students in higher group used Single strategies frequently. The sixth graders' errors can be classified as follows : Formula error(F error), Calculation error(C error), Calculation Product error(P error) and Interpretation error(I error). In this study, there were 4 elements for syntaxes in problems : large number, location of divisor and dividend, divisor size, vocabularies. When students in lower group were solving the problems, F errors appeared most frequently. However, in case of higher group, I errors appeared most frequently. Based on these results, we made some didactical suggestions.

Quantitative Methodology to Assess Cyber Security Risks of SCADA system in Electric Power Industry (전력 SCADA 시스템의 사이버 보안 위험 평가를 위한 정량적 방법론에 관한 연구)

  • Kang, Dong-Joo;Lee, Jong-Joo;Lee, Young;Lee, Im-Sop;Kim, Huy-Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.3
    • /
    • pp.445-457
    • /
    • 2013
  • This paper is about the study to build a quantitative methodology to assess cyber threats and vulnerabilities on control systems. The SCADA system in power industry is one of the most representative and biggest control systems. The SCADA system was originally a local system but it has been extended to wide area as both ICT and power system technologies evolve. Smart Grid is a concept to integrate energy and IT systems, and therefore the existing cyber threats might be infectious to the power system in the integration process. Power system is operated on a real time basis and this could make the power system more vulnerable to the cyber threats. It is a unique characteristic of power systems different from ICT systems. For example, availability is the most critical factor while confidentiality is the one from the CIA triad of IT security. In this context, it is needed to reflect the different characteristics to assess cyber security risks in power systems. Generally, the risk(R) is defined as the multiplication of threat(T), vulnerability(V), and asset(A). This formula is also used for the quantification of the risk, and a conceptual methodology is proposed for the objective in this study.