• Title/Summary/Keyword: Processing operation

Search Result 2,863, Processing Time 0.03 seconds

A Study on Motion Estimator Design Using DCT DC Value (DCT 직류 값을 이용한 움직임 추정기 설계에 관한 연구)

  • Lee, Gwon-Cheol;Park, Jong-Jin;Jo, Won-Gyeong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.3
    • /
    • pp.258-268
    • /
    • 2001
  • The compression method is necessarily used to send the high quality moving picture that contains a number of data in image processing. In the field of moving picture compression method, the motion estimation algorithm is used to reduce the temporal redundancy. Block matching algorithm to be usually used is distinguished partial search algorithm with full search algorithm. Full search algorithm be used in this paper is the method to compare the reference block with entire block in the search window. It is very efficient and has simple data flow and control circuit. But the bigger the search window, the larger hardware size, because large computational operation is needed. In this paper, we design the full search block matching motion estimator. Using the DCT DC values, we decide luminance. And we apply 3 bit compare-selector using bit plane to I(Intra coded) picture, not using 8 bit luminance signals. Also it is suggested that use the same selective bit for the P(Predicted coded) and B(Bidirectional coded) picture. We compare based full search method with PSNR(Peak Signal to Noise Ratio) for C language modeling. Its condition is the reference block 8$\times$8, the search window 24$\times$24 and 352$\times$288 gray scale standard video images. The result has small difference that we cannot see. And we design the suggested motion estimator that hardware size is proved to reduce 38.3% for structure I and 30.7% for structure II. The memory is proved to reduce 31.3% for structure I and II.

  • PDF

Study on the method of safety diagnosis of electrical equipments using fuzzy algorithm (퍼지알고리즘을 이용한 전기전자기기의 안전진단방법에 대한 연구)

  • Lee, Jae-Cheol
    • Journal of Digital Convergence
    • /
    • v.16 no.7
    • /
    • pp.223-229
    • /
    • 2018
  • Recently, the necessity of safety diagnosis of electrical devices has been increasing as the fire caused by electric devices has increased rapidly. This study is concerned with the safety diagnosis of electric equipment using intelligent Fuzzy technology. It is used as a diagnostic input for the multiple electrical safety factors such as the use current, cumulative use time, deterioration and arc characteristics inherent to the equipment. In order to extract these information in real time, a device composed of various sensor circuits, DSP signal processing, and communication circuit is implemented. The fuzzy logic algorithm using the Gaussian function for each information is designed and compiled to be implemented on a small DSP board. The fuzzy logic receives the four diagnostic information, deduces it by the fuzzy engine, and outputs the overall safety status of the device as a 100-step analog fuzzy value familiar to human sensibility. By experiments of a device that combines hardware and fuzzy algorithm implemented in this study, it is verified that it can be implemented in a small DSP board with human-friendly fuzzy value, diagnosing real-time safety conditions during operation of electric equipment. In the future, we expect to be able to study more intelligent diagnostic systems based on artificial intelligent with AI dedicated Micom.

A PageRank based Data Indexing Method for Designing Natural Language Interface to CRM Databases (분석 CRM 실무자의 자연어 질의 처리를 위한 기업 데이터베이스 구성요소 인덱싱 방법론)

  • Park, Sung-Hyuk;Hwang, Kyeong-Seo;Lee, Dong-Won
    • CRM연구
    • /
    • v.2 no.2
    • /
    • pp.53-70
    • /
    • 2009
  • Understanding consumer behavior based on the analysis of the customer data is one essential part of analytic CRM. To do this, the analytic skills for data extraction and data processing are required to users. As a user has various kinds of questions for the consumer data analysis, the user should use database language such as SQL. However, for the firm's user, to generate SQL statements is not easy because the accuracy of the query result is hugely influenced by the knowledge of work-site operation and the firm's database. This paper proposes a natural language based database search framework finding relevant database elements. Specifically, we describe how our TableRank method can understand the user's natural query language and provide proper relations and attributes of data records to the user. Through several experiments, it is supported that the TableRank provides accurate database elements related to the user's natural query. We also show that the close distance among relations in the database represents the high data connectivity which guarantees matching with a search query from a user.

  • PDF

Development and Validation of A Decision Support System for the Real-time Monitoring and Management of Reservoir Turbidity Flows: A Case Study for Daecheong Dam (실시간 저수지 탁수 감시 및 관리를 위한 의사결정지원시스템 개발 및 검증: 대청댐 사례)

  • Chung, Se-Woong;Jung, Yong-Rak;Ko, Ick-Hwan;Kim, Nam-Il
    • Journal of Korea Water Resources Association
    • /
    • v.41 no.3
    • /
    • pp.293-303
    • /
    • 2008
  • Reservoir turbidity flows degrade the efficiency and sustainability of water supply system in many countries located in monsoon climate region. A decision support system called RTMMS aimed to assist reservoir operations was developed for the real time monitoring, modeling, and management of turbidity flows induced by flood runoffs in Daecheong reservoir. RTMMS consists of a real time data acquisition module that collects and stores field monitoring data, a data assimilation module that assists pre-processing of model input data, a two dimensional numerical model for the simulation of reservoir hydrodynamics and turbidity, and a post-processor that aids the analysis of simulation results and alternative management scenarios. RTMMS was calibrated using field data obtained during the flood season of 2004, and applied to real-time simulations of flood events occurred on July of 2006 for assessing its predictive capability. The system showed fairly satisfactory performance in reproducing the density flow regimes and fate of turbidity plumes in the reservoir with efficient computation time that is a vital requirement for a real time application. The configurations of RTMMS suggested in this study can be adopted in many reservoirs that have similar turbidity issues for better management of water supply utilities and downstream aquatic ecosystem.

Students' Recognition on the Experiment and Practice of Technology.Home Economics in Middle schools (중학교 기술.가정 교과의 실험.실습 운영에 관한 학습자 인식 연구)

  • Song Ji-Sun;Doo Kyung-Ja;Hong Hee-Young
    • Journal of Korean Home Economics Education Association
    • /
    • v.18 no.2 s.40
    • /
    • pp.29-45
    • /
    • 2006
  • This study was to investigate the perception of middle school students on the management of the curriculum $\ulcorner$Technology Home Economics$\lrcorner$ according to the 7th National Curriculum. The subjects were 494 third grade students from middle schools located in Seoul, in order to inquire into their perceptions through the questionnaire. The collected data was analyzed with the descriptive statistics, Pearson Chi-Square, t-test, and one-way ANOVA by SPSS Win ver. 12.0 program. The major findings were as follows: Firstly there were gender differences on the interests for the subject of $\ulcorner$Technology Home Economics$\lrcorner$. The girls who were interested in the subject were much more numerous than the boys, but only in the technology part of it, the boys were more interested than the girls. Secondly the students recognized that the experiment & practice for learning $\ulcorner$Technology Home Economics$\lrcorner$ was important. They, however, recognized that its operation in school was not enough to understand the contents. The higher a student viewed the importance of the experiment & practice on $\ulcorner$Technology Home Economics$\lrcorner$, the higher his perception of its usefulness in real life. Thirdly the highest ranking of its usefulness for the contents of the subject $\ulcorner$Technology Home Economics$\lrcorner$ was identified as 'the Computer and Information Processing' and 'the Nutrients and Diet in Adolescence'. These findings suggest that the importance of the experiment & practice was enhanced and the gender differences on the usefulness of the experiment & practice on the each units were considered in order to increase the degree of the students' interest and usefulness of the $\ulcorner$Technology Home Economics$\lrcorner$

  • PDF

A Study on Low-Cost RFID System Mutual Authentication Scheme using Key Division (키 분할을 이용한 Low-Cost RFID 시스템 상호 인증 방안에 관한 연구)

  • Kang, Soo-Young;Lee, Im-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.14C no.5
    • /
    • pp.431-438
    • /
    • 2007
  • RFID system is core technology that construct ubiquitous environment for replacement of barcode technology. Use ratio of RFID system rapidly increase because the technology has many good points such as identification speed, storage space, convenience etc. But low-cost tag operates easily by query of reader, so the system happened user privacy violent problem by tag information exposure. The system studied many ways for security application, but operation capability of low-cost tag is about $5K{\sim}10K$ gates, but only $250{\sim}3K$ gates allocated security part. So it is difficult to apply security to the system. Therefore, this scheme uses dividing 64 bits and reduces arithmetic, so proposed scheme provide mutual authentication that can apply to low-cost RFID system. Existing methods divide by 4 and used 96 bits. However, that reduces 32 bits length for lightweight and reduced from communication number of times of 7 times to 5 times. Also, because offer security by random number than existing scheme that generate two random numbers, that is more efficient. However, uses hash function for integrity that was not offered by XOR arithmetic and added extension of proposed scheme. Extended scheme is not offered efficiency than methods that use XOR arithmetic, but identification distance is mode that is proposed secure so that can use in for RFID system.

Implementation of payment settlement system through Cyber Bank for Electronic Commerce (전자상거래용 사이버뱅크의 지불결제시스템 구축)

  • Kim, Moon-Shik;Lee, Eun-Seok
    • The KIPS Transactions:PartD
    • /
    • v.15D no.1
    • /
    • pp.121-130
    • /
    • 2008
  • In line with the enhanced weight and variety of electronic commerce in business activities, new type of payment settlement and banking system which will enable to store, create and transfer values from the existing method of payment settlement is highly required. Cyber Banking system draws strong attention being the solution of there requirements. The existing Cyber Banking system has the difficulty of operation, administration, in addition to the problem of initial facility investment of big amount, resulted from the usage of the current business process. As the existing Cyber Bank system is unable to carry out the function of storing, creating, and transferring values due to the adoption conventional credit card system instead of the application of non-stop payment system between the seller and buyer. As a result, current Cyber Bank system still imply the deficiency of non-performing cash payment function on internet. This paper describes (1) an integrated application process, One Process One Input (OPOI) which is essential for software development of the Cyber Bank, (2) an application process of payment settlement system to be applied to the electronic commerce in Internet. And then, with these for a basis, (3) design and implementation of payment settlement system through CyberBank for Electronic Commerce. Consequently, by means of this suggested process, we could attempt to solve the problem of existing Cyber Bank system and further to explore the possibility of advanced Cyber Banking being the non-stop payment settlement system. The effectiveness of this suggested system has been practically confirmed.

A Study on the Design of EA Performance Evaluation Model and the Application Case (EA성과평가 모델의 설계 및 적용사례에 관한 연구)

  • Lee, Seok-Kyun;Lee, Young-Min;Rhew, Sung-Yul
    • The KIPS Transactions:PartD
    • /
    • v.16D no.3
    • /
    • pp.395-406
    • /
    • 2009
  • Korean government has operated EA by the act on efficient introduction of information system and operation, etc. But the evaluation system for EA and the criteria don't prepare well. Particularly, There is no model for EA performance measurement and the way is insufficient. In this study, we derived 8 areas and 17 criteria for the performance evaluation based on the Performance Reference Model of U.S FEA and Korea. And we also derived 8 areas and 10 criteria for it based on the OMB EA Assessment Framework and the EA maturity model in Korea. We propose the performance evaluation model of the five areas that consists of the business performance, customer performance, process, human resource and the technology for EA performance evaluation. To verify the model, we applied the model to three organizations and evaluated EA performance. In addition, we compared the performance result with the performance evaluation area of EA maturity model of Korea to verify the result. We also analyzed the criteria of the proposed performance evaluation model with the current EA maturity model and Performance Reference Model of Korea. As a result of the evaluation, we verified of the proposed performance evaluation model, too.

A Fast String Matching Scheme without using Buffer for Linux Netfilter based Internet Worm Detection (리눅스 넷필터 기반의 인터넷 웜 탐지에서 버퍼를 이용하지 않는 빠른 스트링 매칭 방법)

  • Kwak, Hu-Keun;Chung, Kyu-Sik
    • The KIPS Transactions:PartC
    • /
    • v.13C no.7 s.110
    • /
    • pp.821-830
    • /
    • 2006
  • As internet worms are spread out worldwide, the detection and filtering of worms becomes one of hot issues in the internet security. As one of implementation methods to detect worms, the Linux Netfilter kernel module can be used. Its basic operation for worm detection is a string matching where coming packet(s) on the network is/are compared with predefined worm signatures(patterns). A worm can appear in a packet or in two (or more) succeeding packets where some part of worm is in the first packet and its remaining part is in its succeeding packet(s). Assuming that the maximum length of a worm pattern is less than 1024 bytes, we need to perform a string matching up to two succeeding packets of 2048 bytes. To do so, Linux Netfilter keeps the previous packet in buffer and performs matching with a combined 2048 byte string of the buffered packet and current packet. As the number of concurrent connections to be handled in the worm detection system increases, the total size of buffer (memory) increases and string matching speed becomes low In this paper, to reduce the memory buffer size and get higher speed of string matching, we propose a string matching scheme without using buffer. The proposed scheme keeps the partial matching result of the previous packet with signatures and has no buffering for previous packet. The partial matching information is used to detect a worm in the two succeeding packets. We implemented the proposed scheme by modifying the Linux Netfilter. Then we compared the modified Linux Netfilter module with the original Linux Netfilter module. Experimental results show that the proposed scheme has 25% lower memory usage and 54% higher speed compared to the original scheme.

Toward 6 Degree-of-Freedom Video Coding Technique and Performance Analysis (6 자유도 전방위 몰입형 비디오의 압축 코덱 개발 및 성능 분석)

  • Park, Hyeonsu;Park, Sang-hyo;Kang, Je-Won
    • Journal of Broadcast Engineering
    • /
    • v.24 no.6
    • /
    • pp.1035-1052
    • /
    • 2019
  • Recently, as the demand for immersive videos increases, efficient video processing techniques for omnidirectional immersive video is actively developed by MPEG-I. While the omnidirectional video provides a larger degree of freedom for a free viewpoint, the size of the video increases significantly. Furthermore, in order to compress 6 degree-of-freedom (6 DoF) videos that support motion parallax, it is required to develop a codec to yield better coding efficiency. In this paper, we develop a 6 DoF codec using Versatile Video Coding (VVC) as the next generation video coding standard. To the authors' best knowledge, this is the first VVC-based 6 DoF video codec toward the future ISO/IEC 23090 Part 7 (Metadata for Immersive Media (Video)) MPEG-I standardization. The experiments were conducted on the seven test video sequences specified in Common Test Condition (CTC) in two operation modes of TMIV (Test Model for Immersive Media) software. It is demonstrated that the proposed codec improves coding performance around 33.8% BD-rate reduction in the MIV (Metadata for Immersive Video) mode and 30.2% BD-rate reduction in the MIV view mode as compared to the state-of-the-art TMIV reference software. We also show the performance comparisons using Immersive Video PSNR (IV-PSNR) and Mean Structural Similarity (MSSIM).