• Title/Summary/Keyword: Random Binary

Search Result 281, Processing Time 0.023 seconds

A Hybrid RPWM Technique using Logical Composition of a RSF and a RPP (RSF와 RPP의 논리적인 조합을 이용한 하이브리드 RPWM기법)

  • Kim K. S.;Jung Y. G.;Lim Y. C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.07a
    • /
    • pp.411-414
    • /
    • 2004
  • 본 연구에서는 RPP(Randomized Pulse Position PWM)의 특징과 RSF(Random Switching Frequency PWM)의 특징을 모두 갖는 하이브리드 RPWM (Random PWM)기법을 제안하였다. 제안된 방법은 PRBS(Pseudo-Random Binary Sequence)로 동작하는 시프트 레지스터의 lead-lag 랜덤 비트를 사용한다는 점에서 종전의 방법과 동일하나, 이와 논리적인 비교를 위해 랜덤 주파수의 삼각파를 이용한다는 점에서 종전의 방법과 다르다. 본 연구의 타당성을 확인하기 위하여 인버터 기반의 3상 유도모터 구동시스템에 제안된 방법을 적용하였다. 그 결과 종전의 방법에 비하여 인버터 구동 유도모터의 전압 및 전류의 고조파 스펙트럼의 광 대역화에 탁월한 효과가 있음을 입증할 수 있었다.

  • PDF

A Hybrid Random Pulse Width Modulation(HRPWM) Technique Using LF2407 DSP Controller (LF2407 DSP제어기를 사용한 혼합형 랜덤 펄스폭 변조(HRPWM)기법)

  • Kim K.S.;Jung Y.G.;Lim Y.C.
    • Proceedings of the KIPE Conference
    • /
    • 2004.11a
    • /
    • pp.101-105
    • /
    • 2004
  • 본 연구에서는 LF2407 DSP제어기를 사용한 혼합형 랜덤 펄스폭 변조기법(HRPWM : Hybrid Random PWM)을 제안하였다. 제안된 HRPWM은 PRBS (Pseudo-Random Binary Sequence)로 동작하는 시프트 레지스터의 lead-lag 랜덤 비트를 사용한다는 점에서 종전의 방법과 동일하다. 그러나 Lead-Lag 랜덤 비트와 논리적인 비교를 하기 위해 고정 주파수의 캐리어를 사용 하지 않고 랜덤 주파수의 삼각파 캐리어를 이용한다는 점이 종전의 방법과 다르다. LF2407 DSP에 의하여 랜덤 수 및 PRBS 그리고 3상 기준 정현파를 실시간으로 발생하며, DSP외부의 주파수 변조기 MAX038에 의하여 랜덤 주파수의 캐리어를 발생한다. 제안된 기법을 LF2407기반의 3상 유도모터 구동장치에 적용한 결과, 모터 전류파형은 종전의 방법과 유사한 파형을 유지하면서도 모터 전압 및 전류의 고조파 스펙트럼은 광대역 주파수로 분포시킬 수 있었다.

  • PDF

Medical Image Classification and Keyword Annotation Using Combination of Random Forests and Relation Weight (Random Forests와 관계 가중치 결합을 이용한 의료 영상 분류 및 주석 자동 생성)

  • Lee, Ji-hyun;Kim, Seong-hoon;Ko, Byoung-chul;Nam, Jae-Yeal
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2010.11a
    • /
    • pp.596-598
    • /
    • 2010
  • 본 논문에서는 의료영상 중 X-ray 영상을 대상으로 영상을 분류하고 분류 결과에 따라 다중 키워드를 생성하는 방법을 제시한다. X-ray영상은 대부분 그레이 영상임으로 Local Binary Patterns (LBP)을 이용하여 픽셀간의 연관성을 특징으로 추출하고, 실시간 학습 및 분류가 가능한 Random Forests 분류기로 영상들을 30개의 클래스로 분류한다. 또한, 미리 정의된 신체 부위간의 관계 가중치를 분류 스코어에 결합하여 신뢰값을 생성하고 이를 기반으로 영상에 대해 다중 주석을 부여하게 된다. 이렇게 부여된 다중 주석은 키워드 기반의 의료영상을 가능케 함으로 보다 쉽고 효율적인 검색 환경을 제공할 수 있다.

Ensemble of Nested Dichotomies for Activity Recognition Using Accelerometer Data on Smartphone (Ensemble of Nested Dichotomies 기법을 이용한 스마트폰 가속도 센서 데이터 기반의 동작 인지)

  • Ha, Eu Tteum;Kim, Jeongmin;Ryu, Kwang Ryel
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.123-132
    • /
    • 2013
  • As the smartphones are equipped with various sensors such as the accelerometer, GPS, gravity sensor, gyros, ambient light sensor, proximity sensor, and so on, there have been many research works on making use of these sensors to create valuable applications. Human activity recognition is one such application that is motivated by various welfare applications such as the support for the elderly, measurement of calorie consumption, analysis of lifestyles, analysis of exercise patterns, and so on. One of the challenges faced when using the smartphone sensors for activity recognition is that the number of sensors used should be minimized to save the battery power. When the number of sensors used are restricted, it is difficult to realize a highly accurate activity recognizer or a classifier because it is hard to distinguish between subtly different activities relying on only limited information. The difficulty gets especially severe when the number of different activity classes to be distinguished is very large. In this paper, we show that a fairly accurate classifier can be built that can distinguish ten different activities by using only a single sensor data, i.e., the smartphone accelerometer data. The approach that we take to dealing with this ten-class problem is to use the ensemble of nested dichotomy (END) method that transforms a multi-class problem into multiple two-class problems. END builds a committee of binary classifiers in a nested fashion using a binary tree. At the root of the binary tree, the set of all the classes are split into two subsets of classes by using a binary classifier. At a child node of the tree, a subset of classes is again split into two smaller subsets by using another binary classifier. Continuing in this way, we can obtain a binary tree where each leaf node contains a single class. This binary tree can be viewed as a nested dichotomy that can make multi-class predictions. Depending on how a set of classes are split into two subsets at each node, the final tree that we obtain can be different. Since there can be some classes that are correlated, a particular tree may perform better than the others. However, we can hardly identify the best tree without deep domain knowledge. The END method copes with this problem by building multiple dichotomy trees randomly during learning, and then combining the predictions made by each tree during classification. The END method is generally known to perform well even when the base learner is unable to model complex decision boundaries As the base classifier at each node of the dichotomy, we have used another ensemble classifier called the random forest. A random forest is built by repeatedly generating a decision tree each time with a different random subset of features using a bootstrap sample. By combining bagging with random feature subset selection, a random forest enjoys the advantage of having more diverse ensemble members than a simple bagging. As an overall result, our ensemble of nested dichotomy can actually be seen as a committee of committees of decision trees that can deal with a multi-class problem with high accuracy. The ten classes of activities that we distinguish in this paper are 'Sitting', 'Standing', 'Walking', 'Running', 'Walking Uphill', 'Walking Downhill', 'Running Uphill', 'Running Downhill', 'Falling', and 'Hobbling'. The features used for classifying these activities include not only the magnitude of acceleration vector at each time point but also the maximum, the minimum, and the standard deviation of vector magnitude within a time window of the last 2 seconds, etc. For experiments to compare the performance of END with those of other methods, the accelerometer data has been collected at every 0.1 second for 2 minutes for each activity from 5 volunteers. Among these 5,900 ($=5{\times}(60{\times}2-2)/0.1$) data collected for each activity (the data for the first 2 seconds are trashed because they do not have time window data), 4,700 have been used for training and the rest for testing. Although 'Walking Uphill' is often confused with some other similar activities, END has been found to classify all of the ten activities with a fairly high accuracy of 98.4%. On the other hand, the accuracies achieved by a decision tree, a k-nearest neighbor, and a one-versus-rest support vector machine have been observed as 97.6%, 96.5%, and 97.6%, respectively.

A Fast Decision Method of Quadtree plus Binary Tree (QTBT) Depth in JEM (차세대 비디오 코덱(JEM)의 고속 QTBT 분할 깊이 결정 기법)

  • Yoon, Yong-Uk;Park, Do-Hyun;Kim, Jae-Gon
    • Journal of Broadcast Engineering
    • /
    • v.22 no.5
    • /
    • pp.541-547
    • /
    • 2017
  • The Joint Exploration Model (JEM), which is a reference SW codec of the Joint Video Exploration Team (JVET) exploring the future video standard technology, provides a recursive Quadtree plus Binary Tree (QTBT) block structure. QTBT can achieve enhanced coding efficiency by adding new block structures at the expense of largely increased computational complexity. In this paper, we propose a fast decision algorithm of QTBT block partitioning depth that uses the rate-distortion (RD) cost of the upper and current depth to reduce the complexity of the JEM encoder. Experimental results showed that the computational complexity of JEM 5.0 can be reduced up to 21.6% and 11.0% with BD-rate increase of 0.7% and 1.2% in AI (All Intra) and RA (Random Access), respectively.

Joint analysis of binary and continuous data using skewed logit model in developmental toxicity studies (발달 독성학에서 비대칭 로짓 모형을 사용한 이진수 자료와 연속형 자료에 대한 결합분석)

  • Kim, Yeong-hwa;Hwang, Beom Seuk
    • The Korean Journal of Applied Statistics
    • /
    • v.33 no.2
    • /
    • pp.123-136
    • /
    • 2020
  • It is common to encounter correlated multiple outcomes measured on the same subject in various research fields. In developmental toxicity studies, presence of malformed pups and fetal weight are measured on the pregnant dams exposed to different levels of a toxic substance. Joint analysis of such two outcomes can result in more efficient inferences than separate models for each outcome. Most methods for joint modeling assume a normal distribution as random effects. However, in developmental toxicity studies, the response distributions may change irregularly in location and shape as the level of toxic substance changes, which may not be captured by a normal random effects model. Motivated by applications in developmental toxicity studies, we propose a Bayesian joint model for binary and continuous outcomes. In our model, we incorporate a skewed logit model for the binary outcome to allow the response distributions to have flexibly in both symmetric and asymmetric shapes on the toxic levels. We apply our proposed method to data from a developmental toxicity study of diethylhexyl phthalate.

3D Content Model Hashing Based on Object Feature Vector (객체별 특징 벡터 기반 3D 콘텐츠 모델 해싱)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.47 no.6
    • /
    • pp.75-85
    • /
    • 2010
  • This paper presents a robust 3D model hashing based on object feature vector for 3D content authentication. The proposed 3D model hashing selects the feature objects with highest area in a 3D model with various objects and groups the distances of the normalized vertices in the feature objects. Then we permute groups in each objects by using a permutation key and generate the final binary hash through the binary process with the group coefficients and a random key. Therefore, the hash robustness can be improved by the group coefficient from the distance distribution of vertices in each object group and th hash uniqueness can be improved by the binary process with a permutation key and a random key. From experimental results, we verified that the proposed hashing has both the robustness against various mesh and geometric editing and the uniqueness.

The Structure of Reversible DTCNN (Discrete-Time Celluar Neural Networks) for Digital Image Copyright Labeling (디지털영상의 저작권보호 라벨링을 위한 Reversible DTCNN(Discrete-Time Cellular Neural Network) 구조)

  • Lee, Gye-Ho;Han, Seung-jo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.3
    • /
    • pp.532-543
    • /
    • 2003
  • In this paper, we proposed structure of a reversible discrete-time cellular neural network (DTCNN) for labeling digital images to protect copylight. First, we present the concept and the structure of reversible DTCNN, which can be used to generate 2D binary pseudo-random images sequences. We presented some, output examples of different kinds of reversible DTCNNs to show their complex behaviors. Then both the original image and the copyright label, which is often another binary image, are used to generate a binary random key image. The key image is then used to scramble the original image. Since the reversibility of a reversible DTCNN, the same reversible DTCNN can recover the copyright label from a labeled image. Due to the high speed of a DTCNN chip, our method can be used to label image sequences, e.g., video sequences, in real time. Computer simulation results are presented.

Detecting Spectre Malware Binary through Function Level N-gram Comparison (함수 단위 N-gram 비교를 통한 Spectre 공격 바이너리 식별 방법)

  • Kim, Moon-Sun;Yang, Hee-Dong;Kim, Kwang-Jun;Lee, Man-Hee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.6
    • /
    • pp.1043-1052
    • /
    • 2020
  • Signature-based malicious code detection methods share a common limitation; it is very hard to detect modified malicious codes or new malware utilizing zero-day vulnerabilities. To overcome this limitation, many studies are actively carried out to classify malicious codes using N-gram. Although they can detect malicious codes with high accuracy, it is difficult to identify malicious codes that uses very short codes such as Spectre. We propose a function level N-gram comparison algorithm to effectively identify the Spectre binary. To test the validity of this algorithm, we built N-gram data sets from 165 normal binaries and 25 malignant binaries. When we used Random Forest models, the model performance experiments identified Spectre malicious functions with 99.99% accuracy and its f1-score was 92%.

Estimation of Visual Stimulus Intensity From Retinal Ganglion Cell Spike Trains Using Optimal Linear Filter (최적선형필터를 이용한 망막신경절세포 Spike Train으로부터의 시각자극 세기 변화 추정)

  • Ryu, Sang-Baek;Kim, Doo-Hee;Ye, Jang-Hee;Kim, Kyung-Hwan;Goo, Yong-Sook
    • Journal of Biomedical Engineering Research
    • /
    • v.28 no.2
    • /
    • pp.212-217
    • /
    • 2007
  • As a preliminary study for the development of electrical stimulation strategy of artificial retina, we set up a method fur the reconstruction of input intensity variation from retinal ganglion cell(RGC) responses. In order to estimate light intensity variation, we used an optimal linear filter trained from given stimulus intensity variation and multiple single unit spike trains from RGCs. By applying ON/OFF stimulation(ON duration: 2 sec, OFF duration: 5 sec) repetitively, we identified three functional types of ganglion cells according to when they respond to the ON/OFF stimulus actively: ON cell, OFF cell, and ON-OFF cell. Experiments were also performed using a Gaussian random stimulus and a binary random stimulus. The input intensity was updated once every 90 msec(i. e. 11 Hz) to present the stimulus. The result of reconstructing 11 Hz Gaussian and binary random stimulus was not satisfactory and showed low correlation between the original and reconstructed stimulus. In the case of ON/OFF stimulus in which temporal variation is slow, successful reconstruction was achieved and the correlation coefficient was as high as 0.8.