• Title/Summary/Keyword: Selection efficiency

Search Result 1,648, Processing Time 0.027 seconds

Binarization and Stroke Reconstruction of Low Quality Character Image for Effective Character Recognition (효과적인 문자 인식을 위한 저 품질 문자 영상의 이진화 및 획 재구성 방법)

  • Kim, Do-Hyeon;Cha, Eui-Young
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.608-618
    • /
    • 2007
  • Image binarization is an important preprocessing to identify the object of interest by dividing pixels into the background and object. We proposes efficient binarization method and a stroke reconstruction method of the low quality character image for an effective character recognition. First, the character image is binarized by using the both advantages of local and global thresholding method and then the noise elimination around the character stroke and the hole filling on the stoke by the analysis of the binarized stroke image are performed to enhance the quality of the character stroke. Proposed binarization algorithm for character image achieved an efficiency of both processing speed and performance by the adaptive threshold selection. Moreover, We could get a high qualify binary image by a stroke reconstruction of the step-by-step denoising process.

The Study for ENHPP Software Reliability Growth Model Based on Kappa(2) Coverage Function (Kappa(2) 커버리지 함수를 이용한 ENHPP 소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee-Cheul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2311-2318
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. Accurate predictions of software release times, and estimation of the reliability and availability of a software product require Release times of a critical element of the software testing process : test coverage. This model called Enhanced non-homogeneous Poission process(ENHPP). In this paper, exponential coverage and S-shaped model was reviewed, proposes the Kappa coverage model, which make out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE statistics and Kolmogorov distance, for the sake of efficient model, was employed. Numerical examples using real data set for the sake of proposing Kappa coverage model was employed. This analysis of failure data compared with the Kappaa coverage model and the existing model(using arithmetic and Laplace trend tests, bias tests) is presented.

The Study for NHPP Software Reliability Growth Model based on Burr Distribution (Burr 분포를 이용한 NHPP소프트웨어 신뢰성장모형에 관한 연구)

  • Kim, Hee-Cheul;Park, Jong-Goo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.3
    • /
    • pp.514-522
    • /
    • 2007
  • Finite failure NHPP models presented in the literature exhibit either constant, monotonic increasing or monotonic decreasing failure occurrence rates per fault. In this parer, Goel-Okumoto and Yamada-Ohba-Osaki model was reviewed, proposes the Burr distribution reliability model, which making out efficiency application for software reliability. Algorithm to estimate the parameters used to maximum likelihood estimator and bisection method, model selection based on SSE, AIC statistics and Kolmogorov distance, for the sake of efficient model, was employed. Analysis of failure using real data set for the sake of proposing shape parameter of the Burr distribution was employed. This analysis of failure data compared with the Burr distribution model and the existing model(using arithmetic and Laplace trend tests, bias tests) is presented.

A Critical Approach to the Directions of the Neoliberal Educative Policies of the Governments of Democratic Alliances of Chile (칠레 민주연합 정부의 신자유주의 교육 정책방향의 비판적 접근)

  • Ahn, Tae Hwan
    • Cross-Cultural Studies
    • /
    • v.29
    • /
    • pp.315-339
    • /
    • 2012
  • The Chilean educative policies as the Voucher System and the privatization have been almost same from the Pinochet government and the ones of "Concertacion" or "Democratic Alliances" until now. Because the neoliberal regime has dominated principally in Chile the area of the education. In this study first of all I will analyze the procedures of the violent repression of the leftist politicians and the intellectuals of the universities by the Pinochet government. And the importance of the reform of the law of education in 1980 was emphasized and the other one in 1990 one day before the retirement of Pinochet. We can comprehend the fact that the education would have been used as a tool to achieve the development of the country and the economic one sacrificing the public and equalitarian values of the education. And the competence, the efficiency and the quality of the education have been emphasized through the policies as example the rights of the selection of the schools by the parents as like a product in the market. But the result was the enormorors expansion of the private education not only in the secondary schools but also in the universities. And also has been intensified "the segregation and the discrimination" of the students jerarquitized by the different social-economic levels of the parents. The Chilean people including the middle class did not realize rightly the inherent problems of the neoliberal regime having the equivocation as if the private schools should have been better than the public ones. However the high level of the public university education became to be dominated by the acomodated class. This was the cause of the last year's great scale of the demonstration of the Chilean students. The most important thing is that these matters was agravated not by the Pinochet government but by the ones of "Concertacion" or "Democratic Alliances". Because these governments tried to maintain the neoliberal regime by means of the education only arranging the small problems or contratiempos.

The Development of the Automatic Linkage Establishment System for the Long Range Communication (장거리 통신을 위한 주파수 자동탐색 시스템 개발)

  • No, Sangwan;Lee, Soonyoung;Kim, Minsoo
    • Journal of Aerospace System Engineering
    • /
    • v.13 no.5
    • /
    • pp.87-93
    • /
    • 2019
  • This study suggests the development of the ALE (Automatic Link Establishment) system for the long-range communication with a helicopter at the lands or marines by HF (High Frequency) radios. In the condition of LOS or more than 35 NM, the communication success rate is significantly lowered when the frequency is manually selected because of the reduced transmission power and various strong RF environment noise signals. In this paper, we make an effort to overcome the difficulties of choosing the optimal frequency when the operating frequency selection is manually operated in long-distance communication or LOS uncertain environment. The ALE system is designed based on the frequency analysis propagation software and is verified that the communication success rate is increased by applying the proposed system. The ALE system was applied to the helicopter system and the ground/flight test was conducted. As a result, the superiority and efficiency of the proposed system were verified.

Development of 50W High Quality Factor Printed Circuit Board Coils for a 6.78MHz, 60cm Air-gap Wireless Power Transfer System (6.78MHz, 거리 60cm, 50W급 무선 전력 전송 시스템용 High Quality Factor PCB 코일 개발)

  • Lee, Seung-Hwan;Yi, Kyung-Pyo
    • Journal of the Korean Society for Railway
    • /
    • v.19 no.4
    • /
    • pp.468-479
    • /
    • 2016
  • In order to supply power to online monitoring systems that are attached to high voltage catenary or overhead wires, a wireless power transfer system is required that is able to transmit power over the insulation gap. Such wireless power transfer systems have transmitter and receiver coils that have diameters of over 10cm. This paper focused on an investigation of the sources of loss in the coils when the coils are fabricated using printed circuit board technology. Using finite element simulation results, it has been shown that the dielectric loss in the substrate was the dominant source of the total loss. It has been demonstrated that the selection of a proper dielectric material was the most critical factor in reducing the loss. For further reduction of the loss, the distributed tuning capacitor method and the slotting of the inter-turn spaces have been proposed. For the evaluation of the proposed methods, four coils have been fabricated and their equivalent series resistances and quality factors were measured. Measured quality factors were greater than 300, which means that these devices will be helpful in achieving high coil-to-coil efficiency.

Impossible Differential Cryptanalysis on ESF Algorithm with Simplified MILP Model

  • Wu, Xiaonian;Yan, Jiaxu;Li, Lingchen;Zhang, Runlian;Yuan, Pinghai;Wang, Yujue
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.10
    • /
    • pp.3815-3833
    • /
    • 2021
  • MILP-based automatic search is the most common method in analyzing the security of cryptographic algorithms. However, this method brings many issues such as low efficiency due to the large size of the model, and the difficulty in finding the contradiction of the impossible differential distinguisher. To analyze the security of ESF algorithm, this paper introduces a simplified MILP-based search model of the differential distinguisher by reducing constrains of XOR and S-box operations, and variables by combining cyclic shift with its adjacent operations. Also, a new method to find contradictions of the impossible differential distinguisher is proposed by introducing temporary variables, which can avoid wrong and miss selection of contradictions. Based on a 9-round impossible differential distinguisher, 15-round attack of ESF can be achieved by extending forward and backward 3-round in single-key setting. Compared with existing results, the exact lower bound of differential active S-boxes in single-key setting for 10-round ESF are improved. Also, 2108 9-round impossible differential distinguishers in single-key setting and 14 12-round impossible differential distinguishers in related-key setting are obtained. Especially, the round of the discovered impossible differential distinguisher in related-key setting is the highest, and compared with the previous results, this attack achieves the highest round number in single-key setting.

A study on Cheollik in The Annals of the Joseon Dynasty (조선왕조실록에 나타난 철릭 고찰)

  • Kim, Myung-Ja;Lee, So-Young
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.20 no.4
    • /
    • pp.105-115
    • /
    • 2018
  • This paper presents an investigation into Cheollik based on 288 records about it at the homepage of The Annals of the Joseon Dynasty on the Internet. Cheollik was called in diverse names and worn by various social classes from kings to common people, but it was solidified as clothes for military officers toward the latter half of Joseon. Not only did it serve the purpose of clothes, but it also was used for a royal grant, diplomacy, shrouding a corpse, and royal coffin. It served the diplomatic purposes a lot especially during the reign of King Sejo and King Seongjong. Cheollik was usually made of cotton, hemp, silk, and mixed fabric with silk used most. Its major colors include white, green, red, blue, black, purple, grey, and yellow with white used most. The fabrics and colors of Cheollik became simplified toward the latter half of Joseon. Silk was most used in Cheollik for a royal grant, shrouding a corpse, and royal coffin. White was most used in Cheollik for kings' visit to royal tombs or their participation in ancestral rites. There were limitations with the selection of materials according to the social status and situations. It was stipulated that only Sa and Ju were used to make Cheollik for Dangsangguan and Danghaguan. Cheollik made of silk was banned for country residents and merchants. The color of Cheollik for Danghaguan was changed to blue and then red. Of military officers, only those who had a Gonsu title or higher were allowed to wear Cheollik made of silk in various colors. In the end, Cheollik was abolished for its low convenience and efficiency during the rule of King Gojong.

A Two-Way Authentication Protocol Based on Hash Collision for Unmanned Systems in Tactical Wireless Networks (전술 무선 네트워크에서 무인체계를 위한 해시 충돌 기반의 양방향 인증 프로토콜)

  • Lee, Jong-kwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.729-738
    • /
    • 2019
  • In this paper, we propose two-way authentication protocol between unmanned systems in tactical wireless networks in which long distance communications are not guaranteed due to a poor channel conditions. It is assumed that every unmanned systems have same random data set before they put into combat. The proposed protocol generates authentication code(AC) using random data that causes hash collision. The requester for authentication encrypts the materials such as their identifier, time-stamp, authentication code with the secret key. After then the requester transmits the encrypted message to the receiver. The receiver authenticates the requester by verifying the authentication code included in the request message. The performance analysis of the proposed protocol shows that it guarantees the security for various attack scenarios and efficiency in terms of communication overhead and computational cost. Furthermore, we analyzed the effect of the parameter values of the proposed protocol on the performance and suggest appropriate parameter value selection guide according to the level of security requirement.

Adaptive Learning Path Recommendation based on Graph Theory and an Improved Immune Algorithm

  • BIAN, Cun-Ling;WANG, De-Liang;LIU, Shi-Yu;LU, Wei-Gang;DONG, Jun-Yu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.5
    • /
    • pp.2277-2298
    • /
    • 2019
  • Adaptive learning in e-learning has garnered researchers' interest. In it, learning resources could be recommended automatically to achieve a personalized learning experience. There are various ways to realize it. One of the realistic ways is adaptive learning path recommendation, in which learning resources are provided according to learners' requirements. This paper summarizes existing works and proposes an innovative approach. Firstly, a learner-centred concept map is created using graph theory based on the features of the learners and concepts. Then, the approach generates a linear concept sequence from the concept map using the proposed traversal algorithm. Finally, Learning Objects (LOs), which are the smallest concrete units that make up a learning path, are organized based on the concept sequences. In order to realize this step, we model it as a multi-objective combinatorial optimization problem, and an improved immune algorithm (IIA) is proposed to solve it. In the experimental stage, a series of simulated experiments are conducted on nine datasets with different levels of complexity. The results show that the proposed algorithm increases the computational efficiency and effectiveness. Moreover, an empirical study is carried out to validate the proposed approach from a pedagogical view. Compared with a self-selection based approach and the other evolutionary algorithm based approaches, the proposed approach produces better outcomes in terms of learners' homework, final exam grades and satisfaction.