• Title/Summary/Keyword: complements

Search Result 443, Processing Time 0.028 seconds

Robust Object Detection from Indoor Environmental Factors (다양한 실내 환경변수로부터 강인한 객체 검출)

  • Choi, Mi-Young;Kim, Gye-Young;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.2
    • /
    • pp.41-46
    • /
    • 2010
  • In this paper, we propose a detection method of reduced computational complexity aimed at separating the moving objects from the background in a generic video sequence. In generally, indoor environments, it is difficult to accurately detect the object because environmental factors, such as lighting changes, shadows, reflections on the floor. First, the background image to detect an object is created. If an object exists in video, on a previously created background images for similarity comparison between the current input image and to detect objects through several operations to generate a mixture image. Mixed-use video and video inputs to detect objects. To complement the objects detected through the labeling process to remove noise components and then apply the technique of morphology complements the object area. Environment variable such as, lighting changes and shadows, to the strength of the object is detected. In this paper, we proposed that environmental factors, such as lighting changes, shadows, reflections on the floor, including the system uses mixture images. Therefore, the existing system more effectively than the object region is detected.

Coupling Metrics for Web Pages Clustering in Restructuring of Web Applications (웹 어플리케이션 재구조화를 위한 클러스터링에 사용되는 결합도 메트릭)

  • Lee, En-Joo;Park, Gen-Duk
    • Journal of the Korea Society of Computer and Information
    • /
    • v.12 no.3
    • /
    • pp.75-84
    • /
    • 2007
  • Due to the increasing complexity and shorter life cycle of web applications, web applications need to be restructured to improve flexibility and extensibility. These days approaches are being used where systems are understood and restructured through clustering techniques. In this paper, the coupling metrics are proposed for clustering web pages more effectively. To achieve this, web application models are defined, where the relationship between web pages and the numbers of parameters are included. Considering direct and indirect coupling strength based on these models, coupling metrics are defined. The more direct relations between two pages and the more parameters they have, the stronger direct coupling is. The higher indirect connectivity strength between two pages is, the more similar the patterns of relationships among other web pages are. We verify the suggested metrics according to the well known verification framework and provide a case study to show that our metrics complements some existing metrics.

  • PDF

A Study on the Problem Analysis and Improvement Plan for the Korean Railways Communication Networks (국내 철도 통신망의 문제점 분석 및 개선방안 연구)

  • Kim, Kyung-Hee;Kim, Yong-Kyu;Park, Duk-Kyu
    • Journal of the Korean Society for Railway
    • /
    • v.16 no.6
    • /
    • pp.534-539
    • /
    • 2013
  • The research about the Korean integrated wireless network for railways is in progress. The network integrates and complements the various railway functions. In addition, the network is trying to change from wire communication to radio communication. The activities for the railway frequency acquisition are also in progress for the implementation of the network. This paper analyzes the problems for the Korean railway communication networks. The problems revolve around the dispersed network structure, the limited functions, the different communication methods, the technology limitation for the communication methods, and the usage of the non-licensed band. Subsequently, we explain the current state and trend for the foreign communication of the railways. This paper suggests improvement plans for the problems and also explains the expected efficiency for the improvement plans.

Comparison of Water Supply Reliability by Dam Operation Methods (댐 운영방식에 따른 이수안전도의 비교)

  • Choi, Si Jung;Lee, Dong-Ryul;Moon, Jang Won
    • Journal of Korea Water Resources Association
    • /
    • v.47 no.6
    • /
    • pp.523-536
    • /
    • 2014
  • A water supply reliability is mainly influenced by water demand, reservoir storage, and inflow change caused from drought. The water supply reliability can vary depending on the method of dam operation. In Korea, the deficit-supply method which complements water deficit as water shortage occurs in downstream areas has been used for the national water resources master plan using K-WEAP, but the prime flow method, an alternative approach, would show different results of water supply reliability in comparison to the deficit-supply method. The objective of this research is to compare and analyze differences in water supply reliability according to dam operation methods. These results can be used to re-evaluate water supply reliability of dam in a circumstance considering steady dam release for instreamflow in downstream and hydroelectric power generation.

Analysis of Conflict Structure between Parents and Children Character inherent in and : Based on Type Dynamics Theory of MBTI (에 나타난 부모와 자녀 캐릭터 사이의 갈등구조 분석 : MBTI 유형역동 이론에 근거하여)

  • Yang, Se-Hyeok
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.7
    • /
    • pp.24-37
    • /
    • 2013
  • This study aims to analyze comparatively the structure of conflict between parents and children in terms of their character with Pixar's and from the aspects of MBTI's type dynamics. Thus, the paper infers the hierarchy of the characters' personality type and psychological function and also analyzes the structure of conflict and reconciliation based on type dynamics. The study has drawn conclusions with the work analysis as follows: (1) The structure shows that the parents' thinking function restricts the children's intuitive function, and it is metaphorized as 'collision between reality and possibility', (2) As the extroverted psychological function of the character having a complementary role complements the underdeveloped tertiary function of the character with deficiency and contributes to the type development, (3) In , the subject of conflict realizes direct, unidirectional complementation, (4) And in , not because of the subject of conflict but because of the mirror character, indirect, bidirectional complementary methodology differs.

Development of non-fragile $H_{\infty}$ controller design algorithm for singular systems (특이시스템의 비약성 $H_{\infty}$ 제어기 설계 알고리듬 개발)

  • Kim, Jong-Hae
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.42 no.6
    • /
    • pp.9-14
    • /
    • 2005
  • In this paper, we consider the synthesis of non-fragile $H_{\infty}$ state feedback controllers for singular systems and static state feedback controller with multiplicative uncertainty. The sufficient condition of controller existence, the design method of non-fragile $H_{\infty}$ controller, and the measure of non-fragility in controller are presented via LMI(linear matrix inequality) technique. Also, the sufficient condition can be rewritten as LMI form in terms of transformed variables through singular value decomposition, some changes of variables, and Schur complements. Therefore, the obtained non-fragile $H_{\infty}$ controller guarantees the asymptotic stability and disturbance attenuation of the closed loop singular systems within a prescribed degree. Moreover, the controller design method can be extended to the problem of robust and non-fragile $H_{\infty}$ controller design method for singular systems with parameter uncertainties. Finally, a numerical example is given to illustrate the design method.

A Design of MILENAGE Algorithm-based Mutual Authentication Protocol for The Protection of Initial Identifier in LTE (LTE 환경에서 초기 식별자를 보호하기 위한 MILENAGE 알고리즘 기반의 상호인증)

  • Yoo, Jae-hoe;Kim, Hyung-uk;Jung, Yong-hoon
    • Journal of Venture Innovation
    • /
    • v.2 no.1
    • /
    • pp.13-21
    • /
    • 2019
  • In LTE environment, which is 4th generation mobile communication systems, there is concern about private information exposure by transmitting initial identifier in plain text. This paper suggest mutual authentication protocol, which uses one-time password utilizing challenge-response and AES-based Milenage key generation algorithm, as solution for safe initial identification communication, preventing unique identification information leaking. Milenage key generation algorithm has been used in LTE Security protocol for generating Cipher key, Integrity key, Message Authentication Code. Performance analysis evaluates the suitability of LTE Security protocol and LTE network by comparing LTE Security protocol with proposed protocol about algorithm operation count and Latency.Thus, this paper figures out initial identification communication's weak points of currently used LTE security protocol and complements in accordance with traditional protocol. So, it can be applied for traditional LTE communication on account of providing additional confidentiality to initial identifier.

FDG-PET/CT Complements Bone Scan with Respect to the Detection of Skip Metastasis of Osteosarcoma: A Case Report (골육종의 도약전이 진단에서 골스캔의 보완검사로서의 FDG-PET/CT: 증례 보고)

  • Cheon, Gi-Jeong;Choe, Jae-Gol;Chae, In-Jung;Lee, Dae-Hee;Song, Sang-Heon;Kim, Myo-Jong;Park, Jong-Hoon
    • The Journal of the Korean bone and joint tumor society
    • /
    • v.18 no.1
    • /
    • pp.45-49
    • /
    • 2012
  • Skip lesion is not uncommon feature in osteosarcoma and considered to be importantly associated with poor prognosis factor, and thus, should be excised with the main mass. The accurate pre-operative evaluation of the intramedullary extent of osteosarcoma is essential, because it determines the level of bone resection. Among the reliable detection methods, bone scan has a drawback of high rate of false negative results and regional MRI has a difficulty to cover the whole involved lesions without clinical suspicion. The authors report a case of osteosarcoma of the distal femur with a proximal skip lesion that was not detected by either regional MR imaging or by bone scan, but which was visualized by FDG-PET/CT.

The Design and Development of Linked Data from Authority Data in National Archives of Korea (기록물 전거통제 기반 Linked Data 구축에 대한 연구)

  • Park, Ok-Nam
    • Journal of the Korean BIBLIA Society for library and Information Science
    • /
    • v.23 no.2
    • /
    • pp.5-25
    • /
    • 2012
  • The purpose of this study is to develop linked data of authority data in national archives of Korea as a cornerstone for linked data cloud of Korea. The study analyzed data structure of authority data as well as a retrieval system. It finally developed linked data based on RDF/OWL, Dublin Core, and SKOS. The study also employed TopBraid ComposerTM as a tool for ontology construction. The visualization of the tool provides users with flexible search and browsing between data as well as access of detail authority data. It complements the search of a current system in terms of flexible linking between records and authority data. The study also suggests future work to publish linked data of archival data set itself and make rich relationships among data in museums, libraries, and other archives.

A Study of Jeogori Design Pattern using the Pattern Analysis in the Books Entitled Hanbok Construction Focusing on the Women in 20's (성인여성 저고리 패턴을 활용한 개선된 저고리 패턴설계연구 - 20대 여성용 저고리를 중심으로 -)

  • Kim, Hyun-Ju;Chang, Min-jung
    • Journal of the Korea Fashion and Costume Design Association
    • /
    • v.17 no.4
    • /
    • pp.1-14
    • /
    • 2015
  • This study mainly analyzes that designing patterns of an adult women Jeogori that takes advantage of patterns from each textbooks and complements the disadvantages based on the analysis of data from the dress evaluation and comparison of materials. The modification of a size specification is needed for the standard body as an adjust of the length of Jogori between front and back, mediation for bust width between front and back, a movement for the based line of Sup and Godae. As a result, the suitable pattern according to the standard somatotype is as below. Jeogori Length of front is determined by the length of back which was measured from side neck point to bust point plus three centimeters, and give three and half centimeters more in front. This three and half centimeters is for the curved in front of your body due to the chest. Bust width of front and back have to show the differences of human body. Bust width of front is calculated as bust girth into quarters and add two centimeters. Bust width of back gives one centimeter behind the curve from the center line in order to reduce the floating phenomenon. So, the amount of center back line dart is one centimeter. Arm hole girth measures as dividing bust girth into four. Also, Goedae width has two methods to measure. First, divide bust girth into ten equal parts and subtract 0.5 centimeters from it. Second, measure neck girth and divide it by four. Sleeve length is equal to Hwajang minus bust width of front. Hand wrist calculates in using bust girth. Make bust girth into quarters and multiply three fifths. Side line measures as deducting from Jeogori length of back to Arm hole girth and multiply two thirds.

  • PDF