• Title/Summary/Keyword: full-information

Search Result 3,671, Processing Time 0.033 seconds

A motion estimation algorithm with low computational cost using low-resolution quantized image (저해상도 양자화된 이미지를 이용하여 연산량을 줄인 움직임 추정 기법)

  • 이성수;채수익
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.33B no.8
    • /
    • pp.81-95
    • /
    • 1996
  • In this paper, we propose a motio estiamtion algorithm using low-resolution quantization to reduce the computation of the full search algorithm. The proposed algorithm consists of the low-resolution search which determins the candidate motion vectors by comparing the low-resolution image and the full-resolution search which determines the motion vector by comparing the full-resolution image on the positions of the candidate motion vectors. The low-resolution image is generated by subtracting each pixel value in the reference block or the search window by the mean of the reference block, and by quantizing it is 2-bit resolution. The candidate motion vectors are determined by counting the number of pixels in the reference block whose quantized codes are unmatched to those in the search window. Simulation results show that the required computational cost of the proposed algorithm is reduced to 1/12 of the full search algorithm while its performance degradation is 0.03~0.12 dB.

  • PDF

해난사고 분석을 위한 Full-mission Shiphandling Simulator(FMSS)시연

  • Lee, Dong-Seop;Gang, Jeong-Gu
    • Proceedings of the Korean Institute of Navigation and Port Research Conference
    • /
    • 2011.06a
    • /
    • pp.87-88
    • /
    • 2011
  • 다기능 선박조종시뮬레이터(Full-mission Shiphandling Simulator)를 이용한 사고분석 방법을 한국해양수산연수원이 보유한 DNV(Det Norske Veritas)선급에서 "Integrated Simulator System, NAUT AW(SIM), DYNPOS-AUT(SIM), HSC, TUG, ICE" Class로 인정하고, STCW 협약 Regulation I/12를 충족한 Russia TRANSAS사의 "NAVI-TRAINER PROFESSIONAL 5000 NTPRO 5000" Full-mission Shiphandling Simulator를 이용하여 시행하였다.

  • PDF

Anonymity-Based Authenticated Key Agreement with Full Binding Property

  • Hwang, Jung Yeon;Eom, Sungwook;Chang, Ku-Young;Lee, Pil Joong;Nyang, DaeHun
    • Journal of Communications and Networks
    • /
    • v.18 no.2
    • /
    • pp.190-200
    • /
    • 2016
  • In this paper, we consider some aspects of binding properties that bind an anonymous user with messages. According to whether all the messages or some part of the messages are bound with an anonymous user, the protocol is said to satisfy the full binding property or the partial binding property, respectively. We propose methods to combine binding properties and anonymity-based authenticated key agreement protocols. Our protocol with the full binding property guarantees that while no participant's identity is revealed, a participant completes a key agreement protocol confirming that all the received messages came from the other participant. Our main idea is to use an anonymous signature scheme with a signer-controlled yet partially enforced linkability. Our protocols can be modified to provide additional properties, such as revocable anonymity. We formally prove that the constructed protocols are secure.

Phase-Shifted Full Bridge(PSFB) DC/DC Converter with a Hold-up Time Compensation Circuit for Information Technology (IT) Devices (홀드 업 타임 보상회로를 가진 IT 기기용 Front-end PSFB DC/DC 컨버터)

  • Yi, Kang-Hyun
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.18 no.5
    • /
    • pp.501-506
    • /
    • 2013
  • A hold-up time compensation circuit is proposed to get high efficiency of the front-end phase-shifted full bridge DC/DC converter. The proposed circuit can make the phase-shifted full bridge front-end DC/DC converter built with 0.5 duty ratio so that the conduction loss of the primary side and voltage stress across rectifier in the secondary side are reduced and the higher efficiency can be obtained. Furthermore, the requirement of an output filter significantly can diminish due to the perfect filtered waveform. A 12V/100A prototype has been made and experimental results are given to verify the theoretic analysis and detailed features.

Development of Dynamo Algorithm Based on BIM for Direct Sunlight Impact Analysis of Tunnel Outlet (BIM 기반 터널 출구부 직광영향검토 Dynamo 알고리즘 개발)

  • Kwon, Bareum;Yeom, Chunho
    • Journal of KIBIM
    • /
    • v.12 no.4
    • /
    • pp.41-51
    • /
    • 2022
  • BIM was introduced under the leadership of public institutions, and projects such as road, railway, and site creation, including BIM tasks, are currently being ordered. In addition, as the Ministry of Land, Infrastructure and Transport(MOLIT) is pushing for the full design of BIM, public institutions under its jurisdiction are also pushing for the full design of BIM. Full design of BIM means that all designs are done with BIM. Public institutions' BIM guidelines only require BIM deliverables, and there is a limited direction for the BIM design process to respond to traditional design approaches. Therefore, it is necessary to develop a BIM-based design process corresponding to the full design of BIM.

Automatic Detection of the Middle Tooth Crown Part for Full Automatic Tooth Segmentation in Dental CT Images

  • Lee, Chan-Woo;Chae, Ok-Sam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.3
    • /
    • pp.17-23
    • /
    • 2018
  • In this paper, we propose the automatic detection method which find the middle part of tooth crown to start individual tooth segmentation. There have been many studies on the automation of individual tooth segmentation, but there are still many problems for full automation. Detection of middle part of tooth crown used as initial information for individual tooth segmentation is closely related to performance, but most studies are based on the assumption that they are already known or they can be represented by using a straight line. In this study, we have found that the jawbone curve is similar to the tooth alignment curve by spatially analyzing the CT image, and propose a method to automatically detect the middle part of tooth crown. The proposed method successfully uses the jawbone curves to successfully create a tooth alignment curve that is difficult to detect. As the middle part of tooth crown is in the form of a tooth alignment curve, the proposed method detects the middle part of tooth crown successfully. It has also been verified by experiments that the proposed method works well on real dental CT images.

Counterfeit Detection Using Characterization of Safety Feature on Banknote with Full-field Optical Coherence Tomography

  • Choi, Woo-June;Min, Gi-Hyeon;Lee, Byeong-Ha;Eom, Jong-Hyun;Kim, Ju-Wan
    • Journal of the Optical Society of Korea
    • /
    • v.14 no.4
    • /
    • pp.316-320
    • /
    • 2010
  • We report an application of full-field optical coherence tomography (FF-OCT) for identifying counterfeit bank notes. The depth-resolved imaging capability of FF-OCT was used for tomographic identification of superficially-identical objects. By retrieving the internal structures of the security feature (cash hologram) of an original banknote, we could demonstrate the feasibility of FF-OCT to identify counterfeit money. The FF-OCT images showed that the hologram consisted of micron scale multi-coated layers including an air gap. Therefore, it is expected that FF-OCT has potential as a new non-invasive tool to discern imitation of currency, and it would find applications in a wide field of counterfeit sciences.

Power Allocation for Opportunistic Full-Duplex based Relay Selection in Cooperative Systems

  • Zhong, Bin;Zhang, Dandan;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.10
    • /
    • pp.3908-3920
    • /
    • 2015
  • In this paper, performance analysis of full-duplex (FD) relay selection under decode-and-forward (DF) relaying mode is carried out by taking into account several critical factors, including the distributions of the received signal-to-noise ratio (SNR) and the outage probability of wireless links. The tradeoff between the FD and half-duplex (HD) modes for relay selection techniques is also analyzed, where the former suffers from the impact of residual self-interference, but the latter requires more channel resources than the former (i.e., two orthogonal channels are required). Furthermore, the impact of optimal power allocation (OPA) on the proposed relay-selection scheme is analyzed. Particularly, the exact closed-form expressions for outage probability of the proposed scheme over Rayleigh fading channels are derived, followed by validating the proposed analysis using simulation. Numerical results show that the proposed FD based scheme outperforms the HD based scheme by more than 4 dB in terms of coding gain, provided that the residual self-interference level in the FD mode can be substantially suppressed to the level that is below the noise power.

The Full-Duplex Device-to-Device Security Communication Under the Coverage of Unmanned Aerial Vehicle

  • Zeng, Qian;Zhang, Zhongshan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.4
    • /
    • pp.1941-1960
    • /
    • 2019
  • Unmanned aerial vehicles (UAVs), acting as mobile base stations (BSs), can be deployed in the typical fifth-generation mobile communications (5G) scenarios for the purpose of substantially enhancing the radio coverage. Meanwhile, UAV aided underlay device-to-device (D2D) communication mode can be activated for further improving the capacity of the 5G networks. However, this UAV aided D2D communication system is more vulnerable to eavesdropping attacks, resulting in security risks. In this paper, the D2D receivers work in full-duplex (FD) mode, which improves the security of the network by enabling these legitimate users to receive their useful information and transmit jamming signal to the eavesdropper simultaneously (with the same frequency band). The security communication under the UAV coverage is evaluated, showing that the system's (security) capacity can be substantially improved by taking advantage of the flexible radio coverage of UAVs. Furthermore, the closed-form expressions for the coverage probabilities are derived, showing that the cellular users (CUs)' secure coverage probability in downlink transmission is mainly impacted by the following three factors: its communication area, the relative position with UAV, and its eavesdroppers. In addition, it is observed that the D2D users or DUs' secure coverage probability is relevant to state of the UAV. The system's secure capacity can be substantially improved by adaptively changing the UAV's position as well as coverage.

Rate-Compatible LDPC Codes Based on the PEG Algorithm for Relay Communication Systems

  • Zhou, Yangzhao;Jiang, Xueqin;Lee, Moon Ho
    • Journal of Communications and Networks
    • /
    • v.17 no.4
    • /
    • pp.346-350
    • /
    • 2015
  • It is known that the progressive edge-growth (PEG) algorithm can be used to construct low-density parity-check (LDPC) codes at finite code lengths with large girths through the establishment of edges between variable and check nodes in an edge-by-edge manner. In [1], the authors derived a class of LDPC codes for relay communication systems by extending the full-diversity root-LDPC code. However, the submatrices of the parity-check matrix H corresponding to this code were constructed separately; thus, the girth of H was not optimized. To solve this problem, this paper proposes a modified PEG algorithm for use in the design of large girth and full-diversity LDPC codes. Simulation results indicated that the LDPC codes constructed using the modified PEG algorithm exhibited a more favorable frame error rate performance than did codes proposed in [1] over block-fading channels.