• Title/Summary/Keyword: hybrid systems

Search Result 2,645, Processing Time 0.033 seconds

An Improvement Algorithm for the Image Compression Imaging

  • Hu, Kaiqun;Feng, Xin
    • Journal of Information Processing Systems
    • /
    • v.16 no.1
    • /
    • pp.30-41
    • /
    • 2020
  • Lines and textures are natural properties of the surface of natural objects, and their images can be sparsely represented in suitable frames such as wavelets, curvelets and wave atoms. Based on characteristics that the curvelets framework is good at expressing the line feature and wavesat is good at representing texture features, we propose a model for the weighted sparsity constraints of the two frames. Furtherly, a multi-step iterative fast algorithm for solving the model is also proposed based on the split Bergman method. By introducing auxiliary variables and the Bergman distance, the original problem is transformed into an iterative solution of two simple sub-problems, which greatly reduces the computational complexity. Experiments using standard images show that the split-based Bergman iterative algorithm in hybrid domain defeats the traditional Wavelets framework or curvelets framework both in terms of timeliness and recovery accuracy, which demonstrates the validity of the model and algorithm in this paper.

The Design of a Hybrid Intrusion Detection System using Immune Systems (생체 면역시스템을 이용한 하이브리드 침입 탐지 시스템 설계)

  • Yang, Eun-Mok;Lee, Sang-Yong
    • Annual Conference of KIPS
    • /
    • 2001.10a
    • /
    • pp.523-526
    • /
    • 2001
  • 최근 컴퓨터와 인터넷의 급속한 발전과 더불어 컴퓨터의 데이터를 파괴하거나 바이러스를 이용해 정보를 빼내기 위한 해킹 등이 만연하고 있다. 이에 컴퓨터의 데이터를 외부 침입물질에 대해 자체적인 보호와 제거 기능을 가진 생체 면역시스템을 이용한 연구가 활발히 진행되고 있다. 생체 면역 시스템은 바이러스나 병원균 등의 낮선 외부의 침입자로부터 자신을 보호하기 위해 크게 선천성 면역과 후천성 면역을 제공한다. 본 논문은 선천성 면역에는 오용탐지기법과 후천성 면역에는 비정상행위 탐지 기법을 이용한 하이브리드 침입탐지 시스템을 제안한다. 감사 자료 수집은 멀티레벨 파라미터 모니터링을 통해 감사 자료를 수집한다. 선천성 면역에서는 피부와 여러 가지 감각 기관의 분비물을 이용하듯이 방화벽과 같은 비슷한 기능을 하는 서비스 제한 에이전트와 기존에 알려진 버그와 해킹 기법을 시나리오 지식베이스를 이용하는 오용탐지 기법을 사용한다. 그리고, 후천성 면역에서는 유전자 알고리즘을 이용해 침입을 탐지하고 대응한다.

  • PDF

Review of Biological Network Data and Its Applications

  • Yu, Donghyeon;Kim, MinSoo;Xiao, Guanghua;Hwang, Tae Hyun
    • Genomics & Informatics
    • /
    • v.11 no.4
    • /
    • pp.200-210
    • /
    • 2013
  • Studying biological networks, such as protein-protein interactions, is key to understanding complex biological activities. Various types of large-scale biological datasets have been collected and analyzed with high-throughput technologies, including DNA microarray, next-generation sequencing, and the two-hybrid screening system, for this purpose. In this review, we focus on network-based approaches that help in understanding biological systems and identifying biological functions. Accordingly, this paper covers two major topics in network biology: reconstruction of gene regulatory networks and network-based applications, including protein function prediction, disease gene prioritization, and network-based genome-wide association study.

Simulation-based Reliability and Maintainability Design of a Warship (시뮬레이션 기반 함정의 신뢰도와 보전도 설정)

  • Han, Young Jin;Yun, Won Young;You, Jea Woo;Choi, Chung Hyun;Kim, Hee Wook
    • Journal of Korean Institute of Industrial Engineers
    • /
    • v.39 no.6
    • /
    • pp.461-472
    • /
    • 2013
  • In this paper, we deal with a simulation-based reliability and maintainability design problem of a warship and want to determine the optimal values of MTBF and MTTR of all units and ALDT of the warship. The system availability and life cycle cost are used as optimization criteria and estimated by simulation. A hybrid genetic algorithm with a heuristic method is proposed to find near-optimal solutions and numerical examples are also studied to investigate the effect of model parameters to the optimal solutions and compare with a general genetic algorithm.

Statistical Design of Two-Stage Reliability Demonstration Tests (2단계 신뢰성 실증시험의 통계적 설계)

  • Seo, Sun-Keun
    • Journal of Korean Society for Quality Management
    • /
    • v.39 no.2
    • /
    • pp.313-319
    • /
    • 2011
  • In design verification and process validation stages, reliability demonstration tests(RDT's) are common practice in industry, A new two-stage RDT that is known to be more efficient than a corresponding single-stage one in terms of expected test duration for Weibull distribution is proposed. Zero or one failure two-stage plans to minimize expected test duration under Type I and hybrid censoring subject to satisfying consumer's risk at a specified reliability target are developed and a numerical example is provided to illustrate the proposed two-stage RDT plans and compared with other one- and two-stage plans.

Extraction of User Preference for Hybrid Collaborative Filtering

  • Qing Li;Kim, Byeong-Man;Shin, Yoon-Sik;Lim, En-Ki
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.04b
    • /
    • pp.7-9
    • /
    • 2004
  • With the development of e-commerce and information access, recommender systems have become a popular technique to prune large information spaces so that users are directed toward those items that best meet their needs and preferences. In this paper, clustering technique is applied in the collaborative recommender framework to consider semantic contents available from the user profiles. We also suggest methods to construct user profiles from rating information and attributes of items to accommodate user preferences. Further, we show that the correct application of the semantic content information obtained from user profiles does enhance the effectiveness of collaborative recommendation.

  • PDF

Review on Digital Image Watermarking Based on Singular Value Decomposition

  • Wang, Chengyou;Zhang, Yunpeng;Zhou, Xiao
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1585-1601
    • /
    • 2017
  • With the rapid development of computer technologies, a number of image modification methods have emerged, which have great impacts on the security of image information. Therefore, it is necessary to protect the integrity and authenticity of digital images, and digital watermarking technique consequently becomes a research hotspot. An effort is made to survey and analyze advancements of image watermarking algorithms based on singular value decomposition (SVD) in recent years. In the first part, an overview of watermarking techniques is presented and then mathematical theory of SVD is given. Besides, SVD watermarking model, features, and evaluation indexes are demonstrated. Various SVD-based watermarking algorithms, as well as hybrid watermarking algorithms based on SVD and other transforms for copyright protection, tamper detection, location, and recovery are reviewed in the last part.

DC-Voltage Regulation for Solar-Variable Speed Hybrid System

  • Niyitegeka, Gedeon;Lee, Kyungkyu;Choi, Jaeho
    • Proceedings of the KIPE Conference
    • /
    • 2015.11a
    • /
    • pp.123-124
    • /
    • 2015
  • Recently interest on DC systems has been grown up extensively for more efficient connection with renewable energy. During the operation, there happens DC_link voltage variations. This paper focuses on the DC voltage stabilization applied in stand-alone DC microgrid to improve the system stability by keeping the voltage within limits. Batteries and a variable speed diesel generator cover the shortage of power after all available renewable energy is consumed. Load shedding or power generation reduction should automatically takes place if the maximum tolerable voltage variation is exceeded. PSIM based simulation results are presented to evaluate the performance of the proposed control measures.

  • PDF

Multiple-Channel Active Noise Control by ANFIS and Independent Component Analysis without Secondary Path Modeling

  • Kim, Eung-Ju;Lee, Sang-yup;Kim, Beom-Soo;Lim, Myo-Taeg
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.22.1-22
    • /
    • 2001
  • In this paper we present Multiple-Channel Active Noise Control[ANC] system by employing Independent Component Analysis[ICA] and Adaptive Network Fuzzy Inference System[ANFIS]. ICA is widely used in signal processing and communication and it use prewhiting and appropriate choice of non-linearities, ICA can separate mixed signal. ANFIS controller is trained with the hybrid learning algorithm to optimize its parameters for adaptively canceling noise. This new method which minimizes a statistical dependency of mutual information(MI) in mixed low frequency noise signal and there is no need to secondary path modeling. The proposed implementations achieve more powerful and stable noise reduction than Filtered-X LMS algorithms which is needed for LTI assumption and precise secondary error

  • PDF

Intelligent navigation and control system for a mobile robot based on different programming paradigms

  • Kubik, Tomasz;Loukianov, Andrey A.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2001.10a
    • /
    • pp.36.6-36
    • /
    • 2001
  • The problem of robot navigation and control is a complex task. Its complexity and characteristics depends on the characteristics of the environment robot inhabits, robot construction (mechanical abilities to move, sense) and the job the robot is supposed to do. In this paper we propose a hybrid programming approach to mobile robot navigation and control in an indoor environment. In our approach we used declarative, procedural, and object oriented programming paradigms and we utilized some advantages of our distributed computing architecture. The programming languages corresponding to the paradigms we used were C, C++ and Prolog. In the paper we present some details of our mobile robot hardware and software structure, focusing on the software design and implementation.

  • PDF