• 제목/요약/키워드: information operations

검색결과 4,569건 처리시간 0.028초

Safety Assessment in Operation of Human-centered Robots - An Information-theoretic Approach

  • Choi, Gi-Heung
    • International Journal of Safety
    • /
    • 제5권2호
    • /
    • pp.12-17
    • /
    • 2006
  • Operations of human-centered robot, in general, facilitates the creation of new process that may potentially harm the human operators. Design of safety-guaranteed operation of human-centered robots is, therefore, important since it determines the ultimate outcomes of operations involving safety of human operators. This study discusses the application of information-theoretic measures to safety assessment of human-centered robotic operations. Some examples are given.

Morphological Operations to Segment a Tumor from a Magnetic Resonance Image

  • Thapaliya, Kiran;Kwon, Goo-Rak
    • Journal of information and communication convergence engineering
    • /
    • 제12권1호
    • /
    • pp.60-65
    • /
    • 2014
  • This paper describes an efficient framework for the extraction of a brain tumor from magnetic resonance (MR) images. Before the segmentation process, a median filter is used to filter the image. Then, the morphological gradient is computed and added to the filtered image for intensity enhancement. After the enhancement process, the thresholding value is calculated using the mean and the standard deviation of the image. This thresholding value is used to binarize the image followed by the morphological operations. Moreover, the combination of these morphological operations allows to compute the local thresholding image supported by a flood-fill algorithm and a pixel replacement process to extract the tumor from the brain. Thus, this framework provides a new source of evidence in the field of segmentation that the specialist can aggregate with the segmentation results in order to soften his/her own decision.

이동 IP 체계에 대한 군 정보체계 활용방안 연구 (A Study on Mobile IP Systems for Military Information Systems)

  • 이태종
    • 한국국방경영분석학회지
    • /
    • 제22권2호
    • /
    • pp.73-89
    • /
    • 1996
  • This paper suggests the new IP, SIMIP(Simple Mobile IP), which supports a continuous mobility between a static host and a mobile host in the static TCP/IP LAN environment where mobile hosts are overlayed with cells. For designing a mobile protocol, routing optimization is very important, and it is directly related to the management mechanism of a mobile host's location information. When the mobile hosts' location information are centralized, the network has high risk when a centralized device fails. On the other hand, when they are distributed, the above problems are solved. But it requires complicated techniques in order to search the encapsulated addresses. SIMP centralizes mobile hosts' location information, minimizes the risk by automatically substituting the failed default mobile router with one of the multiple general mobile routers, and supports the optimal routing path through "default mobile router path alternation" Then since SIMIP isn't reasonable the operations informations to the chief in military operations room.ions room.

  • PDF

정보시스템 프로잭트의 선택원리 (A Model for Project Selection of Information System)

  • 지원철
    • 한국경영과학회지
    • /
    • 제10권1호
    • /
    • pp.79-83
    • /
    • 1985
  • This purpose of this study is to suggest a tentative model for project selection of information system. In constructing a mathematical model, quantification of decision criteria is tried to lessen difficulties of measuring benefits of information system project. Suggested model enables us to select projects in the context of portfolio and information system policy.

  • PDF

Detection for Operation Chain: Histogram Equalization and Dither-like Operation

  • Chen, Zhipeng;Zhao, Yao;Ni, Rongrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제9권9호
    • /
    • pp.3751-3770
    • /
    • 2015
  • Many sorts of image processing software facilitate image editing and also generate a great number of doctored images. Forensic technology emerges to detect the unintentional or malicious image operations. Most of forensic methods focus on the detection of single operations. However, a series of operations may be used to sequentially manipulate an image, which makes the operation detection problem complex. Forensic investigators always want to know as much exhaustive information about a suspicious image's entire processing history as possible. The detection of the operation chain, consisting of a series of operations, is a significant and challenging problem in the research field of forensics. In this paper, based on the histogram distribution uniformity of a manipulated image, we propose an operation chain detection scheme to identify histogram equalization (HE) followed by the dither-like operation (DLO). Two histogram features and a local spatial feature are utilized to further determine which DLO may have been applied. Both theoretical analysis and experimental results verify the effectiveness of our proposed scheme for both global and local scenarios.

Incremental Information Content of Cash Flow and Earnings in the Iranian Capital Market

  • Asgari, Leila;Salehi, Mahdi;Mohammadi, Ali
    • 산경연구논집
    • /
    • 제5권1호
    • /
    • pp.5-9
    • /
    • 2014
  • Purpose - This study aims to examine the incremental information content of cash flw from operations and earnings in the Iranian capital market. Design, methodology, and approach - Based on market-based accounting research, this study uses statistical associations between accounting data (earnings and cash flw) and stock returns to assess/measure the incremental information content (value relevance) of cash flw and earnings. A multivariate regression model based on panel data is used to examine the incremental information content of earnings and cash flow from operations. Results - The results show that both earnings and cash flow from operations have incremental information content beyond each other. These results are consistent with the findings of recent studies. Overall, the fidings of this study support the usefulness of cash flw information in addition to earnings, in fim valuation by investors in the Iranian market. Conclusions - The study makes the following contributions to the Iranian literature on incremental information content of cash flw and earnings. First, this study employs actual cash flw data derived from cash flw statements. Second, this study employs a large sample size for a more recent period.

Computation and Communication Efficient Key Distribution Protocol for Secure Multicast Communication

  • Vijayakumar, P.;Bose, S.;Kannan, A.;Jegatha Deborah, L.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제7권4호
    • /
    • pp.878-894
    • /
    • 2013
  • Secure multimedia multicast applications involve group communications where group membership requires secured dynamic key generation and updating operations. Such operations usually consume high computation time and therefore designing a key distribution protocol with reduced computation time is necessary for multicast applications. In this paper, we propose a new key distribution protocol that focuses on two aspects. The first one aims at the reduction of computation complexity by performing lesser numbers of multiplication operations using a ternary-tree approach during key updating. Moreover, it aims to optimize the number of multiplication operations by using the existing Karatsuba divide and conquer approach for fast multiplication. The second aspect aims at reducing the amount of information communicated to the group members during the update operations in the key content. The proposed algorithm has been evaluated based on computation and communication complexity and a comparative performance analysis of various key distribution protocols is provided. Moreover, it has been observed that the proposed algorithm reduces the computation and communication time significantly.

Operations of fuzzy bags

  • Kim, Kyung-Soo;Miyamoto, Sadaaki
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 제어로봇시스템학회 1996년도 Proceedings of the Korea Automatic Control Conference, 11th (KACC); Pohang, Korea; 24-26 Oct. 1996
    • /
    • pp.28-31
    • /
    • 1996
  • A bag is a set-like entity which can contain repeated elements. Fuzzy bags have been studied by Yager, who defined their basic relations and operations. However, his definitions of the basic relations and operations are inconsistent with the corresponding relations and operations for ordinary fuzzy sets. The present paper presents new basic relations and operations of fuzzy bags using a grade sequence for each element of the universal set. Moreover the .alpha.-cut, t-norms, the extension principle, and the composition of fuzzy bag relations are described.

  • PDF