• Title/Summary/Keyword: k-Means 알고리즘

Search Result 773, Processing Time 0.029 seconds

Optimization Design of Damping Devices for a Super-Tall Building Using Computational Platform (전산플랫폼을 이용한 초고층구조물의 감쇠장치 최적화 설계)

  • Joung, Bo-Ra;Lee, Sang-Hyun;Chung, Lan;Choi, Hyun-Chul
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.2
    • /
    • pp.145-152
    • /
    • 2015
  • In the study, the effects of damping devices on damping ratio increase and wind-load reduction were investigated based on the computational platform, which is one of the parametric modeling methods. The computational platform helps the designers or engineers to evaluate the efficacy of the numerous alternative structural systems for irregular Super-Tall building, which is crucial in determining the capacity and the number of the supplemental damping devices for adding the required damping ratios to the building. The inherent damping ratio was estimated based on the related domestic and foreign researches conducted by using real wind-load records. Two types of damping devices were considered: One is inter-story installation type passive control devices and the other is mass type active control devices. The supplemental damping ratio due to the damping devices was calculated by means of equivalent static analysis using an equation suggested by FEMA. The optimal design of the damping devices was conducted by using the computational platform. The structural element quantity reduction effect resulting from the installation of the damping devices could be simply assessed by proposing a wind-load reduction factor, and the effectiveness of the proposed method was verified by a numerical example of a 455m high-rise building. The comparison between roof displacement and the story shear forces by the nonlinear time history analysis and the proposed method indicated that the proposed method could simply but approximately estimate the effects of the supplemental damping devices on the roof displacement and the member force reduction.

Development of Drought Map Based on Three-dimensional Spatio-temporal Analysis of Drought (가뭄사상에 대한 3차원적 시공간 분석을 통한 가뭄지도 개발)

  • Yoo, Jiyoung;So, Byung-Jin;Kwon, Hyun-Han;Kim, Tae-Woong
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.1
    • /
    • pp.25-33
    • /
    • 2020
  • A drought event is characterized by duration, severity and affected area. In general, after calculating a drought index using hydro-meteorological time series at a station, a drought event is defined based on the run theory to identify the beginning and end time. However, this one-dimensional analysis has limitations for analyzing the spatio-temporal occurrence characteristics and movement paths of drought. Therefore, this study is to define a three-dimensional drought event using a simple clustering algorithm and to develop a drought map that can be used to understand the drought severity according to the spatio-temporal expansion of drought. As a result, compared with the two-dimensional monitoring information to show spatial distribution of drought index, a proposed drought map is able to show three-dimensional drought characteristics inclusing drought duration, spatial cumulative severity, and centroid of drought. The analysis of drought map indicated that there was a drought event which had the affected area less than 10 % while on occations while there were 11 drought events (44 %) which had the affected area more a than 90 % of the total area. This means that it is important to understand the relationship between spatial variation of drought affected area and severity corresponding to various drought durations. The development of drought map based on three-dimensional drought analysis is useful to analyze the spatio-temporal occurrence characteristics and propagation patterns of regional drought which can be utilized in developing mitigation measures for future extreme droughts.

A Study of Acoustic Masking Effect from Formant Enhancement in Digital Hearing Aid (디지털 보청기에서의 포먼트 강조에 의한 마스킹 효과 연구)

  • Jeon, Yu-Yong;Kil, Se-Kee;Yoon, Kwang-Sub;Lee, Sang-Min
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.45 no.5
    • /
    • pp.13-20
    • /
    • 2008
  • Although digital hearing aid algorithms have been developed to compensate hearing loss and to help hearing impaired people to communicate with others, digital hearing aid user still complain about difficulty of hearing the speech. The reason could be the quality of speech through digital hearing aid is insufficient to understand the speech caused by feedback, residual noise and etc. And another thing is masking effect among formants that makes sound quality low. In this study, we measured the masking characteristics of normal listeners and hearing impaired listeners having presbyacusis to confirm masking effect in speech itself. The experiment is composed of 5 tests; pure tone test, speech reception threshold (SRT) test, word recognition score (WRS) test, puretone masking test and speech masking test. In speech masking test, there are 25 speeches in each speech set. And log likelihood ratio (LLR) is introduced to evaluate the distortion of each speech objectively. As a result, the speech perception became lower by increasing the quantity of formant enhancement. And each enhanced speech in a speech set has statistically similar LLR, however speech perception is not. It means that acoustic masking effect rather than distortion influences speech perception. In actuality, according to the result of frequency analysis of the speech that people can not answer correctly, level difference between first formant and second formant is about 35dB, and it is similar to result of pure tone masking test(normal hearing subject:36.36dB, hearing impaired subject:32.86dB). Characteristics of masking effect is not similar between normal listeners and hearing impaired listeners. So it is required to check the characteristics of masking effect before wearing a hearing aid and to apply this characteristics to fitting.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.

Periodic Mesh Generation for Composite Structures using Polyhedral Finite Elements (다면체 유한요소를 이용한 복합재 구조의 주기 격자망 생성)

  • Sohn, Dongwoo;Park, Jong Youn;Cho, Young-Sam;Lim, Jae Hyuk;Lee, Haengsoo
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.27 no.4
    • /
    • pp.239-245
    • /
    • 2014
  • Finite element modeling of composite structures may be cumbersome due to complex distributions of reinforcements. In this paper, an efficient scheme is proposed that can generate periodic meshes for the composite structures. Regular meshes with hexahedral finite elements are first prepared, and the elements are then trimmed to fit external surfaces of reinforcements in the composite structures. The trimmed hexahedral finite elements located at interfaces between the matrix and the reinforcements correspond to polyhedral finite elements, which allow an arbitrary number of nodes and faces in the elements. Because the trimming process is consistently conducted by means of consistent algorithms, the elements of the reinforcements are automatically compatible with those of the matrices. With the additional consideration of periodicity of reinforcements in a representative volume element(RVE), the proposed scheme provides periodic meshes in an efficient manner, which are compatible for each pair of periodic boundaries of the RVE. Therefore, periodic boundary conditions for the RVE are enforced straightforwardly. Numerical examples demonstrate the effectiveness of the proposed scheme for finite element modeling of complex composite structures.

An Embedding /Extracting Method of Audio Watermark Information for High Quality Stereo Music (고품질 스테레오 음악을 위한 오디오 워터마크 정보 삽입/추출 기술)

  • Bae, Kyungyul
    • Journal of Intelligence and Information Systems
    • /
    • v.24 no.2
    • /
    • pp.21-35
    • /
    • 2018
  • Since the introduction of MP3 players, CD recordings have gradually been vanishing, and the music consuming environment of music users is shifting to mobile devices. The introduction of smart devices has increased the utilization of music through music playback, mass storage, and search functions that are integrated into smartphones and tablets. At the time of initial MP3 player supply, the bitrate of the compressed music contents generally was 128 Kbps. However, as increasing of the demand for high quality music, sound quality of 384 Kbps appeared. Recently, music content of FLAC (Free License Audio Codec) format using lossless compression method is becoming popular. The download service of many music sites in Korea has classified by unlimited download with technical protection and limited download without technical protection. Digital Rights Management (DRM) technology is used as a technical protection measure for unlimited download, but it can only be used with authenticated devices that have DRM installed. Even if music purchased by the user, it cannot be used by other devices. On the contrary, in the case of music that is limited in quantity but not technically protected, there is no way to enforce anyone who distributes it, and in the case of high quality music such as FLAC, the loss is greater. In this paper, the author proposes an audio watermarking technology for copyright protection of high quality stereo music. Two kinds of information, "Copyright" and "Copy_free", are generated by using the turbo code. The two watermarks are composed of 9 bytes (72 bits). If turbo code is applied for error correction, the amount of information to be inserted as 222 bits increases. The 222-bit watermark was expanded to 1024 bits to be robust against additional errors and finally used as a watermark to insert into stereo music. Turbo code is a way to recover raw data if the damaged amount is less than 15% even if part of the code is damaged due to attack of watermarked content. It can be extended to 1024 bits or it can find 222 bits from some damaged contents by increasing the probability, the watermark itself has made it more resistant to attack. The proposed algorithm uses quantization in DCT so that watermark can be detected efficiently and SNR can be improved when stereo music is converted into mono. As a result, on average SNR exceeded 40dB, resulting in sound quality improvements of over 10dB over traditional quantization methods. This is a very significant result because it means relatively 10 times improvement in sound quality. In addition, the sample length required for extracting the watermark can be extracted sufficiently if the length is shorter than 1 second, and the watermark can be completely extracted from music samples of less than one second in all of the MP3 compression having a bit rate of 128 Kbps. The conventional quantization method can extract the watermark with a length of only 1/10 compared to the case where the sampling of the 10-second length largely fails to extract the watermark. In this study, since the length of the watermark embedded into music is 72 bits, it provides sufficient capacity to embed necessary information for music. It is enough bits to identify the music distributed all over the world. 272 can identify $4*10^{21}$, so it can be used as an identifier and it can be used for copyright protection of high quality music service. The proposed algorithm can be used not only for high quality audio but also for development of watermarking algorithm in multimedia such as UHD (Ultra High Definition) TV and high-resolution image. In addition, with the development of digital devices, users are demanding high quality music in the music industry, and artificial intelligence assistant is coming along with high quality music and streaming service. The results of this study can be used to protect the rights of copyright holders in these industries.

A Case Study for Simulation of a Debris Flow with DEBRIS-2D at Inje, Korea (DEBRIS-2D를 이용한 인제지역 토석류 산사태 거동모사 사례 연구)

  • Chae, Byung-Gon;Liu, Ko-Fei;Kim, Man-Il
    • The Journal of Engineering Geology
    • /
    • v.20 no.3
    • /
    • pp.231-242
    • /
    • 2010
  • In order to assess applicability of debris flow simulation on natural terrain in Korea, this study introduced the DEBRIS-2D program which had been developed by Liu and Huang (2006). For simulation of large debris flows composed of fine and coarse materials, DEBRIS-2D was developed using the constitutive relation proposed by Julien and Lan (1991). Based on the theory of DEBRIS-2D, this study selected a valley where a large debris flow was occurred on July 16th, 2006 at Deoksanri, Inje county, Korea. The simulation results show that all mass were already flowed into the stream at 10 minutes after starting. In 10minutes, the debris flow reached the first geological turn and an open area, resulting in slow velocity and changing its flow direction. After that, debris flow started accelerating again and it reached the village after 40 minutes. The maximum velocity is rather low between 1 m/sec and 2 m/sec. This is the reason why debris flow took 50 minutes to reach the village. The depth change of debris flow shows enormous effect of the valley shape. The simulated result is very similar to what happened in the field. It means that DEBRIS-2D program can be applied to the geologic and topographic conditions in Korea without large modification of analysis algorithm. However, it is necessary to determine optimal reference values of Korean geologic and topographic properties for more reliable simulation of debris flows.

Wireless LAN-based Vehicle Location Estimation in GPS Shading Environment (GPS 음영 환경에서 무선랜 기반 차량 위치 추정 연구)

  • Lee, Donghun;Min, Kyungin;Kim, Jungha
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.19 no.1
    • /
    • pp.94-106
    • /
    • 2020
  • Recently, the radio navigation method utilizing the GPS(Global Positioning System) satellite information is widely used as the method to measure the position of objects. As GPS applications become wider and fields based on various positioning information emerge, new methods for achieving higher accuracy are required. In the case of autonomous vehicles, the INS(Inertial Navigation System) using the IMU(Inertial Measurement Unit), and the DR(Dead Reckoning) algorithm using the in-vehicle sensor, are used for the purpose of preventing degradation of accuracy of the GPS and to measure the position in the shadow area. However, these positioning methods have many elements of problems due not only to the existence of various shaded areas such as building areas that are continually enlarged, tunnels, underground parking lots and but also to the limitations of accumulation-based location estimation methods that increase in error over time. In this paper, an efficient positioning method in a large underground parking space using Fingerprint method is proposed by placing the AP(Access Points) and directional antennas in the form of four anchors using WLAN, a popular means of wireless communication, for positioning the vehicle in the GPS shadow area. The proposed method is proved to be able to produce unchanged positioning results even in an environment where parked vehicles are moved as time passes.

Application of Variance Reduction Techniques for the Improvement of Monte Carlo Dose Calculation Efficiency (분산 감소 기법에 의한 몬테칼로 선량 계산 효율 평가)

  • Park, Chang-Hyun;Park, Sung-Yong;Park, Dal
    • Progress in Medical Physics
    • /
    • v.14 no.4
    • /
    • pp.240-248
    • /
    • 2003
  • The Monte Carlo calculation is the most accurate means of predicting radiation dose, but its accuracy is accompanied by an increase in the amount of time required to produce a statistically meaningful dose distribution. In this study, the effects on calculation time by introducing variance reduction techniques and increasing computing power, respectively, in the Monte Carlo dose calculation for a 6 MV photon beam from the Varian 600 C/D were estimated when maintaining accuracy of the Monte Carlo calculation results. The EGSnrc­based BEAMnrc code was used to simulate the beam and the EGSnrc­based DOSXYZnrc code to calculate dose distributions. Variance reduction techniques in the codes were used to describe reduced­physics, and a computer cluster consisting of ten PCs was built to execute parallel computing. As a result, time was more reduced by the use of variance reduction techniques than that by the increase of computing power. Because the use of the Monte Carlo dose calculation in clinical practice is yet limited by reducing the computational time only through improvements in computing power, introduction of reduced­physics into the Monte Carlo calculation is inevitable at this point. Therefore, a more active investigation of existing or new reduced­physics approaches is required.

  • PDF

An Efficient Feedback Collection for Multimedia Multicast (멀티미디어 멀티캐스트를 위한 효율적인 피드백 정보 수집)

  • Kung, Sang-Hwan;Kang, Min-Gyu;Koo, Yeon-Seol
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.3
    • /
    • pp.751-762
    • /
    • 1998
  • The purpose of this study is to enhance the quality of multimedia service under the heterogeneous end-terminals and network environment by monitoring the data receiving status of the group members regularly when the sender multicasts real-time multimedia data to a group. Especially, it focuses to reduce the total number of status information responded to the sender from the receivers. Accordingly. it upgrades the sender's performance by suppressing the number of status information packets generated by the receivers. The key idea of this study starts from how we profile the activity of all the members in a group. We assume that the receiver status in the worst status, so called primary receiver, represents the status of the whole group. This means that the whole group is assumed as being degraded in performance if the primary receiver is degraded, and that the whole group is assumed as being upgraded if the primary one is upgraded. In this algorithm, the primary receiver announces its status information to the whole group prior to other receivers, ana every receiver listening to the primary and other receivers' status compares its own status with them. Accordingly, any receiver may give up the status notification in case its status is not worse than others, resulting in the reduction of unnecessary responses to the sender.

  • PDF