• Title/Summary/Keyword: layer 2

Search Result 19,004, Processing Time 0.049 seconds

A Study on Face Awareness with Free size using Multi-layer Neural Network (다층신경망을 이용한 임의의 크기를 가진 얼굴인식에 관한 연구)

  • Song, Hong-Bok;Seol, Ji-Hwan
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.2
    • /
    • pp.149-162
    • /
    • 2005
  • This paper suggest a way to detect a specific wanted figure in public places such as subway stations and banks by comparing color face images extracted from the real time CCTV with the face images of designated specific figures. Assuming that the characteristic of the surveillance camera allows the face information in screens to change arbitrarily and to contain information on numerous faces, the accurate detection of the face area was focused. To solve this problem, the normalization work using subsampling with $20{\times}20$ pixels on arbitrary face images, which is based on the Perceptron Neural Network model suggested by R. Rosenblatt, created the effect of recogning the whole face. The optimal linear filter and the histogram shaper technique were employed to minimize the outside interference such as lightings and light. The addition operation of the egg-shaped masks was added to the pre-treatment process to minimize unnecessary work. The images finished with the pre-treatment process were divided into three reception fields and the information on the specific location of eyes, nose, and mouths was determined through the neural network. Furthermore, the precision of results was improved by constructing the three single-set network system with different initial values in a row.

Development of Estimation Method for Velocity Pressure Exposure Coefficient of Buildings Based on Spatial Information (공간정보기반 건축물의 풍속고도분포계수 산정 방법 개발)

  • SEO, Eun-Su;CHOI, Se-Hyu
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.20 no.2
    • /
    • pp.32-46
    • /
    • 2017
  • Recent rapid urban expansion and crowding of various industrial facilities has affected the features of a significant part of downtown area, resulting in areas having buildings with a wide range of height and the foothills. To compute a velocity pressure exposure coefficient, namely the design wind speed factor, this study defines ground surface roughness by utilizing concentration analysis for the height of each building. After obtaining spatial data by extracting a building layer from digital maps, the study area was partitioned for the concentration analysis and to allow investigation of the frequency distribution of building heights. Concentration analysis by building height was determined with the Variation-to-Means Ratio (VMR) and Poisson distribution analysis using a buildings distribution chart, with statistical significance determined using Chi-square verification. Applying geographic information systems (GIS) with the architectural information made it possible to estimate a velocity pressure exposure coefficient factor more quantitatively and objectively, by including geographic features, as compared to current methods. Thus, this method is expected to eliminate inaccuracies that arise when building designers calculate the velocity pressure exposure coefficient in subjective way, and to help increase the wind resistance of buildings in a more logical and cost-effective way.

Functions and Roles of Digital Landscape Architectural Drawing (조경 설계에서 디지털 드로잉의 기능과 역할)

  • Lee, Myeong-Jun
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.46 no.2
    • /
    • pp.1-13
    • /
    • 2018
  • This work discusses the major roles of digital technologies in the history of landscape architectural drawing, and offers a critique of the dominant trend towards realism in recent digital landscape representations. During the period of transition from conventional drawing tools, computer technologies generally functioned as mechanical tools to imitate prior manual techniques. Specifically, the GIS was served as a mechanical tool to efficiently process the manual layer cake; CAD software generally functioned to translate physical models to two-dimensional construction documents while graphic software generally functioned as a tool to perform processes similar to those of manual collage and montage techniques. Recent digital landscape drawings tend to adopt a realistic depiction like the painting of landscape appearance. In the representations, discernible traces of cutting and assembling are removed via graphic software; thus, the complete representations are perceived as if they were a copy of an actual landscape. The realistic images are an easy way to communicate with the public. However, it is difficult to achieve a full embodiment of all of the multisensory characteristics of a landscape through these visuals. They often deceive viewers by visualizing idealized conditions of not-yet-actualized landscapes and production of the final images takes up a large portion of the overall design process. Alternatively, 3D digital modeling of landscape performance and creative uses of digital technologies during the overall design process, as well as hybridized techniques with different drawing techniques and technologies, provide the opportunity to explore various aspects of a landscape.

Development of Vehicle Queue Length Estimation Model Using Deep Learning (딥러닝을 활용한 차량대기길이 추정모형 개발)

  • Lee, Yong-Ju;Hwang, Jae-Seong;Kim, Soo-Hee;Lee, Choul-Ki
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.17 no.2
    • /
    • pp.39-57
    • /
    • 2018
  • The purpose of this study was to construct an artificial intelligence model that learns and estimates the relationship between vehicle queue length and link travel time in urban areas. The vehicle queue length estimation model is modeled by three models. First of all, classify whether vehicle queue is a link overflow and estimate the vehicle queue length in the link overflow and non-overflow situations. Deep learning model is implemented as Tensorflow. All models are based DNN structure, and network structure which shows minimum error after learning and testing is selected by diversifying hidden layer and node number. The accuracy of the vehicle queue link overflow classification model was 98%, and the error of the vehicle queue estimation model in case of non-overflow and overflow situation was less than 15% and less than 5%, respectively. The average error per link was about 12%. Compared with the detecting data-based method, the error was reduced by about 39%.

Analysis for the Effect of EMI Shield Layers' Height on Circuit Function (EMI 차폐막의 높이가 회로의 기능에 미치는 영향 분석)

  • Kim, Hyeon-Woo;Woo, Jin-Ha;Jang, Se-Hyun;Chang, Tae-Soon;Lee, Won-Hui;Hur, Jung
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.6
    • /
    • pp.57-63
    • /
    • 2019
  • S-parameters were used to analyze the effect of the circuit according to the height of the EMI shield layers. Among the S-parameters, S11, S21, S22, and S31 were used as factors for determining the effect on the circuit function. Simulations were performed using shields made of Graphite and Ferrite, and the frequencies were run from 100 MHz to 1 GHz. As the height of the shield was increased, the value of S21 was getting closer to 0 dB. In addition, the SE value was confirmed to improve the shielding performance according to the thickness of the insulating layer only in a specific frequency band. Based on 800um with thickest silicon dioxide thickness, the FG structure averaged -1 dB in narrow frequency bands between 100 MHz and 300 MHz, showing better efficiency than GF with an average of -2 dB. Although GF structures do not show high efficiency, they exhibit average performance of -3 dB in frequency bands between 100 MHz and 1 GHz rather than FG structures that sway over a wide range. In other words, FG and GF structures have trade-off structures. Therefore, it should be noted that the appropriate structure is selected for use.

Design and Implementation of 8b/10b Encoder/Decoder for Serial ATA (직렬 ATA용 8b/10b 인코더와 디코더 설계 및 구현)

  • Heo Jung-Hwa;Park Nho-Kyung;Park Sang-Bong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.1A
    • /
    • pp.93-98
    • /
    • 2004
  • Serial ATA interface Is inexpensive comparatively and performance is superior. So it is suitable technology in demand that now require data transmission and throughput of high speed. This paper describes a design and implementation of Serial ATA Link layer about error detection and 8b/10b encoder/decoder for DC balance in frequency 150MHz. The 8b/10b Encoder is partitioned into a 5b/6b plus a 3b/4b coder. The logical model of the block is described by using Verilog HDL at register transistor level and the verified HDL is synthesized using standard cell libraries. And it is fabricated with $0.35{\mu}m$ Standard CMOS Cell library and the chip size is about $1500{\mu}m\;*\;1500{\mu}m$. The function of this chip has been verified and tested using testboard with FPGA equipment and IDEC ATS2 test equipment. It is used to frequency of 100MHz in verification processes and supply voltage 3.3V. The result of testing is well on the system clock 100MHz. The designed and verified each blocks may be used IP in the field of high speed serial data communication.

Transmitter Beamforming and Artificial Noise with Delayed Feedback: Secrecy Rate and Power Allocation

  • Yang, Yunchuan;Wang, Wenbo;Zhao, Hui;Zhao, Long
    • Journal of Communications and Networks
    • /
    • v.14 no.4
    • /
    • pp.374-384
    • /
    • 2012
  • Utilizing artificial noise (AN) is a good means to guarantee security against eavesdropping in a multi-inputmulti-output system, where the AN is designed to lie in the null space of the legitimate receiver's channel direction information (CDI). However, imperfect CDI will lead to noise leakage at the legitimate receiver and cause significant loss in the achievable secrecy rate. In this paper, we consider a delayed feedback system, and investigate the impact of delayed CDI on security by using a transmit beamforming and AN scheme. By exploiting the Gauss-Markov fading spectrum to model the feedback delay, we derive a closed-form expression of the upper bound on the secrecy rate loss, where $N_t$ = 2. For a moderate number of antennas where $N_t$ > 2, two special cases, based on the first-order statistics of the noise leakage and large number theory, are explored to approximate the respective upper bounds. In addition, to maintain a constant signal-to-interferenceplus-noise ratio degradation, we analyze the corresponding delay constraint. Furthermore, based on the obtained closed-form expression of the lower bound on the achievable secrecy rate, we investigate an optimal power allocation strategy between the information signal and the AN. The analytical and numerical results obtained based on first-order statistics can be regarded as a good approximation of the capacity that can be achieved at the legitimate receiver with a certain number of antennas, $N_t$. In addition, for a given delay, we show that optimal power allocation is not sensitive to the number of antennas in a high signal-to-noise ratio regime. The simulation results further indicate that the achievable secrecy rate with optimal power allocation can be improved significantly as compared to that with fixed power allocation. In addition, as the delay increases, the ratio of power allocated to the AN should be decreased to reduce the secrecy rate degradation.

Spawning Behavior and Early Life History of Korean Aucha Perch, Coreoperca herzi Herzenstein (한국산 꺽지 (Coreoperca herzi)의 산란습성 및 초기생활사)

  • 한경호;박준택;정규화;이원교;이재용;방인철
    • Journal of Aquaculture
    • /
    • v.11 no.1
    • /
    • pp.49-58
    • /
    • 1998
  • The spawning behavior and early life history of the Korean aucha perch, Coreoperca herzi were studied. The eggs were spawned in a one-layer mass, hanging from the underside of a largy stone and guarded by one male. According to the considerable size difference os eggs in the individual ovaries, it was concluded that they spawns several times within a spawning season of May~June. The ripe eggs were demersal and adhesive, and their diameter were 2.60~3.04mm with several oil globule of 0.10~0.64mm. Hatching in the tank with $19.0{\pm}1.0^{\circ}C.$ in men water temperature started from the 380 hours after fertilization. Newly-hatched larvae were measured 6.45~7.34mm in total length (TL, mean : 6.85mm), and mouth and anus were open. Melanophores were present on the head, around the yolk, and on the dorsal part of the abdominal region. 3 days old larvae were measured 7.00~7.40mm in TL (mean : 7.25mm), and they fed Daphnia sp. and Brachionus plicatilis actively. 6 days old larvae transformed to postlarval stage and they were 7.94~10.10mm in TL (mean : 9.00mm). As yolk sac were nearly absorbed, the caudal notochord flex at 45. Aggregate numbers of all fin rays were completed at over 16.90~19.80mm in TL (30 days after hatching), at which time the larvae reached the juvenile stage. In fifty days old larvae(24.60~27.10mm in TL) were similar in body form, lateral line and color to adult.

  • PDF

VLSI Design of Interface between MAC and PHY Layers for Adaptive Burst Profiling in BWA System (BWA 시스템에서 적응형 버스트 프로파일링을 위한 MAC과 PHY 계층 간 인터페이스의 VLSI 설계)

  • Song Moon Kyou;Kong Min Han
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.1
    • /
    • pp.39-47
    • /
    • 2005
  • The range of hardware implementation increases in communication systems as high-speed processing is required for high data rate. In the broadband wireless access (BWA) system based on IEEE standard 802.16 the functions of higher part in the MAC layer to Provide data needed for generating MAC PDU are implemented in software, and the tasks from formatting MAC PDUs by using those data to transmitting the messages in a modem are implemented in hardware. In this paper, the interface hardware for efficient message exchange between MAC and PHY layers in the BWA system is designed. The hardware performs the following functions including those of the transmission convergence(TC) sublayer; (1) formatting TC PDU(Protocol data unit) from/to MAC PDU, (2) Reed-solomon(RS) encoding/decoding, and (3) resolving DL MAP and UL MAP, so that it controls transmission slot and uplink and downlink traffic according to the modulation scheme of burst profile. Also, it provides various control signal for PHY modem. In addition, the truncated binary exponential backoff (TBEB) algorithm is implemented in a subscriber station to avoid collision on contention-based transmission of messages. The VLSI architecture performing all these functions is implemented and verified in VHDL.

New Contention Window Control Algorithm for TCP Performance Enhancement in IEEE 802.11 based Wireless Multi-hop Networks (IEEE 802.11 기반 무선 멀티홉 망에서 TCP의 성능향상을 위한 새로운 경쟁 윈도우 제어 알고리즘)

  • Gi In-Huh;Lee Gi-Ra;Lee Jae-Yong;Kim Byung-Chul
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.43 no.9 s.351
    • /
    • pp.165-174
    • /
    • 2006
  • In this paper, we propose a new contention window control algorithm to increase TCP performance in wireless multi-hop networks. The new contention window control algorithm is suggested to reduce the hidden and exposed terminal problems of wireless multi-hop networks. Most of packet drops in wireless multi-hop networks results from hidden and exposed terminal problems, not from collisions. However, in normal DCF algorithm a failed user increases its contention window exponentially, thus it reduces the success probability of fined nodes. This phenomenon causes burst data transmissions in a particular node that already was successful in packet transmission, because the success probability increases due to short contention window. However, other nodes that fail to transmit packet data until maximum retransmission attempts try to set up new routing path configuration in network layer, which cause TCP performance degradation and restrain seamless data transmission. To solve these problems, the proposed algorithm increases the number of back-of retransmissions to increase the success probability of MAC transmission, and fixes the contention window at a predetermined value. By using ns-2 simulation for the chain and grid topology, we show that the proposed algorithm enhances the TCP performance.