• Title/Summary/Keyword: sequential detection

Search Result 263, Processing Time 0.028 seconds

Correction of Ocular Fundus Fluorescein Angiogram in Nonlinear Distortion (비선형왜곡된 형광안저화상의 보정)

  • 고창림
    • Journal of Biomedical Engineering Research
    • /
    • v.11 no.1
    • /
    • pp.31-38
    • /
    • 1990
  • Image correction of the fluorescein angiogram with the low contrast and geometrically distorted is studied. The procedure is divided into two steps : A template matching step and a geometrical transformation step. Based on the sequential similiarity detection algorithm, more Improved matching results are obtained with edge enhanced image. For the reference points and the corresponding matchimg points, the geometrical transformationss by the use of the average value of the X, Y translational shifts and a pair of these points, respectively are described. Then the corrected images are obtained using bilinear interpolation. It is proven that the usefullness of this study for the image correction of the ocular fundus fluoresceln angiogram with low contrast and geometrically distorted mainly due to the eye movements.

  • PDF

A Genetic Approach for Joint Link Scheduling and Power Control in SIC-enable Wireless Networks

  • Wang, Xiaodong;Shen, Hu;Lv, Shaohe;Zhou, Xingming
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.4
    • /
    • pp.1679-1691
    • /
    • 2016
  • Successive interference cancellation (SIC) is an effective means of multi-packet reception to combat interference at the physical layer. We investigate the joint optimization issue of channel access and power control for capacity maximization in SIC-enabled wireless networks. We propose a new interference model to characterize the sequential detection nature of SIC. Afterward, we formulize the joint optimization problem, prove it to be a nondeterministic polynomial-time-hard problem, and propose a novel approximation approach based on the genetic algorithm (GA). Finally, we discuss the design and parameter setting of the GA approach and validate its performance through extensive simulations.

The Sequential GHT for the Efficient Pattern Recognition (효율적 패턴 인식을 위한 순차적 GHT)

  • 김수환;임승민;이규태;이태원
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.28B no.5
    • /
    • pp.327-334
    • /
    • 1991
  • This paper proposes an efficient method of implementing the generalized Hough transform (GHT), which has been hindered by an excessive computing load and a large memory requirement. The conventional algorithm requires a parameter space of 4 dimensions in detection a rotated, scaled, and translated object in an input image. Prior to the application of GHT to the input image, the proposed method determines the angle of rotation and the scaling factor of the test image using the proportion of the edge components between the reference image and test image. With the rotation angle and the scaling factor already determined, the parameter spaceis to be reduced to a simple array of 2 dimensions by applying the unit GHT only one time. The experiments with the image of airplanes reveal that both of the computing time and the requires memory size are reduced by 95 percent, without any degradatationof accuracy, compared with the conventional GHT algorithm.

  • PDF

A procedure for simultaneous variable selection, variable transformation and outlier identification in linear regression (선형회귀에서 변수선택, 변수변환과 이상치 탐지의 동시적 수행을 위한 절차)

  • Seo, Han Son;Yoon, Min
    • The Korean Journal of Applied Statistics
    • /
    • v.33 no.1
    • /
    • pp.1-10
    • /
    • 2020
  • We propose a unified approach to variable selection, transformation and outliers in the linear model. The procedure includes a sequential method for outlier detection and a least trimmed squares estimator for variable transformation. It uses all possible subsets regressions for model selection. Some real data analyses and the simulation results are provided to show the efficiency of the methods in the context of the correct variable selection and the fitness of the estimated model.

3-D Socation Estimation of Airbonne Targets Using a Modified Radon Transform (레이돈 변환 방식을 이용한 비행 물체의 3차원 위치 추정)

  • 최재호;곽훈성
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.31B no.6
    • /
    • pp.25-32
    • /
    • 1994
  • A new projection-based approach derived from the Radon transform for detecting and estimating 3-D locations of unresolved targets in a time-sequential set of infrared imageries is presented. Since the signal-to-noise ration per pixel is very low (a dim target) and target tracks which span over many image frames. Since the 2-D multiple representations along arbitary orientations utilizing the 3-D Radon transform, our projection-based transform method enables us to analyze the 3-D problem in terms of its 2-D projections. Our method not only alleviates the great computatioonal expense of processing entire set of images as a whole, but the results reveal that the proposed strategy produces a robust detection and estimation of 3-D target trajectories event at low SNRs.

  • PDF

Automated Markerless Analysis of Human Gait Motion for Recognition and Classification

  • Yoo, Jang-Hee;Nixon, Mark S.
    • ETRI Journal
    • /
    • v.33 no.2
    • /
    • pp.259-266
    • /
    • 2011
  • We present a new method for an automated markerless system to describe, analyze, and classify human gait motion. The automated system consists of three stages: I) detection and extraction of the moving human body and its contour from image sequences, ii) extraction of gait figures by the joint angles and body points, and iii) analysis of motion parameters and feature extraction for classifying human gait. A sequential set of 2D stick figures is used to represent the human gait motion, and the features based on motion parameters are determined from the sequence of extracted gait figures. Then, a k-nearest neighbor classifier is used to classify the gait patterns. In experiments, this provides an alternative estimate of biomechanical parameters on a large population of subjects, suggesting that the estimate of variance by marker-based techniques appeared generous. This is a very effective and well-defined representation method for analyzing the gait motion. As such, the markerless approach confirms uniqueness of the gait as earlier studies and encourages further development along these lines.

Test Pattern Genration for Detection of Stuck-Open and Stuck-On Faults in BiCMOS Circuits (BiCMOS 회로의Stuck-Open 고장과 Stuck-On 고장 검출을 위한 테스트 패턴 생성)

  • 신재흥;임인칠
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.34C no.1
    • /
    • pp.1-11
    • /
    • 1997
  • A BiCMOS circuit consists of the CMOS part which performs the logic function, and the bipolar part which drives output load. In BiCMOS circuits, transistor stuck-open faults exhibit delay faults in addition to sequential beavior. Also, stuck-on faults enhanced IDDQ (quiscent power supply current) at steady state. In this paper, a method is proposed which efficiently generates test patterns to detect stuck-open faults and stuck-on faults in BiCMOS circuits. The proposed method divides the BiCMOS circuit into pull-up part and pull-down part, and generates test patterns detect faults occured in each part by structural property of the BiCMOS circuit.

  • PDF

Anomaly Intrusion Detection Using Sequential Properties of Packets (패킷 순차성을 이용한 비정상행위 침입 탐지)

  • 홍동호;유황빈
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.12a
    • /
    • pp.101-106
    • /
    • 2003
  • 인터넷 상에서의 대부분의 네트워크 공격은 공격의 목표가 되는 시스템에 단일 패킷만을 보냄으로써 공격이 이뤄질 수 없다. 그렇기 때문에 침입탐지시스템에서는 내부 네트워크로 들어오고 나가는 패킷들에 대한 일련의 순차성을 알아냄으로써 네트워크 공격을 탐지할 수 있다. 본 연구에서는 이러한 네트워크 패킷의 순차성을 이용하여 비정상행위에 대한 침입탐지 방법을 제안하였으며 또한 일부 비정상행위 탐지에서 사용하고 있는 시간을 기준으로 한 트랜잭션의 분할에서 오는 단점을 지적하고 그것을 보완하기 위하여 탐지 단위로서 사용자의 세션을 사용하였다. TCP/IP 네트워크에서의 사용자 세션 정보를 표현하기 위해서 여러 가지 정보가 사용자 행위 테이블로 표현되며 이러한 사용자 행위 테이블은 서비스 포트 별로 통계적인 정리가 가능하다. 또한 이렇게 정리된 서비스 포트별 정보에서는 확률을 기반으로 한 비정상 행위를 도출할 수 있으며, 이러한 비정상 행위도를 이용하여 침입 판단의 근거자료로 삼을 수 있음을 확인하였다.

  • PDF

Detection of Sugar Process Contamination Using Dextran Binding hages Produced by Batch Fermentation of Escherichia coli (대장균의 회분식 발효에 의해 생산된 덱스트란 결합 파아지를 활용한 설탕 제조공정 오염 검출)

  • Kim, Du-Woon
    • Food Science and Preservation
    • /
    • v.15 no.5
    • /
    • pp.617-621
    • /
    • 2008
  • Sequential passes through $Sephadex^{TM}$ columns were used to select phages that displays ligands for dextran ($\alpha$-1,6 linked linear chains) from a phage antibody library. Those phages that bound to the $Sephadex^{TM}$ in each iteration were replicated in E. coli. A phage preparation isolated on the third round selection produced 5.4 nephelos turbidity units (NTU) in a dextran specific immunonephelometric assay, a 2.2 fold higher value than the phage preparation from the first round selection. This phage gave $72\;{\pm}\;10$ normalized intensity (N.I.) in a dip-stick assay against high molecular size dextran (T2000, $2\;{\times}\;10^6) and significantly lower color ($30\;{\pm}\;6$ N.I.) against low molecular size dextran (T10, $10^4$). The presence of an Fab insert in each of these phages was confirmed using a $\beta-galactosidase linked assay and polymerase chain reaction.

Role of proteases, cytokines, and growth factors in bone invasion by oral squamous cell carcinoma

  • Son, Seung Hwa;Chung, Won-Yoon
    • International Journal of Oral Biology
    • /
    • v.44 no.2
    • /
    • pp.37-42
    • /
    • 2019
  • Oral squamous cell carcinoma (OSCC) is the most common oral malignancy and an increasing global public health problem. OSCC frequently invades the jaw bone. OSCC-induced bone invasion has a significant impact on tumor stage, treatment selection, patient outcome, and quality of life. A number of studies have shown that osteoclast-mediated bone resorption is a major step in the progression of bone invasion by OSCC; however, the molecular mechanisms involved in OSCC bone invasion are not yet clear. In this review, we present the clinical types of OSCC bone invasion and summarize the role of key molecules, including proteases, cytokines, and growth factors, in the sequential process of bone invasion. A better understanding of bone invasion will facilitate the discovery of molecular targets for early detection and treatment of OSCC bone invasion.