http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
송종관,박장식,Song, Jongkwan,Park, Jang-Sik 한국전자통신학회 2011 한국전자통신학회 논문지 Vol.6 No.6
CAN통신은 자동차 내부 전자제어장치 간의 통신을 위하여 개발되어 최근 자동제동장치 등의 적용되고 있으며, 생산자동화를 위한 필드버스에도 적용되고 있다. 최근에는 대형 선박의 엔진제어 등을 위하여 필드버스가 도입되고 있다. 본 논문에서는 기존의 RS485 방식에 비하여 유지보수가 수월하도록 CAN통신을 기반으로 선박의 선실 출입통제 시스템을 구현하여 하였다. CAN통신기반 선실 출입통제 시스템은 출입통제 서버, ARM9 임베디드 시스템과 CAN컨트롤러를 내장한 마이크로컨트롤러로 구성되어 있다. 출입통제 서버는 관리자가 접속하여 출입통제 시스템의 전반적인 관리를 할 수 있도록 하고 ARM9 프로세서를 채용한 임베디드 시스템은 CAN 네트워크로 연결된 RFID 리더컨트롤러의 출입 정보를 서버로 전송하고 출입관리를 한다. 임베디드 시스템은 CAN 프레임을 서버로 전송하는 게이트웨이 역할을 한다. CAN communication developed for communication between electric control devices in vehicle, was recently applied to automatic breaking devices, and can also be applied to field bus for production automation. Recently, field bus is introduced in engine control etc., for large ship. In this paper, cabin access control system is implemented, based on CAN communication. The cabin access control system based on CAN communication consists of access control server, embedded system based on ARM9, and micro-controller built-in CAN controller. The access control server can be able to manage overall access control system by accessing with manager. And embedded system adopted ARM9 processor transmits access information of RFID reader controller connected with CAN networks to server, also performs access control. The embedded system carry CAN frames to server, so it is used as gateway.
서정우,송종관 慶星大學校 1998 論文集 Vol.19 No.2
The subset averaged midian(SAM) predictors are applied to the differential pulse code modulation(DPCM) coding of images. It is observed that DPCM systems with SAM predictors can isolate, not propagate, transmission errors in reconstructing input signals at the receiver. A condition which guarantees the stability of a DPCM decoder with the SAM predictor is derived. We design SAM predictors minimizing the prediction error variance under the constraints that guarantees both the decoder stability and the channel error isolation characteristics.
송종관,손원무 경성대학교 공학기술연구소 2003 공학기술연구지 Vol.S2 No.2
The SA filters have a very flexible structure by limiting the maximum subwindow size. This flexible structure presents an effective trade-off between the complexity and performance fo the filters. In this paper, an experimental result is presented showing the performance variation according to the change of filter order and subfilter type(such as (max, min, exclusive-OR, med). We designed optimal SA filters minimizing MSE for the various noise condition. The result shows several new properties of SA filters.
송종관 경성대학교 공학기술연구소 2001 공학기술연구지 Vol.8 No.-
In this paper a fast algorithm to search the median value among the sample data. This algorithm is based on bit-level search method. The median value may be found with proposed algorithm by simple bit comparing operation. Compared with previous method, proposed algorithm reduce searching time and implementation complexity. Moreover, the searching time is independent on the number of window size.
지문의 지역적 융선간 거리를 이용한 전처리 과정에 따른 알고리즘 및 성능분석
손원무,송종관,윤병우 경성대학교 공학기술연구소 2003 공학기술연구지 Vol.S1 No.2
Binarization is a process of minutiae extraction in fingerprints identification algorithm. In this paper, we proposed more exact minutiae extraction algorithm with more enhanced binarization method, compared with traditional binarization process. We could have more enhanced results by using the direction and the half distance between ridges as the threshold of binarization process.
박정호,송종관,윤병우 경성대학교 공학기술연구소 2003 공학기술연구지 Vol.S2 No.1
In fingerprint verification and identification, fingerprint and background region should be segmented. For this purpose, most systems obtain variance of brightness of X and Y direction using Sobel mask. To decide if given local region is background or not, the variance is compared with a certain threshold. Although this method is simple, most fingerprint image does not separated with two region of fingerprint and background region. In this paper, we presented a new segmentation algorithm based on run-length connectivity analysis. For a given binary image after thresholding, suggested algorithm calculates RL of X and Y direction. Until the given image is segmented to two regions, small run region is successively inverted. Experimental result show that this algorithm effectively separates fingerprint region and background region.
신종욱,윤병우,송종관,-- 경성대학교 공학기술연구소 2003 공학기술연구지 Vol.S2 No.2
The result of fingerprint matching is different as the quality or the state of input fingerprint image. We can extract the false direction information when the quality of fingerprint is degraded by the noise or the scars of the ridges. The information of the direction is very important for the elimination of the false minutia, the measurement of the ridge distance, matching, finding of cores and deltas. We need the method which can compensate or correct the false information of directions because the false directions include serious errors in the fingerprint recognition. We propose a method which can compensate or correct the false direction of fingerprint with a α-trimmed mean filter followed by LPF to reconstruct the false direction information when fingerprints are corrupted by scars.