• Title/Summary/Keyword: 검색 알고리즘

Search Result 1,683, Processing Time 0.027 seconds

Line Drawings from 2D Images (이차원 영상의 라인 드로잉)

  • Son, Min-Jung;Lee, Seung-Yong
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.12
    • /
    • pp.665-682
    • /
    • 2007
  • Line drawing is a widely used style in non-photorealistic rendering because it generates expressive descriptions of object shapes with a set of strokes. Although various techniques for line drawing of 3D objects have been developed, line drawing of 2D images has attracted little attention despite interesting applications, such as image stylization. This paper presents a robust and effective technique for generating line drawings from 2D images. The algorithm consists of three parts; filtering, linking, and stylization. In the filtering process, it constructs a likelihood function that estimates possible positions of lines in an image. In the linking process, line strokes are extracted from the likelihood function using clustering and graph search algorithms. In the stylization process, it generates various kinds of line drawings by applying curve fitting and texture mapping to the extracted line strokes. Experimental results demonstrate that the proposed technique can be applied to the various kinds of line drawings from 2D images with detail control.

Design and Implementation of a Contents Recommendation System in Mobile Environments (모바일 환경에서 콘텐츠 추천 시스템 설계 및 구현)

  • Lee, Nak-Gyu;Pi, Jun-Il;Park, Jun-Ho;Bok, Kyoung-Soo;Yoo, Jae-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.40-51
    • /
    • 2011
  • The key issues of recommendation systems provide the contents satisfying the interests of users for the huge amounts of contents over internet. The existing recommendation system use the algorithms considering the users' profiles and context information to enhance the exactness of a recommendation. However, the existing recommendation system can't satisfy the requirements of service providers because the business models of service providers is not considered. In this paper, we propose the mobile recommendation system using the composite contexts and the recommendation weights applying the business model of service providers. The proposed system retrieves the contents of the contents providers using composite context information and apply the recommendation weights to recommend the suitable contents for the business models of service providers. Therefore, we provide the contents satisfying the consumption value of users and the business models of service providers to mobile users.

Analysis and Visualization for Comment Messages of Internet Posts (인터넷 게시물의 댓글 분석 및 시각화)

  • Lee, Yun-Jung;Ji, Jeong-Hoon;Woo, Gyun;Cho, Hwan-Gue
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.7
    • /
    • pp.45-56
    • /
    • 2009
  • There are many internet users who collect the public opinions and express their opinions for internet news or blog articles through the replying comment on online community. But, it is hard to search and explore useful messages on web blogs since most of web blog systems show articles and their comments to the form of sequential list. Also, spam and malicious comments have become social problems as the internet users increase. In this paper, we propose a clustering and visualizing system for responding comments on large-scale weblogs, namely 'Daum AGORA,' using similarity analysis. Our system shows the comment clustering result as a simple screen view. Our system also detects spam comments using Needleman-Wunsch algorithm that is a well-known algorithm in bioinformatics.

Automatic Leather Quality Inspection and Grading System by Leather Texture Analysis (텍스쳐 분석에 의한 피혁 등급 판정 및 자동 선별시스템에의 응용)

  • 권장우;김명재;길경석
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.4
    • /
    • pp.451-458
    • /
    • 2004
  • A leather quality inspection by naked eyes has known as unreliable because of its biological characteristics like accumulated fatigue caused from an optical illusion and biological phenomenon. Therefore it is necessary to automate the leather quality inspection by computer vision technique. In this paper, we present automatic leather qua1ity classification system get information from leather surface. Leather is usually graded by its information such as texture density, types and distribution of defects. The presented algorithm explain how we analyze leather information like texture density and defects from the gray-level images obtained by digital camera. The density data is computed by its ratio of distribution area, width, and height of Fourier spectrum magnitude. And the defect information of leather surface can be obtained by histogram distribution of pixels which is Windowed from preprocessed images. The information for entire leather could be a standard for grading leather quality. The proposed leather inspection system using machine vision can also be applied to another field to substitute human eye inspection.

  • PDF

An Implementation of the Spam Mail Prevention System Using Reply Message with Secrete Words (비밀단어의 회신을 이용한 스팸메일 차단 시스템의 구현)

  • Ko Joo Young;Shim Jae Chang;Kim Hyun Ki
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.1
    • /
    • pp.111-118
    • /
    • 2005
  • This paper describes an implementation of the spam mail prevention system using reply message with secrete words. When user receives a new e-mail, the e-mail address is compared with the white e-mail addresses in database by the system. If user receives a new e-mail which does not exist in a white e-mail addresses database, a reply e-mail attached with secrete words is delivered automatically. And the system is compared with the white domains first for intranet environment. It speeds up processing time. proposed algorithm is required a small database and faster than the black e-mail addresses comparison. This system is implemented using procmail, PHP and IMAP on Linux and the user can manage the databases on the web.

  • PDF

A Study on the Industrial Application of Image Recognition Technology (이미지 인식 기술의 산업 적용 동향 연구)

  • Song, Jaemin;Lee, Sae Bom;Park, Arum
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.7
    • /
    • pp.86-96
    • /
    • 2020
  • Based on the use cases of image recognition technology, this study looked at how artificial intelligence plays a role in image recognition technology. Through image recognition technology, satellite images can be analyzed with artificial intelligence to reveal the calculation of oil storage tanks in certain countries. And image recognition technology makes it possible for searching images or products similar to images taken or downloaded by users, as well as arranging fruit yields, or detecting plant diseases. Based on deep learning and neural network algorithms, we can recognize people's age, gender, and mood, confirming that image recognition technology is being applied in various industries. In this study, we can look at the use cases of domestic and overseas image recognition technology, as well as see which methods are being applied to the industry. In addition, through this study, the direction of future research was presented, focusing on various successful cases in which image recognition technology was implemented and applied in various industries. At the conclusion, it can be considered that the direction in which domestic image recognition technology should move forward in the future.

Design and Implementation of a Trajectory-based Index Structure for Moving Objects on a Spatial Network (공간 네트워크상의 이동객체를 위한 궤적기반 색인구조의 설계 및 구현)

  • Um, Jung-Ho;Chang, Jae-Woo
    • Journal of KIISE:Databases
    • /
    • v.35 no.2
    • /
    • pp.169-181
    • /
    • 2008
  • Because moving objects usually move on spatial networks, efficient trajectory index structures are required to achieve good retrieval performance on their trajectories. However, there has been little research on trajectory index structures for spatial networks such as FNR-tree and MON-tree. But, because FNR-tree and MON-tree are stored by the unit of the moving object's segment, they can't support the whole moving objects' trajectory. In this paper, we propose an efficient trajectory index structure, named Trajectory of Moving objects on Network Tree(TMN Tree), for moving objects. For this, we divide moving object data into spatial and temporal attribute, and preserve moving objects' trajectory. Then, we design index structure which supports not only range query but trajectory query. In addition, we divide user queries into spatio-temporal area based trajectory query, similar-trajectory query, and k-nearest neighbor query. We propose query processing algorithms to support them. Finally, we show that our trajectory index structure outperforms existing tree structures like FNR-Tree and MON-Tree.

Real-time 3D Calibration for Pose Computation in Extended Environments (확장 환경에서의 위치 및 방향 정보 계산을 위한 실시간 3차원 위치 계산)

  • Park, Jun;Jang, Jun-Ho;Kwon, Jang-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.6 no.3
    • /
    • pp.455-461
    • /
    • 2003
  • In Computer Vision-based pose computation systems, markers are often used as reference points: artificially-designed (to maximize the efficiency in detection) markers are installed in the environment and their positions are measured using probing devices such as mechanical digitizers and laser range finders. The camera (or the user) pose is computed based on three or more markers 3D positions and the 2D positions in the image. However, in extended environments, it is impractical to install enough number of markers to be detected by the camera. Instead, natural features, if detected and tracked efficiently, can be used as reference points. These natural features 3D positions need to be measured before they can be used as reference points. In this paper, technologies of utilizing natural features are introduced for pose computation or refinement in extended environments.

  • PDF

Classification of Client-side Application-level HTTP Traffic (HTTP 트래픽의 클라이언트측 어플리케이션별 분류)

  • Choi, Mi-Jung;Jin, Chang-Gyu;Kim, Myung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.11B
    • /
    • pp.1277-1284
    • /
    • 2011
  • Today, many applications use 80 port, which is a basic port number of HTTP protocol, to avoid a blocking of firewall. HTTP protocol is used in not only Web browsing but also many applications such as the search of P2P programs, update of softwares and advertisement transfer of nateon messenger. As HTTP traffics are increasing and various applications transfer data through HTTP protocol, it is essential to identify which applications use HTTP and how they use the HTTP protocol. In order to prevent a specific application in the firewall, not the protocol-level, but the application-level traffic classification is necessary. This paper presents a method to classify HTTP traffics based on applications of the client-side and group the applications based on providing services. We developed an application-level HTTP traffic classification system and verified the method by applying the system to a small part of the campus network.

A Study on the Industrial Data Processing for Control System Middle Ware and Algorithm RFID is Expected (RFID을 이용한 산업용 제어 관리시스템에 적합한 미들웨어 알고리즘에 관한 연구)

  • Kang, Jeong-Yong
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.5A
    • /
    • pp.451-459
    • /
    • 2007
  • RFID it reads information which is it writes, the semiconductor chip for and the radio frequency system which uses the hazard antenna it has built-in transmission of information it talks. Formation which is transmitted like this collection and America which it filtrates wey the RFID search service back to inform the location of the server which has commodity information which relates with an object past record server. The hazard where measurement analysis result the leader for electronic interference does not occur consequently together from with verification test the power level which is received from the antenna grade where it stands must maintain minimum -55dBm and the electronic interference will not occur with the fact that, antenna and reel his recognition distance the maximum 7m until the recognition which is possible but smooth hazard it must stand and and with the fact that it will do from within and and and 3-4m it must be used Jig it is thought.