• Title/Summary/Keyword: 시각 정보 처리

Search Result 1,609, Processing Time 0.036 seconds

Reconfiguration of Physical Structure of Vegetation by Voxelization Based on 3D Point Clouds (3차원 포인트 클라우드 기반 복셀화에 의한 식생의 물리적 구조 재구현)

  • Ahn, Myeonghui;Jang, Eun-kyung;Bae, Inhyeok;Ji, Un
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.40 no.6
    • /
    • pp.571-581
    • /
    • 2020
  • Vegetation affects water level change and flow resistance in rivers and impacts waterway ecosystems as a whole. Therefore, it is important to have accurate information about the species, shape, and size of any river vegetation. However, it is not easy to collect full vegetation data on-site, so recent studies have attempted to obtain large amounts of vegetation data using terrestrial laser scanning (TLS). Also, due to the complex shape of vegetation, it is not easy to obtain accurate information about the canopy area, and there are limitations due to a complex range of variables. Therefore, the physical structure of vegetation was analyzed in this study by reconfiguring high-resolution point cloud data collected through 3-dimensional terrestrial laser scanning (3D TLS) in a voxel. Each physical structure was analyzed under three different conditions: a simple vegetation formation without leaves, a complete formation with leaves, and a patch-scale vegetation formation. In the raw data, the outlier and unnecessary data were filtered and removed by Statistical Outlier Removal (SOR), resulting in 17%, 26%, and 25% of data being removed, respectively. Also, vegetation volume by voxel size was reconfigured from post-processed point clouds and compared with vegetation volume; the analysis showed that the margin of error was 8%, 25%, and 63% for each condition, respectively. The larger the size of the target sample, the larger the error. The vegetation surface looked visually similar when resizing the voxel; however, the volume of the entire vegetation was susceptible to error.

Comparative Analysis of Evaluation Methods for Image Segmentation Results (영상분할 결과 평가 방법의 적용성 비교 분석)

  • Seo, Won-Woo;Lee, Kyu-Sung
    • Korean Journal of Remote Sensing
    • /
    • v.37 no.2
    • /
    • pp.257-274
    • /
    • 2021
  • Although image segmentation is a critical part of object-based analysis of high resolution imagery, there has been lack of studies to evaluate the quality of image segmentation. In this study, we aimed to find practical and effective methods to obtain optimal parameters for image segmentation. Evaluations of image segmentation are divided into unsupervised, supervised, and qualitative visual interpretation methods. Using the multispectral UAV images, sampled from urban and forest over the Incheon Metropolitan City Park, three evaluation methods were compared. In overall, three methods showed very similar results regardless of the computational costs and applicability, although the optimal parameters determined by the evaluations were different between the urban and forest images. There is no single measure that outperforms in the unsupervised evaluation. Any combinations of intra-segment measures (V, COV, WV) and inter-segment measures (MI, BSH, DTNP) provided almost the same results. Although supervised method may be biased by subjective selection of reference data, it can be easily applied to detect object of interest. The qualitative visual interpretation on the segmentation results corresponded with the unsupervised and supervised evaluations.

Evaluation of Debonding Defects in Railway Concrete Slabs Using Shear Wave Tomography (전단파 토모그래피를 활용한 철도 콘크리트 궤도 슬래브 층분리 결함 평가)

  • Lee, Jin-Wook;Kee, Seong-Hoon;Lee, Kang Seok
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.3
    • /
    • pp.11-20
    • /
    • 2022
  • The main purpose of this study is to investigate the applicability of the shear wave tomography technology as a non-destructive testing method to evaluate the debonding between the track concrete layer (TCL) and the hydraulically stabilized based course (HSB) of concrete slab tracks for the Korea high-speed railway system. A commercially available multi-channel shear wave measurement device (MIRA) is used to evaluate debonding defects in full-scaled mock-up test specimen that was designed and constructed according to the Rheda 200 system. A part of the mock-up specimen includes two artificial debonding defects with a length and a width of 400mm and thicknesses of 5mm and 10mm, respectively. The tomography images obtained by a MIRA on the surface of the concrete specimens are effective for visualizing the debonding defects in concrete. In this study, a simple image processing method is proposed to suppress the noisy signals reflected from the embedded items (reinforcing steel, precast sleeper, insert, etc.) in TCL, which significantly improves the readability of debonding defects in shear wave tomography images. Results show that debonding maps constructed in this study are effective for visualizing the spatial distribution and the depths of the debondiing defects in the railway concrete slab specimen.

Image Watermarking for Copyright Protection of Images on Shopping Mall (쇼핑몰 이미지 저작권보호를 위한 영상 워터마킹)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.19 no.4
    • /
    • pp.147-157
    • /
    • 2013
  • With the advent of the digital environment that can be accessed anytime, anywhere with the introduction of high-speed network, the free distribution and use of digital content were made possible. Ironically this environment is raising a variety of copyright infringement, and product images used in the online shopping mall are pirated frequently. There are many controversial issues whether shopping mall images are creative works or not. According to Supreme Court's decision in 2001, to ad pictures taken with ham products is simply a clone of the appearance of objects to deliver nothing but the decision was not only creative expression. But for the photographer's losses recognized in the advertising photo shoot takes the typical cost was estimated damages. According to Seoul District Court precedents in 2003, if there are the photographer's personality and creativity in the selection of the subject, the composition of the set, the direction and amount of light control, set the angle of the camera, shutter speed, shutter chance, other shooting methods for capturing, developing and printing process, the works should be protected by copyright law by the Court's sentence. In order to receive copyright protection of the shopping mall images by the law, it is simply not to convey the status of the product, the photographer's personality and creativity can be recognized that it requires effort. Accordingly, the cost of making the mall image increases, and the necessity for copyright protection becomes higher. The product images of the online shopping mall have a very unique configuration unlike the general pictures such as portraits and landscape photos and, therefore, the general image watermarking technique can not satisfy the requirements of the image watermarking. Because background of product images commonly used in shopping malls is white or black, or gray scale (gradient) color, it is difficult to utilize the space to embed a watermark and the area is very sensitive even a slight change. In this paper, the characteristics of images used in shopping malls are analyzed and a watermarking technology which is suitable to the shopping mall images is proposed. The proposed image watermarking technology divide a product image into smaller blocks, and the corresponding blocks are transformed by DCT (Discrete Cosine Transform), and then the watermark information was inserted into images using quantization of DCT coefficients. Because uniform treatment of the DCT coefficients for quantization cause visual blocking artifacts, the proposed algorithm used weighted mask which quantizes finely the coefficients located block boundaries and coarsely the coefficients located center area of the block. This mask improves subjective visual quality as well as the objective quality of the images. In addition, in order to improve the safety of the algorithm, the blocks which is embedded the watermark are randomly selected and the turbo code is used to reduce the BER when extracting the watermark. The PSNR(Peak Signal to Noise Ratio) of the shopping mall image watermarked by the proposed algorithm is 40.7~48.5[dB] and BER(Bit Error Rate) after JPEG with QF = 70 is 0. This means the watermarked image is high quality and the algorithm is robust to JPEG compression that is used generally at the online shopping malls. Also, for 40% change in size and 40 degrees of rotation, the BER is 0. In general, the shopping malls are used compressed images with QF which is higher than 90. Because the pirated image is used to replicate from original image, the proposed algorithm can identify the copyright infringement in the most cases. As shown the experimental results, the proposed algorithm is suitable to the shopping mall images with simple background. However, the future study should be carried out to enhance the robustness of the proposed algorithm because the robustness loss is occurred after mask process.

Usefulness of Data Mining in Criminal Investigation (데이터 마이닝의 범죄수사 적용 가능성)

  • Kim, Joon-Woo;Sohn, Joong-Kweon;Lee, Sang-Han
    • Journal of forensic and investigative science
    • /
    • v.1 no.2
    • /
    • pp.5-19
    • /
    • 2006
  • Data mining is an information extraction activity to discover hidden facts contained in databases. Using a combination of machine learning, statistical analysis, modeling techniques and database technology, data mining finds patterns and subtle relationships in data and infers rules that allow the prediction of future results. Typical applications include market segmentation, customer profiling, fraud detection, evaluation of retail promotions, and credit risk analysis. Law enforcement agencies deal with mass data to investigate the crime and its amount is increasing due to the development of processing the data by using computer. Now new challenge to discover knowledge in that data is confronted to us. It can be applied in criminal investigation to find offenders by analysis of complex and relational data structures and free texts using their criminal records or statement texts. This study was aimed to evaluate possibile application of data mining and its limitation in practical criminal investigation. Clustering of the criminal cases will be possible in habitual crimes such as fraud and burglary when using data mining to identify the crime pattern. Neural network modelling, one of tools in data mining, can be applied to differentiating suspect's photograph or handwriting with that of convict or criminal profiling. A case study of in practical insurance fraud showed that data mining was useful in organized crimes such as gang, terrorism and money laundering. But the products of data mining in criminal investigation should be cautious for evaluating because data mining just offer a clue instead of conclusion. The legal regulation is needed to control the abuse of law enforcement agencies and to protect personal privacy or human rights.

  • PDF

Development of a Model of Brain-based Evolutionary Scientific Teaching for Learning (뇌기반 진화적 과학 교수학습 모형의 개발)

  • Lim, Chae-Seong
    • Journal of The Korean Association For Science Education
    • /
    • v.29 no.8
    • /
    • pp.990-1010
    • /
    • 2009
  • To derive brain-based evolutionary educational principles, this study examined the studies on the structural and functional characteristics of human brain, the biological evolution occurring between- and within-organism, and the evolutionary attributes embedded in science itself and individual scientist's scientific activities. On the basis of the core characteristics of human brain and the framework of universal Darwinism or universal selectionism consisted of generation-test-retention (g-t-r) processes, a Model of Brain-based Evolutionary Scientific Teaching for Learning (BEST-L) was developed. The model consists of three components, three steps, and assessment part. The three components are the affective (A), behavioral (B), and cognitive (C) components. Each component consists of three steps of Diversifying $\rightarrow$ Emulating (Executing, Estimating, Evaluating) $\rightarrow$ Furthering (ABC-DEF). The model is 'brain-based' in the aspect of consecutive incorporation of the affective component which is based on limbic system of human brain associated with emotions, the behavioral component which is associated with the occipital lobes performing visual processing, temporal lobes performing functions of language generation and understanding, and parietal lobes, which receive and process sensory information and execute motor activities of the body, and the cognitive component which is based on the prefrontal lobes involved in thinking, planning, judging, and problem solving. On the other hand, the model is 'evolutionary' in the aspect of proceeding according to the processes of the diversifying step to generate variants in each component, the emulating step to test and select useful or valuable things among the variants, and the furthering step to extend or apply the selected things. For three components of ABC, to reflect the importance of emotional factors as a starting point in scientific activity as well as the dominant role of limbic system relative to cortex of brain, the model emphasizes the DARWIN (Driving Affective Realm for Whole Intellectual Network) approach.

Analysis and Improvement Strategies for Korea's Cyber Security Systems Regulations and Policies

  • Park, Dong-Kyun;Cho, Sung-Je;Soung, Jea-Hyen
    • Korean Security Journal
    • /
    • no.18
    • /
    • pp.169-190
    • /
    • 2009
  • Today, the rapid advance of scientific technologies has brought about fundamental changes to the types and levels of terrorism while the war against the world more than one thousand small and big terrorists and crime organizations has already begun. A method highly likely to be employed by terrorist groups that are using 21st Century state of the art technology is cyber terrorism. In many instances, things that you could only imagine in reality could be made possible in the cyber space. An easy example would be to randomly alter a letter in the blood type of a terrorism subject in the health care data system, which could inflict harm to subjects and impact the overturning of the opponent's system or regime. The CIH Virus Crisis which occurred on April 26, 1999 had significant implications in various aspects. A virus program made of just a few lines by Taiwanese college students without any specific objective ended up spreading widely throughout the Internet, causing damage to 30,000 PCs in Korea and over 2 billion won in monetary damages in repairs and data recovery. Despite of such risks of cyber terrorism, a great number of Korean sites are employing loose security measures. In fact, there are many cases where a company with millions of subscribers has very slackened security systems. A nationwide preparation for cyber terrorism is called for. In this context, this research will analyze the current status of Korea's cyber security systems and its laws from a policy perspective, and move on to propose improvement strategies. This research suggests the following solutions. First, the National Cyber Security Management Act should be passed to have its effectiveness as the national cyber security management regulation. With the Act's establishment, a more efficient and proactive response to cyber security management will be made possible within a nationwide cyber security framework, and define its relationship with other related laws. The newly passed National Cyber Security Management Act will eliminate inefficiencies that are caused by functional redundancies dispersed across individual sectors in current legislation. Second, to ensure efficient nationwide cyber security management, national cyber security standards and models should be proposed; while at the same time a national cyber security management organizational structure should be established to implement national cyber security policies at each government-agencies and social-components. The National Cyber Security Center must serve as the comprehensive collection, analysis and processing point for national cyber crisis related information, oversee each government agency, and build collaborative relations with the private sector. Also, national and comprehensive response system in which both the private and public sectors participate should be set up, for advance detection and prevention of cyber crisis risks and for a consolidated and timely response using national resources in times of crisis.

  • PDF

Skew Compensation and Text Extraction of The Traffic Sign in Natural Scenes (자연영상에서 교통 표지판의 기울기 보정 및 덱스트 추출)

  • Choi Gyu-Dam;Kim Sung-Dong;Choi Ki-Ho
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.3 no.2 s.5
    • /
    • pp.19-28
    • /
    • 2004
  • This paper shows how to compensate the skew from the traffic sign included in the natural image and extract the text. The research deals with the Process related to the array image. Ail the process comprises four steps. In the first fart we Perform the preprocessing and Canny edge extraction for the edge in the natural image. In the second pan we perform preprocessing and postprocessing for Hough Transform in order to extract the skewed angle. In the third part we remove the noise images and the complex lines, and then extract the candidate region using the features of the text. In the last part after performing the local binarization in the extracted candidate region, we demonstrate the text extraction by using the differences of the features which appeared between the tett and the non-text in order to select the unnecessary non-text. After carrying out an experiment with the natural image of 100 Pieces that includes the traffic sign. The research indicates a 82.54 percent extraction of the text and a 79.69 percent accuracy of the extraction, and this improved more accurate text extraction in comparison with the existing works such as the method using RLS(Run Length Smoothing) or Fourier Transform. Also this research shows a 94.5 percent extraction in respect of the extraction on the skewed angle. That improved a 26 percent, compared with the way used only Hough Transform. The research is applied to giving the information of the location regarding the walking aid system for the blind or the operation of a driverless vehicle

  • PDF

The Effect of Long-term Treatment with Clozapine on Cognitive Functions in Chronic Schizophrenic Patients (만성 정신분열증 환자의 인지기능에 미치는 Clozapine 장기치료의 효과)

  • Lee, Hong-Shick;Kim, Ji-Hyeon;Jeon, Ji-Yong;Jeong, Min-Jung
    • Korean Journal of Biological Psychiatry
    • /
    • v.1 no.1
    • /
    • pp.109-116
    • /
    • 1994
  • It is not known whether negative symptoms and cognitive functions are dissociable or improvements in symptoms are reflected in improvements in cognitive functions in chronic schizophrenic patients. We administered clozapine to evaluate its effect on cognitive functions in chronic schizophrenic patients and to show correlations between improvement in psychotic symptoms and in cognitive functions. Neuropsychological tests such as Wisconsin Card Sorting Test, Digit Span test and Judgment of Line Orientation Test were applied to 16 chronic schizophrenic patients at baseline and after 9 months of treatment with clozapine. Using BPRS we assessed psychopathology before initiation of clozapine and at 9 months. Clozapine improved both positive and negative symptoms in chronic schizophrenic patients significantly. After nine months of clozapine treatment, significant improvements occurred in attention, short-term memory and visual perception ability. And interestingly we noted the trend of improvement in executive functions even though they were not statistical significant. Any significant correlations between the clinical improvement and change in congnitive functions were not observed. Long-term treatment with clozapine improved parts of cognitive functions of chronic schizophrenics. The results of the study suggest that deficits in simple cognitive functions as well as psychotic symptoms are improved after 3 month period of short-term treatment, but executive functions requiring more sophisticated processing of information could be improved after more than 9 months of long-term treatment.

  • PDF

Analysis of Observation Characteristics by Cognitive Style : MEG Study (인지양식에 따른 관찰 특성 분석 : MEG 연구)

  • Yang, Il-Ho;Lee, Soon-Joo;Kim, Eun-Ae;Lee, So-Ree;Kwon, Suk-Won
    • Journal of The Korean Association For Science Education
    • /
    • v.30 no.8
    • /
    • pp.1097-1109
    • /
    • 2010
  • The purpose of this study is to analyze the ERF components patterns of observers who have different cognitive styles using magneto-encephalography (MEG). The task was developed based on the CSA (Cognitive Style Analysis) program. Eight right-handed, healthy male college students participated in voluntarily. To investigate college students' ERF components during the task, an MEG system with block design was used to measure magnetic signals in their brains. For examining the observation characteristic by cognitive style, MEG ERF components were analyzed. As a result, four ERF components (M1, M2, M3, M4) were observed. Through the results of this study, the reason for different observation characteristics by cognitive styles was verified in the neurophysiological methods. This study will have implications to establish theories on scientific observation and cognitive styles.