• Title/Summary/Keyword: 입력처리 지도

Search Result 1,640, Processing Time 0.034 seconds

Key Frame Extraction and Region Segmentation-based Video Retrieval in Compressed Domain (압축영역에서의 대표프레임 추출 및 영역분할기반 비디오 검색 기법)

  • 강응관;김성주;송호근;최종수
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.9B
    • /
    • pp.1713-1720
    • /
    • 1999
  • This paper presents a new key frame extraction technique, for scene change detection, using the proposed AHIM (Accumulative Histogram Intersection Measure) from the DC image constructed by DCT DC coefficients in the compressed video sequence that is video compression standard such as MPEG. For fast content-based browsing and video retrieval in a video database, we also provide a novel coarse-to-fine video indexing scheme. In the extracted key frame, we perform the region segmentation as a preprocessing. First, the segmented image is projected with the horizontal direction, then we transform the result into a histogram, which is saved as a database index. In the second step, we calculate the moments and change them into a distance value. From the simulation results, the proposed method clearly shows the validity and superiority in respect of computation time and memory space, and that in conjunction with other techniques for indexing, such as color, can provide a powerful framework for image indexing and retrieval.

  • PDF

Barcode Region of Interest Extraction Method Using a Local Pixel Directions in a Multiple Barcode Region Image (다중 바코드 영역을 가지는 영상에서 지역적 픽셀 방향성을 이용한 바코드 관심 영역 추출 방법)

  • Cho, Hosang;Kang, Bongsoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.9
    • /
    • pp.2121-2128
    • /
    • 2015
  • In this paper presents a method of extracting reliable and regions of interest (ROI) in barcode for the purpose of factory automation. backgrounds are separated based on directional components and the characteristics of detected patterns. post-processing is performed on candidate images with analysis of problems caused by blur, rotation and areas of high similarity. In addition, the resizing factor is used to achieve faster calculations through image resizing. The input images contained multiple product or barcode for application to diverse automation environments; a high extraction success rate is accomplished despite the maximum shooting distance of 80 cm. Simulations involving images with various shooting distances gave an ROI detection rate of 100% and a post-processing success rate of 99.3%.

Analytical System Development for Reinforced Tall Buildings with Construction Sequence (시공단계에 따른 철근콘크리트 고층건물의 해석시스템 개발)

  • Lee, Tae-Gyu
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.9
    • /
    • pp.410-417
    • /
    • 2013
  • Long-term behavior analysis considering construction sequence should be performed in the design and the actual construction of reinforced tall buildings. Most of the analytical studies on this subject, however, has not been applied directly to the structural design and the construction caused by the simple approach. As the axial force redistribution of shores and columns is time-dependent, the actual construction sequence with the placement of concrete, form removal, reshoring, shore removal, and the additional load application is very important. Object-oriented analysis program considering construction sequence, especially time-dependent deformation in early days, is developed. This system is composed of input module, database module, database store module, analysis module, and result generation module. Linkage interface between the central database and each of the related module is implemented by the visual c# concept. Graphic user interface and the relational database table are supported for user's convenience.

Stereo image compression based on error concealment for 3D television (3차원 텔레비전을 위한 에러 은닉 기반 스테레오 영상 압축)

  • Bak, Sungchul;Sim, Donggyu;Namkung, Jae-Chan;Oh, Seoung-jun
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.286-296
    • /
    • 2005
  • This paper presents a stereo-based image compression and transmission system for 3D realistic television. In the proposed system, a disparity map is extracted from an input stereo image pair and the extracted disparity map and one of two input images are transmitted or stored at a local or remote site. However, correspondences can not be determined in occlusion areas. Thus, it is not easy to recover 3D information in such regions. In this paper, a reconstruction image compensation algorithm based on error block concealment and in-loop filtering is proposed to minimize the reconstruction error in generating stereo image pair. The effectiveness of the proposed algorithm is shown in term of objective accuracy of reconstruction image with several real stereo image pairs.

Error-Resilience Enhancement based on Polyphase Down Sampling for the H.264 Video Coding Technology (에러 강인성 향상을 위한 다상 다운 샘플링 적용 H.264 동영상 부호화 기술)

  • Jung, Eun Ku;Jia, Jie;Kim, Hae Kwang;Choi, Hae Chul;Kim, Jae Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.340-347
    • /
    • 2005
  • This paper presents a polyphase down sampling based multiple description coding applied to H.264 video coding standard. For a given macroblock, a residual macroblock is calculated by motion estimation, and before applying DCT, quantization and entrophy coding of the H.264 coding process, the polyphase down sampling is applied to the residual macroblock to code in four separate descriptions. Experiments were performed for all the 9 test sequences of JVT SVC standardization in various packet loss patterns. Experimental results show that the proposed one gives 0.5 to 5 dB enhancement over an error-concealment based on the slice group map technolgoy.

An Efficient ROLAP Cube Generation Scheme (효율적인 ROLAP 큐브 생성 방법)

  • Kim, Myung;Song, Ji-Sook
    • Journal of KIISE:Databases
    • /
    • v.29 no.2
    • /
    • pp.99-109
    • /
    • 2002
  • ROLAP(Relational Online Analytical Processing) is a process and methodology for a multidimensional data analysis that is essential to extract desired data and to derive value-added information from an enterprise data warehouse. In order to speed up query processing, most ROLAP systems pre-compute summary tables. This process is called 'cube generation' and it mostly involves intensive table sorting stages. (1) showed that it is much faster to generate ROLAP summary tables indirectly using a MOLAP(multidimensional OLAP) cube generation algorithm. In this paper, we present such an indirect ROLAP cube generation algorithm that is fast and scalable. High memory utilization is achieved by slicing the input fact table along one or more dimensions before generating summary tables. High speed is achieved by producing summary tables from their smallest parents. We showed the efficiency of our algorithm through experiments.

The Design for Security System of Linux Operating System (리눅스 운영체제를 위한 보안 시스템 설계)

  • Park, JinSeok;Kim, SoonGohn
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.4
    • /
    • pp.35-42
    • /
    • 2010
  • This paper reviews the current studies about the current secure OS, security module and SELinux, and suggests Linux access control module that uses the user discriminating authentication, security authority inheritance of subjects and objects, reference monitor and MAC class process and real-time audit trailing using DB. First, during the user authentication process, it distinguishes the access permission IP and separates the superuser(root)'s authority from that of the security manager by making the users input the security level and the protection category. Second, when the subjects have access to the objects through security authority inheritance of subjects and objects, the suggested system carries out the access control by comparing the security information of the subjects with that of the objects. Third, this system implements a Reference Monitor audit on every current events happening in the kernel. As it decides the access permission after checking the current MAC security attributes, it can block any malicious intrusion in advance. Fourth, through the real-time audit trailing system, it detects all activities in the operating system, records them in the database and offers the security manager with the related security audit data in real-time.

  • PDF

A study on Simple and Complex Algorithm of Self Controlled Mobile Robot for the Obstacle Avoidance and Path Plan (자율 이동로봇의 장애물 회피 및 경로계획에 대한 간략화 알고리즘과 복합 알고리즘에 관한 연구)

  • 류한성;최중경;구본민;박무열;권정혁
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.115-123
    • /
    • 2002
  • In this paper, we present two types of vision algorithm that mobile robot has CCD camera. for obstacle avoidance and path plan. One is simple algorithm that compare with grey level from input images. Also, The mobile robot depend on image processing and move command from PC host. we has been studied self controlled mobile robot system with CCD camera. This system consists of TMS320F240 digital signal processor, step motor, RF module and CCD camera. we used wireless RF module for movable command transmitting between robot and host PC. This robot go straight until 95 percent filled screen from input image. And the robot recognizes obstacle about 95 percent filled something, so it could avoid the obstacle and conclude new path plan. Another is complex algorithm that image preprocessing by edge detection, converting, thresholding and image processing by labeling, segmentation, pixel density calculation.

Design and Implementation of Context Awareness Smart Jewelry Device (상황인식 스마트 주얼리 디바이스 설계 및 구현)

  • Kang, YunJeong;Choi, DongOun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.11
    • /
    • pp.2113-2118
    • /
    • 2016
  • Smart Jewelry is applied to the components of the Internet of Things. The process of obtaining the status information to the input of the sensor. And it controls the light color of the LED. Because to express the beauty of twinkling lights that can be felt in the jewelery and aesthetic functions were applied in order to feel the mystery. Smart Jewelry is capable of communication, interaction, wearable. Smart jewelery was equipped with a color, temperature, ambient light sensor. It was designed to allow interaction with a Bluetooth module. Applying an algorithm so that the light jewelry colors can vary depending on the circumstances of the smart jewelry wearer had been implemented by the mobile application. It can be realized in digital technology and the convergence of life. It presents the orientation development of the smart jewelery device on IoT environment.

Processing Sliding Windows over Disordered Streams (비순서화된 스트림 처리를 위한 슬라이딩 윈도우 기법)

  • Kim, Hyeon-Gyu;Kim, Cheol-Ki;Kim, Myoung-Ho
    • Journal of KIISE:Databases
    • /
    • v.33 no.6
    • /
    • pp.590-599
    • /
    • 2006
  • Disordered streams cause two issues in processing sliding windows: i) how to place input tuples into a buffer in an increasing order efficiently and ii) how to determine a time point to process the windows from input tuples in the buffer. To address these issues, we propose a structure and method of operators for processing sliding windows. We first present a structure of the operators using an index to handle input tuples efficiently. Then, we propose a method to determine the time point to process the windows, which is called a mean-based estimation. In the proposed method, users can describe parameters required for estimation in a query specification, which provides a way for users to control the properties of query results such as the accuracy or the response time according to application requirements. Our experimental results show that the mean-based estimation provides better adaptivity and stability than the one used in the existing method.