• Title/Summary/Keyword: 컴퓨터 복원

Search Result 499, Processing Time 0.02 seconds

Precise Rectification of Misaligned Stereo Images for 3D Image Generation (입체영상 제작을 위한 비정렬 스테레오 영상의 정밀편위수정)

  • Kim, Jae-In;Kim, Tae-Jung
    • Journal of Broadcast Engineering
    • /
    • v.17 no.2
    • /
    • pp.411-421
    • /
    • 2012
  • The stagnant growth in 3D market due to 3D movie contents shortage is encouraging development of techniques for production cost reduction. Elimination of vertical disparity generated during image acquisition requires heaviest time and effort in the whole stereoscopic film-making process. This matter is directly related to competitiveness in the market and is being dealt with as a very important task. The removal of vertical disparity, i.e. image rectification has been treated for a long time in the photogrammetry field. While computer vision methods are focused on fast processing and automation, photogrammetry methods on accuracy and precision. However, photogrammetric approaches have not been tried for the 3D film-making. In this paper, proposed is a photogrammetry-based rectification algorithm that enable to eliminate the vertical disparity precisely by reconstruction of geometric relationship at the time of shooting. Evaluation of proposed algorithm was carried out by comparing the performance with two existing computer vision algorithms. The epipolar constraint satisfaction, epipolar line accuracy and vertical disparity of result images were tested. As a result, the proposed algorithm showed excellent performance than the other algorithms in term of accuracy and precision, and also revealed robustness about position error of tie-points.

The computer-Integrated Business System(CIBS) for Highly Decentralized Organizations (분산조직을 위한 컴퓨터 통합 비즈니스 시스템)

  • 박광호;권용균
    • Proceedings of the Korean Operations and Management Science Society Conference
    • /
    • 1996.10a
    • /
    • pp.153-156
    • /
    • 1996
  • 현재의 정보시스템이 하드웨어의 발전에 비해 늦어진 이유는 개발 단계별로 상호 일관성이 결여된 방법론을 사용하고 있고 이 방법론들이 실제의 비즈니스 프로세스(Business Process)와는 차이가 있는 형태로 구현이 되기 때문이다. 또한, 이런 방법론들이 분산조직에 사용된다면 비즈니스 프로세스가 세분화되기 때문에 문제점들이 더 깊이 심화되는 경향이 발생하게 된다. 이런 상황에 대한 해결책은 정보시스템이 비즈니스 프로세스로부터 구체적인 정보시스템의 구현에 이르기까지 일관성 있게 진행할 수 있는 방법론이 필요하다. 그러므로, 정보시스템 구현의 각 단계별로 추상과 구현방법을 구체적으로 제시하고 개념적인 무결성을 보장할수 있는 새로운 정보시스템 개발방법이 요구된다. 본 논문에서는 이러한 정보시스템을 구현하기 위해서 업무분석의 과정에서부터 구현에 이르기까지 개념적인 무결성(Conceptual Integrity)을 유지하고(Brooks, 1982) 방법론상에서 중단이나 변형없이 연결되는 시스템 개발방법론인 컴퓨터 통합 비즈니스 시스템(Computer-Integrated Business System:CIBS)을 소개하고 이 CIBS가 사용하는 세부적인 객체지향 프로그래밍 방법론이 AF(Application Framework)을 설명하며, 최종적으로 이 CIBS에 의해서 구현된 정보시스템과 기존의 프로그래밍 기법으로 구현된 정보시스템과의 비교를 통해 그 장단점을 증명하고자 한다. 또한, 이 CIBS구조는 정보시스템의 단편적인 정보제공 능력을 넘어서서 비즈니스 프로세스를 개선함에 의해서 기업의 노하우를 정립하고 이를 발전시키는 정보시스템의 진보된 형태를 보여줌으로서 정보시스템의 새로운 모습과 비젼을 제시하며 혁신적인 정보시스템의 새로운 구조를 보여준다. 문제점들은 HED (Human Engineerign Discrepance) 목록으로 정리하여 설계에 반영하도록 하였다.로 마음의 안정감, 몸의 긴장 이완에 따른 건강 상태 유지, 수업 집중도 향상 등이 나타났다. 위와 같은 종합 적 분석 결과에 따라, 본 연구는 제조 현장의 생산성 향상 및 품질 향상과 연계하여 작업자의 작업 집중도 향상, 작업자의 육체적, 심리적 변화에 따른 생산성 및 품질 향상 변화 정도 등의 산업공학(인간공학) 제 분야의 여러 측면에서 연구 및 적용이 가능하리라 사료된다.l, 시험군:25.90$\pm$7.16mg/d1, 47% 감소)를 나타내었으며, 시험군의 AUC는 대조군에 비해 39% 감소하였고, 혈중 아세트알데히드의 농도는 투여 60분후 시험군(3.96$\pm$0.07nmo1/$m\ell$)이 대조군(6.45$\pm$0,64nmo1/$m\ell$)에 비해 유의성 있는 감소(39%)를 나타내었으며, 시험군의 AUC는 대조군에 비해 48% 감소하였다 한편, 시험관내 에탄올 대사 효소에 대한 바이오짐의 효과를 검색해본 결과 바이오짐(2.0 $\mu\textrm{g}$/assay)에 의해 Aldehyde dehydrogenase(1.5unit/assay)의 활성이 14% 증가되었다. 본 연구의 결과로 볼 때, 비지니스 및 바이오짐은 음주 후 상승된 혈중 에탄을 농도 및 아세트알데히드의 농도를 현저히 감소시키는 효과가 있었다.량 보호 관리, 도시 소공원 개발, 역사 문화 공원 조성, 하천 공간 복원, 공원 시설 기능 개선, 이용 프로그램 개발, 공원 관리 개선, 환경 피해 녹지의 회복, 도시 환경 림 조성, 녹지 기능

  • PDF

Performance Evaluation of Hybrid-SE-MMA Adaptive Equalizer using Adaptive Modulus and Adaptive Step Size (적응 모듈러스와 적응 스텝 크기를 이용한 Hybrid-SE-MMA 적응 등화기의 성능 평가)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.20 no.2
    • /
    • pp.97-102
    • /
    • 2020
  • This paper relates with the Hybrid-SE-MMA (Signed-Error MMA) that is possible to improving the equalization performance by using the adaptive modulus and adaptive step size in SE-MMA adaptive equalizer for the minimizing the intersymbol interference. The equalizer tap coefficient is updatted use the error signal in MMA algorithm for adaptive equalizer. But the sign of error signal is used for the simplification of arithmetic operation in SE-MMA algorithm in order to updating the coefficient. By this simplification, we get the fast convergence speed and the reduce the algorithm processing speed, but not in the equalization performance. In this paper, it is possible to improve the equalization performance by computer simulation applying the adaptive modulus to the SE-MMA which is proposional to the power of equalizer output signal. In order to compare the improved equalization performance compared to the present SE-MMA, the recovered signal constellation that is the output of the equalizer, residual isi, MD(maximum distortion), MSE and the SER perfomance that means the robustness to the external noise were used. As a result of computer simulation, the Hybrid-SE-MMA improve equalization performance in the residual isi and MD, MSE, SER than the SE-MMA.

Noise Removal using Fuzzy Mask Filter (퍼지 마스크 필터를 이용한 잡음 제거)

  • Lee, Sang-Jun;Yoon, Seok-Hyun;Kim, Kwang-Baek
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.41-45
    • /
    • 2010
  • Image processing techniques are fundamental in human vision-based image information processing. There have been widely studied areas such as image transformation, image enhancement, image restoration, and image compression. One of research subgoals in those areas is enhancing image information for the correct information retrieval. As a fundamental task for the image recognition and interpretation, image enhancement includes noise filtering techniques. Conventional filtering algorithms may have high noise removal rate but usually have difficulty in conserving boundary information. As a result, they often use additional image processing algorithms in compensation for the tradeoff of more CPU time and higher possibility of information loss. In this paper, we propose a Fuzzy Mask Filtering algorithm that has high noise removal rate but lesser problems in above-mentioned side-effects. Our algorithm firstly decides a threshold based on fuzzy logic with information from masks. Then it decides the output pixel value by that threshold. In a designed experiment that has random impulse noise and salt pepper noise, the proposed algorithm was more effective in noise removal without information loss.

Performance Analysis of RS codes for Low Power Wireless Sensor Networks (저전력 무선 센서 네트워크를 위한 RS 코드의 성능 분석)

  • Jung, Kyung-Kwon;Choi, Woo-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.4
    • /
    • pp.83-90
    • /
    • 2010
  • In wireless sensor networks, the data transmitted from the sensor nodes are susceptible to corruption by errors which caused of noisy channels and other factors. In view of the severe energy constraint in Sensor Networks, it is important to use the error control scheme of the energy efficiently. In this paper, we presented RS (Reed-Solomon) codes in terms of their BER performance and power consumption. RS codes work by adding extra redundancy to the data. The encoded data can be stored or transmitted. It could have errors introduced, when the encoded data is recovered. The added redundancy allows a decoder to detect which parts of the received data is corrupted, and corrects them. The number of errors which are able to be corrected by RS code can determine by added redundancy. The results of experiment validate the performance of proposed method to provide high degree of reliability in low-power communication. We could predict the lifetime of RS codes which transmitted at 32 byte a 1 minutes. RS(15, 13), RS(31, 27), RS(63, 57), RS(127,115), and RS(255,239) can keep the days of 173.7, 169.1, 163.9, 150.7, and 149.7 respectively. The evaluation based on packet reception ratio (PRR) indicates that the RS(255,239) extends a sensor node's communication range by up about 3 miters.

A Study on Optical Condition and preprocessing for Input Image Improvement of Dented and Raised Characters of Rubber Tires (고무타이어 문자열 입력영상 개선을 위한 전처리와 광학조건에 관한 연구)

  • 류한성;최중경;권정혁;구본민;박무열
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.6 no.1
    • /
    • pp.124-132
    • /
    • 2002
  • In this paper, we present a vision algorithm and method for input image improvement and preprocessing of dented and raised characters on the sidewall of tires. we define optical condition between reflect coefficient and reflectance by the physical vector calculate. On the contrary this work will recognize the engraved characters using the computer vision technique. Tire input images have all most same grey levels between the characters and backgrounds. The reflectance is little from a tire surface. therefore, it's very difficult segment the characters from the background. Moreover, one side of the character string is raised and the other is dented. So, the captured images are varied with the angle of camera and illumination. For optimum Input images, the angle between camera and illumination was found out to be with in 90$^{\circ}$. In addition, We used complex filtering with low-pass and high-pass band filters to improve input images, for clear input images. Finally we define equation reflect coefficient and reflectance. By doing this, we obtained good images of tires for pattern recognition.

Power analysis attacks against NTRU and their countermeasures (NTRU 암호에 대한 전력 분석 공격 및 대응 방법)

  • Song, Jeong-Eun;Han, Dong-Guk;Lee, Mun-Kyu;Choi, Doo-Ho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.2
    • /
    • pp.11-21
    • /
    • 2009
  • The NTRU cryptosystem proposed by Hoffstein et al. in 1990s is a public key cryptosystem based on hard lattice problems. NTRU has many advantages compared to other public key cryptosystems such as RSA and elliptic curve cryptosystems. For example, it guarantees high speed encryption and decryption with the same level of security, and there is no known quantum computing algorithm for speeding up attacks against NTRD. In this paper, we analyze the security of NTRU against the simple power analysis (SPA) attack and the statistical power analysis (STPA) attack such as the correlation power analysis (CPA) attack First, we implement NTRU operations using NesC on a Telos mote, and we show how to apply CPA to recover a private key from collected power traces. We also suggest countermeasures against these attacks. In order to prevent SPA, we propose to use a nonzero value to initialize the array which will store the result of a convolution operation. On the other hand, in order to prevent STPA, we propose two techniques to randomize power traces related to the same input. The first one is random ordering of the computation sequences in a convolution operation and the other is data randomization in convolution operation.

An Educational Plan for Chinese Culture through 「Analysis of the Legend of the Gaotang(高唐)shennu(神女)」 (<고당신녀전설 분석>을 통한 중국문화 교육 방안)

  • Kim, Sung-Hee;Choi, Eunsun;Park, Namje
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.313-320
    • /
    • 2022
  • Recently, the keyword 'convergence' has emerged in the education field. The voice of demand for the humanities is also increasing. The range of convergence of the humanities is gradually spreading to various fields such as science, technology, engineering, and the arts field. And also, the trend is to nurture the future creative convergence talent with logical, comprehensive, and creative thinking through the fusion of humanities, scientific, and empirical theories. Myths and legends contain the content of humanity's culture creation and deal with matters such as religion, philosophy, art, and science. Therefore, through the consciousness of the ancients who lived in the so-called convergence era when academic differentiation did not occur, it will be possible to reflect on the appearance of sages. In this paper, we propose a method for educating Chinese culture through the analysis of by Wen Yi-Duo, a famous Chinese scholar. He sought to find the origin of Chinese culture through myths and legends and to find national identity by restoring the concept of national culture in the period of origin. The myths and legends of China are closely related to the cultural phenomena of modern China, which will further enhance our understanding of China.

Design and Implementation of User-Level FileSystem in the Combat Management System

  • Kang, Seok-Hyun;Kim, Keun-Hee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.9-16
    • /
    • 2022
  • In this paper, we propose a plan to design and utilize the RDBS(Record Block Data file management System) so that data can be recovered when data files in the Combat Management System are mismatched. The CMS(Combat Management System) manages the same files in multiple IPN(Infomation Processing Node) repositories to support multiplexing. However, mismatches in data files can occur due to equipment maintenance or user immaturity. The existing CMS does not manage the history of changes in data files, and when a mismatch occurs, data file were synchronized based on the latest date. But, It is difficult to say that files with the latest date have the highest reliability, and once the file synchronization has progressed, it cannot be recovered with pre-synchronization data. To solve this problem, data was stored and synchronized in units of record blocks using RDBS proposed in this paper, and the Rsync algorithm was used to reduce the overhead of file synchronization due to units of record blocks. SW applied with RDBS was tested for performance in a simulated environment, and it was confirmed that it could be applied to CMS through normal operation confirmation.

An Efficient CT Image Denoising using WT-GAN Model

  • Hae Chan Jeong;Dong Hoon Lim
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.5
    • /
    • pp.21-29
    • /
    • 2024
  • Reducing the radiation dose during CT scanning can lower the risk of radiation exposure, but not only does the image resolution significantly deteriorate, but the effectiveness of diagnosis is reduced due to the generation of noise. Therefore, noise removal from CT images is a very important and essential processing process in the image restoration. Until now, there are limitations in removing only the noise by separating the noise and the original signal in the image area. In this paper, we aim to effectively remove noise from CT images using the wavelet transform-based GAN model, that is, the WT-GAN model in the frequency domain. The GAN model used here generates images with noise removed through a U-Net structured generator and a PatchGAN structured discriminator. To evaluate the performance of the WT-GAN model proposed in this paper, experiments were conducted on CT images damaged by various noises, namely Gaussian noise, Poisson noise, and speckle noise. As a result of the performance experiment, the WT-GAN model is better than the traditional filter, that is, the BM3D filter, as well as the existing deep learning models, such as DnCNN, CDAE model, and U-Net GAN model, in qualitative and quantitative measures, that is, PSNR (Peak Signal-to-Noise Ratio) and SSIM (Structural Similarity Index Measure) showed excellent results.