• Title/Summary/Keyword: Background Information

Search Result 4,957, Processing Time 0.032 seconds

Vehicle HUD's cognitive emotional evaluation - Focused on color visibility of driving information (차량용 HUD의 인지적 감성 평가 -주행정보의 색채 시인성을 중심으로-)

  • Choi, Won-Jung;Lee, Won-Jung;Lee, Seol-Hee;Park, YungKyung
    • Science of Emotion and Sensibility
    • /
    • v.16 no.2
    • /
    • pp.195-206
    • /
    • 2013
  • The main causes of traffic accidents while driving a car is of the driver's visual distraction. In this study, the color sensitivity of the information projected on the windshield were evaluated for HUD (Head Up Display) system which helps the driver's eyes on the road while driving. The driving Information were projected $9^{\circ}$ downward from front sight $0^{\circ}$ under lab's fluorescent lights, LED floorlights and the TV had having 25 [lux] illumination when driving at night environment and 100,000 [lux] of daylight environment. Munsell color hue of the basic five colors (R, Y, G, B, P) and the color of traffic lights YR, W were the color of the seven characters, each character were outlined by White, Gray except for W. Total of 19 experimental stimuli was shown in the environment of day and night driving for asking visibility information of color, fatigue, preferences, and evaluate the degree of interference. The results came out that the bright Y and G color is visibility significantly for daylight. Second, with the outline of the text, the color of the outline works as a background for luminance contrast effects and affects visibility. Third, without the outline, the glass in front of the vehicle acts as the background and the luminance contrast of characters achieve greater brightness and visibility. The luminance contrast between the stimuli and background should be considered for increasing color visibility for driving information which is an important factor for HUD commercialization.

  • PDF

Reduction Algorithm of Environmental Noise by Multi-band Filter (멀티밴드필터에 의한 환경잡음억압 알고리즘)

  • Choi, Jae-Seung
    • Journal of the Korea Society of Computer and Information
    • /
    • v.17 no.8
    • /
    • pp.91-97
    • /
    • 2012
  • This paper first proposes the speech recognition algorithm by detection of the speech and noise sections at each frame, then proposes the reduction algorithm of environmental noise by multi-band filter which removes the background noises at each frame according to detection of the speech and noise sections. The proposed algorithm reduces the background noises using filter bank sub-band domain after extracting the features from the speech data. In this experiment, experimental results of the proposed noise reduction algorithm by the multi-band filter demonstrate using the speech and noise data, at each frame. Based on measuring the spectral distortion, experiments confirm that the proposed algorithm is effective for the speech by corrupted the noise.

Study of sound for Smart phone games (스마트폰 게임의 사운드에 관한 연구)

  • Lee, Myung-Hwan;Ryu, Chang-Su
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.405-408
    • /
    • 2012
  • Recently, Smartphone takes center stage as the next generation game platform, so there's fierce competition between various companies which enter the mobile market. According to Smartphone market is wide, Smart phone App game sound is more widely. This study attempts to analyse the role of sound effects and BGM(background music) during game play or game development, and make a comparison between game play with and without Sound effects, so that to suggest the direction of development of the App game sound for Smartphone and to remind the importance of sound effects and emphasize the necessity of development of the professional game sound.

  • PDF

Improving the Processing Speed and Robustness of Face Detection for a Psychological Robot Application (심리로봇적용을 위한 얼굴 영역 처리 속도 향상 및 강인한 얼굴 검출 방법)

  • Ryu, Jeong Tak;Yang, Jeen Mo;Choi, Young Sook;Park, Se Hyun
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.20 no.2
    • /
    • pp.57-63
    • /
    • 2015
  • Compared to other emotion recognition technology, facial expression recognition technology has the merit of non-contact, non-enforceable and convenience. In order to apply to a psychological robot, vision technology must be able to quickly and accurately extract the face region in the previous step of facial expression recognition. In this paper, we remove the background from any image using the YCbCr skin color technology, and use Haar-like Feature technology for robust face detection. We got the result of improved processing speed and robust face detection by removing the background from the input image.

A Study on the Extraction of E-mail Region in Unconstraint Calling Card Images (무제약 명함 영상에서의 E-mail 영역 검출에 관한 연구)

  • 신상철;정재영
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.7 no.5
    • /
    • pp.183-189
    • /
    • 2002
  • In this paper, we propose an algorithm to extract the E-mail address in calling card images. Firstly, text regions are separated from background. in the image. To do this, the properties of e-mail addresses and the texture features in the image is used. And then, each text region is explored to find the candidates of e-mail region. Finally, each candidate is divided into characters to find at-symbol(@), that is, e-mail region. The experimental results show hit-ratio over 93.3% for the various kind of calling cards containing different fonts, background images, caricatures.

  • PDF

Extraction of tire information markings using a surface reflection model (표면의 반사 특성을 이용한 타이어 정보 마크의 추출)

  • Ha, Jong-Eun;Lee, Jae-Yong;Gwon, In-So
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.2 no.4
    • /
    • pp.324-329
    • /
    • 1996
  • In this paper, we present a vision algorithm to extract the tire information markings on the sidewall of tires. Since the appearance of tire marks is the same as its background, a primary feature to distinguish tire marks from their background is the roughness. Generally, the roughness of tire marks is different from that of its bakground: the surface of tire marks is smoother than the backgrounds. Light incident on the tire surface is reflected differently according to the roughness. For smoother surfaces, the surface irradiance is much stronger than that of rough surfaces. Based on these phenomena and observation, we propose an optimal illumination condition based on Torrance-Sparrow reflection model. We also develop an efficient reflectance-ratio based operator to extract the boundary of tire marks. Even with a very simple masking operation, we were able to obtain remarkable boundary extraction results from real experiments using many tires. By explicitly using the surface reflection model to explain the intensity variation on the black tire surface, we demonstrate that a physics-based vision method is powerful and feasible in extracting surface markings on tires.

  • PDF

Moving Object Detection Robust to Sudden illumination Change using Modified Texture Information (개선된 텍스쳐 정보를 이용한 갑작스러운 조명 변화에 강인한 이동 물체 탐지)

  • O, Yoe-Han;Chang, Hyung-Jin;Kim, Soo-Wan;Choi, Jin-Young
    • Proceedings of the KIEE Conference
    • /
    • 2008.10b
    • /
    • pp.268-269
    • /
    • 2008
  • Moving object detection is a fundamental technique in visual surveillance. Robust technique to enhance performance of moving object detection is required for several bad conditions in real external circumtance. In case of sudden illumination change in outdoor condition, many objects are determined as moving object though they are not really moving, but just their illumination changes. This makes the detection result untrustworthy. In this paper, robust moving object detection to sudden illumination change using gaussian mixture background model and new texture information using background from the weighted sum of recent images is proposed.

  • PDF

Detecting a Relay Attack with a Background Noise (소리를 이용한 릴레이 공격 공격의 탐지)

  • Kim, Jonguk;Kang, Sukin;Hong, Manpyo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.4
    • /
    • pp.617-627
    • /
    • 2013
  • Wireless communication technology such as NFC and RFID makes the data transfer between devices much easier. Instead of the irksome typing of passwords, users are able to simply authenticate themselves with their smart cards or smartphones. Relay attack, however, threatens the security of token-based, something-you-have authentication recently. It efficiently attacks the authentication system even if the system has secure channels, and moreover it is easy to deploy. Distance bounding or localization of two devices has been proposed to detect relay attacks. We describe the disadvantages and weakness of existing methods and propose a new way to detect relay attacks by recording a background noise.

Transmission of the Region of Interest in Images Using Wavelet Transform (웨이브렛 변환을 이용한 관심영역의 부호화)

  • Lee, Soo-Jong;Lee, Wan-Ju;Kim, Yong-Kyu
    • The Journal of Information Technology
    • /
    • v.10 no.3
    • /
    • pp.15-31
    • /
    • 2007
  • Region-of-Interest is the region within the image selected for the users needs. The development of multimedia has made the expectation of image telecommunication higher, but the usage of the image, image transmission time, and image storage create problems. When transmitter or the receiver stops transmission at some point, we can still see the general image and the ROI maintains better image quality if the ROI is specified beforehand. In this paper, three methods are proposed and constructed for the transmission of ROI. In the first method, the ROI and the background are separated and then encoded as described above. The second method is to encode without separating the ROI and the background. The masked region is scaled and the coefficients are increased, then the region is transmitted first. The third method is the loseless coding of the ROI. For loseless coding, real number tap cannot be restored perfectly due to the rounding error, so the method of using integers is used. The proposed method shows a better performance than EZW even in case of ROI's PSNR at quality of 40 dB.

  • PDF

ShareSafe: An Improved Version of SecGraph

  • Tang, Kaiyu;Han, Meng;Gu, Qinchen;Zhou, Anni;Beyah, Raheem;Ji, Shouling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.11
    • /
    • pp.5731-5754
    • /
    • 2019
  • In this paper, we redesign, implement, and evaluate ShareSafe (Based on SecGraph), an open-source secure graph data sharing/publishing platform. Within ShareSafe, we propose De-anonymization Quantification Module and Recommendation Module. Besides, we model the attackers' background knowledge and evaluate the relation between graph data privacy and the structure of the graph. To the best of our knowledge, ShareSafe is the first platform that enables users to perform data perturbation, utility evaluation, De-A evaluation, and Privacy Quantification. Leveraging ShareSafe, we conduct a more comprehensive and advanced utility and privacy evaluation. The results demonstrate that (1) The risk of privacy leakage of anonymized graph increases with the attackers' background knowledge. (2) For a successful de-anonymization attack, the seed mapping, even relatively small, plays a much more important role than the auxiliary graph. (3) The structure of graph has a fundamental and significant effect on the utility and privacy of the graph. (4) There is no optimal anonymization/de-anonymization algorithm. For different environment, the performance of each algorithm varies from each other.