• Title/Summary/Keyword: Context Extraction

Search Result 112, Processing Time 0.025 seconds

A Design and Implementation of algorithm choosing Context-based Image used Multimedia Communication (멀티미디어 통신을 이용한 내용기반 이미지 추출 알고리즘 설계 및 구현)

  • 안병규
    • Journal of the Korea Computer Industry Society
    • /
    • v.2 no.11
    • /
    • pp.1421-1426
    • /
    • 2001
  • Nowadays, as the quantity of multimedia information increases rapidly, an efficient management for multimedia has become more important. In this paper, to index and search multimedia contents efficiently, we designed the algorithm searching specific image and saving the extracted image using the semantic information extraction scheme based on contents and it is one of the schemes to indexing and searching of video data. After extracting the RGB information from input image, while all frames of video is inspected sequentially, the specific image is saved through referring to the position and distribution of contents from the collection scheme of RGB range. In case of using the proposed image extraction algorithm, because only saved video is searched instead of the whole the searching time can be reduced.

  • PDF

Graphemes Segmentation for Arabic Online Handwriting Modeling

  • Boubaker, Houcine;Tagougui, Najiba;El Abed, Haikal;Kherallah, Monji;Alimi, Adel M.
    • Journal of Information Processing Systems
    • /
    • v.10 no.4
    • /
    • pp.503-522
    • /
    • 2014
  • In the cursive handwriting recognition process, script trajectory segmentation and modeling represent an important task for large or open lexicon context that becomes more complicated in multi-writer applications. In this paper, we will present a developed system of Arabic online handwriting modeling based on graphemes segmentation and the extraction of its geometric features. The main contribution consists of adapting the Fourier descriptors to model the open trajectory of the segmented graphemes. To segment the trajectory of the handwriting, the system proceeds by first detecting its baseline by checking combined geometric and logic conditions. Then, the detected baseline is used as a topologic reference for the extraction of particular points that delimit the graphemes' trajectories. Each segmented grapheme is then represented by a set of relevant geometric features that include the vector of the Fourier descriptors for trajectory shape modeling, normalized metric parameters that model the grapheme dimensions, its position in respect to the baseline, and codes for the description of its associated diacritics.

Research trends in the Korean Journal of Women Health Nursing from 2011 to 2021: a quantitative content analysis

  • Ju-Hee Nho;Sookkyoung Park
    • Women's Health Nursing
    • /
    • v.29 no.2
    • /
    • pp.128-136
    • /
    • 2023
  • Purpose: Topic modeling is a text mining technique that extracts concepts from textual data and uncovers semantic structures and potential knowledge frameworks within context. This study aimed to identify major keywords and network structures for each major topic to discern research trends in women's health nursing published in the Korean Journal of Women Health Nursing (KJWHN) using text network analysis and topic modeling. Methods: The study targeted papers with English abstracts among 373 articles published in KJWHN from January 2011 to December 2021. Text network analysis and topic modeling were employed, and the analysis consisted of five steps: (1) data collection, (2) word extraction and refinement, (3) extraction of keywords and creation of networks, (4) network centrality analysis and key topic selection, and (5) topic modeling. Results: Six major keywords, each corresponding to a topic, were extracted through topic modeling analysis: "gynecologic neoplasms," "menopausal health," "health behavior," "infertility," "women's health in transition," and "nursing education for women." Conclusion: The latent topics from the target studies primarily focused on the health of women across all age groups. Research related to women's health is evolving with changing times and warrants further progress in the future. Future research on women's health nursing should explore various topics that reflect changes in social trends, and research methods should be diversified accordingly.

A Study on Dataset Generation Method for Korean Language Information Extraction from Generative Large Language Model and Prompt Engineering (생성형 대규모 언어 모델과 프롬프트 엔지니어링을 통한 한국어 텍스트 기반 정보 추출 데이터셋 구축 방법)

  • Jeong Young Sang;Ji Seung Hyun;Kwon Da Rong Sae
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.11
    • /
    • pp.481-492
    • /
    • 2023
  • This study explores how to build a Korean dataset to extract information from text using generative large language models. In modern society, mixed information circulates rapidly, and effectively categorizing and extracting it is crucial to the decision-making process. However, there is still a lack of Korean datasets for training. To overcome this, this study attempts to extract information using text-based zero-shot learning using a generative large language model to build a purposeful Korean dataset. In this study, the language model is instructed to output the desired result through prompt engineering in the form of "system"-"instruction"-"source input"-"output format", and the dataset is built by utilizing the in-context learning characteristics of the language model through input sentences. We validate our approach by comparing the generated dataset with the existing benchmark dataset, and achieve 25.47% higher performance compared to the KLUE-RoBERTa-large model for the relation information extraction task. The results of this study are expected to contribute to AI research by showing the feasibility of extracting knowledge elements from Korean text. Furthermore, this methodology can be utilized for various fields and purposes, and has potential for building various Korean datasets.

Hardware Implementation of EBCOT TIER-1 for JPEG2000 Encoder (JPEG2000 Encoder를 위한 EBCOT Tier-1의 하드웨어 구현)

  • Lee, Sung-Mok;Jang, Won-Woo;Cho, Sung-Dae;Kang, Bong-Soon
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.11 no.2
    • /
    • pp.125-131
    • /
    • 2010
  • This paper presents the implementation of a EBCOT TIER-1 for JPEG2000 Encoder. JPEG2000 is new standard for the compression of still image for overcome the artifact of JPEG. JPEG2000 standard is based on DWT(Discrete Wavelet Transform) and EBCOT Entropy coding technology. EBCOT(Embedded block coding with optimized truncation) is the most important technology that is compressed the image data in the JPEG2000. However, EBCOT has the artifact because the operations are bit-level processing and occupy the harf of the computation time of JPEG2000 Compression. Therefore, in this paper, we present modified context extraction method for enhance EBCOT computational efficiency and implemented MQ- Coder as arithmetic coder. The proposed system is implemented by Verilog-HDL, under the condition of TSMC 0.25um ASIC library, gate counts are 30,511EA and satisfied the 50MHz operating condition.

Performance Enhancement of Tree Kernel-based Protein-Protein Interaction Extraction by Parse Tree Pruning and Decay Factor Adjustment (구문 트리 가지치기 및 소멸 인자 조정을 통한 트리 커널 기반 단백질 간 상호작용 추출 성능 향상)

  • Choi, Sung-Pil;Choi, Yun-Soo;Jeong, Chang-Hoo;Myaeng, Sung-Hyon
    • Journal of KIISE:Software and Applications
    • /
    • v.37 no.2
    • /
    • pp.85-94
    • /
    • 2010
  • This paper introduces a novel way to leverage convolution parse tree kernel to extract the interaction information between two proteins in a sentence without multiple features, clues and complicated kernels. Our approach needs only the parse tree alone of a candidate sentence including pairs of protein names which is potential to have interaction information. The main contribution of this paper is two folds. First, we show that for the PPI, it is imperative to execute parse tree pruning removing unnecessary context information in deciding whether the current sentence imposes interaction information between proteins by comparing with the latest existing approaches' performance. Secondly, this paper presents that tree kernel decay factor can play an pivotal role in improving the extraction performance with the identical learning conditions. Consequently, we could witness that it is not always the case that multiple kernels with multiple parsers perform better than each kernels alone for PPI extraction, which has been argued in the previous research by presenting our out-performed experimental results compared to the two existing methods by 19.8% and 14% respectively.

Frontal Face Region Extraction & Features Extraction for Ocular Inspection (망진을 위한 정면 얼굴 영역 및 특징 요소 추출)

  • Cho Dong-Uk;Kim Sun-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.585-592
    • /
    • 2005
  • One of the most important things in the researches on diseases is to attach more importance to prevention of a disease and preservation of health than to treatment of a disease, also to foods rather than to medicines. In this context, the most significant concern in examining a patient is to find the presence of disease, and, if any, to diaguose the type of disease, after which a pharmacotherapy is followed. In this paper, various diagnosis methods of Oriental medicines are discussed. And ocular inspection, the most important method among the 4 disease diagnoses of Oriental medicines, is studied. Observing a person's shape and color has been the major method for ocular inspection, which usually has been dependent upon doctor's intuition as of these days. We are developing an automatic system which provides objective basic data for ocular inspection. As the first stage, we applied the signal processing techniques to automatic feature extraction of faces for ocular inspection. Firstly, facial regions are extracted from the point of frontal view, which was followed by extraction of their features. The experiment applied to 20 persons showed that frontal face regions are perfectly extracted, as well as their features, such as eyes, eyebrows, noses and mouths. Future work will seek to address the issues of morphological operation for a few unfinished extraction results, such as combined hair and eyebrows.

Design and Implementation of Visual Information Extraction System for Education (학습용 시각 정보 인식 시스템의 설계 및 구현)

  • Shin, Hyunkyung
    • Journal of The Korean Association of Information Education
    • /
    • v.16 no.4
    • /
    • pp.483-488
    • /
    • 2012
  • As propagation of mobile smart devices is widespread, it is an observable trend that the cases of utilizing them are increasing in the school programs, and it is also anticipated that they will be very important part of the educational equipment in near future. For this reason the department of education and science technology has announced a medium and long term project on the education with smart device, which is undergoing the preparation stage, and the various academic and industrial institutes have actively produced the related research results and the application prototypes. In this paper we propose a framework on design and implementation of a visual context recognition system for educational purpose usable in the school program by utilizing a module for recognition of the texts embedded in the image captured by video camera from mobile smart device. The system proposed in this paper is consisted of the four modules, such as, image acquisition, image processing, information extraction, and knowledge representation, which are explained in details with the practical examples.

  • PDF

Smart Home Healthcare Device based on Ubiquitous Communication

  • Kim, Keun-Young;Cha, Joo-Hun;Park, Mig-Non
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2235-2239
    • /
    • 2003
  • The aim of this research is to study and develop enabling technologies for home healthcare device with ubiquitous network. The motivation of this paper is to enable healthcare in home, to development the device for smart home health care. To achieve the aim, we must develop the prototype platform based on home gateways, distributed context user interface based on UPnP and support for information sharing with high speed power line communication and mobile infra-structures. And IPv6 is the base technology of this platform. In this paper, we concern that physical health, mental health and medical emergencies is all of home healthcare. With the smart device, we evaluate the connectivity, automatic information extraction and private data exchange and event driven message. The result of this paper is demonstration of smart device for ubiquitous communication in a healthcare application such as patient monitoring device and several information services. In conclusion, home healthcare will support more healthy and easy living for a human.

  • PDF

Hiding Sensitive Frequent Itemsets by a Border-Based Approach

  • Sun, Xingzhi;Yu, Philip S.
    • Journal of Computing Science and Engineering
    • /
    • v.1 no.1
    • /
    • pp.74-94
    • /
    • 2007
  • Nowadays, sharing data among organizations is often required during the business collaboration. Data mining technology has enabled efficient extraction of knowledge from large databases. This, however, increases risks of disclosing the sensitive knowledge when the database is released to other parties. To address this privacy issue, one may sanitize the original database so that the sensitive knowledge is hidden. The challenge is to minimize the side effect on the quality of the sanitized database so that non-sensitive knowledge can still be mined. In this paper, we study such a problem in the context of hiding sensitive frequent itemsets by judiciously modifying the transactions in the database. Unlike previous work, we consider the quality of the sanitized database especially on preserving the non-sensitive frequent itemsets. To preserve the non-sensitive frequent itemsets, we propose a border-based approach to efficiently evaluate the impact of any modification to the database during the hiding process. The quality of database can be well maintained by greedily selecting the modifications with minimal side effect. Experiments results are also reported to show the effectiveness of the proposed approach.