• Title/Summary/Keyword: Function Embedding

Search Result 115, Processing Time 0.024 seconds

Trends of Full 3D Human Reconstruction Technology Based on Image (이미지 기반 완전 3D 인간 복원 기술 동향)

  • Song, Dae-Young;Lee, HeeKyung;Seo, Jeongil;Cho, Donghyeon
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2022.11a
    • /
    • pp.106-108
    • /
    • 2022
  • 이미지 기반 3D 형상 복원에 있어서, 이미지에 보이지 않는 폐색(Occlusion) 영역 부분에 대한 정보가 손실되므로 완전한 복원에 어려움이 있으며, 세밀한 텍스쳐(Texture) 표현이 이루어지지 않고 심한 평활화(Smoothing)나 고립된 노이즈 메쉬(Isolated Noise Mesh) 등 구조적 훼손이 발생한다. 주로 깊은 신경망을 이용하여, 음함수(Implicit Function) 기반 방법은 사전훈련이 완료된 보조 신경망들을 전면부에 배치하거나, Hourglass 등 임베딩(Embedding) 아키텍처를 추가하거나, 또는 표면 법선(Surface Normal)과 같은 환시(Hallucination)를 생성하여 신경망에 입력하기도 한다. 이 논문에서는, 인물의 이미지를 입력받아 색상, 머리카락 및 의상을 포함하는 완전 3D 인간 복원 기술들을 조망해본다.

  • PDF

A Study on the Information Reversibility of Quantum Logic Circuits (양자 논리회로의 정보 가역성에 대한 고찰)

  • Park, Dong-Young
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.12 no.1
    • /
    • pp.189-194
    • /
    • 2017
  • The reversibility of a quantum logic circuit can be realized when two reversible conditions of information reversible and energy reversible circuits are satisfied. In this paper, we have modeled the computation cycle required to recover the information reversibility from the multivalued quantum logic to the original state. For modeling, we used a function embedding method that uses a unitary switch as an arithmetic exponentiation switch. In the quantum logic circuit, if the adjoint gate pair is symmetric, the unitary switch function shows the balance function characteristic, and it takes 1 cycle operation to recover the original information reversibility. Conversely, if it is an asymmetric structure, it takes two cycle operations by the constant function. In this paper, we show that the problem of 2-cycle restoration according to the asymmetric structure when the hybrid MCT gate is realized with the ternary M-S gate can be solved by equivalent conversion of the asymmetric gate to the gate of the symmetric structure.

A Digital Image Watermarking Scheme using ElGamal Function (ElGarnal함수를 사용하는 디지털 이미지 워터마킹 기법)

  • Lee, Jean-Ho;Kim, Tai-Yun
    • The KIPS Transactions:PartC
    • /
    • v.9C no.1
    • /
    • pp.1-8
    • /
    • 2002
  • Digital image watermarking is a technique for the purpose of protecting the ownership of the image by embedding proprietary watermarks in a digital image. It is required for the digital image watermarking scheme to pursue the robustness against water marking attacks and the perceptual Invisibility more than usual in steganography area, to guarantee not a hidden watermarking algorithm but the publicity of water-marking algorithm details and hidden use of key, which can protect the unauthorized user access from detection. In this paper we propose a new copyright watermarking scheme, which is barred on one-way hash functions using ElGamal functions and modular operations. ElGamal functions are widely used in cryptographic systems. Our watermarking scheme is robust against LSB(least significant bit) attacks and gamma correction attack, and also perceptually invisible. We demonstrate the characteristics of our proposed watermarking scheme through experiments. It is necessary to proceed as the future work the algorithm of achieving at the same time both the pseudo-randomness for the steno-key generation and the asymmetric-key generation.

Measured Return Loss and Predicted Interference Level of PCB Integrated Filtering Antenna at Millimeter-Wave

  • Lee Jae-Wook;Kim Bong-Soo;Song Myung-Sun
    • Journal of electromagnetic engineering and science
    • /
    • v.5 no.3
    • /
    • pp.140-145
    • /
    • 2005
  • In this paper, an experimental investigation for return loss and a software-based prediction for interference level of single-packaged filtering antenna composed of dielectric waveguide filter and PCB(Printed Circuit Board) slot antenna in transceiver module have been carried out with several different feeding structures in millimeter-wave regime. The implementation and embedding method of the existing air-filled waveguide filters working at millimeter-wave frequency on general PCB substrate have been described. In a view of the implementation of each components, the dielectric waveguide embedded in PCB and LTCC(Low Temparature Co-fired Ceramic) substrates has employed the via fences as a replacement with side walls and common ground plane to prevent energy leakage. The characteristics of several prototypes of filtering antenna embedded in PCB substrate are considered by comparing the wideband and transmission characteristics as a function of bent angle of transmission line connecting two components. In addition, as an essential to the packaging of transceiver module working at millimeter-wave, miniaturization technology maintaining the performances of independent components and the important problems caused by integrating and connecting the different components in different layers are described in this paper.

Prediction of Wind Power by Chaos and BP Artificial Neural Networks Approach Based on Genetic Algorithm

  • Huang, Dai-Zheng;Gong, Ren-Xi;Gong, Shu
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.1
    • /
    • pp.41-46
    • /
    • 2015
  • It is very important to make accurate forecast of wind power because of its indispensable requirement for power system stable operation. The research is to predict wind power by chaos and BP artificial neural networks (CBPANNs) method based on genetic algorithm, and to evaluate feasibility of the method of predicting wind power. A description of the method is performed. Firstly, a calculation of the largest Lyapunov exponent of the time series of wind power and a judgment of whether wind power has chaotic behavior are made. Secondly, phase space of the time series is reconstructed. Finally, the prediction model is constructed based on the best embedding dimension and best delay time to approximate the uncertain function by which the wind power is forecasted. And then an optimization of the weights and thresholds of the model is conducted by genetic algorithm (GA). And a simulation of the method and an evaluation of its effectiveness are performed. The results show that the proposed method has more accuracy than that of BP artificial neural networks (BP-ANNs).

A Secret Key Watermarking for Authentication and Integrity (인증과 무결성을 위한 비밀키 워터마킹)

  • Woo, Chan-Il;Shin, In-Chul
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.11
    • /
    • pp.3576-3583
    • /
    • 2000
  • Digital watermarks have recently been proposed for the purposes of copyright ptotechtion and autheutication for multimedia contents. A watermarking technique consists of an algorithm that incorporates a watermarking structure into an image in the spatial or frequency domains. In this paper we proposed a new watermarking method for authentication and integrity of digital images and the proposed algorithm uses the MD5 hash funiction and a symmetric key encryption algorithm. To decide the position of embedding watermark and the bit pasitionin the original image, the secret key is used as an input of the MD5 hash function. The simulation results show that the proposed algorithm has the advantage of difficulty to find positions of inserted watermarks, and keep the similar watermarked image quabty with Wong's method.

  • PDF

On-Chip Debug Architecture for Multicore Processor

  • Park, Hyeong-Bae;Xu, Jing-Zhe;Kim, Kil-Hyun;Park, Ju-Sung
    • ETRI Journal
    • /
    • v.34 no.1
    • /
    • pp.44-54
    • /
    • 2012
  • Because of the intrinsic lack of internal-system observability and controllability in highly integrated multicore processors, very restricted access is allowed for the debugging of erroneous chip behavior. Therefore, the building of an efficient debug function is an important consideration in the design of multicore processors. In this paper, we propose a flexible on-chip debug architecture that embeds a special logic supporting the debug functionality in the multicore processor. It is designed to support run-stop-type debug functions that can halt and control the execution of the multicore processor at breakpoint events and inspect the possible causes of any errors. The debug architecture consists of the following three functional components: the core debug support block, the multicore debug support block, and the debug interface and control block. By embedding this debug infrastructure, the embedded processor cores within the multicore processor can be debugged simultaneously as well as independently. The debug control is performed by employing a JTAG-based scanning operation. We apply this on-chip debug architecture to build a debugger for a prototype multicore processor and demonstrate the validity and scalability of our approach.

Casual Jacket Design Preference of Women Aged 50s-60s for Functional Clothing (기능성 의류 설계를 위한 50~60대 여성의 캐주얼 재킷 선호도)

  • Paek, Kyung-Ja;Lee, Jeong-Ran
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.35 no.2
    • /
    • pp.156-166
    • /
    • 2011
  • This study investigated the casual jacket design preferences of women aged 50s and 60s and suggested a prototype design for functional clothing. All age groups liked the casual jacket with a length between the waist and hip, a convertible collar, and a single-breasted design. Those in their 50s preferred fitted or semi-fitted casual jackets while those in their 60s preferred semi-fitted casual jackets. Although, there were significant differences between the preferred jacket designs and ready-made brand jacket designs, most brand jacket designs were casual, semi-fitted, middle-hip length, single-breasted, and with stand-rolled or convertible collars. The analysis of the sleeve styles in brand jackets showed that consumers needed designs that are more decorative. Fashion designers for senior citizens need to design elderly clothing that is comfortable, fashionable, functional, and considers a universal design for ease of clothing function. It will also make the senior citizen fashion market more appealing to consumers. To provide jacket designs for senior citizens, we suggested casual jacket designs for embedding a functional device as well as a new jacket design library for women in their 50s and 60s.

Transmission of Channel Error Information over Voice Packet (음성 패킷을 이용한 채널의 에러 정보 전달)

  • 박호종;차성호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.21 no.4
    • /
    • pp.394-400
    • /
    • 2002
  • In digital speech communications, the quality of service can be increased by speech coding scheme that is adaptive to the error rate of voice packet transmission. However, current communication protocol in cellular and internet communications does not provide the function that transmits the channel error information. To solute this problem, in this paper, new method for real-time transmission of channel error information is proposed, where channel error information is embedded in voice packet. The proposed method utilizes the pulse positions of codevector in ACELP speech codec, which results in little degradation in speech quality and low false alarm rate. The simulations with various speech data show that the proposed method meets the requirement in speech quality, detection rate, and false alarm rate.

A New Wavelet Watermarking Based on Linear Bit Expansion (선형계수확장 기반의 새로운 웨이블릿 워터마킹)

  • Piao Yong-Ri;Kim Seok-Tae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2006.05a
    • /
    • pp.167-170
    • /
    • 2006
  • This study proposes a new wavelet watermark technique based on the Linear Bit Expansion. To ensure the security of the watermark, it is Amold Transformed before embedding. Then the wavelet transformation of watermark and original images is processed. Since the size of the watermark image is a quarter of the original site, it uses linear bit-expansion to enlarge the watermark image. Lastly, watermark is inserted in a given intensity to the corresponding low frequency subbands of the wavelet-transformed images proposed in this paper. When detecting the presence of watermark, the similarity between extracted watermark and the original watermark is compared applying the F norm function.

  • PDF