• Title/Summary/Keyword: Image Media

Search Result 3,194, Processing Time 0.028 seconds

A Network Adaptive SVC Streaming Protocol for Improving Video Quality (비디오 품질 향상을 위한 네트워크 적응적인 SVC 스트리밍 프로토콜)

  • Kim, Jong-Hyun;Koo, Ja-Hon;Chung, Kwang-Sue
    • Journal of KIISE:Information Networking
    • /
    • v.37 no.5
    • /
    • pp.363-373
    • /
    • 2010
  • The existing QoS mechanisms for video streaming are short of the consideration for various user environments and the characteristic of streaming applying programs. In order to overwhelm this problem, studies on the video streaming protocols exploiting scalable video coding (SVC), which provide spatial, temporal, and qualitative scalability in video coding, are progressing actively. However, these protocols also have the problem to deepen network congestion situation, and to lower fairness between other traffics, as they are not equipped with congestion control mechanisms. SVC based streaming protocols also have the problem to overlook the property of videos encoded in SVC, as the protocols transmit the streaming simply by extracting the bitstream which has the maximum bit rate within available bandwidth of a network. To solve these problems, this study suggests TCP-friendly network adaptive SVC streaming(T-NASS) protocol which considers both network status and SVC bitstream property. T-NASS protocol extracts the optimal SVC bitstream by calculating TCP-friendly transmission rate, and by perceiving the network status on the basis of packet loss rate and explicit congestion notification(ECN). Through the performance estimation using an ns-2 network simulator, this study identified T-NASS protocol extracts the optimal bitstream as it uses TCP-friendly transmission property and perceives the network status, and also identified the video image quality transmitted through T-NASS protocol is improved.

A Study of Children's Statements in sexual violence cases of children less than the age of 13 -Focusing on video-recorded hearsay evidence- (13세미만 아동성폭력 재판에서의 아동진술연구 -영상매체를 통한 전문 증거를 중심으로-)

  • Park, Yeon Ju;Kim, Jung Woo
    • Journal of the Korean Society of Child Welfare
    • /
    • no.55
    • /
    • pp.87-111
    • /
    • 2016
  • This study aimed to examine how video-recorded hearsay statements are taken in trial with regard to testimony of children less than the age of 13 in terms of children's rights, and to assess policy implications for the purpose of improving the current system. This study analyzed the precedents in accordance with their facts and contents. The analysis of the contents dealt with the main issues of trials concerning the sexual violence of children less than the age of 13. Specifically, This study selected precedents dealing with video-recorded hearsay statements, which are children's indirect statement, as core legal issues; examined the credibility(probative power) and admissibility of video-recorded statements; and prepared systemic alternatives in accordance with the United Nations Convention on the Rights of the Child, the international standards for the protection of children's rights. As a result, this study proposed creating and utilizing indicators to assess evidence admissibility and the credibility of video-recoded statements in trial, thus reducing judgement through judges' discretion. Also proposed are new regulations with regard to cross-examination coverage of the hearsay statement of a child in a sexual violence trial of concerning children less than the age of 13. This study suggests an improvement in legal policies, based given that children's rights are more vulnerable than those of adults in trial. Nevertheless, this study is limited in that it selected and reviewed only among precedents that are in the public record.

ROUTE/DASH-SRD based Point Cloud Content Region Division Transfer and Density Scalability Supporting Method (포인트 클라우드 콘텐츠의 밀도 스케일러빌리티를 지원하는 ROUTE/DASH-SRD 기반 영역 분할 전송 방법)

  • Kim, Doohwan;Park, Seonghwan;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.24 no.5
    • /
    • pp.849-858
    • /
    • 2019
  • Recent developments in computer graphics technology and image processing technology have increased interest in point cloud technology for inputting real space and object information as three-dimensional data. In particular, point cloud technology can accurately provide spatial information, and has attracted a great deal of interest in the field of autonomous vehicles and AR (Augmented Reality)/VR (Virtual Reality). However, in order to provide users with 3D point cloud contents that require more data than conventional 2D images, various technology developments are required. In order to solve these problems, an international standardization organization, MPEG(Moving Picture Experts Group), is in the process of discussing efficient compression and transmission schemes. In this paper, we provide a region division transfer method of 3D point cloud content through extension of existing MPEG-DASH (Dynamic Adaptive Streaming over HTTP)-SRD (Spatial Relationship Description) technology, quality parameters are further defined in the signaling message so that the quality parameters can be selectively determined according to the user's request. We also design a verification platform for ROUTE (Real Time Object Delivery Over Unidirectional Transport)/DASH based heterogeneous network environment and use the results to validate the proposed technology.

A Problematic Bubble Detection Algorithm for Conformal Coated PCB Using Convolutional Neural Networks (합성곱 신경망을 이용한 컨포멀 코팅 PCB에 발생한 문제성 기포 검출 알고리즘)

  • Lee, Dong Hee;Cho, SungRyung;Jung, Kyeong-Hoon;Kang, Dong Wook
    • Journal of Broadcast Engineering
    • /
    • v.26 no.4
    • /
    • pp.409-418
    • /
    • 2021
  • Conformal coating is a technology that protects PCB(Printed Circuit Board) and minimizes PCB failures. Since the defects in the coating are linked to failure of the PCB, the coating surface is examined for air bubbles to satisfy the successful conditions of the conformal coating. In this paper, we propose an algorithm for detecting problematic bubbles in high-risk groups by applying image signal processing. The algorithm consists of finding candidates for problematic bubbles and verifying candidates. Bubbles do not appear in visible light images, but can be visually distinguished from UV(Ultra Violet) light sources. In particular the center of the problematic bubble is dark in brightness and the border is high in brightness. In the paper, these brightness characteristics are called valley and mountain features, and the areas where both characteristics appear at the same time are candidates for problematic bubbles. However, it is necessary to verify candidates because there may be candidates who are not bubbles. In the candidate verification phase, we used convolutional neural network models, and ResNet performed best compared to other models. The algorithms presented in this paper showed the performance of precision 0.805, recall 0.763, and f1-score 0.767, and these results show sufficient potential for bubble test automation.

Quantification Model Development of Human Accidents on External Construction Site by Applying Probabilistic Method (확률론적 기법을 활용한 건설현장 외부 인명피해 정량화 모델 개발)

  • Ha, Sun-Geun;Kim, Tae-Hui;Son, Ki-Young;Kim, Ji-Myong;Son, Seung-Hyun
    • Journal of the Korea Institute of Building Construction
    • /
    • v.18 no.6
    • /
    • pp.611-619
    • /
    • 2018
  • The researches have only conducted regarding construction safety management and risk on interior construction site(workers) and is insufficient about the exterior construction site(third party). As a result, ordinary people who were near construction sites have injured and hold a negative view when they think about the construction industry because construction industry have been exposed to them having a high accidents rate through media. In addition, the importance of industrial disaster prevention is emphasized at this point in time, the overall safety management system should be constructed with considering construction site external(third human) for improving the negative image of the construction industry among ordinary people. Therefore, the objective of this study is to develop the quantification model of human accident utilizing the insurance claim payout occurred construction site exterior(third party). In the future, it can be used as a reference for developing the safety management checklist in construction site interior exterior and development for forecasting control system of human accident.

A Study on the Length of DMZ and MDL (비무장지대 및 군사분계선의 길이에 관한 연구)

  • KIM, Chang-Hwan
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.22 no.1
    • /
    • pp.19-27
    • /
    • 2019
  • This study is to measure the length of the Demilitarized Zone and the Military Demarcation Line(MDL) on the Korean Peninsular. For this purpose, maps of the Armistice Agreement Volume II were used. These maps are nine sheets. In order to extract the MDL shown on the map, coordinates were assigned to the scanned image maps using the georeferencing module of ArcGIS based on the sheet line coordinates. The accuracy of the extracted vectors was checked by overlaying them on the maps of the Armistice Agreement Volume II. And I tried to validate these vectors through comparative analysis with vectors extracted from Kim(2007). Vectors extracted from Kim(2007) had errors in the curvilinear parts of the MDL, but the vectors extracted from this study exactly matched the MDL in the Armistice Agreement Volume II. The measured length is 239.42km(148.77miles). This means that the expression '155mile MDL' or '248km DMZ' in papers, reports or mass media has so far been inappropriate. I think this study will be able to provide information on the exact length of the DMZ in studies related with DMZ or in policy decisions by the national and local government. However, it is deemed necessary to verify this result by national organizations such as the NGII(National Geographic Information Institute). After these verification procedures, I hope that the national government will inform the people of the exact length of DMZ and MDL.

Dual CNN Structured Sound Event Detection Algorithm Based on Real Life Acoustic Dataset (실생활 음향 데이터 기반 이중 CNN 구조를 특징으로 하는 음향 이벤트 인식 알고리즘)

  • Suh, Sangwon;Lim, Wootaek;Jeong, Youngho;Lee, Taejin;Kim, Hui Yong
    • Journal of Broadcast Engineering
    • /
    • v.23 no.6
    • /
    • pp.855-865
    • /
    • 2018
  • Sound event detection is one of the research areas to model human auditory cognitive characteristics by recognizing events in an environment with multiple acoustic events and determining the onset and offset time for each event. DCASE, a research group on acoustic scene classification and sound event detection, is proceeding challenges to encourage participation of researchers and to activate sound event detection research. However, the size of the dataset provided by the DCASE Challenge is relatively small compared to ImageNet, which is a representative dataset for visual object recognition, and there are not many open sources for the acoustic dataset. In this study, the sound events that can occur in indoor and outdoor are collected on a larger scale and annotated for dataset construction. Furthermore, to improve the performance of the sound event detection task, we developed a dual CNN structured sound event detection system by adding a supplementary neural network to a convolutional neural network to determine the presence of sound events. Finally, we conducted a comparative experiment with both baseline systems of the DCASE 2016 and 2017.

Vizrt Engine-Based Virtual Reality Graphics Algorithm A Study on the Basic Practical Training Method (Vizrt 엔진 기반 가상현실 그래픽 알고리즘과 기초 실습 교육 방식의 연구)

  • Cho, Hyun Kyung
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.3
    • /
    • pp.197-202
    • /
    • 2019
  • In the era of the fourth revolution, interest in content production using proven engines in the broadcasting sector, such as Vizrt, is growing. The new visual effects required in the 5G era are critical to content production training. Vizrt has a good production time utility and affordability for broadcast and media content. In this paper, we are going to use this to present a practical case of the theorem and application of the basic training course in the production of virtual content, and to present the basic training direction. In the introduction, the graphic algorithm analyzed and studied the characteristics and environmental factors of the Vizrt engine. In this paper, the production process was studied separately, and the work carried out through engine implementation was presented. The VS Studio Foundation was provided as a practical production case at each stage. The Vizrt engine operator process is important in graphic approach and application, and through the results of the lecture, the method of understanding and implementing algorithms for virtual reality perspective suitable for basic learning was studied. Based on practice, the research method of main theory was to create Vizrt contents specialized in 5G contents work in each sector and to implement graphic production in new areas from contents image. Through this study, we came to the conclusion of the basic training method through virtual reality content work based on Vizrt by practicing content creation according to the subject. It also proposes the effect of creating Vizrt content and the direction of building Vizrt basic training courses.

Low-complexity Local Illuminance Compensation for Bi-prediction mode (양방향 예측 모드를 위한 저복잡도 LIC 방법 연구)

  • Choi, Han Sol;Byeon, Joo Hyung;Bang, Gun;Sim, Dong Gyu
    • Journal of Broadcast Engineering
    • /
    • v.24 no.3
    • /
    • pp.463-471
    • /
    • 2019
  • This paper proposes a method for reducing the complexity of LIC (Local Illuminance Compensation) for bi-directional inter prediction. The LIC performs local illumination compensation using neighboring reconstruction samples of the current block and the reference block to improve the accuracy of the inter prediction. Since the weight and offset required for local illumination compensation are calculated at both sides of the encoder and decoder using the reconstructed samples, there is an advantage that the coding efficiency is improved without signaling any information. Since the weight and the offset are obtained in the encoding prediction step and the decoding step, encoder and decoder complexity are increased. This paper proposes two methods for low complexity LIC. The first method is a method of applying illumination compensation with offset only in bi-directional prediction, and the second is a method of applying LIC after weighted average step of reference block obtained by bidirectional prediction. To evaluate the performance of the proposed method, BD-rate is compared with BMS-2.0.1 using B, C, and D classes of MPEG standard experimental image under RA (Random Access) condition. Experimental results show that the proposed method reduces the average of 0.29%, 0.23%, 0.04% for Y, U, and V in terms of BD-rate performance compared to BMS-2.0.1 and encoding/decoding time is almost same. Although the BD-rate was lost, the calculation complexity of the LIC was greatly reduced as the multiplication operation was removed and the addition operation was halved in the LIC parameter derivation process.

An Empirical Analysis on the Operating System Update Decision Factors according to Age and Gender (연령과 성별에 따른 운영체제 업데이트 실시여부 실증분석)

  • Kim, Sunok;Lee, Mina
    • Journal of the Korean Data Analysis Society
    • /
    • v.20 no.6
    • /
    • pp.3117-3126
    • /
    • 2018
  • The operating system update is a basic step to maintain a safe internet use environment. This study analyzed whether the implementation of the operating system update was related to gender and age group during the violation accident prevention act in relation to information protection on the internet, and tried to verify the validity of these factors by analyzing the influence of gender and age group. In this study, logistic regression analysis was conducted based on the information security survey data surveyed by the Korea Internet & Security Agency in 2016. As a result, gender and age were surveyed as factors related to the implementation of operating system updates. As a result of analyzing the impact on the implementation of operating system updates by gender, it is estimated that the odds are 0.419 times higher for women than for men. According to the analysis of the operating system update by age group based on the 50s, which is a vulnerable group of information, the result is that the odds are 13.266 times higher in the 20s than the 50s.