• Title/Summary/Keyword: Information searching & coding

Search Result 73, Processing Time 0.049 seconds

Fractal Image Coding Based On Variable Block (가변 블록 기반 프랙탈 영상 부호화)

  • 노근수;조성환
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.35T no.3
    • /
    • pp.15-24
    • /
    • 1998
  • In this paper, we present new method of fractal image coding based on iterated function system(IFS) suggested by Barnsley. In previous Fractal coding using full searching algorithm, the quality of reconstructed image was better than other fractal coding method's, but it took a long time in that algorithm for searching domain blocks matched. And it is performed through linear affine transform, therefore it is difficult to approximate the complex range blocks. In this paper, using quadtree partitioning, complex blocks are divided into more smaller blocks, and simple blocks are merged to more larger blocks. So, we can got more precisely approximated range blocks and reduce the number of transformations. Hence, we have improved the compression ratio. In addition, we restrict the region of searching domains in order to reduce the searching time and coding time. Compared with full searching algorithm, we reduced coding time drastically, and quality of reconstructed image was better in terms subjective criteria. And compared with Monro's, our method is slower, but we could obtain a reconstructed image with better quality.

  • PDF

Progressive Region of Interest Coding Using the Embedded Coding Technifque (임베디드 부호화 기법을 이용한 점진적 관심영역 부호화)

  • 최호중;강의성;다나카도시히사;고성제
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.1B
    • /
    • pp.148-155
    • /
    • 2000
  • In image coding applications such as web browsing and image database searching, it is very useful to quickly view a small portion of the image with higher quality. Region of interest (ROI) coding technique provides the capability to reconstruct the ROI in advance of decompressing the rest of the image, with a smaller number of transmitted bits compared to the case where the entire image is treated with the same priority. In this paper, a progressive ROI coding method using the enbedded coder is presented, and an efficient transmission method for the ROI information. Experimental results show that the proposed progressive ROI coding technique can be effectively used for image coding applications such as web browsing and image database searching system.

  • PDF

Pattern Generation for Coding Error Detection in VHDL Behavioral-Level Designs (VHDL 행위-레벨 설계의 코딩오류 검출을 위한 패턴 생성)

  • Kim, Jong-Hyeon;Park, Seung-Gyu;Seo, Yeong-Ho;Kim, Dong-Uk
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.38 no.3
    • /
    • pp.185-197
    • /
    • 2001
  • Recently, the design method by VHDL coding and synthesis has been used widely. As the integration ratio increases, the amount design by VHDL at a time also increases so many coding errors occur in a design. Thus, lots of time and effort is dissipated to detect those coding errors. This paper proposed a method to verify the coding errors in VHDL behavioral-level designs. As the methodology, we chose the method to detect the coding error by applying the generated set of verifying patterns and comparing the responses from the error-free case(gold unit) and the real design. Thus, we proposed an algorithm to generate the verifying pattern set for the coding errors. Verifying pattern generation is peformed for each code and the coding errors are classified as two kind: condition errors and assignment errors. To generate the patterns, VHDL design is first converted into the corresponding CDFG(Control & Data Flow Graph) and the necessary information is extracted by searching the paths in CDFG. Path searching method consists of forward searching and backward searching from the site where it is assumed that coding error occurred. The proposed algorithm was implemented with C-language. We have applied the proposed algorithm to several example VHDL behavioral-level designs. From the results, all the patterns for all the considered coding errors in each design could be generated and all the coding errors were detectable. For the time to generate the verifying patterns, all the considered designed took less than 1 [sec] of CPU time in Pentium-II 400MHz environments. Consequently, the verification method proposed in this paper is expected to reduce the time and effort to verify the VHDL behavioral-level designs very much.

  • PDF

Fast Algorithms to Generate the Codebook for Vector Quantization in Image Coding (화상 벡터 양자화의 코드북 구성을 위한 고속 알고리즘)

  • 이주희;정해묵;이충웅
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.27 no.1
    • /
    • pp.105-111
    • /
    • 1990
  • In this paper, fast algorithms to generate the codebook of vector quantization in image coding, are proposed. And an efficient algorithm to guess a initial codebook, namely, binary splitting method, is proposed. We generated the initial codebook by binary splitting method and then reduced the searching time using Iterative Optimization algorithm as an alternate to the generalized Lloyd algorithm and several information from binary splitting method. And the searching time and performance can be traded off by varying the searching range. With this proposed algorithm, the computation time can be reduced by a factor of 60 Without any degradation of image quality.

  • PDF

A Study on Software Security Vulnerability Detection Using Coding Standard Searching Technique (코딩 표준 검색 기법을 이용한 소프트웨어 보안 취약성 검출에 관한 연구)

  • Jang, Young-Su
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.973-983
    • /
    • 2019
  • The importance of information security has been increasingly emphasized at the national, organizational, and individual levels due to the widespread adoption of software applications. High-safety software, which includes embedded software, should run without errors, similar to software used in the airline and nuclear energy sectors. Software development techniques in the above sectors are now being used to improve software security in other fields. Secure coding, in particular, is a concept encompassing defensive programming and is capable of improving software security. In this paper, we propose a software security vulnerability detection method using an improved coding standard searching technique. Public static analysis tools were used to assess software security and to classify the commands that induce vulnerability. Software security can be enhanced by detecting Application Programming Interfaces (APIs) and patterns that can induce vulnerability.

Zerotree Quantized Image Coding using Wavelet (웨이브렛을 이용한 제로트리 양자화 이미지 코딩기법 연구)

  • 이양원
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.05a
    • /
    • pp.211-214
    • /
    • 2002
  • Recently efficient image coding using zerotree have been proposed. In these methods, the locations of nonzero wavelet coefficient are enrolled with a tree structure, called zerotree, which ran exploit the self-similarity of the wavelet pyramid decomposition across different scales. These are very especially in low bit rate image coding. In this paper, two zerotree image rolling algorithm, EZW and SPHIT are briefly introduced, and a new zerotree searching scheme is proposed to emphasize the significance of a wavelet coefficient by its orientation as well as its scale.

  • PDF

A Study on a Searching, Extraction and Approximation-Synthesis of Transition Segment in Continuous Speech (연속음성에서 천이구간의 탐색, 추출, 근사합성에 관한 연구)

  • Lee, Si-U
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.4
    • /
    • pp.1299-1304
    • /
    • 2000
  • In a speed coding system using excitation source of voiced and unvoiced, it would be involved a distortion of speech quality in case coexist with a voiced and an unvoiced consonants in a frame. So, I propose TSIUVC(Transition Segment Including UnVoiced Consonant) searching, extraction ad approximation-synthesis method in order to uncoexistent with a voiced and unvoiced consonants in a frame. This method based on a zerocrossing rate and pitch detector using FIR-STREAK Digital Filter. As a result, the extraction rates of TSIUVC are 84.8% (plosive), 94.9%(fricative), 92.3%(affricative) in female voice, and 88%(plosive), 94.9%(fricative), 92.3%(affricative) in male voice respectively, Also, I obain a high quality approximation-synthesis waveforms within TSIUVC by using frequency information of 0.547kHz below and 2.813kHz above. This method has the capability of being applied to speech coding of low bit rate, speech analysis and speech synthesis.

  • PDF

On a Study of the Reduction of Bit Rate by the Preprocessing of PSOLA Coding Technique in the G. 723.1 Vocoder (PSOLA 전처리과정을 이용한 G.723.1 보코더의 전송률 감소에 관한 연구)

  • 장경아;조성현;배명진
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.401-404
    • /
    • 2002
  • In general, speech coding methods are classified into the following three categories: the waveform coding, the source coding and the hybrid coding. In this paper, First, the reference waveform is detected after searching the pitch period by NAMDF similarity and similarity between the reference waveform and the waveform each pitch period. It made a decision whether the waveform is compressed with the threshold of similarity. If the waveform is compressed only magnitude and pitch information is transmitted into the input of G.723.1 vocoder. Performing through the G.723.1 vocoder, the waveform is restored with the magnitude and pitch information by PSOLA synthesis method. The result of simulation with proposed algorithm has a 31% reduction of bit rate than the standard 5.3kbps G.723.1 ACELP vocoder.

  • PDF

An Image Compression Method using Zerotree (Zerotree를 이용한 영상 압축 방법)

  • 최준영;호요성
    • Proceedings of the IEEK Conference
    • /
    • 1998.10a
    • /
    • pp.851-854
    • /
    • 1998
  • Recently efficient image coding algorithms using zerotree have been proposed. In these methods, the locations of nonzero wavelet coefficients are encoded with a tree structure, called zerotree, which can exploit the self-similarity of the wavelet pyramid decomposition across different scales. These are very effective, especially in low bit rate image coding. In this paper, two zerotree image coding algorithms, EZW and SPIHT, are briefly introduced, and a new zerotree searching scheme is proposed to emphasize the significance of a wavelet coefficient by its orientations as well as its scale.

  • PDF

The Impact of the Hotel Employees' Psychological Safety and Intrinsic Motivation on Creative Process Engagement

  • Kim, Ji-Eun;Kim, Mi-Kyung
    • Culinary science and hospitality research
    • /
    • v.23 no.6
    • /
    • pp.57-69
    • /
    • 2017
  • In this quantitative research, it was enhanced to understand the impact of intrinsic motivation on creative process engagement by examining the significant role of psychological safety on intrinsic motivation. These relationships were examined by targeting the employees working full-time for five star deluxe hotels. Total number of 230 responses had been collected out of 250 cases requested and he number of 213 cases was used for the final analysis. The data were analyzed using structural equation modeling with SPSS 19.0 and AMOS 7 software program. The results suggested that psychological safety is significantly associated with intrinsic motivation. Furthermore, the hotel employees' problem identification, information searching & coding, and idea generation are affected by intrinsic motivation. That is, intrinsic motivation plays a significant role for each sub-factors of creative process engagement in the hotel industry. The theoretical and practical implications of these findings are established and related suggestion for formulating marketing strategy is well discussed.