• Title/Summary/Keyword: JMIS

Search Result 294, Processing Time 0.018 seconds

Color Analysis for the Quantitative Aesthetics of Qiong Kiln Ceramics

  • Wang, Fei;Cha, Hang;Leng, Lu
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.97-106
    • /
    • 2020
  • The subjective experience would degrade the current artificial artistic aesthetic analysis. Since Qiong kiln ceramics have a long history and occupy a very important position in ceramic arts, we employed computer-aided technologies to quickly automatically accurately and quantitatively process a large number of Qiong kiln ceramic images and generate the detailed statistical data. Because the color features are simple and significant visual characteristics, the color features of Qiong kiln ceramics are analyzed for the quantitative aesthetics. The Qiong kiln ceramic images are segmented with GrabCut algorithm. Three moments (1st-order, 2nd-order, and 3rd-order) are calculated in two typical color spaces, namely RGB and HSV. The discrimination powers of the color features are analyzed according to various dynasties (Tang Dynasty, Five Dynasties, Song Dynasty) and various utensils (Pot, kettle, bowl), which are helpful to the selection of the discriminant color features among various dynasties and utensils. This paper is helpful to promoting the quantitative aesthetic research of Qiong kiln ceramics and is also conducive to the research on the aesthetics of other ceramics.

Complex ESP Systems Proposal based on Pump Syringe and Electronically injector Modules for Medical Application

  • HAMROUNI, Chafaa
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.175-188
    • /
    • 2020
  • The paper focuses on conception and development of complex systems composed mainly by a pump syringe subsystem and an electronically injector that facilitates patients saving data operation for medical staff use. We successfully developed conventional approaches for medical system staff requirements, such as system boundary conditions. Decisions at a given level are studied. We propose a complex system architecture, based mainly on patients collected data and ordered stepper injection parameters. System is successfully simulated and prototyped. Design and implement tests are accomplished, the proposed system ensures both the electric syringe pump and the electric injector operation. In addition, this new system introduces several additional options as patient database development and automation injection operation. Development and software operating tests to create a visualization control interface are validated. The solution performs syringe function and electronic injector. User can manage a syringe in two C modes of technology. We propose a program composed of two linked parts. If an error such radiologist bad target selection is made, an image with lower intrinsic quality emerges. Developed Shoot syringe different electronic cards are simulated and prototyped, in addition, maps are driven, prototype. All tests results are accomplished.

A Reliability Verification of Screening Time Prediction Reporting of 'Cine-Hangeul'

  • Jeon, Byoung-Won
    • Journal of Multimedia Information System
    • /
    • v.7 no.2
    • /
    • pp.141-146
    • /
    • 2020
  • Cine-Hangeul is a program that can predict the running time of a movie based on the screenplay before production. This paper seeks to verify the prediction reporting function of Cine-Hangeul, which is the standard Korean screenplay format. Moreover, this paper presents a method to increase the accuracy of the Cine-Hangeul reporting function. The objective of this paper is to offer a correction method based on scientific evidence because the current Cine-Hangeul reporting function has many errors. The verification process for five scenarios and movies confirmed that the default setting value of Cine- Hangeul's screening time prediction reporting was many errors. Cine-Hangeul analyzes the amount of textual information to predict the time of the scene and the time of the dialogue and helps predict the total time of the movie. Therefore, if a certain amount of text information is not available, the accuracy is unreliable. The current Cine-Hangeul prediction report confirms that the efficiency is high when the scenario volume is about 90 to 100 pages. As a result, prediction of screening time by Cine-Hangeul, a Korean scenario standard format program, confirmed the verification that it could secure the same level of reliability as the actual screening time by correcting the reporting settings. This verification also affirms that when applying about 50 percent of the basic set of screening time reporting, it is almost identical to the screening time.

New Approach to Two-wheeler Detection using Correlation Coefficient based on Histogram of Oriented Gradients

  • Lee, Yeunghak;Shim, Jaechang
    • Journal of Multimedia Information System
    • /
    • v.3 no.4
    • /
    • pp.119-128
    • /
    • 2016
  • This study aims to suggest a new algorithm for detecting two-wheelers on road that have various shapes according to the viewing angle for vision based intelligent vehicles. This article describes a new approach to two-wheelers detection algorithm riding on people based on modified Histogram of Oriented Gradients (HOG) using correlation coefficient (CC). The CC between two local area variables, in which one is the person riding a bike and other is its background, can represent correlation relation. First, we extract edge vectors using HOG which includes gradient information and differential magnitude as cell based. And then, the value, which is calculated by the CC between the area of each cell and one of two-wheelers, can be extracted as the weighting factor in process for normalizing the modified HOG cell. This paper applied the Adaboost algorithm to make a strong classification from weak classification. In this experiment, we can get the result that the detection rate of the proposed method is higher than that of the traditional method.

Analyzing Effective of Activation Functions on Recurrent Neural Networks for Intrusion Detection

  • Le, Thi-Thu-Huong;Kim, Jihyun;Kim, Howon
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.91-96
    • /
    • 2016
  • Network security is an interesting area in Information Technology. It has an important role for the manager monitor and control operating of the network. There are many techniques to help us prevent anomaly or malicious activities such as firewall configuration etc. Intrusion Detection System (IDS) is one of effective method help us reduce the cost to build. The more attacks occur, the more necessary intrusion detection needs. IDS is a software or hardware systems, even though is a combination of them. Its major role is detecting malicious activity. In recently, there are many researchers proposed techniques or algorithms to build a tool in this field. In this paper, we improve the performance of IDS. We explore and analyze the impact of activation functions applying to recurrent neural network model. We use to KDD cup dataset for our experiment. By our experimental results, we verify that our new tool of IDS is really significant in this field.

Breast Mass Classification using the Fundamental Deep Learning Approach: To build the optimal model applying various methods that influence the performance of CNN

  • Lee, Jin;Choi, Kwang Jong;Kim, Seong Jung;Oh, Ji Eun;Yoon, Woong Bae;Kim, Kwang Gi
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.97-102
    • /
    • 2016
  • Deep learning enables machines to have perception and can potentially outperform humans in the medical field. It can save a lot of time and reduce human error by detecting certain patterns from medical images without being trained. The main goal of this paper is to build the optimal model for breast mass classification by applying various methods that influence the performance of Convolutional Neural Network (CNN). Google's newly developed software library Tensorflow was used to build CNN and the mammogram dataset used in this study was obtained from 340 breast cancer cases. The best classification performance we achieved was an accuracy of 0.887, sensitivity of 0.903, and specificity of 0.869 for normal tissue versus malignant mass classification with augmented data, more convolutional filters, and ADAM optimizer. A limitation of this method, however, was that it only considered malignant masses which are relatively easier to classify than benign masses. Therefore, further studies are required in order to properly classify any given data for medical uses.

Design of Data Center Environmental Monitoring System Based On Lower Hardware Cost

  • Nkenyereye, Lionel;Jang, Jongwook
    • Journal of Multimedia Information System
    • /
    • v.3 no.3
    • /
    • pp.63-68
    • /
    • 2016
  • Environmental downtime produces a significant cost to organizations and makes them unable to do business because what happens in the data center affects everyone. In addition, the amount of electrical energy consumed by data centers increases with the amount of computing power installed. Installation of physical Information Technology and facilities related to environmental concerns, such as monitoring temperature, humidity, power, flood, smoke, air flow, and room entry, is the most proactive way to reduce the unnecessary costs of expensive hardware replacement or unplanned downtime and decrease energy consumed by servers. In this paper, we present remote system for monitoring datacenter implementing using open-source hardware platforms; Arduino, Raspberry Pi, and the Gobetwino. The sensed data displayed through Arduino are transferred using Gobetwino to the nearest host server such as temperature, humidity and distance every time an object hitting another object or a person coming in entrance. The raspberry Pi records the sensed data at the remote location. The objective of collecting temperature and humidity data allows monitoring of the server's health and getting alerts if things start to go wrong. When the temperature hits $50^{\circ}C$, the supervisor at remote headquarters would get a SMS, and then they would take appropriate actions to reduce electrical costs and preserve functionality of servers in data centers.

Framework for assessing responsiveness to personal data breaches based on Capture-the-Flag

  • Oh, Sangik;Kim, Byung-Gyu;Park, Namje
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.215-220
    • /
    • 2020
  • Many state agencies and companies collect personal data for the purpose of providing public services and marketing activities and use it for the benefit and results of the organization. In order to prevent the spread of COVID-19 recently, personal data is being collected to understand the movements of individuals. However, due to the lack of technical and administrative measures and internal controls on collected personal information, errors and leakage of personal data have become a major social issue, and the government is aware of the importance of personal data and is promoting the protection of personal information. However, theory-based training and document-based intrusion prevention training are not effective in improving the capabilities of the privacy officer. This study analyzes the processing steps and types of accidents of personal data managed by the organization and describes measures against personal data leakage and misuse in advance. In particular, using Capture the Flag (CTF) scenarios, an evaluation platform design is proposed to respond to personal data breaches. This design was proposed as a troubleshooting method to apply ISMS-P and ISO29151 indicators to reflect the factors and solutions to personal data operational defects and to make objective measurements.

Fully Analog ECG Baseline Wander Tracking and Removal Circuitry using HPF Based R-peak Detection and Quadratic Interpolation

  • Nazari, Masoud;Rajeoni, Alireza Bagheri;Lee, Kye-Shin
    • Journal of Multimedia Information System
    • /
    • v.7 no.3
    • /
    • pp.231-238
    • /
    • 2020
  • This work presents a fully analog baseline wander tracking and removal circuitry using high-pass filter (HPF) based R-peak detection and quadratic interpolation that does not require digital post processing, thus suitable for compact and low power long-term ECG monitoring devices. The proposed method can effectively track and remove baseline wander in ECG waveforms corrupted by various motion artifacts, whereas minimizing the loss of essential features including the QRS-Complex. The key component for tracking the baseline wander is down sampling the moving average of the corrupted ECG waveform followed by quadratic interpolation, where the R-peak samples that distort the baseline tracking are excluded from the moving average by using a HPF based approach. The proposed circuit is designed using CMOS 0.18-㎛ technology (1.8V supply) with power consumption of 19.1 ㎼ and estimated area of 15.5 ㎟ using a 4th order HPF and quadratic interpolation. Results show SNR improvement of 10 dB after removing the baseline wander from the corrupted ECG waveform.

Twitter Crawling System

  • Ganiev, Saydiolim;Nasridinov, Aziz;Byun, Jeong-Yong
    • Journal of Multimedia Information System
    • /
    • v.2 no.3
    • /
    • pp.287-294
    • /
    • 2015
  • We are living in epoch of information when Internet touches all aspects of our lives. Therefore, it provides a plenty of services each of which benefits people in different ways. Electronic Mail (E-mail), File Transfer Protocol (FTP), Voice/Video Communication, Search Engines are bright examples of Internet services. Between them Social Network Services (SNS) continuously gain its popularity over the past years. Most popular SNSs like Facebook, Weibo and Twitter generate millions of data every minute. Twitter is one of SNS which allows its users post short instant messages. They, 100 million, posted 340 million tweets per day (2012)[1]. Often big amount of data contains lots of noisy data which can be defined as uninteresting and unclassifiable data. However, researchers can take advantage of such huge information in order to analyze and extract meaningful and interesting features. The way to collect SNS data as well as tweets is handled by crawlers. Twitter crawler has recently emerged as a great tool to crawl Twitter data as well as tweets. In this project, we develop Twitter Crawler system which enables us to extract Twitter data. We implemented our system in Java language along with MySQL. We use Twitter4J which is a java library for communicating with Twitter API. The application, first, connects to Twitter API, then retrieves tweets, and stores them into database. We also develop crawling strategies to efficiently extract tweets in terms of time and amount.