• Title/Summary/Keyword: Run-Length

Search Result 427, Processing Time 0.021 seconds

Implementation of Parallel Volume Rendering Using the Sequential Shear-Warp Algorithm (순차 Shear-Warp 알고리즘을 이용한 병렬볼륨렌더링의 구현)

  • Kim, Eung-Kon
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.6
    • /
    • pp.1620-1632
    • /
    • 1998
  • This paper presents a fast parallel algorithm for volume rendering and its implementation using C language and MPI MasPar Programming Language) on the 4,096 processor MasPar MP-2 machine. This parallel algorithm is a parallelization hased on the Lacroute' s sequential shear - warp algorithm currently acknowledged to be the fastest sequential volume rendering algorithm. This algorithm reduces communication overheads by using the sheared space partition scheme and the load balancing technique using load estimates from the previous iteration, and the number of voxels to be processed by using the run-length encoded volume data structure.Actual performance is 3 to 4 frames/second on the human hrain scan dataset of $128\times128\times128$ voxels. Because of the scalability of this algorithm, performance of ]2-16 frames/sc.'cond is expected on the 16,384 processor MasPar MP-2 machine. It is expected that implementation on more current SIMD or MIMD architectures would provide 3O~60 frames/second on large volumes.

  • PDF

The estimation of camera calibration parameters using the properties of vanishing point at the paved and unpaved road (무한원점의 성질을 이용한 포장 및 비포장 도로에서의 카메라 교정 파라메터 추정)

  • Jeong, Jun-Ik;Jeong, Myeong-Hee;Rho, Do-Whan
    • Proceedings of the KIEE Conference
    • /
    • 2006.10c
    • /
    • pp.178-180
    • /
    • 2006
  • In general, camera calibration has to be gone ahead necessarily to estimate a position and an orientation of the object exactly using a camera. Autonomous land system in order to run a vehicle autonomously needs a camera calibration method appling a camera and various road environment. Camera calibration is to prescribe the confrontation relation between third dimension space and the image plane. It means to find camera calibration parameters. Camera calibration parameters using the paved road and the unpaved road are estimated. The proposed algorithm has been detected through the image processing after obtaining the paved road and the unpaved road. There is able to detect easily edges because the road lanes exist in the raved road. Image processing method is two. One is a method on the paved road. Image is segmentalized using open, dilation, and erosion. The other is a method on the unpaved road. Edges are detected using blur and sharpening. So it has been made use of Hough transformation in order to detect the correct straight line because it has less error than least-square method. In addition to, this thesis has been used vanishing point' principle. an algorithm suggests camera calibration method using Hough transformation and vanishing point. When the algorithm was applied, the result of focal length was about 10.7[mm] and RMS errors of rotation were 0.10913 and 0.11476 ranges. these have the stabilized ranges comparatively. This shows that this algorithm can be applied to camera calibration on the raved and unpaved road.

  • PDF

Communication-Efficient Representations for Certificate Revocation in Wireless Sensor Network (WSN에서의 효율적 통신을 위한 인증서 폐지 목록 표현 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.14C no.7
    • /
    • pp.553-558
    • /
    • 2007
  • In this paper, we introduce a set of structures and algorithms for communication efficient public key revocation in wireless sensor networks. Unlike the traditional networks, wireless sensor network is subjected to resources constraints. Thus, traditional public key revocation mechanisms such like the ordinary certificate revocation list is unsuitable to be used. This unsuitability is due to the huge size of required representation space for the different keys' identifiers and the revocation communication as the set of revoked keys grow. In this work, we introduce two communication-efficient schemes for the certificate revocation. In the first scheme, we utilize the complete subtree mechanism for the identifiers representation which is widely used in the broadcast encryption/user revocation. In the second scheme, we introduce a novel bit vector representation BVS which uses vector of relative identifiers occurrence representation. We introduce different revocation policies and present corresponding modifications of our scheme. Finally, we show how the encoding could reduce the communication overhead as well. Simulation results and comparisons are provided to show the value of our work.

Design and Implementation of ECQV Implicit Certificate (ECQV 묵시적 인증서의 설계 및 구현에 관한 연구)

  • Seong, Jeong-Gi;Kim, Eun-Gi
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.4
    • /
    • pp.744-752
    • /
    • 2017
  • ECQV implicit certificate reconstructs the public key from the certificate without validation of the signature unlike the explicit certificate. Like this, the certificate and the public key is implicitly validated when a public key is reconstructed from a certificate. Hence, ECQV implicit certificate is shorter than the explicit certificate due to be only comprised of the public key reconstruction data instead of the signature and the public key, and faster to reconstruct the public key from the certificate than validating the signature. Furthermore, ECQV is well suited for environments and application that resources such as memory and bandwidth are limited because it is shorter the key length, and faster the performance than other cipher cryptography due to be run on ECC. In this paper, we describe prerequisites of ECQV specified in the SECG SEC 4 and issuance of an implicit certificate, reconstruction of the public key from an implicit certificate. Also we designed and implemented ECQV, and measured the performance of it.

Research on the Table Vacuolization in the Document Image (문서 영상 내의 테이블 벡터화 연구)

  • Kim, U-Seong;Sim, Jin-Bo;Park, Yong-Beom;Mun, Gyeong-Ae;Ji, Su-Yeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.5
    • /
    • pp.1147-1159
    • /
    • 1996
  • In this paper. we develop an efficient algorithm which vectorize the table input for mixed document recognition system. It is necessary to separate character and line for recognizing the character in the table. For recognizing table, we have to recognize the character which is blocked by table line and develop the efficient rectorization method for table line. For vectorizing table, we develop several methods. The first method is to extract table line part using 8-dircction chaincodes. The second method is to extract horizontal and vertical lines using histogram of lines. The third one is to extract diagonal lines of table by using the cross points of horizontal and verticallines. Finally we also develop the table vectorization method which finds the regularity characteristics of horizontal and vertical lines composing table, In the paper, we sugest a regularity method for efficient table vectorization.

  • PDF

A study on RDM algorithm for document image and application to digital signature (문서화상에 대한 RDM 합성 알고리즘 및 디지틀 서명에의 응용)

  • 박일남;이대영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.12
    • /
    • pp.3056-3068
    • /
    • 1996
  • This papre presents the RDM algorithm for composition of bit. After this, we propose a digital signature scheme for facsimile document using RDM algorithm. We modify the even-odd feature in distance of changing pel between coding line and multiple reference line which have been scanned before, and run-length in coding line. The time to take in signature is reduced by spreading of signature. Non-repudiation in origin, the 3rd condition of digital signature is realized by proposed digital signature scheme. The transmitter embeds the signature secretly and tensfers it, and the receiver makes a check of any forgery on the signature and the document. This scheme is compatible with the ITU-T.4(G3 or G4 facsimile standard). The total amount of data transmitted and the quality of image are about the same to that of the original document, thus a third party does not notics signature embeded on the document.

  • PDF

Prediction of Cement Volume for Vertebroplasty Based on Imaging and Biomechanical Results

  • Lee, Sung-Jae;Tack, Gye-Rae;Lee, Seung-Yong;Jun, Bong-Jae;Lim, Do-Hyung;Shin, Jung-Woog;Kim, Jeong-Koo;Shin, Kyu-Chul
    • Journal of Mechanical Science and Technology
    • /
    • v.15 no.7
    • /
    • pp.1041-1050
    • /
    • 2001
  • Control of bone cement volume (PMMA) may be critical for preventing complications in vertebroplasty, the percutaneous injection of PMMA into vertebra. The purpose of this study was to predict the optimal volume of PMMA injection based on CT images. For this, correlation between PMMA volume and textural features of CT images was examined before and after surgery to evaluate the appropriate PMMA amount. The gray level run length analysis was used to determine the textural features of the trabecular bone. Extimation of PMMA volume was done using 3D visualization with semi-automatic segmentation on postoperative CT images. Then, finite element (FE) models were constructed based on the CT image data of patients and PMMA volume. Appropriate material properties for the trabecular bone were assigned by converting BMD to elastic modulus. Structural reinforcement due to the changes in PMMA volume and BMD was assessed in terms of axial displacement of the superior endplate. A strong correlation was found between the injected PMMA volume and the area of the intertrabecular space and that of trabecular bone calculated from the CT images (r=0.90 and -0.90, respectively). FE results suggested that vertebroplasty could effectively reinforce the osteoporotic vertebra regardless of BMD or PMMA volume. Effectiveness of additional PMMA injection tended to decrease. For patients with BMD well lower than 50mg/ml, injection of up to 30% volume of the vertebral body is recommended. However, less than 30% is recommended otherwise to avoid any complications from excessive PMMA because the strength has already reached the normal level.

  • PDF

The Vertical Distribution of Radiative Flux and Heating Rate at King Sejong Station in West Antarctica (남극 세종기지에서 복사 속 및 복사 가열률의 연직 분포)

  • Lee, Kyu-Tae;Lee, Bang-Yong;Lee, Won-Hak;Jee, Joon-Bum;Lee, Min-Kyung
    • Ocean and Polar Research
    • /
    • v.27 no.1
    • /
    • pp.87-95
    • /
    • 2005
  • The vertical profiles of radiative flux and heating rate at King Sejong Station in West Antarctica were calculated with radiative transfe model by Chou and Suarez (1999) and Chou et al (2001). To run this model, the profiles of temperature, mixing ratios of water vapor and ozone at King Sejng Station were derived from ECMWF Reanalysis data. The surface temperature and albedo were also derived from NCEP/NCAR Reanalysis and CERES data. The radiative flux strongly depends on the cloud optical path length that was calculated using the measured W-h data and model by Chou and Lee(1996). Durins the period of $2000{\sim}2001$ (12 and 18 UTC), the correlation coefficient between calculated and measured downward solar fluxes at surface was 0.90 and the coefficient for downward longwave flux was 0.61. The calculated net heating rates of surface layer decreased during the same period, the trend of which was in accordance with the decrease of measured temperature.

Research of human body information interfacing with Far infrared and application to physical therapy (Far infrared를 이용한 생체정보 인터페이싱에 대한 연구)

  • Park, Rae Joon;Kim, Jae-Yoon
    • The Journal of Korean Physical Therapy
    • /
    • v.13 no.3
    • /
    • pp.509-527
    • /
    • 2001
  • The Sun's ray is composed of Infrared(49%), Visible light(40%) and Ultra violet(11%), however the ray getting to the earth is FIR(Far infrared; 60%), IR(Infrared; 20%), and UV(Ultra Violet; 20%). Human beings has utilized FIR already from time immemorial. Hershel found out Infrared for the first time. in the Industrial Revolution the Infrared and FIR had been begun to use making products. In these days, with contemporary science FIR would be begun to clear up the implication in the human body and organic compound. IR classified by wavelength three parts NlR, MIR, FIR. There is FIR which is radiated from healthy human body the wave length is 8-l4m. The human body is composed of proteins which get easily changed by a thermal factor (about 42 $^{\circ}$C over). FIR with low temperature can deeply penetrate on the human body composed things without troublesomes, since FIR has effectively operated on the human body at low temperature (35-40 $^{\circ}$C). When FlR penetrated on the human body. it would inhibit the abnormal genes and cells expression, and then information of DNA and RNA would be reexpressed for arranging DNA and RNA abnormal state. As FlR's receptors in the body, it could be presumed that N-glycosyl linkage of purine and deoxyribose, RNA splicing process, and Heat shock protein. To take the FIR which was a optimized wavewlength and strength, at first, we induced the characteristic algorithm and the computerized programing. Then we formed that the formular of optimized FIR with physical, mathematical logic and theory. especially, Plank, Kirchhoff, Wien, Stefan-Boltzmann's logic and law. In the long run, the formular was induced with integration mathematical, since we had to know the molecular wavelength. Based on the induced formular as above, we programmed the optimized FlR radiating computerized program. In this research, we designed the eletronic circuit f3r interfacing with human body to diagnosis and treatment with FIR sensor which radiated FIR wavelength optimized.

  • PDF

An Efficient Medical Image Compression Considering Brain CT Images with Bilateral Symmetry (뇌 CT 영상의 대칭성을 고려한 관심영역 중심의 효율적인 의료영상 압축)

  • Jung, Jae-Sung;Lee, Chang-Hun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.5
    • /
    • pp.39-54
    • /
    • 2012
  • Picture Archiving and Communication System (PACS) has been planted as one of the key infrastructures with an overall improvement in standards of medical informationization and the stream of digital hospitalization in recent days. The kind and data of digital medical imagery are also increasing rapidly in volume. This trend emphasizes the medical image compression for storing large-scale medical image data. Digital Imaging and Communications in Medicine (DICOM), de facto standard in digital medical imagery, specifies Run Length Encode (RLE), which is the typical lossless data compressing technique, for the medical image compression. However, the RLE is not appropriate approach for medical image data with bilateral symmetry of the human organism. we suggest two preprocessing algorithms that detect interested area, the minimum bounding rectangle, in a medical image to enhance data compression efficiency and that re-code image pixel values to reduce data size according to the symmetry characteristics in the interested area, and also presents an improved image compression technique for brain CT imagery with high bilateral symmetry. As the result of experiment, the suggested approach shows higher data compression ratio than the RLE compression in the DICOM standard without detecting interested area in images.