• Title/Summary/Keyword: SEED Algorithm

Search Result 199, Processing Time 0.025 seconds

Automatic Liver Segmentation Method on MR Images using Normalized Gradient Magnitude Image (MR 영상에서 정규화된 기울기 크기 영상을 이용한 자동 간 분할 기법)

  • Lee, Jeong-Jin;Kim, Kyoung-Won;Lee, Ho
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.11
    • /
    • pp.1698-1705
    • /
    • 2010
  • In this paper, we propose a fast liver segmentation method from magnetic resonance(MR) images. Our method efficiently divides a MR image into a set of discrete objects, and boundaries based on the normalized gradient magnitude information. Then, the objects belonging to the liver are detected by using 2D seeded region growing with seed points, which are extracted from the segmented liver region of the slice immediately above or below the current slice. Finally, rolling ball algorithm, and connected component analysis minimizes false positive error near the liver boundaries. Our method was validated by twenty data sets and the results were compared with the manually segmented result. The average volumetric overlap error was 5.2%, and average absolute volumetric measurement error was 1.9%. The average processing time for segmenting one data set was about three seconds. Our method could be used for computer-aided liver diagnosis, which requires a fast and accurate segmentation of liver.

Effective Object Recognition based on Physical Theory in Medical Image Processing (의료 영상처리에서의 물리적 이론을 활용한 객체 유효 인식 방법)

  • Eun, Sung-Jong;WhangBo, Taeg-Keun
    • The Journal of the Korea Contents Association
    • /
    • v.12 no.12
    • /
    • pp.63-70
    • /
    • 2012
  • In medical image processing field, object recognition is usually processed based on region segmentation algorithm. Region segmentation in the computing field is carried out by computerized processing of various input information such as brightness, shape, and pattern analysis. If the information mentioned does not make sense, however, many limitations could occur with region segmentation during computer processing. Therefore, this paper suggests effective region segmentation method based on R2-map information within the magnetic resonance (MR) theory. In this study, the experiment had been conducted using images including the liver region and by setting up feature points of R2-map as seed points for 2D region growing and final boundary correction to enable region segmentation even when the border line was not clear. As a result, an average area difference of 7.5%, which was higher than the accuracy of conventional exist region segmentation algorithm, was obtained.

A Study on Security Consideration and Utilization of Domestic Encryption Algorithm for Developing Secure Smartphone Applications (안전한 스마트폰 애플리케이션 개발을 위한 보안 고려사항 및 국산암호알고리즘 적용 방안 연구)

  • Kim, Jee Yeon;Jeon, Woong Ryul;Lee, Young Sook;Kim, Mi Joo;Jung, Hyun Chul;Won, Dong Ho
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.1
    • /
    • pp.51-61
    • /
    • 2011
  • A smartphone is a mobile phone that offers more advanced computing ability and connectivity than a contemporary basic feature phone. Unlike feature phone, a smartphone allows the user to install and run more advanced applications based on a specific platform. Smartphones run complete operating system software providing a platform for application developers. A smartphone will become the default computing method for many point activities in the not-too-distant future, such as e-mail, online shopping, gaming, and even video entertainment. For smartphone that contains sensitive information and access the Internet, security is a major issue. In the 1980s, security issues were hardly noticed; however, security is a major issue for users today, which includes smart phones. Because security is much more difficult to address once deployment and implementation are underway, it should be considered from the beginning. Recently our government recognized the importance of smartphone security and published several safety tips for using the smartphone. However, theses tips are user-oriented measures. Maintaining the security of a smartphone involves the active participation of the user. Although it is a important users understand and take full advantage of the facilities afforded by smarphone, it is more important developers distribute the secure smartphone application through the market. In this paper we describe some scenarios in which user is invaded his/her privacy by smartphone stolen, lost, misplaced or infected with virus. Then we suggest the security considerations for securing smartphone applications in respect with developers. We also suggest the methods applying domestic encryption algorithms such as SEED, HIGHT and ARIA in developing secure applications. This suggested security considerations may be used by developers as well as users (especially organizations) interested in enhancing security to related security incidents for current and future use of smartphones.

Adaptive Random Testing for Integrated System based on Output Distribution Estimation (통합 시스템을 위한 출력 분포 기반 적응적 랜덤 테스팅)

  • Shin, Seung-Hun;Park, Seung-Kyu;Choi, Kyung-Hee;Jung, Ki-Hyun
    • Journal of the Korea Society for Simulation
    • /
    • v.20 no.3
    • /
    • pp.19-28
    • /
    • 2011
  • Adaptive Random Testing (ART) aims to enhance the performance of pure random testing by detecting failure region in a software. The ART algorithm generates effective test cases which requires less number of test cases than that of pure random testing. However, all ART algorithms currently proposed are designed for the tests of monolithic system or unit level. In case of integrated system tests, ART approaches do not achieve same performances as those of ARTs applied to the unit or monolithic system. In this paper, we propose an extended ART algorithm which can be applied to the integrated system testing environment without degradation of performance. The proposed approach investigates an input distribution of the unit under a test with limited number of seed input data and generates information to be used to resizing input domain partitions. The simulation results show that our approach in an integration environment could achieve similar level of performance as an ART is applied to a unit testing. Results also show resilient effectiveness for various failure rates.

Development of Multi-channel Fiber Laser and Beam Alignment Method (다채널 광섬유 레이저 및 다중 빔 정렬 기술 개발)

  • Kim, Youngchan;Ryu, Daegeon;Noh, Young-Chul
    • Korean Journal of Optics and Photonics
    • /
    • v.33 no.6
    • /
    • pp.245-251
    • /
    • 2022
  • We have developed a multi-channel fiber laser for tiled laser beam combining and a laser output array system for multi-beam alignment. The fiber laser is a master oscillator power amplifier configuration that has a common seed, a preamplifier, and a 7-channel amplifier. The output power of each channel is more than 10 W. The laser output array system is a packed cylindrical configuration for a high fill-factor, and it has capabilities for collimation and tilt control with built-in PZT. Multi-beam alignment to a target is successfully implemented using PZT controlled with a stochastic parallel gradient descent (SPGD) algorithm.

Development of Backcalculation Algorithm of Pavement System Using Matrix Solution Technique (매트릭스 해법을 이용한 포장체 각 층의 탄성계수 추정 역산알고리즘의 개발)

  • Kim, Soo Il;Lee, Kwang Ho;Park, Byung Hyun
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.14 no.3
    • /
    • pp.495-508
    • /
    • 1994
  • A backcalculation procedure to determine the layer moduli of flexible pavement structure is developed using matrix solution technique. Forward calculation computer program adopted in this backcalculation procedure is SINELA which is one of layered elastic computer programs. Data base system is used as a tool for setting initial seed moduli and depth to virtual bedrock in backcalculation procedure. The validity and applicability of the proposed backcalculation procedure are verified through various numerical model tests. From the results of comparison analysis with FPEDD1, it is found that the proposed procedure gives more efficient and accurate results.

  • PDF

Development of Datamining Roadmap and Its Application to Water Treatment Plant for Coagulant Control (데이터마이닝 로드맵 개발과 수처리 응집제 제어를 위한 데이터마이닝 적용)

  • Bae, Hyeon;Kim, Sung-Shin;Kim, Ye-Jin
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.9 no.7
    • /
    • pp.1582-1587
    • /
    • 2005
  • In coagulant control of water treatment plants, rule extraction, one of datamining categories, was performed for coagulant control of a water treatment plant. Clustering methods were applied to extract control rules from data. These control rules can be used for fully automation of water treatment plants instead of operator's knowledge for plant control. To perform fuzzy clustering, there are some coefficients to be determined and these kinds of studies have been performed over decades such as clustering indices. In this study, statistical indices were taken to calculate the number of clusters. Simultaneously, seed points were found out based on hierarchical clustering. These statistical approaches give information about features of clusters, so it can reduce computing cost and increase accuracy of clustering. The proposed algorithm can play an important role in datamining and knowledge discovery.

A two-stage cascaded foreground seeds generation for parametric min-cuts

  • Li, Shao-Mei;Zhu, Jun-Guang;Gao, Chao;Li, Chun-Wei
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5563-5582
    • /
    • 2016
  • Parametric min-cuts is an object proposal algorithm, which can be used for accurate image segmentation. In parametric min-cuts, foreground seeds generation plays an important role since the number and quality of foreground seeds have great effect on its efficiency and accuracy. To improve the performance of parametric min-cuts, this paper proposes a new framework for foreground seeds generation. First, to increase the odds of finding objects, saliency detection at multiple scales is used to generate a large set of diverse candidate seeds. Second, to further select good-quality seeds, a two-stage cascaded ranking classifier is used to filter and rank the candidates based on their appearance features. Experimental results show that parametric min-cuts using our seeding strategy can obtain a relative small pool of proposals with high accuracy.

Wavelet Image Coding Using the Significant Cluster Extraction by Morphology and the Adaptive Quantization (모폴로지에 의한 중요 클러스터 추출과 적응양자화를 이용한 웨이브릿 영상부호화)

  • 류태경;강경원;권기룡;김문수;문광석
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.2
    • /
    • pp.85-90
    • /
    • 2004
  • This paper proposes the wavelet image coding using the significant cluster extraction by morphology and the adaptive quantization. In the conventional MRWD method, the additional seed data takes large potion of the total data bits. The proposed method extracts the significant cluster using morphology to improve the coding efficiency. In addition, the adaptive quantization is proposed to reduce the number of redundant comparative operations which are indispensably occurred in the MRWD quantization. The experimental result shows that the proposed algorithm has the improved coding efficiency and computational cost while preserving superior PSNR

  • PDF

New OTP Authentication Approach based on Table Pattern Schedule (테이블 패턴 스케줄 기반 OTP 인증)

  • Balilo, Benedicto B. Jr.;Gerardo, Bobby D.;Medina, Ruji P.;Byun, Yung-Cheol
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.66 no.12
    • /
    • pp.1899-1904
    • /
    • 2017
  • This paper presents a new one-time password approach generated based on $4{\times}4$ pattern schedule. It demonstrates generation of passkey from initial seed of random codes and mapping out in table pattern schedule which will produce a new form of OTP scheme in protecting information or data. The OTP-2FA has been recognized by many organizations as a landmark to authentication techniques. OTP is the solution to the shortcomings of the traditional user name/password authentication. With the application of OTP, some have benefited already while others have had second thoughts because of some considerations like cryptographic issue. This paper presents a new method of algorithmic approach based on table schedule (grid authentication). The generation of OTP will be based on the random parameters that will be mapped out in rows and columns allowing the user to form the XY values to get the appropriate values. The algorithm will capture the values and extract the predefined characters that produce the OTP codes. This scheme can work in any information verification system to enhance the security, trust and confidence of the user.