• Title/Summary/Keyword: binary processing

Search Result 730, Processing Time 0.026 seconds

Skew Correction of Document Images using Edge (에지를 이용한 문서영상의 기울기 보정)

  • Ju, Jae-Hyon;Oh, Jeong-Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.7
    • /
    • pp.1487-1494
    • /
    • 2012
  • This paper proposes an algorithm detecting the skew of the degraded as well as the clear document images using edge and correcting it. The proposed algorithm detects edges in a character region selected by image complexity and generates projection histograms by projecting them to various directions. And then it detects the document skew by estimating the edge concentrations in the histograms and corrects the skewed document image. For the fast skew detection, the proposed algorithm uses downsampling and 3 step coarse-to-fine searching. In the skew detection of the clear and the degraded images, the maximum and the average detection errors in the proposed algorithm are about 50% of one in a conventional similar algorithm and the processing time is reduced to about 25%. In the non-uniform luminance images acquired by a mobile device, the conventional algorithm can't detect skews since it can't get valid binary images, while the proposed algorithm detect them with the average detection error of 0.1o or under.

Electrical Characterization of Amorphous Zn-Sn-O Transistors Deposited through RF-Sputtering

  • Choi, Jeong-Wan;Kim, Eui-Hyun;Kwon, Kyeong-Woo;Hwang, Jin-Ha
    • Proceedings of the Korean Vacuum Society Conference
    • /
    • 2014.02a
    • /
    • pp.304.1-304.1
    • /
    • 2014
  • Flat-panel displays have been growing as an essential everyday product in the current information/communication ages in the unprecedented speed. The forward-coming applications require light-weightness, higher speed, higher resolution, and lower power consumption, along with the relevant cost. Such specifications demand for a new concept-based materials and applications, unlike Si-based technologies, such as amorphous Si and polycrystalline Si thin film transistors. Since the introduction of the first concept on the oxide-based thin film transistors by Hosono et al., amorphous oxide thin film transistors have been gaining academic/industrial interest, owing to the facile synthesis and reproducible processing despite of a couple of shortcomings. The current work places its main emphasis on the binary oxides composed of ZnO and SnO2. RF sputtering was applied to the fabrication of amorphous oxide thin film devices, in the form of bottom-gated structures involving highly-doped Si wafers as gate materials and thermal oxide (SiO2) as gate dielectrics. The physical/chemical features were characterized using atomic force microscopy for surface morphology, spectroscopic ellipsometry for optical parameters, X-ray diffraction for crystallinity, and X-ray photoelectron spectroscopy for identification of chemical states. The combined characterizations on Zn-Sn-O thin films are discussed in comparison with the device performance based on thin film transistors involving Zn-Sn-O thin films as channel materials, with the aim to optimizing high-performance thin film transistors.

  • PDF

BTC employing a Quad Tree Technique for Image Data Compression (QUAD TREE를 이용한 BTC에서의 영상데이타 압축)

  • 백인기;김해수;조성환;이근영
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.13 no.5
    • /
    • pp.390-399
    • /
    • 1988
  • A conventional BTC has the merit of real time processing and simple computation, but has the problem that its compression rate is low. In this paper, a modified BTC using the Quad Tree which is frequently used in binary image is proposed. The method results in the low compression rate by decreasing the total number of subblocks by mean of making the size of a subblock large in the small variation area of graty level and the size af a subblock small in the large variation area of gary level. For the effective transmission of bit plane, the Huffman run-lengh code for the large size of a subblock and the lookup table for tha small size of a subblock are used. The proposed BTC method show the result of coding 256 level image at the average data rate of about 0.8 bit/pixel.

  • PDF

Implementation of an Automatic Door Lock System Using DTMF Signal of a Mobile Phone (모바일 단말기의 DTMF 신호를 이용한 자동 도어락 시스템 구현)

  • Bae Ki-Won;Yang Doo-Yeong
    • The Journal of the Korea Contents Association
    • /
    • v.6 no.1
    • /
    • pp.8-13
    • /
    • 2006
  • In this thesis, an automatic door lock system using a dual tone multiple frequency(DTMF) signal generated as pushing the key button of mobile phone is proposed and implemented. This system consists of a transmitter module and a receiver module for processing the DTMF signal of mobile phone. The DTMF signal of mobile phone connected with ear-phone jack enter into the input terminal of DTMF receiver and those are encoded by a code-converter with 4-bits binary format in the DTMF receiver. The encoded output signals are transmitted to the amplitude shift keying(ASK) modulator of transmitter module and the modulated ASK signals which are converted into radio frequency(RF) signals propagate in a free space. The RF signals passed through a free space are demodulated by the ASK demodulator of receiver module and the demodulated ASK signals are sent to a micro-controller unit(MCU). The output signals processed by the MCU are compared with the secreted identification number which is prerecorded in a microprocessor and are transferred to a power relay. If the result is the same, the automatic door lock system opens a door. In the opposite case, it maintains closing the door. The implemented automatic door lock system operates well in mobile environments.

  • PDF

Study on the Development of Auto-classification Algorithm for Ginseng Seedling using SVM (Support Vector Machine) (SVM(Support Vector Machine)을 이용한 묘삼 자동등급 판정 알고리즘 개발에 관한 연구)

  • Oh, Hyun-Keun;Lee, Hoon-Soo;Chung, Sun-Ok;Cho, Byoung-Kwan
    • Journal of Biosystems Engineering
    • /
    • v.36 no.1
    • /
    • pp.40-47
    • /
    • 2011
  • Image analysis algorithm for the quality evaluation of ginseng seedling was investigated. The images of ginseng seedling were acquired with a color CCD camera and processed with the image analysis methods, such as binary conversion, labeling, and thinning. The processed images were used to calculate the length and weight of ginseng seedlings. The length and weight of the samples could be predicted with standard errors of 0.343 mm, and 0.0214 g respectively, $R^2$ values of 0.8738 and 0.9835 respectively. For the evaluation of the three quality grades of Gab, Eul, and abnormal ginseng seedlings, features from the processed images were extracted. The features combined with the ratio of the lengths and areas of the ginseng seedlings efficiently differentiate the abnormal shapes from the normal ones of the samples. The grade levels were evaluated with an efficient pattern recognition method of support vector machine analysis. The quality grade of ginseng seedling could be evaluated with an accuracy of 95% and 97% for training and validation, respectively. The result indicates that color image analysis with support vector machine algorithm has good potential to be used for the development of an automatic sorting system for ginseng seedling.

A Semi-fragile Image Watermarking Scheme Exploiting BTC Quantization Data

  • Zhao, Dongning;Xie, Weixin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.4
    • /
    • pp.1499-1513
    • /
    • 2014
  • This paper proposes a novel blind image watermarking scheme exploiting Block Truncation Coding (BTC). Most of existing BTC-based watermarking or data hiding methods embed information in BTC compressed images by modifying the BTC encoding stage or BTC-compressed data, resulting in watermarked images with bad quality. Other than existing BTC-based watermarking schemes, our scheme does not really perform the BTC compression on images during the embedding process but uses the parity of BTC quantization data to guide the watermark embedding and extraction processes. In our scheme, we use a binary image as the original watermark. During the embedding process, the original cover image is first partitioned into non-overlapping $4{\times}4$ blocks. Then, BTC is performed on each block to obtain its BTC quantized high mean and low mean. According to the parity of high mean and the parity of low mean, two watermark bits are embedded in each block by modifying the pixel values in the block to make sure that the parity of high mean and the parity of low mean in the modified block are equal to the two watermark bits. During the extraction process, BTC is first performed on each block to obtain its high mean and low mean. By checking the parity of high mean and the parity of low mean, we can extract the two watermark bits in each block. The experimental results show that the proposed watermarking method is fragile to most image processing operations and various kinds of attacks while preserving the invisibility very well, thus the proposed scheme can be used for image authentication.

Adaptive thresholding for two-dimensional barcode images using two thresholds and the integral image (이중 문턱 값과 적분영상을 이용한 2차원 바코드 영상의 적응적 이진화)

  • Lee, Yeon-Kyung;Yoo, Hoon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.11
    • /
    • pp.2453-2458
    • /
    • 2012
  • In this paper, we propose an adaptive thresholding method to binarize two-dimensional barcode images. Adaptive thresholding methods that minimize light effects convert an original image into a binary image. The methods are applied to document image binarization. The methods, however, have problems of determining box size used in adaptive thresholding. thus, they inappropriate to use in recognition of two-dimensional barcode images. To overcome the problem, we analysis the problem and propose a new adaptive threshold method using the integral image. To show the effectiveness of our method, we compared our method with the well-known existing methods in terms of visual quality and processing time. The experimental result indicates that the proposed method is superior to the existing method.

Lung and Airway Segmentation using Morphology Information and Spline Interpolation in Lung CT Image (흉부 CT 영상의 형태학적 정보 및 Spline 보간법을 이용한 폐 및 기관지 분할 알고리즘)

  • Cho, Joon-Ho;Kim, Jung-Chul
    • Journal of Broadcast Engineering
    • /
    • v.18 no.5
    • /
    • pp.702-712
    • /
    • 2013
  • In this paper, we proposed an algorithm that extracts the airway and lung without loss of information in spite of the pulmonary vessel and nodules of the chest wall in the chest CT images. We use a mask image in order to improve the performance and to save processing time of airway and lung segmentation. In the second step, by converting left and right lungs to binary image using the morphological information, we have removed the solitary pulmonary nodule to identify the value of the threshold lung and the chest wall. The last step is to connect the outer shell of the lung with cubic Spline interpolation by adding the perfect pixel and computing the distance of the removed part. Experimental results using Matlab verified that the proposed method could overcome the drawbacks of the conventional methods.

Research of Semantic Considered Tree Mining Method for an Intelligent Knowledge-Services Platform

  • Paik, Juryon
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.5
    • /
    • pp.27-36
    • /
    • 2020
  • In this paper, we propose a method to derive valuable but hidden infromation from the data which is the core foundation in the 4th Industrial Revolution to pursue knowledge-based service fusion. The hyper-connected societies characterized by IoT inevitably produce big data, and with the data in order to derive optimal services for trouble situations it is first processed by discovering valuable information. A data-centric IoT platform is a platform to collect, store, manage, and integrate the data from variable devices, which is actually a type of middleware platforms. Its purpose is to provide suitable solutions for challenged problems after processing and analyzing the data, that depends on efficient and accurate algorithms performing the work of data analysis. To this end, we propose specially designed structures to store IoT data without losing the semantics and provide algorithms to discover the useful information with several definitions and proofs to show the soundness.

Characterization of Physicochemical Properties of Ferulic Acid

  • Sohn, Young-Taek;Oh, Jin-Hee
    • Archives of Pharmacal Research
    • /
    • v.26 no.12
    • /
    • pp.1002-1008
    • /
    • 2003
  • Ferulic acid (3-methoxy, 4-hydroxy cinnamic acid) is a flavoid component possessing antioxidant property. The compound is currently under development as a new drug candidate for the treatment of the dementia. The objective of this preformulation study was to determine the physicochemical properties of ferulic acid. The n-octanol to water partition coefficients of ferulic acid were 0.375 and 0.489 at the pHs of 3 and 10, respectively. Accelerated stability study for ferulic acid indicated that the t 90 value for the drug was estimated to be 459 days at $25^{\circ}C$. Ferulic acid was also found to be unstable under the relative humidity of more than 76%, probably because of the hygroscopic nature of the drug. In order to study compatibility of ferulic acid with typical excipients, potential change in differential scanning calorimetry spectrum was studied in 1: 1 binary mixtures of ferulic acid and typical pharmaceutical excipients (e.g., Aerosil, Avicel, CMC, Eudragit, lactose, PEG, PVP, starch and talc). Avicel, CMC, PVP and starch were found to be incompatible with ferulic acid, indicating the addition of these excipients may complicate the manufacturing of the formulation for the drug. Particle size distribution of ferulic acid powder was in the size range of 10-190 $\mu$m with the mean particle size of 61 $\mu$m. The flowability of ferulic acid was apparently inadequate, indicating the granulation may be necessary for the processing of the drug to solid dosage forms. Two polymorphic forms were obtained by recrystallization from various solvents used in formulation. New polymorphic form of ferulic acid, Form II, was obtained by recrystallization from 1,4-dioxane. The equilibrium solubility for Form I was approximately twice of that for Form II. The dissolution rate of Form II was higher than that of Form I in the early phase (<6 min). Therefore, these physicochemical information has to be taken in the consideration for the formulation of ferulic acid.