• Title/Summary/Keyword: location detection

Search Result 1,591, Processing Time 0.024 seconds

Development of Trans-Admittance Scanner (TAS) for Breast Cancer Detection (유방암 검출을 위한 생계 어드미턴스 스캐너의 개발)

  • 이정환;오동인;이재상;우응제;서진근;권오인
    • Journal of Biomedical Engineering Research
    • /
    • v.25 no.5
    • /
    • pp.335-342
    • /
    • 2004
  • This paper describes a trans-admittance scanner for breast cancer detection. A FPGA-based sinusoidal waveform generator produces a constant voltage. The voltage is applied between a hand-held electrode and a scan probe placed on the breast. The scan probe contains an 8x8 array of electrodes that are kept at the ground potential. Multi-channel precision digital ammeters using the phase-sensitive demodulation technique were developed to measure the exit current from each electrode in the array. Different regions of the breast are scanned by moving the probe on the breast. We could get trans-admittance images of resistor and saline phantoms with an anomaly inside. The images provided the information on the depth and location of the anomaly. In future studies, we need to improve the accuracy through a better calibration method. We plan to test the scanner's ability to detect a cancer lesion inside the human breast.

Learning-based Detection of License Plate using SIFT and Neural Network (SIFT와 신경망을 이용한 학습 기반 차량 번호판 검출)

  • Hong, Won Ju;Kim, Min Woo;Oh, Il-Seok
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.8
    • /
    • pp.187-195
    • /
    • 2013
  • Most of former studies for car license plate detection restrict the image acquisition environment. The aim of this research is to diminish the restrictions by proposing a new method of using SIFT and neural network. SIFT can be used in diverse situations with less restriction because it provides size- and rotation-invariance and large discriminating power. SIFT extracted from the license plate image is divided into the internal(inside class) and the external(outside class) ones and the classifier is trained using them. In the proposed method, by just putting the various types of license plates, the trained neural network classifier can process all of the types. Although the classification performance is not high, the inside class appears densely over the plate region and sparsely over the non-plate regions. These characteristics create a local feature map, from which we can identify the location with the global maximum value as a candidate of license plate region. We collected image database with much less restriction than the conventional researches. The experiment and evaluation were done using this database. In terms of classification accuracy of SIFT keypoints, the correct recognition rate was 97.1%. The precision rate was 62.0% and recall rate was 50.2%. In terms of license plate detection rate, the correct recognition rate was 98.6%.

Digital watermarking algorithm for authentication and detection of manipulated positions in MPEG-2 bit-stream (MPEG-2비트열에서의 인증 및 조작위치 검출을 위한 디지털 워터마킹 기법)

  • 박재연;임재혁;원치선
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.40 no.5
    • /
    • pp.378-387
    • /
    • 2003
  • Digital watermarking is the technique that embeds invisible signalsincluding owner identification information, specific code, or pattern into multimedia data such as image, video and audio. Watermarking techniques can be classified into two groups; robust watermarking and fragile(semi-fragile) watermarking. The main purpose of the robust watermarking is the protection of copyright, whereas fragile(semi-fragile) watermarking prevents image or video data from illegal modifications. To achieve this goal watermark should survive from unintentional modifications such as random noise or compression, but it should be fragile for malicious manipulations. In this paper, an invertible semi-fragile watermarkingalgorithm for authentication and detection of manipulated location in MPEG-2 bit-stream is proposed. The proposed algorithm embeds two kinds of watermarks, which are embedded into quantized DCT coefficients. So it can be applied directly to the compressed bit-stream. The first watermark is used for authentication of video data. The second one is used for detection of malicious manipulations. It can distinguish transcodingin bit-stream domain from malicious manipulation and detect the block-wise locations of manipulations in video data. Also, since the proposed algorithm has an invertible property, recovering original video data is possible if the watermarked video is authentic.

Breast Cancer Recurrence According to Molecular Subtype

  • Shim, Hee Jin;Kim, Sung Hun;Kang, Bong Joo;Choi, Byung Gil;Kim, Hyeon Sook;Cha, Eun Suk;Song, Byung Joo
    • Asian Pacific Journal of Cancer Prevention
    • /
    • v.15 no.14
    • /
    • pp.5539-5544
    • /
    • 2014
  • Background: To evaluate the location of tumor relapse and imaging modality for detection according to the breast cancer subtype: luminal A, luminal B, HER2 positive luminal B, nonluminal HER2 positive, and triple negative. Materials and Methods: A total of 1244 patients with breast cancer with known estrogen receptor (ER), progesterone receptor (PR), Ki-67 and human epidermal growth factor receptor 2 (HER2), who underwent breast surgery from 2009 to 2012 were analyzed. Patients were classified into the following categories: luminal A (n=458), luminal B (n=241), HER2 positive luminal B (n=227), nonluminal HER2 positive (n=145) and triple negative (n=173). A total of 105 cases of relapse were detected in 102 patients: locoregional recurrence (n=46), recurrence in the contralateral breast (n=28) and distant metastasis (n=31). Comparison of proportions was used to determine the difference between subtypes. Results: Relapse rates by subtypes are as follows: luminal A 23 of 458 (5.02%), luminal B 19 of 241(7.88%), HER2 positive luminal B 15 of 227 (6.61%), nonluminal HER2 postive 19 of 145 (13.10%) and triple negative 29 of 173(16.76%). Luminal A tumors had the lowest rate of recurrence and had significantly lower recurrence rate in comparison with nonluminal HER2 postive (p=0.0017) and triple negative subtypes (p<0.0001). Compared with all other subtypes except nonluminal HER2 positive, triple negative tumors had the highest rate of tumor recurrence (p<0.01). Triple negatives were most likely to develop contralateral recurrence against all subtypes (p<0.05). Detection rate of locoregional and contralateral tumor recurrence were 28.3% on mammography (n=17/60). Conclusions: Luminal A tumors are associated with a low risk of recurrence while triple negative lesions have a high risk. In case of triple negative tumors, the contralateral breast has much more recurrence as compared with all other subtype. In terms of detection rates, breast USG was the best modality for detecting tumor recurrence, compared with other modalities (p<0.05). Subtyping of breast tumors using a molecular gene expression panel can identify patients who have increased risk of recurrence and allow prediction of locations of tumor recurrence for each subtype.

Flying Cake: An Augmented Game on Mobile Device (Flying Cake: 모바일 단말기를 이용한 실감형 게임)

  • Park, An-Jin;Jung, Kee-Chul
    • Journal of KIISE:Software and Applications
    • /
    • v.34 no.1
    • /
    • pp.79-94
    • /
    • 2007
  • In the ubiquitous computing age which uses a high quantity network, mobile devices such as wearable and hand-held ones with a small tamers and a wireless communication module will be widely used in near future. Thus, a lot of researches about an augmented game on mobile devices have been attempted recently. The existing augmented games used a traditional 'backpack' system and a pattern marker. The 'backpack' system is expensive, cumbersome and inconvenient to use, and because of the pattern marker, it is only possible to play the game in the previously installed palace. In this paper, we propose an augmented game called Flying Cake using a face region to create the virtual object(character) without the pattern marker, which manually indicates an overlapped location of the virtual object in the real world, on a small and mobile PDA instead of the cumbersome hardware. Flying Cake is an augmented shooting game. This game supplies us with two types: 1) a single player which attacks a virtual character on images captured by a camera in an outdoor physical area, 2) dual players which attack the virtual character on images which we received through a wireless LAN. We overlap the virtual character on the face region using a face detection technique, and users play Flying Cake though attacking the virtual character. Flying Cake supplies new pleasure to flayers with a new game paradigm through an interaction between the user in the physical world captured by the PDA camera and the virtual character in a virtual world using the face detection.

A study on the discriminant analysis of node deployment based on cable type Wi-Fi in indoor (케이블형 Wi-Fi 기반 실내 공간의 노드 배치 판별 분석에 관한 연구)

  • Zin, Hyeon-Cheol;Kim, Won-Yeol;Kim, Jong-Chan;Kim, Yoon-Sik;Seo, Dong-Hoan
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.40 no.9
    • /
    • pp.836-841
    • /
    • 2016
  • An indoor positioning system using Wi-Fi is essential to produce a radio map that combines the indoor space of two or more dimensions, the information of node positions, and etc. in processing for constructing the radio map, the measurement of the received signal strength indicator(RSSI) and the confirmation of node placement information counsume substantial time. Especially, when the installed wireless environment is changed or a new space is created, easy installation of the node and fast indoor radio mapping are needed to provide indoor location-based services. In this paper, to reduce the time consumption, we propose an algorithm to distinguish the straight and curve lines of a corridor section by RSSI visualization and Sobel filter-based edge detection that enable accurate node deployment and space analysis using cable-type Wi-Fi node installed at a 3 m interval. Because the cable type Wi-Fi is connected by a same power line, it has an advantage that the installation order of nodes at regular intervals could be confirmed accurately. To be able to analyze specific sections in space based on this advantage, the distribution of the signal was confirmed and analyzed by Sobel filter based edge detection and total RSSI distribution(TRD) computation through a visualization process based on the measured RSSI. As a result to compare the raw data with the performance of the proposed algorithm, the signal intensity of proposed algorithm is improved by 13.73 % in the curve section. Besides, the characteristics of the straight and the curve line were enhanced as the signal intensity of the straight line decreased by an average of 34.16 %.

Adjacent Pixels based Noise Mitigation Filter in Salt & Pepper Noise Environments (Salt & Pepper 잡음 환경에서 인접 픽셀 기반 잡음 완화 필터)

  • Seong, Chi Hyuk;Shin, Soo Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.54 no.6
    • /
    • pp.65-71
    • /
    • 2017
  • Digital images and videos are subject to various types of noise during storage and transmission. Among these noises, Salt & Pepper noise degrades the compression efficiency of the original data and causing deterioration of performance in edge detection or segmentation used in an image processing method. In order to mitigate this noise, there are many filters such as Median Filter, Weighted Median Filter, Center Weighted Median Filter, Switching Weighted Median Filter and Adaptive Median Filter. However these methods are inferior in performance at high noise density. In this paper we propose a new type of filter for noise mitigation in wireless communication environment where Salt & Pepper noise occurs. The proposed filter detects the location of the damaged pixel by Salt & Pepper noise detection and mitigates the noise by using adjacent pixel values which are not damaged in a certain area. Among the proposed filters, the performance of the filter using the $3{\times}3$ error mask is compared with that of the conventional methods and it is confirmed that when density of noise in the image is 95%, their performances are improved as 13.24 dB compared to MF and 13.09 dB compared to AMF.

Local Fault Detection Technique for Steel Cable using Multi-Channel Magnetic Flux Leakage Sensor (다채널 자속누설 센서를 이용한 강케이블의 국부 단면손상 검색)

  • Park, Seunghee;Kim, Ju-Won;Lee, Changgil;Lee, Jongjae;Gil, Heung-Bae
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.25 no.4
    • /
    • pp.287-292
    • /
    • 2012
  • In this study, Multi-Channel Magnetic Flux Leakage(MFL) sensor - based inspection system was applied to monitor the condition of cables. This inspection system measures magnetic flux to detect the local faults(LF) of steel cable. To verify the feasibility of the proposed damage detection technique, an 8-channel MFL sensor head prototype was designed and fabricated. A steel cable bunch specimen with several types of damage was fabricated and scanned by the MFL sensor head to measure the magnetic flux density of the specimen. To interpret the condition of the steel cable, magnetic flux signals were used to determine the locations of the flaws and the level of damage. Measured signals from the damaged specimen were compared with thresholds set for objective decision making. In addition, the magnetic flux density values measured from every channel were summed to focus on the detection of axial location. And, sum of flux density were displayed with threshold. Finally, the results were compared with information on actual inflicted damages to confirm the accuracy and effectiveness of the proposed cable monitoring method.

Swell Effect Correction of Sub-bottom Profiler Data with Weak Sea Bottom Signal (해저면 신호가 약한 천부해저지층 탐사자료의 너울영향 보정)

  • Lee, Ho-Young;Koo, Nam-Hyung;Kim, Wonsik;Kim, Byoung-Yeop;Cheong, Snons;Kim, Young-Jun;Son, Woohyun
    • Geophysics and Geophysical Exploration
    • /
    • v.18 no.4
    • /
    • pp.181-196
    • /
    • 2015
  • A 3.5 kHz or chirp sub-bottom profiling survey is widely used in the marine geological and engineering purpose exploration. However, swells in the sea degrade the quality of the survey data. The horizontal continuity of profiler data can be enhanced and the quality can be improved by correcting the influence of the swell. Accurate detection of sea bottom location is important in correcting the swell effect. In this study, we tried to pick sea bottom locations by finding the position of crossing a threshold of the maximum value for the raw data and transformed data of envelope or energy ratio. However, in case of the low-quality data where the sea bottom signals are not clear due to sea wave noise, automatic sea bottom detection at the individual traces was not successful. We corrected the mispicks for the low quality data and obtained satisfactory results by picking a sea bottom within a range considering the previous average of sea bottom, and excluding unreliable big-difference picks. In case of trace by trace picking, fewest mispicks were found when using energy ratio data. In case of picking considering the previous average, the correction result was relatively satisfactory when using raw data.

A Method for Detection of Private Key Compromise (서명용 개인키 노출 탐지 기법)

  • Park, Moon-Chan;Lee, Dong-Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.781-793
    • /
    • 2014
  • A Public Key Infrastructure (PKI) is security standards to manage and use public key cryptosystem. A PKI is used to provide digital signature, authentication, public key encryption functionality on insecure channel, such as E-banking and E-commerce on Internet. A soft-token private key in PKI is leaked easily because it is stored in a file at standardized location. Also it is vulnerable to a brute-force password attack as is protected by password-based encryption. In this paper, we proposed a new method that detects private key compromise and is probabilistically secure against a brute-force password attack though soft-token private key is leaked. The main idea of the proposed method is to use a genuine signature key pair and (n-1) fake signature key pairs to make an attacker difficult to generate a valid signature with probability 1/n even if the attacker found the correct password. The proposed method provides detection and notification functionality when an attacker make an attempt at authentication, and enhances the security of soft-token private key without the additional cost of construction of infrastructure thereby extending the function of the existing PKI and SSL/TLS.