• Title/Summary/Keyword: the Information Poor

Search Result 1,954, Processing Time 0.031 seconds

State Encoding of Hidden Markov Linear Prediction Models

  • Krishnamurthy, Vikram;Poor, H.Vincent
    • Journal of Communications and Networks
    • /
    • v.1 no.3
    • /
    • pp.153-157
    • /
    • 1999
  • In this paper, we derive finite-dimensional non-linear fil-ters for optimally reconstructing speech signals in Switched Predic-tion vocoders, Code Excited Linear Prediction(CELP) and Differ-ential Pulse Code Modulation (DPCM). Our filter is an extension of the Hidden Markov filter.

  • PDF

CMOS 영상센서에 대한 영상 신호 전처리기의 구현

  • 정영식;장영조
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2001.12a
    • /
    • pp.15-18
    • /
    • 2001
  • Recently, CMOS image sensor is rapidly used as an image capture device such as mobile phone or notebook PC. Because of poor quality of image by CMOS image sensor, ISP is essential step to improve image quality. In this paper, we implemented and simulated ISP algorithm for real time moving picture of CMOS image sensor. Especial Iy, we concentrated on color interpolation, which extracts three color component from uncompleted color information. Several algorithms for color interpolation are implemented and analyzed to acquire a good quality of picture. Finally, we proposed an improved algorithm and confirmed the effectiveness by experimental simulation results.

  • PDF

A bitrate control using average quantization of 2-D macroblocks (2차원 매크로블록의 평균 양자화를 이용한 비트율 제어)

  • 임용순;이근영
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.35S no.3
    • /
    • pp.159-165
    • /
    • 1998
  • In bitrate control of MPEG-2 TM5, $Q_{j}$, N-act, and mquant, of present macroblock are predicted from those of previous macroblock. It results in poor image quality because of abrups change of them. We proposed a method predicting $Q_{j}$, N-act, and mquant, of present macroblock by averaging those parameters of adjacent previous macroblocks. As a results, it shows improved PSNR compared to bitrate control of MPEG-2 TM5.TM5.

  • PDF

Nutrition Knowledge and Food Habits of College Students (대학생의 영양지식과 식습관에 관한 조사연구)

  • Kim, Wha-Young
    • Journal of Nutrition and Health
    • /
    • v.17 no.3
    • /
    • pp.178-184
    • /
    • 1984
  • The questionnaires answered by 832 college students were analyzed for nutrition knowledge, food habits, and the sources of nutrition information. The students had a high level of perceived knowledge(88%), that is the knowledge that each subject believed he had, but the accuracy of the knowledge was only 55%. The mean score of nutrition knowledge was 7.20 out of possible 15.0 points and the mean food habit score was only 3.90 out of possible 10.0 points. And 59% of the subjects belonged 'poor food habit' group. The female subjects showed higher scores than male students in the perceived knowledge, the accuracy of the knowledge, the mean nutrition knowledge score, and the food habit score. There was a high correlation between nutrition knowledge score and food habit score of the subjects. The male students ranked mass media, high school courses, and parents as their primary sources of nutritional information, while 78% of female subjects ranked high school courses as their first choice of nutritional information.

  • PDF

Detection and Correction Method of Erroneous Data Using Quantile Pattern and LSTM

  • Hwang, Chulhyun;Kim, Hosung;Jung, Hoekyung
    • Journal of information and communication convergence engineering
    • /
    • v.16 no.4
    • /
    • pp.242-247
    • /
    • 2018
  • The data of K-Water waterworks is collected from various sensors and used as basic data for the operation and analysis of various devices. In this way, the importance of the sensor data is very high, but it contains misleading data due to the characteristics of the sensor in the external environment. However, the cleansing method for the missing data is concentrated on the prediction of the missing data, so the research on the detection and prediction method of the missing data is poor. This is a study to detect wrong data by converting collected data into quintiles and patterning them. It is confirmed that the accuracy of detecting false data intentionally generated from real data is higher than that of the conventional method in all cases. Future research we will prove the proposed system's efficiency and accuracy in various environments.

The usage of Electronic Databases in Academic Libraries in Ghana. The Experience of Ghana Communication Technology University Library (GCTUL)

  • Afua Frempong- Kore;Ameyaw Samuel
    • International Journal of Knowledge Content Development & Technology
    • /
    • v.14 no.2
    • /
    • pp.7-27
    • /
    • 2024
  • This study examines the use of electronic databases (e-databases) by faculty members of the Ghana Communication Technology University (GCTU). The study used a descriptive research method. Copies of the questionnaire were used for the data collection. Due to the manageable population, no sampling method was used in this study. The Statistical Package for the Social Sciences (IBM-SPSS 21.0) was used for data analysis. The results showed that most faculty members were aware of the availability of databases in the library. Additionally, the findings established that Emerald, as well as Taylor and Francis, were ranked highly in terms of availability and accessibility. The study identified problems such as difficulty in downloading information as well as poor internet connectivity. Based on the results, the study recommended that library management should address all the challenges that users encounter as soon as possible.

Aircraft Recognition from Remote Sensing Images Based on Machine Vision

  • Chen, Lu;Zhou, Liming;Liu, Jinming
    • Journal of Information Processing Systems
    • /
    • v.16 no.4
    • /
    • pp.795-808
    • /
    • 2020
  • Due to the poor evaluation indexes such as detection accuracy and recall rate when Yolov3 network detects aircraft in remote sensing images, in this paper, we propose a remote sensing image aircraft detection method based on machine vision. In order to improve the target detection effect, the Inception module was introduced into the Yolov3 network structure, and then the data set was cluster analyzed using the k-means algorithm. In order to obtain the best aircraft detection model, on the basis of our proposed method, we adjusted the network parameters in the pre-training model and improved the resolution of the input image. Finally, our method adopted multi-scale training model. In this paper, we used remote sensing aircraft dataset of RSOD-Dataset to do experiments, and finally proved that our method improved some evaluation indicators. The experiment of this paper proves that our method also has good detection and recognition ability in other ground objects.

A High Quality Steganographic Method Using Morphing

  • Bagade, Anant M.;Talbar, Sanjay N.
    • Journal of Information Processing Systems
    • /
    • v.10 no.2
    • /
    • pp.256-270
    • /
    • 2014
  • A new morphed steganographic algorithm is proposed in this paper. Image security is a challenging problem these days. Steganography is a method of hiding secret data in cover media. The Least Significant Bit is a standard Steganographic method that has some limitations. The limitations are less capacity to hide data, poor stego image quality, and imperceptibility. The proposed algorithm focuses on these limitations. The morphing concept is being used for image steganography to overcome these limitations. The PSNR and standard deviation are considered as a measure to improve stego image quality and morphed image selection, respectively. The stego keys are generated during the morphed steganographic embedding and extracting process. Stego keys are used to embed and extract the secret image. The experimental results, which are based on hiding capacity and PSNR, are presented in this paper. Our research contributes towards creating an improved steganographic method using image morphing. The experimental result indicates that the proposed algorithm achieves an increase in hiding capacity, stego image quality, and imperceptibility. The experimental results were compared with state of the art steganographic methods.