• Title/Summary/Keyword: 기하변환

Search Result 486, Processing Time 0.028 seconds

Analysis of Morton Code Conversion for 32 Bit IEEE 754 Floating Point Variables (IEEE 754 부동 소수점 32비트 float 변수의 Morton Code 변환 분석)

  • Park, Taejung
    • Journal of Digital Contents Society
    • /
    • v.17 no.3
    • /
    • pp.165-172
    • /
    • 2016
  • Morton codes play important roles in many parallel GPU applications for the nearest neighbor (NN) search in huge data and queries with its applications growing. This paper discusses and analyzes the meaning of Tero Karras's 32-bit 'unsigned int' Morton code algorithm for three-dimensional spatial information in $[0,1]^3$ and its geometric implications. Based on this, this paper proposes 64-bit 'unsigned long long' version of Morton code and compares the results in both CPU vs. GPU and 32-bit vs. 64-bit versions. The proposed GPU algorithm runs around 1000 times faster than the CPU version.

Study For Watermarking Technique In Medical Image (의료영상에서의 워터마킹 기법에 관한 연구)

  • 남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2002.11a
    • /
    • pp.348-351
    • /
    • 2002
  • Recently, the medical imaging field has been digitalized by the development of computer science and digitization of the medical devices. There are needs of the medical imaging database service and long term storage today because of the installation of PACS system following DICOM standards, telemedicine and etc. and ,also, the illegal distortion of the medical information, data authentication and copyright are being happened. In this paper, we propose watermarking technique as a method which can protect private informations and medical imaging from geometric distortion. Because many watermarks for images are sensitive to geometric distortion, we present a algorithm that is insensitive to RST distortion in medical image. we observed the robustness against several of the signal processing and attacks in medical imaging field by embedding watermark after making a region which is insensitive to RST distortion by using FFT and LPM transformation.

  • PDF

Investigation of Geometrical Properties on Deposition Rate in Cesium Iodine Film (증착속도에 따른 CSI layer의 기하학적 특성 연구)

  • Lee, Kyu-Hong;Park, Ji-Koon;Kang, Sang-Sik;Cha, Byung-Yul;Cho, Sung-Ho;Nam, Sang-Hee
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2003.11a
    • /
    • pp.415-417
    • /
    • 2003
  • CsI 형광체는 X선에 대한 분해능 및 변환효율이 우수한 물질이다. 최근 대면적 평판형 X선 영상검출기의 변환층으로 이용하기 위해 CsI 형광체의 대면적 제조에 대한 연구가 활발히 진행되고 있다. 본 논문은 진공 열증착법을 이용하여 증착속도(3, 3.8, $4.5\;{\mu}m/min$)에 따라 $20\;{\mu}m$ 두께의 CsI 필름을 제조하였고, XRD 및 SEM 분석을 통해 CsI 필름의 기하학적 구조를 조사하였다. 증착된 CsI 필름은 증착속도에 관계없이 복잡한 다결정 구조를 가지며, $3\;{\mu}m/min$의 증착속도에서 약 $1\;{\mu}m$ 크기로 needle-like 한 columnar structure를 가졌다. As results, about 3um/min evaporation rate formed as good geometry characteristics CsI layer.

  • PDF

Realization of 3D Virtual Face Using two Sheets of 2D photographs (두 장의 2D 사진을 이용한 3D 가상 얼굴의 구현)

  • 임낙현;서경호;김태효
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.4
    • /
    • pp.16-21
    • /
    • 2001
  • In this paper a virtual form of 3 dimensional face is synthesized from the two sheets of 2 dimensional photographs In this case two sheets of 2D face photographs, the front and the side photographs are used First of all a standard model for a general face is created and from this model the feature points which represents a construction of face are densely defined on part of ears. eyes, a nose and a lip but the other parts. for example, forehead, chin and hair are roughly determined because of flat region or the less individual points. Thereafter the side photograph is connected symmetrically on the left and right sides of the front image and it is gradually synthesized by use of affine transformation method. In order to remove the difference of color and brightness from the junction part, a linear interpolation method is used. As a result it is confirmed that the proposed model which general model of a face can be obtain the 3D virtual image of the individual face.

  • PDF

Shape Design Optimization Using Isogeometric Analysis (등기하 해석법을 이용한 형상 최적설계)

  • Ha, Seung-Hyun;Cho, Seon-Ho
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.21 no.3
    • /
    • pp.233-238
    • /
    • 2008
  • In this paper, a shape design optimization method for linearly elastic problems is developed using isogeometric approach. In many design optimization problems for practical engineering models, initial raw data usually come from a CAD modeler. Then, designers should convert the CAD data into finite element mesh data since most of conventional design optimization tools are based on finite element analysis. During this conversion, there are some numerical errors due to geometric approximation, which causes accuracy problems in response as well as design sensitivity analyses. As a remedy for this phenomenon, the isogeometric analysis method can be one of the promising approaches for the shape design optimization. The main idea of isogeometric approach is that the basis functions used in analysis is exactly the same as the ones representing the geometry. This geometrically exact model can be used in the shape sensitivity analysis and design optimization as well. Therefore the shape design sensitivity with high accuracy can be obtained, which is very essential for a gradient-based optimization. Through numerical examples, it is verified that the shape design optimization based on an isogeometic approach works well.

Design of a SIFT based Target Classification Algorithm robust to Geometric Transformation of Target (표적의 기하학적 변환에 강인한 SIFT 기반의 표적 분류 알고리즘 설계)

  • Lee, Hee-Yul;Kim, Jong-Hwan;Kim, Se-Yun;Choi, Byung-Jae;Moon, Sang-Ho;Park, Kil-Houm
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.20 no.1
    • /
    • pp.116-122
    • /
    • 2010
  • This paper proposes a method for classifying targets robust to geometric transformations of targets such as rotation, scale change, translation, and pose change. Targets which have rotation, scale change, and shift is firstly classified based on CM(Confidence Map) which is generated by similarity, scale ratio, and range of orientation for SIFT(Scale-Invariant Feature Transform) feature vectors. On the other hand, DB(DataBase) which is acquired in various angles is used to deal with pose variation of targets. Range of the angle is determined by comparing and analyzing the execution time and performance for sampling intervals. We experiment on various images which is geometrically changed to evaluate performance of proposed target classification method. Experimental results show that the proposed algorithm has a good classification performance.

Design of robust Watermarking Algorithm against the Geometric Transformation for Medical Image Security (의료 영상보안을 위한 기하학적 변형에 견고한 워터마킹 알고리즘 설계)

  • Lee, Yun-Bae;Oh, Guan-Tack
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2586-2594
    • /
    • 2009
  • A digital watermarking technique used as a protection and certifying mechanism of copyrighted creations including music, still images, and videos in terms of finding any loss in data, reproduction and pursuit. This study suggests using a selected geometric invariant point through the whole processing procedure of an image and inserting and extracting based on the invariant point so that it will be robust in a geometric transformation attack. The introduced algorithm here is based on a watershed splitting method in order to make medical images strong against RST(Rotation Scale, Translation) transformation and other processing. It also helps to maintain the watermark in images that are compressed and stored for a period of time. This algorithm also proved that is has robustness against not only JPEG compression attack, but also RST attack and filtering attack.

A Study on the Comparison of Channel Selection and Precision Geometric Correction for Image Restoration of an Submerged Water (수몰 지역의 영상복원을 위한 정밀기하보정 및 채널선정 비교연구)

  • Yeon, Sang-Ho
    • Journal of the Korean Association of Geographic Information Studies
    • /
    • v.7 no.1
    • /
    • pp.1-8
    • /
    • 2004
  • It's a very meaningful experimental study to image restoration of ancient villages vanished at the real life spatial world. Focused on Cheung-Pyung Lake around where most part were flooded by the Chung-Ju large dam founded in early 1980s, we used remote sensing technique in this study in order to restore topographical features before the flood with 3 dimensional effects. It was gathered comparatively good satellite photos and remotely sensed digital images, then its made a new color image from these and the topographical map which had been made before filled water. This task was putting together two kinds of different timed images. And then, we generated DEM(digital elevation model) including the outskirts of that area as harmonizing current contour lines with the map. That could be a perfect 3D image of Cheung-Pyung around before when it had been flood by making perspective images from all directions, north, south, east and west, for showing there in three dimensions. Also, flying simulation we made for close visiting can bring us to experience their real space at that time.

  • PDF

A fingerprint Alignment with a 3D Geometric Hashing Table based on the fuzzy Fingerprint Vault (3차원 기하학적 해싱을 이용한 퍼지볼트에서의 지문 정합)

  • Lee, Sung-Ju;Moon, Dae-Sung;Kim, Hak-Jae;Yi, Ok-Yeon;Chung, Yong-Wha
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.18 no.1
    • /
    • pp.11-21
    • /
    • 2008
  • Biometrics-based user authentication has several advantages over traditional password-based systems for standalone authentication applications. This is also true for new authentication architectures known as crypto-biometric systems, where cryptography and biometrics are merged to achieve high security and user convenience at the same time. Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems. This construct aims to secure critical data(e.g., secret key) with the fingerprint data in a way that only the authorized user can access the secret by providing the valid fingerprint, and some implementations results for fingerprint have been reported. However, the previous results had some limitation of the provided security due to the limited numbers of chaff data fer hiding real fingerprint data. In this paper, we propose an approach to provide both the automatic alignment of fingerprint data and higher security by using a 3D geometric hash table. Based on the experimental results, we confirm that the proposed approach of using the 3D geometric hash table with the idea of the fuzzy vault can perform the fingerprint verification securely even with more chaff data included.

Morphing Algorithm of Simple Polygons using Similar Triangulation (유사 삼각 분할을 이용한 단순 다각형의 형태 변환 알고리즘)

  • Song, Eun-Ha;Lee, Ju-Hui;Lee, Sang-Ho
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.11
    • /
    • pp.890-898
    • /
    • 2000
  • 본 논문에서는 단순 다각형을 대상으로 하는 형태 변환 알고리즘을 제안한다. 주어진 다각형을 삼각 분할하고 그 듀얼 트리로부터 구성된 듀얼 루트 트리를 이용하여 형태 변환을 유도하는 기하학적인 방법이다. 이 방법은 기존의 알고리즘이 수학적인 모델링을 기반으로 하기 때문에 감수해야했던 많은 양의 함수계산을 피할 수 있으며 다각형의 속성을 유지하는 삼각 분할을 사용함으로써 중간 단계에 생성된 다각형들이 언제나 적합한 형태의 다각형이 될 수 있다는 특징을 갖는다. 이러한 작업이 가능하도록 하기 위해서 본 논문에서는 유사 삼각 분할(similar triangulation)과 유사 트리의 개념을 이용하였다.

  • PDF