• Title/Summary/Keyword: 문자배치 정보

Search Result 30, Processing Time 0.025 seconds

On Character Region Extraction by Cost Minimization Method (코스트 최소화법에 의한 문자영역의 추출)

  • Kim, Seok-Tae
    • The Transactions of the Korea Information Processing Society
    • /
    • v.3 no.2
    • /
    • pp.348-358
    • /
    • 1996
  • If a method of character region extraction will have general purposes, it could not but make use of common features which all target images have. This paper suggests these common features should be considered as the coalitions for the region to be extracted within a framework of the cost minimization. The method suggested above could be effective by minimizing a cost function estmating the extent that character regions satify quantitatively the features, through Simulated Annealing Method. This method has an uniqueness in that it defines the cost function. Experimental result verify the usefulness of this cost minimization approach to characer region extraction.

  • PDF

Parallel Algorithms for Finding Consensus of Circular Strings (환형문자열에 대한 대표문자열을 찾는 병렬 알고리즘)

  • Kim, Dong Hee;Sim, Jeong Seop
    • Journal of KIISE
    • /
    • v.42 no.3
    • /
    • pp.289-294
    • /
    • 2015
  • The consensus problem is finding a representative string, called a consensus, of a given set S of k strings. Circular strings are different from linear strings in that the last symbol precedes the first symbol. Given a set S of circular strings of length n over an alphabet ${\Sigma}$, we first present an $O({\mid}{\Sigma}{\mid}nlogn)$ time parallel algorithm for finding a consensus of S minimizing both radius and distance sum when k=3 using O(n) threads. Then we present an $O({\mid}{\Sigma}{\mid}n^2logn)$ time parallel algorithm for finding a consensus of S minimizing distance sum when k=4 using O(n) threads. Finally, we compare execution times of our algorithms implemented using CUDA with corresponding sequential algorithms.

Ortho-Phonics Alpabetic One Hand Strock Keyboad's Structure and Design for Intergation of Language and Scription (어문결합을 지향하는 정음한손자판의 배치와 설계)

  • Kim Yong-Gi;Chin Yong-Ohk
    • The KIPS Transactions:PartB
    • /
    • v.11B no.7 s.96
    • /
    • pp.861-866
    • /
    • 2004
  • Keyboard is a link between human and terminal, so we can input knowledge to information device. The misstyping is occured or the speed is reduced if there would be transmission error. We always have to consider human interface and behavior effect, because the keyboard system is the harmony of human and machine. This paper is designed for representation of ortho-phonics alpabetic one hand strock keyboard which is enable to correct error and to edit word.

Text Area Detection of Road Sign Images based on IRBP Method (도로표지 영상에서 IRBP 기반의 문자 영역 추출)

  • Chong, Kyusoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.13 no.6
    • /
    • pp.1-9
    • /
    • 2014
  • Recently, a study is conducting to image collection and auto detection of attribute information using mobile mapping system. The road sign attribute information detection is difficult because of various size and placement, interference of other facilities like trees. In this study, a text detection method that does not rely on a Korean character template is required to successfully detect the target text when a variety of differently sized texts are present near the target texts. To overcome this, the method of incremental right-to-left blob projection (IRBP) was suggested as a solution; the potential and improvement of the method was also assessed. To assess the performance improvement of the IRBP that was developed, the IRBP method was compared to the existing method that uses Korean templates through the 60 videos of street signs that were used. It was verified that text detection can be improved with the IRBP method.

The Influence of perceptual load on target identification and negative repetition effect in post-cueing forced choice task (순간 노출되는 표적의 식별과 부적 반복효과에 지각부하가 미치는 영향)

  • Kim, Inik;Park, ChangHo
    • Korean Journal of Cognitive Science
    • /
    • v.33 no.1
    • /
    • pp.1-22
    • /
    • 2022
  • Lavie's perceptual load theory (Lavie, 1995) proposes that the influence of distractors would be blocked as the load gets higher. Studies of perceptual load have usually adopted the flanker task, developed by Eriksen and Eriksen (1974), which measures reaction time on the target flanked by distractors. In the post-cueing forced task, participants should report the identity of the target cued later, and negative repetition effect (NRE) has often been observed. NRE means the effect that the accuracy of identification is worse when the target is flanked by the same nontargets than when flanked by different nontargets. This study has tried to check whether perceptual load has an effect on identification rate and NRE. Experiment 1 manipulated the similarity between targets and a distractor, and observed a tendency of NRE, but not the effect of perceptual load. Experiment 2 used 4, 2 (in two kinds of diagonal arrangement), or none distractors of the same identity to burden more perceptual load. NRE was significant and perceptual load showed significance but not a linear trend. Experiment 3 checked again whether NRE would be varied according to two levels of perceptual load strengthened by positional variability of load stimuli, but did not find the effect of perceptual load. It is concluded that perceptual load might have a limited effect on the early stage of perceptual processing due to divided attentional processing of the targets briefly exposed. Implications of this study were discussed.

Malaysian Vehicle License Plate Recognition in Low Illumination Images (저 조도 영상에서의 말레이시아 차량 번호판 인식)

  • Kim, Jin-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.13 no.10
    • /
    • pp.19-26
    • /
    • 2013
  • In the Malaysian license plates, alphabets and numerals which are made by plastic, are adhered to a frame as embossing style and occasionally characters in horizontal, vertical directions are aligned with narrow space. So the extraction of character stroke information can be hard in the vehicle images of low illumination intensity. In this paper, Malaysian license plate recognition algorithm for low illumination intensity image is proposed. DoG filtering based character stroke generation method is introduced to derive exact connected components of strokes in the vehicle image of low illumination intensity. After localization of plate by connected component analysis, characters are segmented and recognized. Algorithm is experimented for the 6,046 vehicle images captured in Kuala Lumpur by IR camera without using any special light during day and night. The experimental results show that recognition accuracy of plates is 96.1%.

An Adaptive Multi-Level Thresholding and Dynamic Matching Unit Selection for IC Package Marking Inspection (IC 패키지 마킹검사를 위한 적응적 다단계 이진화와 정합단위의 동적 선택)

  • Kim, Min-Ki
    • The KIPS Transactions:PartB
    • /
    • v.9B no.2
    • /
    • pp.245-254
    • /
    • 2002
  • IC package marking inspection system using machine vision locates and identifies the target elements from input image, and decides the quality of marking by comparing the extracted target elements with the standard patterns. This paper proposes an adaptive multi-level thresholding (AMLT) method which is suitable for a series of operations such as locating the target IC package, extracting the characters, and detecting the Pinl dimple. It also proposes a dynamic matching unit selection (DMUS) method which is robust to noises as well as effective to catch out the local marking errors. The main idea of the AMLT method is to restrict the inputs of Otsu's thresholding algorithm within a specified area and a partial range of gray values. Doing so, it can adapt to the specific domain. The DMUS method dynamically selects the matching unit according to the result of character extraction and layout analysis. Therefore, in spite of the various erroneous situation occurred in the process of character extraction and layout analysis, it can select minimal matching unit in any environment. In an experiment with 280 IC package images of eight types, the correct extracting rate of IC package and Pinl dimple was 100% and the correct decision rate of marking quality was 98.8%. This result shows that the proposed methods are effective to IC package marking inspection.

Matrix Character Relocation Technique for Improving Data Privacy in Shard-Based Private Blockchain Environments (샤드 기반 프라이빗 블록체인 환경에서 데이터 프라이버시 개선을 위한 매트릭스 문자 재배치 기법)

  • Lee, Yeol Kook;Seo, Jung Won;Park, Soo Young
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.2
    • /
    • pp.51-58
    • /
    • 2022
  • Blockchain technology is a system in which data from users participating in blockchain networks is distributed and stored. Bitcoin and Ethereum are attracting global attention, and the utilization of blockchain is expected to be endless. However, the need for blockchain data privacy protection is emerging in various financial, medical, and real estate sectors that process personal information due to the transparency of disclosing all data in the blockchain to network participants. Although studies using smart contracts, homomorphic encryption, and cryptographic key methods have been mainly conducted to protect existing blockchain data privacy, this paper proposes data privacy using matrix character relocation techniques differentiated from existing papers. The approach proposed in this paper consists largely of two methods: how to relocate the original data to matrix characters, how to return the deployed data to the original. Through qualitative experiments, we evaluate the safety of the approach proposed in this paper, and demonstrate that matrix character relocation will be sufficiently applicable in private blockchain environments by measuring the time it takes to revert applied data to original data.

Design for Position Protection Secure Keypads based on Double-Touch using Grouping in the Fintech (핀테크 환경에서 그룹핑을 이용한 이중 터치 기반의 위치 차단이 가능한 보안 키패드 설계)

  • Mun, Hyung-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.12 no.3
    • /
    • pp.38-45
    • /
    • 2022
  • Due to the development of fintech technology, financial transactions using smart phones are being activated. The password for user authentication during financial transactions is entered through the virtual keypad displayed on the screen of the smart phone. When the password is entered, the attacker can find out the password by capturing it with a high-resolution camera or spying over the shoulder. A virtual keypad with security applied to prevent such an attack is difficult to input on a small touch-screen, and there is still a vulnerability in peeping attacks. In this paper, the entire keypad is divided into several groups and displayed on a small screen, touching the group to which the character to be input belongs, and then touching the corresponding character within the group. The proposed method selects the group to which the character to be input belongs, and displays the keypad in the group on a small screen with no more than 10 keypads, so that the size of the keypad can be enlarged more than twice compared to the existing method, and the location is randomly placed, hence location of the touch attacks can be blocked.

Design of an Enhanced Group Keypad to Prevent Shoulder-Surfing Attacks and Enable User Convenience (어깨 너머 공격을 차단하고 사용 편의성이 가능한 개선된 그룹 키패드 설계)

  • Hyung-Jin Mun
    • Journal of Practical Engineering Education
    • /
    • v.15 no.3
    • /
    • pp.641-647
    • /
    • 2023
  • In the fintech environment, ensuring secure financial transactions with smartphones requires authenticating the device owner. Smartphone authentication techniques encompass a variety of approaches, such as passwords, biometrics, SMS authentication, and more. Among these, password-based authentication is commonly used and highly convenient for user authentication. Although it is a simple authentication mechanism, it is susceptible to eavesdropping and keylogging attacks, alongside other threats. Security keypads have been proposed to address vulnerabilities in password input on smartphones. One such innovation is a group keypad, resistant to attacks that guess characters based on touch location. However, improvements are needed for user convenience. In this study, we aim to propose a method that enhances convenience while being resistant to eavesdropping and recording attacks on the existing group keypad. The proposed method uses new signs to allow users to verify instead of the last character confirmation easily and employs dragging-to-touch for blocking recording attacks. We suggest diverse positioning methods tailored for domestic users, improving efficiency and security in password input compared to existing methods.