• Title/Summary/Keyword: 역필터링

Search Result 144, Processing Time 0.035 seconds

Text Area Extraction Method for Color Images Based on Labeling and Gradient Difference Method (레이블링 기법과 밝기값 변화에 기반한 컬러영상의 문자영역 추출 방법)

  • Won, Jong-Kil;Kim, Hye-Young;Cho, Jin-Soo
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.12
    • /
    • pp.511-521
    • /
    • 2011
  • As the use of image input and output devices increases, the importance of extracting text area in color images is also increasing. In this paper, in order to extract text area of the images efficiently, we present a text area extraction method for color images based on labeling and gradient difference method. The proposed method first eliminates non-text area using the processes of labeling and filtering. After generating the candidates of text area by using the property that is high gradient difference in text area, text area is extracted using the post-processing of noise removal and text area merging. The benefits of the proposed method are its simplicity and high accuracy that is better than the conventional methods. Experimental results show that precision, recall and inverse ratio of non-text extraction (IRNTE) of the proposed method are 99.59%, 98.65% and 82.30%, respectively.

The role of Under-balcony Speaker in the Multimedia Environmental (멀티미디어 환경에서 언더발코니 스피커의 역할)

  • Song, Deog-Geun;Park, Eun-Jin;Lee, Seon-Hee
    • Journal of Satellite, Information and Communications
    • /
    • v.10 no.2
    • /
    • pp.86-89
    • /
    • 2015
  • Formula acoustic characteristics of the room with a double layer, are compared through simulation and actual measurement. The rear area of the under- balcony speakers will cause a delay difference between the main speaker. In the mid / bass parts do not generate sufficient pressure is lowered and comb-Filtering phenomenon occurs significantly. The lower right area of the under- balcony speakers and speaker distance is the sound pressure of the under- balcony speakers to around 2 ~ 3m bigger than the main speakers and the sound image matches the pulpit is broken. Also, under area is more than 5 ~ 6m from the balcony outside speakers and causes differ by more than 10dB lower than the under- balcony speakers depending on the local laws of Translator wins Well, the main speaker at mid / high frequency sounds do not enter the sound pressure variations will drop by a significant. Appropriate arrangement and the output of the speaker according to the position under the balcony, and output of the main speakers are requested to minimize this problem sound. The proper sound design direction for the under- balcony speakers must be presented in order to improve the lower balcony area more pleasant acoustic environment.

Design of Efficient Edge Computing based on Learning Factors Sharing with Cloud in a Smart Factory Domain (스마트 팩토리 환경에서 클라우드와 학습된 요소 공유 방법 기반의 효율적 엣지 컴퓨팅 설계)

  • Hwang, Zi-on
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.11
    • /
    • pp.2167-2175
    • /
    • 2017
  • In recent years, an IoT is dramatically developing according to the enhancement of AI, the increase of connected devices, and the high-performance cloud systems. Huge data produced by many devices and sensors is expanding the scope of services, such as an intelligent diagnostics, a recommendation service, as well as a smart monitoring service. The studies of edge computing are limited as a role of small server system with high quality HW resources. However, there are specialized requirements in a smart factory domain needed edge computing. The edges are needed to pre-process containing tiny filtering, pre-formatting, as well as merging of group contexts and manage the regional rules. So, in this paper, we extract the features and requirements in a scope of efficiency and robustness. Our edge offers to decrease a network resource consumption and update rules and learning models. Moreover, we propose architecture of edge computing based on learning factors sharing with a cloud system in a smart factory.

A Study of Security for a Spam Attack of VoIP Vulnerability (VoIP 취약점에 대한 스팸 공격과 보안에 관한 연구)

  • Lee, In-Hee;Park, Dea-Woo
    • KSCI Review
    • /
    • v.14 no.2
    • /
    • pp.215-224
    • /
    • 2006
  • Regarding a spam attack and the interception that a spinoff is largest among Vulnerability of VoIP at these papers study. Write scenario of a spam attack regarding VoIP Vulnerability, and execute Call spam. Instant Messaging spam, Presence spam attack. A spam attack is succeeded in laboratories, and prove. and confirm damage fact of a user in proposals of a spam interception way of VoIP service, 1) INVITE Request Flood Attack 2) Black/White list, 3) Traceback, 4) Black Hole-Sink Hole, 5) Content Filtering, 6) Consent based Communication, 7) Call act pattern investigation, 8) Reputation System Propose, and prove. Test each interception plan proposed in VoIP networks, and confirm security level of a spam interception. Information protection of VoIP service is enlarged at WiBro, BcN. and to realize Ubiquitous Security through result of research of this paper contribute, and may make.

  • PDF

Ku-Band RF Transceiver System Design for UAV Line-Of-Sight Datalink (무인항공기 가시선 데이터링크 Ku 대역 RF 송수신 시스템 설계)

  • Choi, Jaewon;Kim, Jihoon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.9
    • /
    • pp.46-53
    • /
    • 2014
  • In this paper, ku-band RF transceiver system is designed for the unmanned aerial vehicle(UAV) line-of-sight(LOS) datalink. The RF transceiver system is consisted of the transmitting and receiving unit, RF front-end unit, and high power amplification unit. The transmitting and receiving unit has the functions of frequency up/down converting and channel changing. The RF front-end unit has the functions of transmitting and receiving signal duplexing, antenna selection, small signal amplification, and frequency filtering excluding the receiving signal. The high power amplification unit has the functions of ku-band power amplification and transmitting power variation(High/Middle/Low/Mute). The frequency up/down converting of transmitting and receiving unit is designed by using the superheterodyne method. The RF transceiver system is designed to obtain the broadband and high linearity properties for the reliable transmission and reception of high data-rate and high speed data. Also, the channel changing function is designed to use selectively the frequency as the operation environment of UAV.

Design of Biometrics System Using ECG Lead III Signals (심전도 신호의 리드 III 파형을 이용한 바이오인식)

  • Min, Chul-Hong;Kim, Tae-Seon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.48 no.6
    • /
    • pp.43-50
    • /
    • 2011
  • Currently, conventional security methods including IC card or password type method are quickly switched into biometric security systems in various applications and the electrocardiogram (ECG) has been considered as one of novel biometrics way. However, conventional ECG based biometrics used lead II signal which conventionally used for formulaic signal to heart disease diagnosis and it is not suitable for biometrics since it is rather difficult to find consistent features for heart disease patents. To overcome this problem, we developed new biometrics system using ECG lead III signals. For wave extraction, signal peak points are extracted through AAV algorithm. For feature selection, extracted waves are categorized into one of four wave types and total twenty two features including number of vertices, wave shapes, amplitude information and interval information are extracted based on their wave types. Experimental results for thirty-six people showed 100% specificity, 95.59% sensitivity and 99.17% of overall identification accuracy.

A Study of Location Correction Algorithm for Pedestrian Location Tracking in Traffic Connective Transferring System (교통 연계 환승 시스템의 보행자 위치 추적을 위한 보정 알고리즘 연구)

  • Jung, Jong-In;Lee, Sang-Sun
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.8 no.2
    • /
    • pp.149-157
    • /
    • 2009
  • Tracking technologies which provide real-time and customized information through various information collecting and processing for pedestrians who use traffic connective and transferring center have been being examined. However some problems are caused due to the wide-range positioning error for some services as device installation and service place. It is also difficult to be applied to traffic linkage and transfer services because many situations can be barren. In the testbed, Gwangmyoung Station, we got some results in bad conditions such as a lot of steel construction and another communication device. Practically, conditions of the place which will be built can be worse than Gwangmyoung station. Therefore, we researched suitable Location correction algorithm as a method for accuracy to traffic connective and transferring system. And its algorithm is designed through grid coordinates, map-matching, modeling coordinates and Kalman filtering and is being implemented continuously. Also preparing for optimization of various transferring center model, we designed for simulator type algorithm what is available for deciding algorithm factor.

  • PDF

Single chip multi-function peripheral image processor with unified binarization architecture (통합된 이진화 구조를 가진 복합기용 1-Chip 영상처리 프로세서의 개발)

  • Park, Chang-Dae;Lee, Eul-Hwan;Kim, Jae-Ho
    • Journal of the Korean Institute of Telematics and Electronics S
    • /
    • v.36S no.11
    • /
    • pp.34-43
    • /
    • 1999
  • A high-speed image processor (HIP) is implemented for a high-speed multi-function peripheral. HIP has a binarization architecture with unified data path. It has the pixel-by-pixel pipelined processing to minimize size of the external memory. It performs pre-processing such as shading correction, automatic gain control (AGC), and gamma correction, and also drives external CCD or CIS modules. The pre-processed data can be enlarged or reduced. Various binarizatin algorithms can be processed in the unified archiecture. The embedded binarization algorithms are simple thresholding, high pass filtering, dithering, error diffusion, and thershold modulated error diffusion. These binarization algorithms are unified based on th threshold modulated error diffusion. The data path is designed to share the common functional block of the binarization algorithms. The complexity of the controls and the gate counts is greatly reduced with this novel architecture.

  • PDF

Invisible Watermarking for Improved Security of Digital Video Application (디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹)

  • Seo, Jung-Hee;Park, Hung-Bog
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.10
    • /
    • pp.175-183
    • /
    • 2011
  • Performance of digital video watermarking is an assessment that hides a lot of information in digital videos. Therefore, it is required to find a way that enables to store lots of bits of data into a high quality video of the frequency area of digital contents. Hence, this paper designs a watermarking system improving security with an enhancing watermarking based on invisible watermarking and embedding an watermarking on LH and HL subband and its subband by transforming wavelet after the extraction of luminance component from the frames of video by compromising robustness and invisible of watermarking elements. The performance analysis of security of watermarking is carried out with a statistic method, and makes an assessment of robustness against variety of attacks to invisible watermarking. We can verify the security of watermarking against variety of attacks by testing robustness and invisible through carrying out general signal processing like noise addition, lossy compression, and Low-Pass filtering.

Threshold Selection Method for Capacity Optimization of the Digital Watermark Insertion (디지털 워터마크의 삽입용량 최적화를 위한 임계값 선택방법)

  • Lee, Kang-Seung;Park, Ki-Bum
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.10 no.1
    • /
    • pp.49-59
    • /
    • 2009
  • In this paper a watermarking algorithm is proposed to optimize the capacity of the digital watermark insertion in an experimental threshold using the characteristics of human visual system(HVS), adaptive scale factors, and weight functions based on discrete wavelet transform. After the original image is decomposed by a 3-level discrete wavelet transform, the watermarks for capacity optimization are inserted into all subbands except the baseband, by applying the important coefficients from the experimental threshold in the wavelet region. The adaptive scale factors and weight functions based on HVS are considered for the capacity optimization of the digital watermark insertion in order to enhance the robustness and invisibility. The watermarks are consisted of gaussian random sequences and detected by correlation. The experimental results showed that this algorithm can preserve a fine image quality against various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, sharpening, linear and non-linear filtering, etc.

  • PDF