• Title/Summary/Keyword: 영상처리 시스템

Search Result 3,651, Processing Time 0.029 seconds

Digital Library Interface Research Based on EEG, Eye-Tracking, and Artificial Intelligence Technologies: Focusing on the Utilization of Implicit Relevance Feedback (뇌파, 시선추적 및 인공지능 기술에 기반한 디지털 도서관 인터페이스 연구: 암묵적 적합성 피드백 활용을 중심으로)

  • Hyun-Hee Kim;Yong-Ho Kim
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.1
    • /
    • pp.261-282
    • /
    • 2024
  • This study proposed and evaluated electroencephalography (EEG)-based and eye-tracking-based methods to determine relevance by utilizing users' implicit relevance feedback while navigating content in a digital library. For this, EEG/eye-tracking experiments were conducted on 32 participants using video, image, and text data. To assess the usefulness of the proposed methods, deep learning-based artificial intelligence (AI) techniques were used as a competitive benchmark. The evaluation results showed that EEG component-based methods (av_P600 and f_P3b components) demonstrated high classification accuracy in selecting relevant videos and images (faces/emotions). In contrast, AI-based methods, specifically object recognition and natural language processing, showed high classification accuracy for selecting images (objects) and texts (newspaper articles). Finally, guidelines for implementing a digital library interface based on EEG, eye-tracking, and artificial intelligence technologies have been proposed. Specifically, a system model based on implicit relevance feedback has been presented. Moreover, to enhance classification accuracy, methods suitable for each media type have been suggested, including EEG-based, eye-tracking-based, and AI-based approaches.

Development of Inquiry Activity Materials for Visualizing Typhoon Track using GK-2A Satellite Images (천리안 위성 2A호 영상을 활용한 태풍 경로 시각화 탐구활동 수업자료 개발)

  • Chae-Young Lim;Kyung-Ae Park
    • Journal of the Korean earth science society
    • /
    • v.45 no.1
    • /
    • pp.48-71
    • /
    • 2024
  • Typhoons are representative oceanic and atmospheric phenomena that cause interactions within the Earth's system with diverse influences. In recent decades, the typhoons have tended to strengthen due to rapidly changing climate. The 2022 revised science curriculum emphasizes the importance of teaching-learning activities using advanced science and technology to cultivate digital literacy as a citizen of the future society. Therefore, it is necessary to solve the temporal and spatial limitations of textbook illustrations and to develop effective instructional materials using global-scale big data covered in the field of earth science. In this study, according to the procedure of the PDIE (Preparation, Development, Implementation, Evaluation) model, the inquiry activity data was developed to visualize the track of the typhoon using the image data of GK-2A. In the preparatory stage, the 2015 and 2022 revised curriculum and the contents of the inquiry activities of the current textbooks were analyzed. In the development stage, inquiry activities were organized into a series of processes that can collect, process, visualize, and analyze observational data, and a GUI (Graphic User Interface)-based visualization program that can derive results with a simple operation was created. In the implementation and evaluation stage, classes were conducted with students, and classes using code and GUI programs were conducted respectively to compare the characteristics of each activity and confirm its applicability in the school field. The class materials presented in this study enable exploratory activities using actual observation data without professional programming knowledge which is expected to contribute to students' understanding and digital literacy in the field of earth science.

A Study on Stroke Extraction for Handwritten Korean Character Recognition (필기체 한글 문자 인식을 위한 획 추출에 관한 연구)

  • Choi, Young-Kyoo;Rhee, Sang-Burm
    • The KIPS Transactions:PartB
    • /
    • v.9B no.3
    • /
    • pp.375-382
    • /
    • 2002
  • Handwritten character recognition is classified into on-line handwritten character recognition and off-line handwritten character recognition. On-line handwritten character recognition has made a remarkable outcome compared to off-line hacdwritten character recognition. This method can acquire the dynamic written information such as the writing order and the position of a stroke by means of pen-based electronic input device such as a tablet board. On the contrary, Any dynamic information can not be acquired in off-line handwritten character recognition since there are extreme overlapping between consonants and vowels, and heavily noisy images between strokes, which change the recognition performance with the result of the preprocessing. This paper proposes a method that effectively extracts the stroke including dynamic information of characters for off-line Korean handwritten character recognition. First of all, this method makes improvement and binarization of input handwritten character image as preprocessing procedure using watershed algorithm. The next procedure is extraction of skeleton by using the transformed Lu and Wang's thinning: algorithm, and segment pixel array is extracted by abstracting the feature point of the characters. Then, the vectorization is executed with a maximum permission error method. In the case that a few strokes are bound in a segment, a segment pixel array is divided with two or more segment vectors. In order to reconstruct the extracted segment vector with a complete stroke, the directional component of the vector is mortified by using right-hand writing coordinate system. With combination of segment vectors which are adjacent and can be combined, the reconstruction of complete stroke is made out which is suitable for character recognition. As experimentation, it is verified that the proposed method is suitable for handwritten Korean character recognition.

Efficient Policy for ECC Parity Storing of NAND Flash Memory (낸드플래시 메모리의 효율적인 ECC 패리티 저장 방법)

  • Kim, Seokman;Oh, Minseok;Cho, Kyoungrok
    • The Journal of the Korea Contents Association
    • /
    • v.16 no.10
    • /
    • pp.477-482
    • /
    • 2016
  • This paper presents a new method of parity storing for ECC(error correcting code) in SSD (solid-state drive) and suitable structure of the controller. In general usage of NAND flash memory, we partition a page into data and spare area. ECC parity is stored in the spare area. The method has overhead on area and timing due to access of the page memory discontinuously. This paper proposes a new parity policy storing method that reduces overhead and R(read)/W(write) timing by using whole page area continuously without partitioning. We analyzed overhead and R/W timing. As a result, the proposed parity storing has 13.6% less read access time than the conventional parity policy with 16KB page size. For 4GB video file transfer, it has about a minute less than the conventional parity policy. It will enhance the system performance because the read operation is key function in SSD.

The Recognition of Occluded 2-D Objects Using the String Matching and Hash Retrieval Algorithm (스트링 매칭과 해시 검색을 이용한 겹쳐진 이차원 물체의 인식)

  • Kim, Kwan-Dong;Lee, Ji-Yong;Lee, Byeong-Gon;Ahn, Jae-Hyeong
    • The Transactions of the Korea Information Processing Society
    • /
    • v.5 no.7
    • /
    • pp.1923-1932
    • /
    • 1998
  • This paper deals with a 2-D objects recognition algorithm. And in this paper, we present an algorithm which can reduce the computation time in model retrieval by means of hashing technique instead of using the binary~tree method. In this paper, we treat an object boundary as a string of structural units and use an attributed string matching algorithm to compute similarity measure between two strings. We select from the privileged strings a privileged string wIth mmimal eccentricity. This privileged string is treated as the reference string. And thell we wllstructed hash table using the distance between privileged string and the reference string as a key value. Once the database of all model strings is built, the recognition proceeds by segmenting the scene into a polygonal approximation. The distance between privileged string extracted from the scene and the reference string is used for model hypothesis rerieval from the table. As a result of the computer simulation, the proposed method can recognize objects only computing, the distance 2-3tiems, while previous method should compute the distance 8-10 times for model retrieval.

  • PDF

The Study of QoS Parameter Metrics For Efficient End-to-End QoS Management (효율적인 End-to-End QoS 관리를 위한 QoS 인자 Metrics 에 관한 연구)

  • Lee, Sang-Young;Sohn, Jin-Ho;Ahn, Gae-Soon;Hwang, Sun-Ha;Chun, Tai-Myoung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11b
    • /
    • pp.907-910
    • /
    • 2003
  • 이동통신 기술이 발전함에 따라 이동통신 네트워크를 통한 서비스들이 다양해지고, 사용자들의 수는 점점 늘어가고 있다. 또한 사용자들은 일반적으로 이동통신 서비스에 대해 유선 망과 동등한 수준의 품질을 기대한다. 그러나, 이동통신망은 유무선 통합망으로 구성되어 있으며, 이들 복잡한 구성을 갖는 네트워크에 대한 서비스 품질 보장은 유선망에 비해 훨씬 어렵다. 이의 결과로, 이동통신 서비스 네트워크의 트래픽은 과거에 비해 폭발적으로 증가하였다. 따라서, 네트워크 사업자와 서비스 제공자들은 서비스의 성능 문제에 직면하고 있으며, 네트워크 사업자나 서비스 제공자들은 효과적인 서비스 품질관리 기술을 강력하게 요구하고 있다. QoS 감시는 QoS 제공과 보장을 위한 기본적인 기술로서, 실제 네트워크에서 QoS 감시를 위해서는 네트워크 및 서비스 성능 인자들과 QoS 인자들의 관계를 식별해야 한다. 본 논문에서는 서비스와 네트워크 성능인자 그리고, QoS 인자들간의 관계를 QoS metrics로 정의하며, 각 인자들의 관계는 계층적인 그래프로 나타낸다. QoS metrics의 정의와 이에 따른 계층적 그래프의 구성을 통해 세 가지 이점을 기대 할 수 있다. 첫째, 네트워크 사업자들은 QoS 저하의 주요 원인을 신속하게 식별 할 수 있다. 둘째, 네트워크 사업자들과 서비스 제공자들은 주관적인 QoS 를 수치 적인 성능 지표를 통해 측정이 가능하다. 마지막으로, QoS metrics 는 네트워크 사업자들과 서비스 제공자들이 QoS 감시 활동의 결과에 따라 그들의 네트워크를 재구성하는 데 도움을 주며 E2E QoS 제공에 효율성을 가져다 준다.현을 정형화하기 위해 Oolong 코드의 명령어들을 문법으로 작성하였으며, PGS를 통해 생성된 어휘 정보를 가지고 스캐너를 구성하였으며, 파싱테이블을 가지고 파서를 설계하였다. 파서의 출력으로 AST가 생성되면 번역기는 AST를 탐색하면서 의미적으로 동등한 MSIL 코드를 생성하도록 시스템을 컴파일러 기법을 이용하여 모듈별로 구성하였다.적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유

  • PDF

Novel Radix-26 DF IFFT Processor with Low Computational Complexity (연산복잡도가 적은 radix-26 FFT 프로세서)

  • Cho, Kyung-Ju
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.1
    • /
    • pp.35-41
    • /
    • 2020
  • Fast Fourier transform (FFT) processors have been widely used in various application such as communications, image, and biomedical signal processing. Especially, high-performance and low-power FFT processing is indispensable in OFDM-based communication systems. This paper presents a novel radix-26 FFT algorithm with low computational complexity and high hardware efficiency. Applying a 7-dimensional index mapping, the twiddle factor is decomposed and then radix-26 FFT algorithm is derived. The proposed algorithm has a simple twiddle factor sequence and a small number of complex multiplications, which can reduce the memory size for storing the twiddle factor. When the coefficient of twiddle factor is small, complex constant multipliers can be used efficiently instead of complex multipliers. Complex constant multipliers can be designed more efficiently using canonic signed digit (CSD) and common subexpression elimination (CSE) algorithm. An efficient complex constant multiplier design method for the twiddle factor multiplication used in the proposed radix-26 algorithm is proposed applying CSD and CSE algorithm. To evaluate performance of the previous and the proposed methods, 256-point single-path delay feedback (SDF) FFT is designed and synthesized into FPGA. The proposed algorithm uses about 10% less hardware than the previous algorithm.

A Study on the Estimation of Multi-Object Social Distancing Using Stereo Vision and AlphaPose (Stereo Vision과 AlphaPose를 이용한 다중 객체 거리 추정 방법에 관한 연구)

  • Lee, Ju-Min;Bae, Hyeon-Jae;Jang, Gyu-Jin;Kim, Jin-Pyeong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.10 no.7
    • /
    • pp.279-286
    • /
    • 2021
  • Recently, We are carrying out a policy of physical distancing of at least 1m from each other to prevent the spreading of COVID-19 disease in public places. In this paper, we propose a method for measuring distances between people in real time and an automation system that recognizes objects that are within 1 meter of each other from stereo images acquired by drones or CCTVs according to the estimated distance. A problem with existing methods used to estimate distances between multiple objects is that they do not obtain three-dimensional information of objects using only one CCTV. his is because three-dimensional information is necessary to measure distances between people when they are right next to each other or overlap in two dimensional image. Furthermore, they use only the Bounding Box information to obtain the exact coordinates of human existence. Therefore, in this paper, to obtain the exact two-dimensional coordinate value in which a person exists, we extract a person's key point to detect the location, convert it to a three-dimensional coordinate value using Stereo Vision and Camera Calibration, and estimate the Euclidean distance between people. As a result of performing an experiment for estimating the accuracy of 3D coordinates and the distance between objects (persons), the average error within 0.098m was shown in the estimation of the distance between multiple people within 1m.

Detecting and Avoiding Dangerous Area for UAVs Using Public Big Data (공공 빅데이터를 이용한 UAV 위험구역검출 및 회피방법)

  • Park, Kyung Seok;Kim, Min Jun;Kim, Sung Ho
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.6
    • /
    • pp.243-250
    • /
    • 2019
  • Because of a moving UAV has a lot of potential/kinetic energy, if the UAV falls to the ground, it may have a lot of impact. Because this can lead to human casualities, in this paper, the population density area on the UAV flight path is defined as a dangerous area. The conventional UAV path flight was a passive form in which a UAV moved in accordance with a path preset by a user before the flight. Some UAVs include safety features such as a obstacle avoidance system during flight. Still, it is difficult to respond to changes in the real-time flight environment. Using public Big Data for UAV path flight can improve response to real-time flight environment changes by enabling detection of dangerous areas and avoidance of the areas. Therefore, in this paper, we propose a method to detect and avoid dangerous areas for UAVs by utilizing the Big Data collected in real-time. If the routh is designated according to the destination by the proposed method, the dangerous area is determined in real-time and the flight is made to the optimal bypass path. In further research, we will study ways to increase the quality satisfaction of the images acquired by flying under the avoidance flight plan.

BIM Mesh Optimization Algorithm Using K-Nearest Neighbors for Augmented Reality Visualization (증강현실 시각화를 위해 K-최근접 이웃을 사용한 BIM 메쉬 경량화 알고리즘)

  • Pa, Pa Win Aung;Lee, Donghwan;Park, Jooyoung;Cho, Mingeon;Park, Seunghee
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.42 no.2
    • /
    • pp.249-256
    • /
    • 2022
  • Various studies are being actively conducted to show that the real-time visualization technology that combines BIM (Building Information Modeling) and AR (Augmented Reality) helps to increase construction management decision-making and processing efficiency. However, when large-capacity BIM data is projected into AR, there are various limitations such as data transmission and connection problems and the image cut-off issue. To improve the high efficiency of visualizing, a mesh optimization algorithm based on the k-nearest neighbors (KNN) classification framework to reconstruct BIM data is proposed in place of existing mesh optimization methods that are complicated and cannot adequately handle meshes with numerous boundaries of the 3D models. In the proposed algorithm, our target BIM model is optimized with the Unity C# code based on triangle centroid concepts and classified using the KNN. As a result, the algorithm can check the number of mesh vertices and triangles before and after optimization of the entire model and each structure. In addition, it is able to optimize the mesh vertices of the original model by approximately 56 % and the triangles by about 42 %. Moreover, compared to the original model, the optimized model shows no visual differences in the model elements and information, meaning that high-performance visualization can be expected when using AR devices.