• Title/Summary/Keyword: 이진이미지

Search Result 297, Processing Time 0.028 seconds

Developing the Prediction Model for Color Design by the Image Types in the Office Interior (오피스 실내 색채계획을 위한 이미지별 예측모델 작성)

  • 진은미;이진숙
    • Korean Institute of Interior Design Journal
    • /
    • no.32
    • /
    • pp.97-104
    • /
    • 2002
  • The purpose of this study is to suggest the prediction model for the color design by the image types in the office interior. This prediction model of the color design is for the more comfortable environment by using suitable, various colors fitted with business functions. In this research, we carried out the evaluation experiment with the variables such as the color on ceiling, wall, floor and the harmonies of color schemes. We set the prediction index through the multi-regression analysis. And the prediction model was made by these results. The design methods by the prediction model are as follows. 1) The $\ulcorner$variable$\lrcorner$ image was deeply influenced by the value and chroma and it was marked high in low value and high chroma and the harmonies of contrast and different color. 2) The $\ulcorner$comfortable$\lrcorner$ image was related to the value and chroma and it was marked high in high value and low chroma and harmonies of homogeneity and similar. 3) The $\ulcorner$warm$\lrcorner$ image was greatly influenced by the hue and the harmony of color schemes, and it was marked high in the warm colors and harmonies of homogeneity.

Fingerprint Recognition Using Artificial Neural Network (인공신경망을 이용한 지문인식)

  • Jung, Jung-hyun;Choi, Byung-Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.417-420
    • /
    • 2014
  • Importance of security system to prevent recently increased financial security accident is increasing. Biometric system between the security systems is focused. Fingerprint recognition has many useful aspects such as security, reliability and portability. In this treatise, fingerprint recognition technique is realized by using artificial neural network. Artificial Neural Network(ANN) is a mathematics learning model that makes specific patterns that a program can recognize to show a nerve network's characteristic on a computer. Input fingerprint images have a preprocessing process such as equalization, binarization and thinning. We extract minutiae feature in the images and program can recognize a fingerprint through ANN.

  • PDF

A Study on data pre-processing for rainfall estimation from CCTV videos (CCTV 영상 기반 강수량 산정을 위한 데이터 전처리 방안 연구)

  • Byun, Jongyun;Jun, Changhyun;Lee, Jinwook;Kim, Hyeonjun;Cha, Hoyoung
    • Proceedings of the Korea Water Resources Association Conference
    • /
    • 2022.05a
    • /
    • pp.167-167
    • /
    • 2022
  • 최근 빅데이터에 관련된 연구에 있어 데이터의 품질관리에 대한 논의가 꾸준히 이뤄져 오고 있다. 특히 이미지 처리 및 분석에 활용되어온 딥러닝 기술의 경우, 분류 작업 및 패턴인식 등으로부터 데이터의 특징을 추출함으로써 비지도학습(Unsupervised Learning)을 가능하게 한다는 장점이 있음에도 불구하고 빅데이터를 다루는 과정에 있어 용량, 다양성, 속도 및 신뢰성 측면에서의 한계가 있었다. 본 연구에서는 CCTV 영상을 활용한 강수량 산정 모델 개발에 있어 예측 정확도 향상 및 성능 개선을 도모할 수 있는 데이터 전처리 방법을 제안하였다. 서울 근린 AWS 4개소 지역(김포장기, 하남덕풍, 강동, 성남) 및 중앙대학교 지점 내 CCTV를 설치한 후, 최대 9개월의 영상을 확보하여 강수량 산정을 위한 딥러닝 모델을 개발하였다. 배경분리, 조도조정, 영역설정, 데이터증진, 이상데이터 분류 등이 가능한 알고리즘을 개발함으로써 데이터셋 자체에 대한 전처리 작업을 수행한 후, 이에 대한 결과를 기존 관측자료와 비교·분석하였다. 본 연구에서 제안한 전처리 방법들을 적용한 결과, 강수량 산정 모델의 예측 정확도를 평가하는 지표로 선정한 평균 제곱근 편차(Root Mean Square Error; RMSE)가 약 30% 감소함을 확인하였다. 본 연구의 결과로부터 CCTV 영상 데이터를 활용한 강수량 산정의 가능성을 확인할 수 있었으며 특히, 딥러닝 모델 개발시 필요한 적정 전처리 방법들에 대한 기준을 제시할 수 있을 것으로 판단된다.

  • PDF

Design of a Contactless Access Security System using Palm Creases and Palm Vein Pattern Matching (손금과 정맥혈관 패턴매칭을 이용한 비접촉 출입 보안시스템 설계)

  • Ki-Jung Kim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.19 no.1
    • /
    • pp.327-334
    • /
    • 2024
  • In this paper, we developed a system with a near-infrared LED light source with a wavelength of 950nm to acquire palm vein images and a white LED light source to acquire palm creases based on Raspberry Pi. In addition, we implemented a unique pattern-extractable image processing technology that can prevent counterfeiting and enhance security of mixed creases and palmprints through image pre-processing (Gray scaling, Histogram Equalization, Blurring, Thresholding, Thinning) for the acquired vein and palm images, and secured a source technology that can be used in a security-enhanced system.

A Study on the Cognitive Characteristics of Analog Image and Digital Image as a Symbolic Function in the Two-Dimensional Smartphone Form (2차원 스마트폰형상에 있어서 상징적 기능으로서 아날로그이미지 및 디지털이미지의 인지특성 연구)

  • Lee, Jin Seung;Kim, Jin Sung
    • Journal of the HCI Society of Korea
    • /
    • v.13 no.3
    • /
    • pp.17-33
    • /
    • 2018
  • Humans process aesthetic functions of objects such as form, size, color, and texture through vision, while at the same time observe them with a symbolic function by a new psychological interpretation based on their past experience. Therefore, it is more important to study and understand the thoughts and psychological influences of how humans perceive with their eyes than what humans simply look with them. With this research purpose in the background, this study will demonstrate in detail the cognitive characteristics of analog and digital images as a symbolic function with a "formative" point of view. Five hypotheses were established, which were proven through the following tests: smartphone, most frequently used in our daily lives, is simplified to a two-dimensional line drawing form, which is set to instances where the R(radius) is applied to the horizontal line of the two-dimensional form of smartphone, where Run-in-R(radius) is applied, and R(radius) rounding is applied to the edges of those shapes. The shapes were combined to form 12 pairs, which was used in a test to the test subjects. As a result, some human characteristics were observed; in specific, some helped prove objectively how humans perceived analog and digital images as psychologically stronger as a symbolic function. If people's thoughts and feelings gained through such study could be stored in database as one value and be provided to product designers, I believe it could be developed into design form as a basic emotional design that consumers desire.

  • PDF

Hangeul detection method based on histogram and character structure in natural image (다양한 배경에서 히스토그램과 한글의 구조적 특징을 이용한 문자 검출 방법)

  • Pyo, Sung-Kook;Park, Young-Soo;Lee, Gang Seung;Lee, Sang-Hun
    • Journal of the Korea Convergence Society
    • /
    • v.10 no.3
    • /
    • pp.15-22
    • /
    • 2019
  • In this paper, we proposed a Hangeul detection method using structural features of histogram, consonant, and vowel to solve the problem of Hangul which is separated and detected consonant and vowel The proposed method removes background by using DoG (Difference of Gaussian) to remove unnecessary noise in Hangul detection process. In the image with the background removed, we converted it to a binarized image using a cumulative histogram. Then, the horizontal position histogram was used to find the position of the character string, and character combination was performed using the vertical histogram in the found character image. However, words with a consonant vowel such as '가', '라' and '귀' are combined using a structural characteristic of characters because they are difficult to combine into one character. In this experiment, an image composed of alphabets with various backgrounds, an image composed of Korean characters, and an image mixed with alphabets and Hangul were tested. The detection rate of the proposed method is about 2% lower than that of the K-means and MSER character detection method, but it is about 5% higher than that of the character detection method including Hangul.

Performance of Feature-based Stitching Algorithms for Multiple Images Captured by Tunnel Scanning System (터널 스캐닝 다중 촬영 영상의 특징점 기반 접합 알고리즘 성능평가)

  • Lee, Tae-Hee;Park, Jin-Tae;Lee, Seung-Hun;Park, Sin-Zeon
    • Journal of the Korea institute for structural maintenance and inspection
    • /
    • v.26 no.5
    • /
    • pp.30-42
    • /
    • 2022
  • Due to the increase in construction of tunnels, the burdens of maintenance works for tunnel structures have been increasing in Korea. In addition, the increase of traffic volume and aging of materials also threatens the safety of tunnel facilities, therefore, maintenance costs are expected to increase significantly in the future. Accordingly, automated condition assessment technologies like image-based tunnel scanning system for inspection and diagnosis of tunnel facilities have been proposed. For image-based tunnel scanning system, it is key to create a planar image through stitching of multiple images captured by tunnel scanning system. In this study, performance of feature-based stitching algorithms suitable for stitching tunnel scanning images was evaluated. In order to find a suitable algorithm SIFT, ORB, and BRISK are compared. The performance of the proposed algorithm was determined by the number of feature extraction, calculation speed, accuracy of feature matching, and image stitching result. As for stitching performance, SIFT algorithm was the best in all parts of tunnel image. ORB and BRISK also showed satisfactory performance and short calculation time. SIFT can be used to generate precise planar images. ORB and BRISK also showed satisfactory stitching results, confirming the possibility of being used when real-time stitching is required.

Implementation of a Face Authentication Embedded System Using High-dimensional Local Binary Pattern Descriptor and Joint Bayesian Algorithm (고차원 국부이진패턴과 결합베이시안 알고리즘을 이용한 얼굴인증 임베디드 시스템 구현)

  • Kim, Dongju;Lee, Seungik;Kang, Seog Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.9
    • /
    • pp.1674-1680
    • /
    • 2017
  • In this paper, an embedded system for face authentication, which exploits high-dimensional local binary pattern (LBP) descriptor and joint Bayesian algorithm, is proposed. We also present a feasible embedded system for the proposed algorithm implemented with a Raspberry Pi 3 model B. Computer simulation for performance evaluation of the presented face authentication algorithm is carried out using a face database of 500 persons. The face data of a person consist of 2 images, one for training and the other for test. As performance measures, we exploit score distribution and face authentication time with respect to the dimensions of principal component analysis (PCA). As a result, it is confirmed that an embedded system having a good face authentication performance can be implemented with a relatively low cost under an optimized embedded environment.

Introduction to the Indian Buffet Process: Theory and Applications (인도부페 프로세스의 소개: 이론과 응용)

  • Lee, Youngseon;Lee, Kyoungjae;Lee, Kwangmin;Lee, Jaeyong;Seo, Jinwook
    • The Korean Journal of Applied Statistics
    • /
    • v.28 no.2
    • /
    • pp.251-267
    • /
    • 2015
  • The Indian Buffet Process is a stochastic process on equivalence classes of binary matrices having finite rows and infinite columns. The Indian Buffet Process can be imposed as the prior distribution on the binary matrix in an infinite feature model. We describe the derivation of the Indian buffet process from a finite feature model, and briefly explain the relation between the Indian buffet process and the beta process. Using a Gaussian linear model, we describe three algorithms: Gibbs sampling algorithm, Stick-breaking algorithm and variational method, with application for finding features in image data. We also illustrate the use of the Indian Buffet Process in various type of analysis such as dyadic data analysis, network data analysis and independent component analysis.

Evaluation of Pore Size Distribution of Berea Sandstone using X-ray Computed Tomography (X-ray CT를 이용한 베레아 사암의 공극크기분포 산정)

  • Kim, Kwang Yeom;Kim, Kyeongmin
    • The Journal of Engineering Geology
    • /
    • v.24 no.3
    • /
    • pp.353-362
    • /
    • 2014
  • Pore structures in porous rock play an important role in hydraulic & mechanical behaviour of rock. Porosity, size distribution and orientation of pores represent the characteristics of pore structures of porous rock. While effective porosity can be measured easily by conventional experiment, pore size distribution is hard to be quantified due to the lack of corresponding experiment. We assessed pore size distribution of Berea sandstone using X-ray CT image based analysis combined with associated images processing, i.e., image filtering, binarization and skeletonization subsequently followed by the assessment of local thickness and star chord length. The aim of this study is to propose a new and effective way to evaluate pore structures of porous rock using X-ray CT based analysis for pore size distribution.