• Title/Summary/Keyword: Digital mask technique

Search Result 32, Processing Time 0.024 seconds

A Low Power Multi-Function Digital Audio SoC

  • Lim, Chae-Duck;Lee, Kyo-Sik
    • Proceedings of the IEEK Conference
    • /
    • 2004.06b
    • /
    • pp.399-402
    • /
    • 2004
  • This paper presents a system-on-chip prototype implementing a full integration for a portable digital audio system. The chip is composed of a audio processor block to implements audio decoding and voice compression or decompression software, a system control block including 8-bit MCU core and Memory Management Unit (MMU) a low power 16-bit ${\Sigma}{\Delta}$ CODEC, two DC-to-BC converter, and a flash memory controller. In order to support other audio algorithms except Mask ROM type's fixed codes, a novel 16-bit fixed-point DSP core with the program-download architecture is proposed. Funker, an efficient power management technique such as task-based clock management is implemented to reduce power consumption for portable application. The proposed chip has been fabricated with a 4 metal 0.25um CMOS technology and the chip area is about 7.1 mm ${\times}$ 7.1mm with 100mW power dissipation at 2.5V power supply.

  • PDF

Implementation and Evaluation of the 100 Watt High Power Amplifier for Broadband Digital TV Repeater (광대역 디지털TV 중계기용 100 Watt 고출력증폭기의 구현 및 특성 측정에 관한 연구)

  • Sung, Jeon-Joong
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.31 no.5
    • /
    • pp.575-582
    • /
    • 2007
  • In this paper, a 100 Watt high power amplifier has been implemented and performed evaluation, which is operating at UHF band ($470\;{\sim}\;806\;MHz$) for Digital TV repeater. To achieve increase of bandwidth and high power capability, 3-way power combiner and divider of Wilkinson type was adopted. In order to measure the fabricated 100 Watt power amplifier, the estimation technique function which makes equivalent mask was used. As a result of the measurement, the existence of pilot signal is confirmed and the signal transmitted at the rated output power 100 Watt is brought out the flat feature through 6 MHz bandwidth. and it resulted that its value was less than -47 dB at the edge of radiation channel and less than -110 dB at more than 6 MHz position from channel edge.

Extracting Blood Vessels through Similarity Analysis and Intensity Correction (유사도 분석과 명암 보정을 통한 혈관 추출)

  • Jang Seok-Woo
    • Journal of Internet Computing and Services
    • /
    • v.7 no.4
    • /
    • pp.33-43
    • /
    • 2006
  • This paper proposes a method to extract coronary arteries effectively in the angiography, In general. DSA(Digital Subtraction Angiography) is a well-established technique for the visualization of coronary arteries, DSA involves the subtraction of a mask image, an image of a heart before the injection of contrast medium, from a live image, However, this technique is sensitive to the movement of background and can cause wrong detection due to the variance of background intensity between two images. Therefore, this paper solves the structural problem resulted from background movement by selecting an image which has the least difference of movement through the similarity analysis of background texture, and it extracts only the blood vessels effectively through local intensity correction of the selected images, Experimental results show that the proposed method has the lower false-detection rate and higher accuracy rate than existing methods.

  • PDF

Algorithm Development of a Visibility Monitoring Technique Using Digital Image Analysis

  • Pokhrel, Rajib;Lee, Hee-Kwan
    • Asian Journal of Atmospheric Environment
    • /
    • v.5 no.1
    • /
    • pp.8-20
    • /
    • 2011
  • Atmospheric visibility is one of the indicators used to evaluate the status of air quality. Based on a conceptual definition of visibility as the maximum distance at which the outline of the selected target can be recognized, an image analysis technique is introduced here and an algorithm is developed for visibility monitoring. Although there are various measurement techniques, ranging from bulk and precise instruments to naked eye observation techniques, each has their own limitations. In this study, a series of image analysis techniques were introduced and examined for in-situ application. An imaging system was built up using a digital camera and was installed on the study sites in Incheon and Seoul separately. Visual range was also monitored by using a dual technology visibility sensor in Incheon and transmissometer in Seoul simultaneously. The Sobel mask filter was applied to detect the edge lines of objects by extracting the high frequency from the digital image. The root mean square (RMS) index of variation among the pixels in the image was substantially correlated with the visual ranges in Incheon and Seoul with correlations of $R^2$=0.88 and $R^2$=0.71, respectively. The regression line equations between the visual range and the RMS index in Incheon and Seoul were VR=$2.36e^{0.46{\times}(RMS)}$ and VR=$3.18e^{0.15{\times}(RMS)}$, respectively. It was also confirmed that the fine particles ($PM_{2.5}$) have more impacts to the impairment of visibility than coarse particles.

Linearity Improvement of Class E Amplifier Using Digital Predistortion (디지털 사전왜곡을 이용한 마이크로파 E급 증폭기의 선형성 개선)

  • Park, Chan-Hyuck;Koo, Kyung-Heon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.44 no.3 s.357
    • /
    • pp.92-97
    • /
    • 2007
  • Switching mode amplifiers have been studied widely for use at microwave frequency range, and the class E amplifier which is a type of switching mode amplifier offers very high efficiency approaching 100%. In this paper, 2.4GHz microwave class E amplifier with 66% power added efficiency (PAE) and 17.6dBm output has been linearized for use at wireless LAN transmitter, and digital predistortion technique with look up table is applied. With -3dBm input power of wireless LAN, measured output spectrum can meet the required IEEE 802.11g standard spectrum mask, and the digital predistortion output spectrum has been improved by 5dB of ACPR at 20MHz offset from center frequency.

Vibration test and verification of Multi-Anode-Photo-Multiplier-Tube's survivability with X-Ray Coded Mask Gamma Ray Burst Alert Trigger mechanical system in space launch environment

  • Choi, Ji Nyeong;Choi, Yeon Ju;Jeong, Soomin;Jung, Aera;Kim, Min Bin;Kim, Ji Eun;Kim, Sug-Whan;Kim, Ye Won;Lee, Jik;Lim, Heuijin;Min, Kyung Wook;Na, Go Woon;Nam, Ji Woo;Park, Il Hung;Ripa, Jakub.;Suh, Jung Eun
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.37 no.2
    • /
    • pp.209.2-209.2
    • /
    • 2012
  • UFFO Burst Alert & Trigger telescope (UBAT) is one of major instruments of UFFO-Pathfinder. The UBAT aims at 10 arcmin resolution localization of Gamma Ray Bursts with X-ray coded mask technique. It has $400mm{\times}400mm$ coded mask aperture, hopper, shielding and detector module with effective area of $191cm^2$. The detector module consists of an assembly of 36 64-ch MAPMTs and $25mm{\times}25mm$ pixellated YSO crystal array, and associated analog and digital electronics of about 2500 channels. We performed a vibration test using a dummy MAPMT with the detector module structure to measure the indused stress applied onto the MAPMT. We designed a sub-structure on the detector module to avoid the resonance that would otherwise deforms the detector module structure. A finite element analysis confirms the reduction of the load acceleration down to 12g. The experimental results are to be reported. Consequently, it proves that the MAPMT arrays of the flight UBAT detector module structure would survive in the space launch environment.

  • PDF

A Generation of ROI Mask and An Automatic Extraction of ROI Using Edge Distribution of JPEG2000 Image (JPEG2000 이미지의 에지 분포를 이용한 ROI 마스크 생성과 자동 관심영역 추출)

  • Seo, Yeong Geon;Kim, Hee Min;Kim, Sang Bok
    • Journal of Digital Contents Society
    • /
    • v.16 no.4
    • /
    • pp.583-593
    • /
    • 2015
  • Today, caused by the growth of computer and communication technology, multimedia, especially image data are being used in different application divisions. JPEG2000 that is widely used these days provides a Region-of-Interest(ROI) technique. The extraction of ROI has to be rapidly executed and automatically extracted in a huge amount of image because of being seen preferentially to the users. For this purpose, this paper proposes a method about preferential processing and automatic extraction of ROI using the distribution of edge in the code block of JPEG2000. The steps are the extracting edges, automatical extracting of a practical ROI, grouping the ROI using the ROI blocks, generating the mask blocks and then quantization, ROI coding which is the preferential processing, and EBCOT. In this paper, to show usefulness of the method, we experiment its performance using other methods, and executes the quality evaluation with PSNR between the images not coding an ROI and coding it.

Phase-based virtual image encryption and decryption system using Joint Transform Correlator

  • Seo, Dong-Hoan;Cho, Kyu-Bo;Park, Se-Joon;Cho, Woong-Ho;Noh, Duck-Soo;Kim, Soo-Joong
    • Proceedings of the IEEK Conference
    • /
    • 2002.07a
    • /
    • pp.450-453
    • /
    • 2002
  • In this paper a Phase-based virtual image encryption and decryption techniques based on a joint transform correlator (JTC) are proposed. In this method, an encrypted image is obtained by multiplying a phase-encoded virtual image that contains no information from the decrypted image with a random phase. Even if this encryption process converts a virtual image into a white-noise-like image, the unauthorized users can permit a counterfeiting of the encrypted image by analyzing the random phase mask using some phase-contrast technique. However, they cannot reconstruct the required image because the virtual image protects the original image from counterfeiting and unauthorized access. The proposed encryption technique does not suffer from strong auto-correlation terms appearing in the output plane. In addition, the reconstructed data can be directly transmitted to a digital system for real-time processing. Based on computer simulations, the proposed encryption technique and decoding system were demonstrated as adequate for optical security applications.

  • PDF

Simultaneous measurement of velocity fields of wind-blown sand and surrounding wind in an atmospheric boundary layer

  • Zhang W.;Wang Y.;Lee S. J.
    • 한국가시화정보학회:학술대회논문집
    • /
    • 2005.12a
    • /
    • pp.11-16
    • /
    • 2005
  • Saltation is the most important mechanism of wind-blown sand transport. Till now the interaction between wind and sand has not been fully understood. In this study the saltation of sand sample taken from Taklimakan desert was tested in a simulated atmospheric boundary layer. The captured particle images containing both the tracers for wind and saltating sand, were separated by a digital phase mask technique. Both PIV and PTV methods were employed to extract the velocity fields of wind and the dispersed sand particles, respectively. The mean streamwise wind velocity field and turbulent statistics with and without sand transportation were compared, revealing the effect of the moving sand on the wind field. This study is helpful to understand the interaction between wind and blown sand (in saltation), and provide reliable experimental data fur evaluating numerical models.

  • PDF

Accelerated Convolution Image Processing by Using Look-Up Table and Overlap Region Buffering Method (Loop-Up Table과 필터 중첩영역 버퍼링 기법을 이용한 컨벌루션 영상처리 고속화)

  • Kim, Hyun-Woo;Kim, Min-Young
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.49 no.4
    • /
    • pp.17-22
    • /
    • 2012
  • Convolution filtering methods have been widely applied to various digital signal processing fields for image blurring, sharpening, edge detection, and noise reduction, etc. According to their application purpose, the filter mask size or shape and the mask value are selected in advance, and the designed filter is applied to input image for the convolution processing. In this paper, we proposed an image processing acceleration method for the convolution processing by using two-dimensional Look-up table (LUT) and overlap-region buffering technique. First, based on the fixed convolution mask value, the multiplication operation between 8 or 10 bit pixel values of the input image and the filter mask values is performed a priori, and the results memorized in LUT are referred during the convolution process. Second, based on symmetric structural characteristics of the convolution filters, inherent duplicated operation region is analysed, and the saved operation results in one step before in the predefined memory buffer is recalled and reused in current operation step. Through this buffering, unnecessary repeated filter operation on the same regions is minimized in sequential manner. As the proposed algorithms minimize the computational amount needed for the convolution operation, they work well under the operation environments utilizing embedded systems with limited computational resources or the environments of utilizing general personnel computers. A series of experiments under various situations verifies the effectiveness and usefulness of the proposed methods.