• Title/Summary/Keyword: Host Image

Search Result 192, Processing Time 0.025 seconds

Correlation between mergers and AGN activity : a case study with MARK 478

  • Hong, Ju-Eun;Im, Myung-Shin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.35 no.2
    • /
    • pp.34.1-34.1
    • /
    • 2010
  • Studies suggest that activities in luminous AGNs, residing mostly in early-type galaxies, are triggered by merging. However, the observational evidence for the connection between mergers and AGN activity is not clear yet because tracer of the past merging activities such as tidal tail, shell are often too faint. To see if we can reveal the merging features with a small telescope, we observed an AGN, MARK 478, at z=0.077 with long exposure time (7550 seconds) in V filter at Maidanak observatory. Our 2-D fitting analysis shows that the host galaxy of MARK 478 has the bulge to the total luminosity ratio of 0.3. And the residual image, after subtracting point spread function (PSF), bulge and disk components, shows that the host galaxy has an arm-like feature that could be a spiral arm or a feature from minor merging. We also show that the structural parameters obtained from our 2-D fitting match well with those derived from HST image. The promising result suggests that studies of low redshift AGN host galaxies are possible with data from a small telescope. In order to allow a statistical analysis, we hope to expand our sample size in future.

  • PDF

The Obstacle Avoidance Algorithm of Mobile Robot using Line Histogram Intensity (Line Histogram Intensity를 이용한 이동로봇의 장애물 회피 알고리즘)

  • 류한성;최중경;구본민;박무열;윤경섭;윤석영
    • Proceedings of the IEEK Conference
    • /
    • 2002.06d
    • /
    • pp.331-334
    • /
    • 2002
  • In this paper, we present two types of vision algorithm that mobile robot has CCD camera. for obstacle avoidance. This is simple algorithm that compare with grey level from input images. Also, The mobile robot depend on image processing and move command from PC host. we has been studied self controlled mobile robot system with CCD camera. This system consists of digital signal processor, step motor, RF module and CCD camera. we used wireless RF module for movable command transmitting between robot and host PC. This robot go straight until recognize obstacle from input image that preprocessed by edge detection, converting, thresholding. And it could avoid the obstacle when recognize obstacle by line histogram intensity. Host PC measurement wave from various line histogram each 20 Pixel. This histogram Is ( x , y ) value of pixel. For example, first line histogram intensity wave from ( 0, 0 ) to ( 0, 197 ) and last wave from ( 280, 0 ) to ( 280, 197 ). So we find uniform wave region and nonuniform wave region. The period of uniform wave is obstacle region. we guess that algorithm is very useful about moving robot for obstacle avoidance.

  • PDF

A Study on the Design of Format Converter for Pixel-Parallel Image Processing (픽셀-병렬 영상처리에 있어서 포맷 컨버터 설계에 관한 연구)

  • 김현기;김현호;하기종;최영규;류기환;이천희
    • Proceedings of the IEEK Conference
    • /
    • 2001.06b
    • /
    • pp.269-272
    • /
    • 2001
  • In this paper we proposed the format converter design and implementation for real time image processing. This design method is based on realized the large processor-per-pixel array by integrated circuit technology in which this two types of integrated structure is can be classify associative parallel processor and parallel process with DRAM cell. Layout pitch of one-bit-wide logic is identical memory cell pitch to array high density PEs in integrate structure. This format converter design has control path implementation efficiently, and can be utilized the high technology without complicated controller hardware. Sequence of array instruction are generated by host computer before process start, and instructions are saved on unit controller. Host computer is executed the pixel-parallel operation starting at saved instructions after processing start

  • PDF

Development of Multiple Fault Diagnosis Methods for Intelligence Maintenance System (지적보전시스템의 실시간 다중고장진단 기법 개발)

  • Bae, Yong-Hwan
    • Journal of the Korean Society of Safety
    • /
    • v.19 no.1
    • /
    • pp.23-30
    • /
    • 2004
  • Modern production systems are very complex by request of automation, and failure modes that occur in thisautomatic system are very various and complex. The efficient fault diagnosis for these complex systems is essential for productivity loss prevention and cost saving. Traditional fault diagnostic system which perforns sequential fault diagnosis can cause catastrophic failure during diagnosis when fault propagation is very fast. This paper describes the Real-time Intelligent Multiple Fault Diagnosis System (RIMFDS). RIMFDS assesses current machine condition by using sensor signals. This system deals with multiple fault diagnosis, comprising of two main parts. One is a personal computer for remote signal generation and transmission and the other is a host system for multiple fault diagnosis. The signal generator generates various faulty signals and image information and sends them to the host. The host has various modules and agents for efficient multiple fault diagnosis. A SUN workstation is used as a host for multiple fault modules and agents for efficient multiple fault diagnosis. A SUN workstation is used as a host for multiple fault diagnosis and graphic representation of the results. RIMFDS diagnoses multiple faults with fast fault propagation and complex physical phenomenon. The new system based on multiprocessing diagnoses by using Hierarchical Artificial Neural Network (HANN).

Gray-level Image Watermarking using Wavelet Transform (웨이브렛 변환을 이용한 그레이-레벨 영상 워터마킹)

  • Min, Sun-Jin;Chung, Hoon;Kim, Chung-Hwa
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.487-490
    • /
    • 2001
  • With the establishment of the optimized copyright, digital image watermarking technique is demended to identify the owner of a certain image and to avoid the unauthorized distribution of digital image copies. Also, a robust watermarking approach should survive several possible attacks, such as image processing and lossy image compession. The proposed scheme distributes the 256 gray-level signature information in discrete wavelet transform domain of the host image where is very little visible distortion. While much of the privious work used signature data that is a small fraction of th e host images the proposed approach can easily handle gray-scale Images. As the result, stable reconstruction can be obtained even when the images are transformed, JPEG lossy compression or otherwise modified by low-pass filtering operations.

  • PDF

GPU Acceleration of Range Doppler Algorithm for Real-Time SAR Image Generation (실시간 SAR 영상 생성을 위한 Range Doppler Algorithm의 GPU 가속)

  • Dong-Min Jeong;Woo-Kyung Lee;Myeong-Jin Lee;Yun-Ho Jung
    • Journal of IKEEE
    • /
    • v.27 no.3
    • /
    • pp.265-272
    • /
    • 2023
  • In this paper, a GPU-accelerated kernel of range Doppler algorithm (RDA) was developed for real-time image formation based on frequency modulated continuous wave (FMCW) synthetic aperture radar (SAR). A pinned memory was used to minimize the data transfer time between the host and the GPU device, and the kernel was configured to perform all RDA operations on the GPU to minimize the number of data transfers. The dataset was obtained through the FMCW drone SAR experiment, and the GPU acceleration effect was measured in an intel i7-9700K CPU, 32GB RAM, and Nvidia RTX 3090 GPU environment. Including the data transfer time between host and devices, it was measured to be accelerated up to 3.41 times compared to the CPU, and when only the acceleration effect of operation was measured without including the data transfer time, it was confirmed that it could be accelerated up to 156 times.

Implementation of Remote Image Surveillance for Mobile Robot Platform based on Embedded Processor (주행용 로봇 플랫폼을 위한 임베디드 프로세서 기반 원격영상감시 시스템 구현)

  • Han, Kyong-Ho;Yun, Hyo-Won
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.23 no.1
    • /
    • pp.125-131
    • /
    • 2009
  • In this paper, we proposed the remote visual monitoring system on mobile robot platform. The proposed system is composed of ARM9 core PXA255 processor, micro CMOS camera and wireless network and the captured visual image is transmitted via 803.11b/g wireless LAN(WLAN) for remote visual monitoring operations. Robot platform maneuvering command is transmitted via WLAN from host and the $640{\times}480$, $320{\times}240$ pixel fixed visual image is transmitted to host at the rate of $3{\sim}10$ frames per second. Experimental system is implemented on Linux OS base and tested for remote visual monitoring operation and verified the proposed objects.

Copyright Protection for Digital Image by Watermarking Technique

  • Ali, Suhad A.;Jawad, Majid Jabbar;Naser, Mohammed Abdullah
    • Journal of Information Processing Systems
    • /
    • v.13 no.3
    • /
    • pp.599-617
    • /
    • 2017
  • Due to the rapid growth and expansion of the Internet, the digital multimedia such as image, audio and video are available for everyone. Anyone can make unauthorized copying for any digital product. Accordingly, the owner of these products cannot protect his ownership. Unfortunately, this situation will restrict any improvement which can be done on the digital media production in the future. Some procedures have been proposed to protect these products such as cryptography and watermarking techniques. Watermarking means embedding a message such as text, the image is called watermark, yet, in a host such as a text, an image, an audio, or a video, it is called a cover. Watermarking can provide and ensure security, data authentication and copyright protection for the digital media. In this paper, a new watermarking method of still image is proposed for the purpose of copyright protection. The procedure of embedding watermark is done in a transform domain. The discrete cosine transform (DCT) is exploited in the proposed method, where the watermark is embedded in the selected coefficients according to several criteria. With this procedure, the deterioration on the image is minimized to achieve high invisibility. Unlike the traditional techniques, in this paper, a new method is suggested for selecting the best blocks of DCT coefficients. After selecting the best DCT coefficients blocks, the best coefficients in the selected blocks are selected as a host in which the watermark bit is embedded. The coefficients selection is done depending on a weighting function method, where this function exploits the values and locations of the selected coefficients for choosing them. The experimental results proved that the proposed method has produced good imperceptibility and robustness for different types of attacks.

A Novel RGB Image Steganography Using Simulated Annealing and LCG via LSB

  • Bawaneh, Mohammed J.;Al-Shalabi, Emad Fawzi;Al-Hazaimeh, Obaida M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.1
    • /
    • pp.143-151
    • /
    • 2021
  • The enormous prevalence of transferring official confidential digital documents via the Internet shows the urgent need to deliver confidential messages to the recipient without letting any unauthorized person to know contents of the secret messages or detect there existence . Several Steganography techniques such as the least significant Bit (LSB), Secure Cover Selection (SCS), Discrete Cosine Transform (DCT) and Palette Based (PB) were applied to prevent any intruder from analyzing and getting the secret transferred message. The utilized steganography methods should defiance the challenges of Steganalysis techniques in term of analysis and detection. This paper presents a novel and robust framework for color image steganography that combines Linear Congruential Generator (LCG), simulated annealing (SA), Cesar cryptography and LSB substitution method in one system in order to reduce the objection of Steganalysis and deliver data securely to their destination. SA with the support of LCG finds out the optimal minimum sniffing path inside a cover color image (RGB) then the confidential message will be encrypt and embedded within the RGB image path as a host medium by using Cesar and LSB procedures. Embedding and extraction processes of secret message require a common knowledge between sender and receiver; that knowledge are represented by SA initialization parameters, LCG seed, Cesar key agreement and secret message length. Steganalysis intruder will not understand or detect the secret message inside the host image without the correct knowledge about the manipulation process. The constructed system satisfies the main requirements of image steganography in term of robustness against confidential message extraction, high quality visual appearance, little mean square error (MSE) and high peak signal noise ratio (PSNR).

The Research on the Characteristics of Show Hostess Clothing and Presented Items in the CATV Home-Shopping Network Program (TV 홈쇼핑 판매제품별 쇼호스트의 의상 특성조사)

  • Sung, Kwang-Sook
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.8 s.108
    • /
    • pp.138-147
    • /
    • 2006
  • This study tried to research on clothing styles of show hostess in the cable television home-shopping network program. Especially, show hostess's clothing styles were classified into 5 sections according to selling products, that is baby goods, insured goods, underwear, bedclothes and beauty goods. item is examined 7 levels by texture, color, clothing item, fashion image, fashion trend, fashion type, and fashion silhouette. The results showed that significant correlations between show host's clothing and selling products. The another findings of this study is that show hostess's clothing is aimed at the taste of main consumer such as housewife. Conseguently this study reaffirms the importance of the shopping hostess's clothing influnce according to selling products's characteristics.