• Title/Summary/Keyword: Identifier Areas

Search Result 9, Processing Time 0.027 seconds

Recognition of Container Identifiers Using 8-directional Contour Tracking Method and Refined RBF Network

  • Kim, Kwang-Baek
    • Journal of information and communication convergence engineering
    • /
    • v.6 no.1
    • /
    • pp.100-104
    • /
    • 2008
  • Generally, it is difficult to find constant patterns on identifiers in a container image, since the identifiers are not normalized in color, size, and position, etc. and their shapes are damaged by external environmental factors. This paper distinguishes identifier areas from background noises and removes noises by using an ART2-based quantization method and general morphological information on the identifiers such as color, size, ratio of height to width, and a distance from other identifiers. Individual identifier is extracted by applying the 8-directional contour tracking method to each identifier area. This paper proposes a refined ART2-based RBF network and applies it to the recognition of identifiers. Through experiments with 300 container images, the proposed algorithm showed more improved accuracy of recognizing container identifiers than the others proposed previously, in spite of using shorter training time.

Compound Image Identifier Based on Linear Component and Luminance Area (직선요소와 휘도영역 기반 복합 정지영상 인식자)

  • Park, Je-Ho
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.6 no.1
    • /
    • pp.48-54
    • /
    • 2011
  • As personal or compact devices with image acquisition functionality are becoming easily available for common users, the voluminous images that need to be managed by image related services or systems demand efficient and effective methods in the perspective of image identification. The objective of image identification is to associate an image with a unique identifier. Moreover, whenever an image identifier needs to be regenerated, the newly generated identifier should be consistent. In this paper, we propose three image identifier generation methods utilizing image features: linear component, luminance area, and combination of both features. The linear component based method exploits the information of distribution of partial lines over an image, while the luminance area based method utilizes the partition of an image into a number of small areas according to the same luminance degree. The third method is proposed in order to take advantage of both former methods. In this paper, we also demonstrate the experimental evaluations for uniqueness and similarity analysis that have shown favorable results.

Analysis of Image Identifier Generation Methods for Various Size Patterns (크기 변화에 따른 정지영상 식별자 생성 분석)

  • Park, Je-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.9 no.4
    • /
    • pp.51-56
    • /
    • 2010
  • As the price of image acquisition component becomes low enough, the compact and easily accessible handheld devices are generally equipped with image acquisition functionality. This trend speeds up various applications in diverse areas such as image related services and software. Therefore users strongly need to identify their images effectively and efficiently so that the duplicated images are perceived as one physical entity. In order to handle this environment, we propose a number of methods that generate image identifiers utilizing fundamental image features. In this paper, we analyze the identifier generation methods in terms of various size patterns, especially for tiny size cases, since the small images does not contain abundant pixels for feature extraction. In this paper, experimental evaluation over identifier generation methods' behavior according to different sizes is demonstrated.

Image Hashing based Identifier with Entropy Operator (엔트로피 연산자를 이용한 영상 해싱 기반 인식자)

  • Park, Je-Ho
    • Journal of the Semiconductor & Display Technology
    • /
    • v.20 no.3
    • /
    • pp.93-96
    • /
    • 2021
  • The desire for a technology that can mechanically acquire 2D images starting with the manual method of drawing has been making possible a wide range of modern image-based technologies and applications over a period. Moreover, this trend of the utilization of image-related technology as well as image-based information is likely to continue. Naturally, as like other technology areas, the function that humans produce and utilize by using images needs to be automated by using computing-based technologies. Surprisingly, technology using images in the future will be able to discover knowledge that humans have never known before through the information-related process that enables new perception, far beyond the scope of use that human has used before. Regarding this trend, the manipulation and configuration of massively distributed image database system is strongly demanded. In this paper, we discuss image identifier production methods based on the utilization of the image hashing technique which especially puts emphasis over an entropy operator.

Container Image Recognition using Fuzzy-based Noise Removal Method and ART2-based Self-Organizing Supervised Learning Algorithm (퍼지 기반 잡음 제거 방법과 ART2 기반 자가 생성 지도 학습 알고리즘을 이용한 컨테이너 인식 시스템)

  • Kim, Kwang-Baek;Heo, Gyeong-Yong;Woo, Young-Woon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.7
    • /
    • pp.1380-1386
    • /
    • 2007
  • This paper proposed an automatic recognition system of shipping container identifiers using fuzzy-based noise removal method and ART2-based self-organizing supervised learning algorithm. Generally, identifiers of a shipping container have a feature that the color of characters is blacker white. Considering such a feature, in a container image, all areas excepting areas with black or white colors are regarded as noises, and areas of identifiers and noises are discriminated by using a fuzzy-based noise detection method. Areas of identifiers are extracted by applying the edge detection by Sobel masking operation and the vertical and horizontal block extraction in turn to the noise-removed image. Extracted areas are binarized by using the iteration binarization algorithm, and individual identifiers are extracted by applying 8-directional contour tacking method. This paper proposed an ART2-based self-organizing supervised learning algorithm for the identifier recognition, which improves the performance of learning by applying generalized delta learning and Delta-bar-Delta algorithm. Experiments using real images of shipping containers showed that the proposed identifier extraction method and the ART2-based self-organizing supervised learning algorithm are more improved compared with the methods previously proposed.

Application of Navigating System based on Bluetooth Smart (블루투스 스마트 기반의 내비게이팅 시스템)

  • Lee, YoungDoo;Jan, Sana Ullah;Koo, Insoo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.1
    • /
    • pp.69-76
    • /
    • 2017
  • Bluetooth Low Energy (BLE), also known as Bluetooth Smart, has ultra-low power consumption; in fact, BLE-enabled devices can run on a single coin cell battery for several years. In addition, BLE can estimate the approximate distance between two devices using the Received Signal Strength Indication (RSSI) feature, enabling relatively precise navigation in indoor and small outdoor areas where GPS is not an option. In this paper, an experimental setup is presented in which BLE is used for navigation within a small outdoor area. BLE-based beacons are installed in fixed positions, which periodically transmit a universally unique identifier (UUID). A smart device receives the UUID and sends it to a database server using cellular or Wi-Fi technology. The server returns fixed position information corresponding to the received UUID codes, and the smart device uses that information to compute its current position based on relative signal strengths, and display it on a map. These results demonstrate the successful application of BLE technology for navigation in small outdoor areas. This system can be implemented for indoor navigation as well.

Efficient K-Anonymization Implementation with Apache Spark

  • Kim, Tae-Su;Kim, Jong Wook
    • Journal of the Korea Society of Computer and Information
    • /
    • v.23 no.11
    • /
    • pp.17-24
    • /
    • 2018
  • Today, we are living in the era of data and information. With the advent of Internet of Things (IoT), the popularity of social networking sites, and the development of mobile devices, a large amount of data is being produced in diverse areas. The collection of such data generated in various area is called big data. As the importance of big data grows, there has been a growing need to share big data containing information regarding an individual entity. As big data contains sensitive information about individuals, directly releasing it for public use may violate existing privacy requirements. Thus, privacy-preserving data publishing (PPDP) has been actively studied to share big data containing personal information for public use, while preserving the privacy of the individual. K-anonymity, which is the most popular method in the area of PPDP, transforms each record in a table such that at least k records have the same values for the given quasi-identifier attributes, and thus each record is indistinguishable from other records in the same class. As the size of big data continuously getting larger, there is a growing demand for the method which can efficiently anonymize vast amount of dta. Thus, in this paper, we develop an efficient k-anonymity method by using Spark distributed framework. Experimental results show that, through the developed method, significant gains in processing time can be achieved.

A Design Communication System for Message Protection in Next Generation Wireless Network Environment (차세대 무선 네트워크 환경에서 메시지 보호를 위한 통신 시스템 설계)

  • Min, So-Yeon;Jin, Byung-Wook
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.16 no.7
    • /
    • pp.4884-4890
    • /
    • 2015
  • These days most of people possesses an average of one to two mobile devices in the world and a wireless network market is gradually expanding. Wi-Fi preference are increasing in accordance with the use growth of mobile devices. A number of areas such as public agencies, health care, education, learning, and content, manufacturing, retail create new values based on Wi-Fi, and the global network is built and provides complex services. However, There exist some attacks and vulnerabilities like wireless radio device identifier vulnerability, illegal use of network resources through the MAC forgery, wireless authentication key cracking, unauthorized AP / devices attack in the next generation radio network environment. In addition, advanced security technology research, such as authentication Advancement and high-speed secure connection is not nearly progress. Therefore, this paper designed a secure communication system for message protection in next-generation wireless network environments by device identification and, designing content classification and storage protocols. The proposed protocol analyzed safeties with respect to the occurring vulnerability and the securities by comparing and analyzing the existing password techniques in the existing wireless network environment. It is slower 0.72 times than existing cypher system, WPA2-PSK, but enforces the stability in security side.

A Study on Construction & Management of Urban Spatial Information Based on Digital Twin (디지털트윈 기반의 도시 공간정보 구축 및 관리에 관한 연구)

  • Lih, BongJoo
    • Journal of Cadastre & Land InformatiX
    • /
    • v.53 no.1
    • /
    • pp.47-63
    • /
    • 2023
  • The Seoul Metropolitan Government is building and operating digital twin-based urban spatial information to solve various problems in the city and provide public services. Two essential factors to ensure the stable utilization of spatial information for the implementation of such a digital twin city are the latest and quality of the data. However, it is time-consuming and costly to maintain continuous updating of high-quality urban spatial information. To overcome this problem, we studied efficient urban spatial information construction technology and the operation, management, and update procedures of construction data. First, we demonstrated and applied automatic 3D building construction technology centered on point clouds using the latest hybrid sensors, confirmed that it is possible to automatically construct high-quality building models using high-density airborne lidar results, and established an efficient data management plan. By applying differentiated production methods by region, supporting detection of urban change areas through Seoul spatial feature identifiers, and producing international standard data by level, we strengthened the utilization of urban spatial information. We believe that this study can serve as a good precedent for local governments and related organizations that are considering activating urban spatial information based on digital twins, and we expect that discussions on the construction and management of spatial information as infrastructure information for city-level digital twin implementation will continue.