• Title/Summary/Keyword: Image chain

Search Result 221, Processing Time 0.027 seconds

Target Detection Technique in a DBS(Doppler Beam Sharpening) Image (DBS(Doppler Beam Sharpening) 영상에서 표적 탐지 방안)

  • Kong, Young-Joo;Kwon, Jun-Beom;Kim, Hong-Rak;Woo, Seon-Keol
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.28 no.5
    • /
    • pp.373-381
    • /
    • 2017
  • DBS(Doppler Beam Sharpening) algorithm is a way to improve azimuth resolution performance in radar. Since DBS image includes the is information about the search area of radar, various clutter components exist besides the target to be detected. To detect and track the desired target in a DBS image, it must be able to identify a target and the clutter components. In this paper, we describe how to use image size and terrain information(DTED) to identify the target in a DBS image. By using morphological filter and chain code, it acquires image size and excludes the clutter components. By matching with DTED, we determine target.

Detection of Fingerprint Ridge Direction Based on the Run-Length and Chain Codes (런길이 및 체인코드를 이용한 지문 융선의 방향 검출)

  • Lee Jeong-Hwan;Park Se-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.8
    • /
    • pp.1740-1747
    • /
    • 2004
  • In this paper, we proposed an effective method for detecting fingerprint ridge direction based on the run-length and chain codes. First, a fingerprint image is normalized, and it is thresholded to obtain binary image with foreground and background regions. The foreground regions is composed of fingerprint ridges, and the ridges is encoded with the run-length and chain codes. To detect directional information, the boundary of ridge codes is traced, and curvature is calculated at ecah point of boundary. And the detected direction value is smoothed with appropriate window locally. The proposed method is applied to NIST and FVC2002 fingerprint database to evaluate performance. By the experimental results, the proposed method can be used to obtain ridge direction value in fingerprint image.

A Study of Image Target Tracking Using ITS in an Occluding Environment (표적이 일시적으로 가려지는 환경에서 ITS 기법을 이용한 영상 표적 추적 알고리듬 연구)

  • Kim, Yong;Song, Taek-Lyul
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.19 no.4
    • /
    • pp.306-314
    • /
    • 2013
  • Automatic tracking in cluttered environment requires the initiation and maintenance of tracks, and track existence probability of true track is kept by Markov Chain Two model of target existence propagation. Unlike Markov Chain One model for target existence propagation, Markov Chain Two model is made up three hypotheses about target existence event which are that the target exist and is detectable, the target exists and is non-detectable through occlusion, and the target does not exist and is non-detectable according to non-existing target. In this paper we present multi-scan single target tracking algorithm based on the target existence, which call the Integrated Track Splitting algorithm with Markov Chain Two model in imaging sensor.

A Study on the Recognition of Defected Fingerprint Using Chain Code (체인 코드를 이용한 훼손된 지문의 인식에 관한 연구)

  • 조민환
    • Journal of the Korea Society of Computer and Information
    • /
    • v.8 no.4
    • /
    • pp.63-68
    • /
    • 2003
  • Almost the system are usually taken by means of shapes and positions of ridge's end-points and bifurcation in the fingerprint recognition. but we studied about recognition of polluted fingerprint by chain code ridges. the results and sequence of processing are summarized as follows. (1)Capture several kinds of polluted fingerprint image. (2)Preprocessing(median filtering for removing noises, local and global histogram equalization, dilation and erosion, thinning and remove pseudo image), (3)Rebuild ridge line after Least Square Processing, (4)Compute distribution of chain code vector, (5)The results are almost same values of each vector of preprocessed fingerprint images. From the results, we can surmised more successful fingerprints recognition system in combination with other system by singular points

  • PDF

Characterization of the UV Oxidation of Raw Natural Rubber Thin Film Using Image and FT-IR Analysis

  • Kim, Ik-Sik;Lee, Bok-Won;Sohn, Kyung-Suk;Yoon, Joohoe;Lee, Jung-Hun
    • Elastomers and Composites
    • /
    • v.51 no.1
    • /
    • pp.1-9
    • /
    • 2016
  • Characterization of the UV oxidation for raw natural rubber (NR) was investigated in controlled conditions through image and FT-IR analysis. The UV oxidation was performed on a thin film of natural rubber coated on a KBr window at 254 nm and room temperature to exclude the thermal oxidation. Before or after exposure to UV light, image of the NR thin film was observed at a right or tilted angle. FT-IR absorption spectra were measured in transmission mode with the UV irradiation time. The UV oxidation of NR was examined by the changes of absorption peaks at 3425, 1717, 1084, 1477, 1377, and $833cm^{-1}$ which were assigned to hydroxyl group (-OH), carbonyl group (-C=O), carbon-oxygen bond (-C-O), methylene group $(-CH_2-)$, methyl group $(-CH_3)$, and cis-methine group $(cis-CCH_3=CH-)$, respectively. During the initial exposure period, the results indicated that the appearance of carbonyl group was directly related to the reduction of cis-methine group containing carbon-carbon double bond (-C=C-). Most of aldehydes or ketones from carbon-carbon double bonds were formed very fast by chain scission. A lot of long wide cracks with one orientation at regular intervals which resulted in consecutive chain scission were observed by image analysis. During all exposure periods, on the other hand, it was considered that the continuous increment of hydroxyl and carbonyl group was closely related to the decrement of methylene and methyl group in the allylic position. Therefore, two possible mechanisms for the UV oxidation of NR were suggested.

Characterization on the Ozone Oxidation of Raw Natural Rubber Thin Film using Image and FT-IR Analysis

  • Kim, Ik-Sik;Lee, DooYoul;Sohn, Kyung-Suk;Lee, Jung-Hun;Bae, JoongWoo
    • Elastomers and Composites
    • /
    • v.54 no.2
    • /
    • pp.110-117
    • /
    • 2019
  • The characterization of the ozone oxidation for raw natural rubber (NR) was investigated under controlled conditions through image and fourier transform infrared (FT-IR) analysis. The ozone oxidation was performed on a transparent thin film of raw NR coated on a KBr window in a dark chamber at $40^{\circ}C$ under low humidity conditions to completely exclude thermal, moisture, or light oxidation. The ozone concentration was set at 40 parts per hundred million (pphm). Before or after exposure to ozone, the image of the thin film for raw NR was observed at a right or tilted angle. FT-IR absorption spectra were measured in the transmission mode according to ozone exposure time. The ozone oxidation of NR was determined by the changes in the absorption peaks at 1736, 1715, 1697, and $833cm^{-1}$, which were assigned to an aldehyde group (-CHO), a ketone group (-COR), an inter-hydrogen bond between carbonyl group (-C=O) from an aldehyde or a ketone and an amide group (-CONH-) of protein, and a cis-methine group ($is-CCH_3=CH-$, respectively. During ozone exposure period, the results indicated that the formation of the carbonyl group of aldehyde or ketone was directly related to the decrement of the double bond of cis-1,4-polyisoprene. Only carbonyl compounds such as aldehydes or ketones seemed to be formed through chain scission by ozone. Long thin cracks with one orientation at regular intervals, which resulted in consecutive chain scission, were observed by image analysis. Therefore, one possible two-step mechanism for the formation of aldehyde and ketone was suggested.

Impacts of Corporate Social Responsibility and Authenticity on Brand Loyalty: Evidence from the Chain Coffee Shop Industry in Vietnam

  • MAI, Thi Cam Tu;NGUYEN, Hong Son;PHAN, Nguyen Ngoc Diem;LE, Minh Hang;LUU, Phuong Khanh;NGUYEN, Thi Thu Thao;NGUYEN, Thi Thu Trang
    • The Journal of Asian Finance, Economics and Business
    • /
    • v.9 no.6
    • /
    • pp.159-173
    • /
    • 2022
  • This study examines the impact of CSR and its authenticity on customer loyalty through the brand image in the chain coffee shop industry. Using qualitative and quantitative methods, 601 survey questionnaires were distributed, of which 491 were analyzed. The results show that CSR has a positive impact on brand image and customer loyalty. In addition, authenticity does not moderate the impact of CSR on brand image and loyalty, as it is difficult for customers to verify the authenticity of CSR action programs. This study emphasizes the importance of CSR action programs and authenticity for businesses to sustainably enhance their distinctive brand image and customer loyalty. Therefore, for sustainable development in the future, managers of coffee shop chains need to focus on the following issues. First, the most important thing is the right awareness of businesses regarding CSR and CSR authenticity. Third, businesses should strengthen the transparency of CSR action programs in various media so that consumers can easily verify authenticity, to increase brand image and improve customer loyalty.

An Efficient Contour Coding Method Using Depth First Search Algorithm (Depth first search 알고리듬을 이용한 윤곽선 영상의 효과적인 부호화 기법)

  • 김종훈;김한수;김성대;김재균
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.25 no.12
    • /
    • pp.1677-1685
    • /
    • 1988
  • In this paper, a new contour coding algorithm is investigated for use in region based image coding. Generally the contour data may be encoded by its chain codes or chain difference codes. But the data compression efficiency is low because of heavy burden for initial absolute coordinates of each chain. To alleviate this problem, the depth first search in graph traversal algorithm, is applied to the chain difference coding method. The proposed coding scheme is shown to be very efficient for contour images obtained by split-merge segmentation. Finally, we can reuce data about 60% in comparison with modified chain difference coding.

  • PDF

A Quantitative Analysis of Automobile Reverse Supply Chain Using System Dynamics (시스템 다이내믹스를 이용한 자동차 역공급사슬의 정량적 분석)

  • Lim Dong-June;Kim Hae-Joong;Sim Eok-Su;Park Jin-Woo
    • Proceedings of the Korea Society for Simulation Conference
    • /
    • 2005.05a
    • /
    • pp.40-44
    • /
    • 2005
  • For an increasing interest on environment and a reinforcement of regulation, reverse supply chain is getting more interest recently In this study, reverse supply chain model of the automobile industry is designed using system dynamics. Using this model, an enterprise can do various analysis to get better understanding in strategic and operational aspect. The impact on supply chain which is caused by the variation of remanufacturing rate and recycle rate as time changes can be analyzed. Also environment image of the enterprise can be analyzed in quantitative manner to make it easy to set up own strategic plan.

  • PDF

E-mail System Model based on Ethereum (이더리움 기반 이메일 시스템 모델)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.