• Title/Summary/Keyword: Masking

Search Result 746, Processing Time 0.032 seconds

A Hardware Implementation of Fingerprint Identification Thinning Algorithm (지문인식 세선화 알고리즘의 하드웨어 구현)

  • Woo, Yun-Hee;Ha, Mi-Na;Jung, Seung-Min
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.493-496
    • /
    • 2010
  • This paper proposes an effective hardware scheme for thinning stage processing of a fingerprint identification algorithm based on minutiae with 40% cycle occupation of 32-bit RISC microprocessor. The thinning step is needed to be processed by hardware block, because it is performed repeatedly by processing the same operation using an image window masking method. It can reduce the burden of the system and improve speed. The hardware is implemented by HDL and simulated. The result is compared with a conventional one.

  • PDF

Recognition of Identifiers from Shipping Container Image by Using Fuzzy Binarization and ART2-based RBF Network

  • Kim, Kwang-baek;Kim, Young-ju
    • Proceedings of the KAIS Fall Conference
    • /
    • 2003.11a
    • /
    • pp.88-95
    • /
    • 2003
  • The automatic recognition of transport containers using image processing is very hard because of the irregular size and position of identifiers, diverse colors of background and identifiers, and the impaired shapes of identifiers caused by container damages and the bent surface of container, etc. We proposed and evaluated the novel recognition algorithm of container identifiers that overcomes effectively the hardness and recognizes identifiers from container images captured in the various environments. The proposed algorithm, first, extracts the area including only all identifiers from container images by using CANNY masking and bi-directional histogram method. The extracted identifier area is binarized by the fuzzy binarization method newly proposed in this paper and by applying contour tracking method to the binarized area, container identifiers which are targets of recognition are extracted. We proposed and applied the ART2-based RBF network for recognition of container identifiers. The results of experiment for performance evaluation on the real container images showed that the proposed algorithm has more improved performance in the extraction and recognition of container identifiers than the previous algorithms.

  • PDF

Monitoring of Graveyards in Mountainous Areas with Simulated KOMPSAT-2 imagery

  • Chang, Eun-Mi;Kim, Min-Ho;Lee, Byung-Whan;Heo, Min
    • Proceedings of the KSRS Conference
    • /
    • 2003.11a
    • /
    • pp.1409-1411
    • /
    • 2003
  • The application of simulated KOMPSAT-2 imagery to monitor graveyards is to be developed. Positions calculated from image were compared with those obtained from Geographic Positioning System. With 24 checkpoints, the position of graveyards showed within 5-meter range. Unsupervised classification, supervised classification, and objected-orientation classification algorithms were used to extract the graveyard. Unsupervised classification with masking processes based on National topographic data gives the best result. The graveyards were categorized with four types in field studies while the two types of graveyards were shown in descriptive statistics. Cluster Analysis and discriminant analysis showed the consistency with two types of tombs. It was hard to get a specific spectral signature of graveyards, as they are covered with grasses at different levels and shaded from the surrounding trees. The slopes and aspects of location of graveyards did not make any difference in the spectral signatures. This study gives the basic spectral characteristics for further development of objected-oriented classification algorithms and plausibility of KOMPSAT-2 images for management of mountainous areas in the aspect of position accuracy and classification accuracy.

  • PDF

A sequential outlier detecting method using a clustering algorithm (군집 알고리즘을 이용한 순차적 이상치 탐지법)

  • Seo, Han Son;Yoon, Min
    • The Korean Journal of Applied Statistics
    • /
    • v.29 no.4
    • /
    • pp.699-706
    • /
    • 2016
  • Outlier detection methods without performing a test often do not succeed in detecting multiple outliers because they are structurally vulnerable to a masking effect or a swamping effect. This paper considers testing procedures supplemented to a clustering-based method of identifying the group with a minority of the observations as outliers. One of general steps is performing a variety of t-test on individual outlier-candidates. This paper proposes a sequential procedure for searching for outliers by changing cutoff values on a cluster tree and performing a test on a set of outlier-candidates. The proposed method is illustrated and compared to existing methods by an example and Monte Carlo studies.

An Improvement in Idle Sound Quality of a V8 engine (V8 엔진을 탑재한 차량의 아이들링 시의 음질 개선)

  • Suh, In-Soo
    • Proceedings of the Korean Society for Noise and Vibration Engineering Conference
    • /
    • 2004.11a
    • /
    • pp.193-198
    • /
    • 2004
  • In order to keep the market competitiveness, it is desirable for automotive manufacturer to meet the customer's various aspects of requirements. The overall NVH (Noise, Vibration, and Harshness) performance has been an important measure when evaluating overall vehicle performance, product quality, and enhancing customers' loyalty to the product. The noise and vibration, while the engine is idling, has been brought particular attention to the drivers and passengers, because they encounter the operation conditions quite frequently without other masking noise sources: wind noise, road noise, and even powertrain radiated noise at higher speed driving. The specific noise, defined as 'CHIT' noise, has been identified as a potential customer issue, from the Pickup Truck with newly developed V8 powertrain. This paper describes the definition of the noise, identifying the potential sources, and noise radiation mechanisms, based on series of powertrain and vehicle test and verification processes. Then, based on the root-cause identified, the design change has been proposed and validated with several vehicles in order to have a complete satisfaction of the customer.

  • PDF

Study on Ship Detection Using SAR Dual-polarization Data: ENVISAT ASAR AP Mode

  • Yang, Chan-Su;Ouchi, Kazuo
    • Korean Journal of Remote Sensing
    • /
    • v.24 no.5
    • /
    • pp.445-452
    • /
    • 2008
  • Preliminary results are reported on ship detection using coherence images computed from cross-correlating images of multi-look-processed dual-polarization data (HH and HV) of ENVISAT ASAR. The traditional techniques of ship detection by radars such as CFAR (Constant False Alarm Rate) rely on the amplitude data, and therefore the detection tends to become difficult when the amplitudes of ships images are at similar level as the mean amplitude of surrounding sea clutter. The proposed method utilizes the property that the multi-look images of ships are correlated with each other. Because the inter-look images of sea surface are covered by uncorrelated speckle, cross-correlation of multi-look images yields the different degrees of coherence between the images and water. In this paper, the polarimetric information of ships, land and intertidal zone are first compared based on the cross-correlation between HH and HV images, In the next step, we examine the technique when the dual-polarization data are split into two multi-look images, It was shown that the inter-look cross-correlation method could be applicable in the performance improvement of small ship detection and the land masking, It was also found that a simple combination of coherence images from each co-polarised (HH) inter-look and cross-polarised (HV) inter-look data can provide much higher target-detection possibilities.

A Study on Extraction of Non-metallic Ore Deposits from Remote Sensing Data of the Haenam Area (원격탐사자료에 의한 해남지역 비금속광상 및 관련 특성 추출을 위한 연구)

  • 박인석;박종남
    • Korean Journal of Remote Sensing
    • /
    • v.8 no.2
    • /
    • pp.105-123
    • /
    • 1992
  • A study was made on the feature extraction for non-metallic one deposits and their related geology using the Remote Sensing and Airborne Radiometric data. The area chosen is around the Haenam area, where dickite and Quarzite mines are distributed in. The geology of the area consists mainly of Cretaceous volcanics and PreCambrian metamorphic. The methods applied are study on the reflectance characteristics of minerals and rocks sampled in the study area, and the feature extraction extraction of histogram normalized images for Landsat TM and Airborne Radiometric data, and finally evaluation of applicability of some useful pattern recognition techniques for regional lithological mapping. As a result, reflectances of non-metallic minerals are much higher than rock samples in the area. However, low grade dickites are slightly higher than rock samples, probably due to their greyish colour and also their textural features which may scatter the reflectance and may be capable of capturing much hychoryl ions. The reflectances of rock samples may depend on the degree of whiteness of samples. The outcrops or mine dumps in the study area were most effectively extracted on the histogram normalized image of TM Band 1, 2 and 3, due to their high reflectivity. The Masking technique using the above bands may be the most effective and the natural colour composite may provide some success as well. The colour composite image of PCA may also be effective in extracting geological features, and airborne radiometric data may be useful to some degree as an complementary tool.

Effective Decontamination and Remediation After Elemental Mercury Exposure: A Case Report in the United States

  • Johnson-Arbor, Kelly;Schultz, Brian
    • Journal of Preventive Medicine and Public Health
    • /
    • v.54 no.5
    • /
    • pp.376-379
    • /
    • 2021
  • Elemental mercury exposure can result in significant toxicity. Source decontamination and remediation are often required after larger elemental mercury exposures, but the details of these processes are infrequently reported. In the case described herein, a 64-year-old woman and her husband were exposed to elemental mercury in their home after the husband purchased it online for the purpose of recreational barometer calibration. After the mercury reportedly spilled during the calibration process, a vacuum cleaner was used to decontaminate the affected surface; this led to extensive mercury contamination of the home. The couple was relocated from the home while remediation occurred over the course of several weeks. Vacuum cleaning of an elemental mercury spill can lead to extensive volatilization and recirculation of mercury vapor. For smaller mercury spills, careful removal of visible mercury beads by using an eyedropper, cardboard, and masking tape is recommended. Larger spills require professional decontamination and remediation and may necessitate involvement of governmental resources. Vacuum cleaning should not be used as an initial method of decontamination after elemental mercury exposure. Careful attention to source decontamination can reduce the emotional and financial costs associated with extensive remediation after elemental mercury exposure.

Countermeasure Techniques Analysis for Power Analysis Attack (전력분석공격에 대한 대응기술 분석)

  • Kang, Young-Jin;Jo, Jung-Bok;Lee, HoonJae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.221-223
    • /
    • 2014
  • Power analysis attack on cryptographic hardware device aims to study the power consumption while performing operations using secrets keys. Power analysis is a form of side channel attack which allow an attacker to compute the key encryption from algorithm using Simple Power Analysis (SPA), Differential Power Analysis (DPA) or Correlation Power Analysis (CPA). The theoretical weaknesses in algorithms or leaked informations from physical implementation of a cryptosystem are usually used to break the system. This paper describes how power analysis work and we provide an overview of countermeasures against power analysis attacks.

  • PDF

Smart Glasses Technologies for Trustworthy, Augmented Reality, See-Through Eyes-Direct Communications as Substitute for Smart Phones (스마트폰 대체재로서의 신뢰증강보는통신용 스마트안경 기술)

  • Song, K.B.;Lee, J.K.;Kim, K.Y.;Kim, G.W.;Park, S.H.;Kim, T.Y.;Yoon, H.S.;Lee, J.H.;Kim, D.H.
    • Electronics and Telecommunications Trends
    • /
    • v.34 no.5
    • /
    • pp.58-70
    • /
    • 2019
  • In this paper, we present the R&D status of ETRI's Trusted Reality (TR) project and its core technologies. ETRI's TR project focuses on the next-generation paradigm of smart phones, ETRI-TR Smart Glasses, which aims to provide the same features as those of smart phones without the involvement of any handheld device. Furthermore, they are characterized by additional features enabled by trustworthy VR/AR/MR/XR, such as privacy masking/unmasking, distributed structure of thin-client computing/networking among TR-Glasses, TR-LocalEdge, and TR-RemoteEdge, with novel see-through eyes-direct communication between IoT real/virtual objects and human eyes. Based on these core technologies of the ETRI's TR project, the human-held ETRI-TR Smart Glasses is expected to aid in the realization of XR vision with particularly more XR's safe_privacy on social life in the near future.