• Title/Summary/Keyword: Scaling distortion

Search Result 55, Processing Time 0.025 seconds

Implementation of Turbo Decoder Based on Two-step SOVA with a Scaling Factor (비례축소인자를 가진 2단 SOVA를 이용한 터보 복호기의 설계)

  • Kim, Dae-Won;Choi, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.11
    • /
    • pp.14-23
    • /
    • 2002
  • Two implementation methods for SOVA (Soft Output Viterbi Algorithm)of Turbo decoder are applied and verfied. The first method is the combination of a trace back (TB) logic for the survivor state and a double trace back logic for the weight value in two-step SOVA. This architecure of two-setp SOVA decoder allows important savings in area and high-speed processing compared with that of one-step SOVA decoding using register exchange (RE) or trace-back (TB) method. Second method is adjusting the reliability value with a scaling factor between 0.25 and 0.33 in order to compensate for the distortion for a rate 1/3 and 8-state SOVA decoder with a 256-bit frame size. The proposed schemes contributed to higher SNR performance by 2dB at the BER 10E-4 than that of SOVA decoder without a scaling factor. In order to verify the suggested schemes, the SOVA decoder is testd using Xillinx XCV 1000E FPGA, which runs at 33.6MHz of the maximum speed with 845 latencies and it features 175K gates in the case of 256-bit frame size.

A Study on the Characteristics of Furniture Design Using Generative Design - Focus on the Furniture Design using Fractal Geometry and Voronoi Diagram - (생성적 디자인을 이용한 가구디자인의 특성에 관한 연구 - 프랙탈 기하학과 보로노이 다이어그램을 적용한 가구디자인을 중심으로 -)

  • Lee, Jin-Wook
    • Korean Institute of Interior Design Journal
    • /
    • v.20 no.1
    • /
    • pp.89-97
    • /
    • 2011
  • Furniture design is no exception to human desire for pursuit of the nature. In various design fields, it has turned out nature-decorative method in the past, and also recently it has turned out bio-adaptive method which is more root design process using principal of generation in nature world. The purpose of this study is to analyze application methods and characteristics of fractal geometry and voronoi diagram which are most representative principals of generative design in nature by research on the example of furniture design using these principals. The results of having analyzed fumitures by generative design can be summarized as follows; design principals of fractal; superposition, scaling, repetition & gradation, deformation, distortion and voronoi diagram; individual speciation, variational patten, repetition gradation, ambiguous boundary create new design concept and emergent form in furniture design. Application methods are 'form emergence by algorithm', 'conventional process based on principals of generative design', and 'reproduction of pattern from generative design'. Biological reinterpretations and new explorations of principals of nature generation offer unbounded possibilities for furniture design.

Evaluation of Dose Distribution of 6 MV X-ray using Optical Dosimetry (광 도시메트리시스템을 이용한 치료용 6 MV X선 선량분포 평가)

  • Kim, Sunghwan
    • Journal of the Korean Society of Radiology
    • /
    • v.13 no.7
    • /
    • pp.925-932
    • /
    • 2019
  • In this paper, we developed optical dosimetry system with a plastic scintillator, a commercial 50 mm, f1.8 lens, and a commercial high-sensitivity CMOS (complementary metal-oxide semiconductor) camera. And, the correction processors of vignetting, geometrical distortion and scaling were established. Using the developed system, we can measured a percent depth dose, a beam profile and a dose linearity for 6 MV medical LINAC (Linear Accelerator). As results, the optically measured percent depth dose was well matched with the measured percent depth dose by ion-chamber within 2% tolerance. And the determined flatness was 2.8%. We concluded that the optical dosimetry system was sufficient for application of absorbed dose monitoring during radiation therapy.

A Study on Objective Speech Quality Measure under CDMA Telephone Networks Environment (CDMA 통신망에서의 객관적 음질 평가 척도에 관한 연구)

  • 김광수;김민정;석수영;정호열;정현열
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.2 no.4
    • /
    • pp.53-58
    • /
    • 2001
  • In this paper to develop objective speech quality measure for CDMA telephone network environments, recent developed measures are investigated first. But those measures show low performances in CDMA telephone networks. To solve this problem, new objective speech quality measure adopting noise masking threshold is proposed and studied. To acquire better performance, scaled noise masking threshold calculation for speech signals is employed instead of conventional tone signals. To verify effectiveness of proposed method performance comparison experiments are carried out for CDMA telephone network speech databases, for the results proposed methods show improved performances compared to existing meaures.

  • PDF

Scarf Design Combined with Opt Art and Geometrical Pattern of Traditional Ddeoksal (옵아트와 전통 떡살의 기하문양을 조합한 스카프디자인 연구)

  • Kim, Sun Young
    • Fashion & Textile Research Journal
    • /
    • v.15 no.3
    • /
    • pp.325-335
    • /
    • 2013
  • This work develops a motif design integrated with geometrical patterns in traditional ddeoksal and that can be applied to a scarf design so that traditional elements unique to Korean culture can be developed further for a modern application to various design fields. For the research method, literature reviews on op art and traditional ddeoksal were conducted with Adobe Illustrator CS3 and Adobe Photoshop CS3. As for the motif combination, such applications were taken as five pieces from the works of Victor Vasarely and some traditional ddeoksal shapes such as oblique line pattern, taegeuk pattern, and geometrical pattern. Abstract and geometrical images were borrowed from op art and ddeoksal for image expression. The total number of works selected was eleven. To realize the applied scarf design, a motif layout was performed with the scarf center or rim highlighted so that each design feature could be remarkable based on the motif combination. With the function of scaling, rotation, opacity control, filtering effect, the changed images were shown through motif distortion. In addition, this work applies a single combined motif to products for a possible transformation into handkerchiefs and boutique scarfs in the case of smaller sized scarfs.

Detection Copy-Move Forgery in Image Via Quaternion Polar Harmonic Transforms

  • Thajeel, Salam A.;Mahmood, Ali Shakir;Humood, Waleed Rasheed;Sulong, Ghazali
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.8
    • /
    • pp.4005-4025
    • /
    • 2019
  • Copy-move forgery (CMF) in digital images is a detrimental tampering of artefacts that requires precise detection and analysis. CMF is performed by copying and pasting a part of an image into other portions of it. Despite several efforts to detect CMF, accurate identification of noise, blur and rotated region-mediated forged image areas is still difficult. A novel algorithm is developed on the basis of quaternion polar complex exponential transform (QPCET) to detect CMF and is conducted involving a few steps. Firstly, the suspicious image is divided into overlapping blocks. Secondly, invariant features for each block are extracted using QPCET. Thirdly, the duplicated image blocks are determined using k-dimensional tree (kd-tree) block matching. Lastly, a new technique is introduced to reduce the flat region-mediated false matches. Experiments are performed on numerous images selected from the CoMoFoD database. MATLAB 2017b is used to employ the proposed method. Metrics such as correct and false detection ratios are utilised to evaluate the performance of the proposed CMF detection method. Experimental results demonstrate the precise and efficient CMF detection capacity of the proposed approach even under image distortion including rotation, scaling, additive noise, blurring, brightness, colour reduction and JPEG compression. Furthermore, our method can solve the false match problem and outperform existing ones in terms of precision and false positive rate. The proposed approach may serve as a basis for accurate digital image forensic investigations.

Development of Wave Height Field Measurement System Using a Depth Camera (깊이카메라를 이용한 파고장 계측 시스템의 구축)

  • Kim, Hoyong;Jeon, Chanil;Seo, Jeonghwa
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.58 no.6
    • /
    • pp.382-390
    • /
    • 2021
  • The present study suggests the application of a depth camera for wave height field measurement, focusing on the calibration procedure and test setup. Azure Kinect system is used to measure the water surface elevation, with a field of view of 800 mm × 800 mm and repetition rate of 30 Hz. In the optimal optical setup, the spatial resolution of the field of view is 288 × 320 pixels. To detect the water surface by the depth camera, tracer particles that float on the water and reflects infrared is added. The calibration consists of wave height scaling and correction of the barrel distortion. A polynomial regression model of image correction is established using machine learning. The measurement results by the depth camera are compared with capacitance type wave height gauge measurement, to show good agreement.

Tamper Detection of Digital Images using Hash Functions (해쉬 함수를 이용한 디지털 영상의 위변조 검출)

  • Woo, Chan-Il;Lee, Seung-Dae
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.7
    • /
    • pp.4516-4521
    • /
    • 2014
  • Digital watermarking for digital image authentication and integrity schemes are based on fragile watermarking and can detect any modifications in a watermark embedded image by comparing the embedded watermark with the regenerated watermark. Therefore, the digital watermark for image authentication and integrity should be erased easily when the image is changed by digital image processing, such as scaling or filtering etc. This paper proposes an effective tamper detection scheme for digital images. In the proposed scheme, the original image was divided into many non-overlapping $2{\times}2$ blocks. The digital watermark was divided into two LSB of each block and the image distortion was imperceptible to the human eye. The watermark extraction process can be used to determine if the watermarked image has been tampered. The experimental results successfully revealed the effectiveness of the proposed scheme.

A Targeted Counter-Forensics Method for SIFT-Based Copy-Move Forgery Detection (SIFT 기반 카피-무브 위조 검출에 대한 타켓 카운터-포렌식 기법)

  • Doyoddorj, Munkhbaatar;Rhee, Kyung-Hyune
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.5
    • /
    • pp.163-172
    • /
    • 2014
  • The Scale Invariant Feature Transform (SIFT) has been widely used in a lot of applications for image feature matching. Such a transform allows us to strong matching ability, stability in rotation, and scaling with the variety of different scales. Recently, it has been made one of the most successful algorithms in the research areas of copy-move forgery detections. Though this transform is capable of identifying copy-move forgery, it does not widely address the possibility that counter-forensics operations may be designed and used to hide the evidence of image tampering. In this paper, we propose a targeted counter-forensics method for impeding SIFT-based copy-move forgery detection by applying a semantically admissible distortion in the processing tool. The proposed method allows the attacker to delude a similarity matching process and conceal the traces left by a modification of SIFT keypoints, while maintaining a high fidelity between the processed images and original ones under the semantic constraints. The efficiency of the proposed method is supported by several experiments on the test images with various parameter settings.

A Study on LCMV Beamforming Method of Quadratic Pattern Constraints (2차패턴 구속의 LCMV 빔형성 방법 연구)

  • Lee, Kwan-Hyeong
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.15 no.5
    • /
    • pp.343-348
    • /
    • 2022
  • The STAP system suppresses clutter and jamming of the radar signal, but required a large number of samples for optimal performance. A large number of samples increases the signal processing computation. Therefore, there is need for a transformation method for reducing the signal rank. The LCMV beamforming method can easily set the distortion-free-constraint in the direction of arrival, and the beamforming scaling is excellent, so that overall rank can be reduced. In this study, the information of target is estimated using the proposed quadratic pattern constraints(QPC) and LCMV beamforming methods. The proposed method can perform beam pattern control in a desired direction according to the number of constraint conditions as a secondary pattern constraint condition. Through simulation, the performance of the propose method is verified. As a result on th simulation, the desired target was estimated when the proposed method had an angular resolution of 10 degrees or more, but it was not possible to accurately estimate the desired target when the angular resolution was less than 10 degrees.