• Title/Summary/Keyword: Side Information

Search Result 3,585, Processing Time 0.03 seconds

A Side-and Rear-View Image Registration System for Eliminating Blind Spots (차량의 사각 지대 제거를 위한 측/후방 카메라 영상 정합 시스템)

  • Park, Min-Woo;Jang, Kyung-Ho;Jung, Soon Ki;Yoon, Pal-Joo
    • Journal of KIISE:Software and Applications
    • /
    • v.36 no.8
    • /
    • pp.653-663
    • /
    • 2009
  • In this paper, we propose a blind spots elimination system using three cameras. A wide-angle camera is attached on trunk for eliminating blind spots of a rear-view mirror and two cameras are attached on each side-view mirror for eliminating blind spots of vehicle's sides. In order to eliminate blind spots efficiently, we suggest a method to build a panoramic mosaic view with two side images and one wide-angle rear image. First, we obtain an undistorted image from a wide-angle camera of rear-view and calculate the focus-of-contraction (FOC) in undistorted images of rear-view while the car is moving straight forward. Second, we compute a homography among side-view images and an undistorted image of rear-view in flat road scenes. Next, we perform an image registration process after road and background region segmentation. Finally, we generate various views such as a cylinder panorama view, a top view and an information panoramic mosaic view.

Robust Control of Flexible Joint Robot Using ISMC and IDA-PBC (ISMC와 IDA-PBC를 이용한 유연관절로봇의 강인제어)

  • Asignacion, Abner Jr.;Park, Seung-kyu;Lee, Min-wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.6
    • /
    • pp.1203-1211
    • /
    • 2017
  • This paper proposes a robust controller for flexible joint robots to achieve tracking performance and to improve robustness against both matched and mismatched disturbances. The proposed controller consists of a disturbance observer(DOB), passivity-based controller, and integral sliding mode controller(ISMC) in a backstepping manner. The DOB compensates the mismatched disturbance in the link-side and formulates the reference input for the motor-side controller. Interconnection and damping assignment passivity-based controller (IDA-PBC) performs tracking control of motor-side, and it is integrated to nominal control of ISMC to guarantee the over-all stability of the nominal system, while, matched disturbances are decoupled by the discontinuous control of ISMC. In the design of the link-side controller, PD type impedance controller is designed with DOB and this leads the continuous control input which is suitable to the reference input for the motor-side.

A Study on the Compensation of Communication Channel Using Predistorter (사전 왜곡기를 이용한 통신 채널의 보상에 관한 연구)

  • Lim, Seung-Gag
    • Journal of the Korean Institute of Telematics and Electronics T
    • /
    • v.36T no.4
    • /
    • pp.94-102
    • /
    • 1999
  • This paper is related with the compensation of communication channel characteristics using predistorter, and the considered characteristic is the additive noise, phase rotation and frequency selective fading which occurred in communication channel. Predistorter can minimize the effect of obstacle element which occured in channel at receiving side by transmitting the predistortion of signal after modulation, the coefficient of inverse electrical charateristic of communication channel is performed at transmitting side. For this purpose, the predistorter is designed by using Tricepstrum Equalization Algorithm which is adaptive equlizer algorithm, and the receiving side must transmit the probing signal to transmitting side. Using the probing signal, the transmitting side can obtain the inverse characteristic coefficient of communication channel, and this probing signal must be transmitted periodically. We assumed that the channel characteristic do not change during this one period. As a result of computer simulation, we confirmed that the performance of predistorter was fairly good as same as the adaptive equalizer, and this technique have a effectiveness that can be used in the forward channel of mobile communication in order to achieve high speed transmission.

  • PDF

Inverse Operation-based Image Steganography using Side Match for Minimum Data Damage (데이터 손상을 최소화하는 사이드 매치를 이용한 역연산 기반 이미지 스테가노그래피)

  • Che, Won-Seok;Chung, Kyung-Ho;Kim, Sung-Soo;Yun, Tae-Jin;Han, Ki-Jun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.12
    • /
    • pp.153-160
    • /
    • 2014
  • The Streganography method for digital images has to insert secret data into the image without image distortion. Side match method is that size of secret data is calculated by difference of embedded pixel value and mean value of side pixels. And the secret value is embedded into the embedded pixel. Therefore, the more secret data increases, the more image distortion increases, too. In this paper, we propose the enhanced method that calculates embedded pixel value by difference of secret value and mean value of side pixels. In proposed method, more secret data is embedded and image distortion has to decreases.

A Study on Two-Dimensional Analysis with the Acceptance of High-Tech New Product - Focusing on Smart-Phone's Usefulness Expectancy referring to Product and Application - (하이테크 신제품 수용의 2차원 연구 - 스마트폰의 제품과 애플리케이션 유용성 기대를 중심으로-)

  • Lim, Yang Whan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.151-162
    • /
    • 2011
  • This study defined acceptance of high-tech new product as user's active using the product such as utilizing application software rather than purchasing it. As exploring factors to effect on customer's acceptance, usefulness expectancy was examined from product side and application side. When investigating the exogenous variables to influence on usefulness expectancy from the product side, customer's product knowledge and social influences are put forward to support the hypothesis. From the application side, customer's knowledge about the application and its trust are put to explain usefulness expectancy of the application. Smart phone users were good subjects for this study and most hypotheses were tested using structural equation model and the results are followings. First usefulness expectancy of the product and of application significantly effect on customer's intention to use high-tech new product and also usefulness expectancy of the product positively effects on which of the application. Second customer's perceived knowledge about the product and social influences impact usefulness expectancy of the product. But third customer's perceived trust toward application didn't any positive impact usefulness expectancy of the application. Through the result, there will be several implications. First, from both of side; product and application, customer's usefulness expectancy should be satisfied to be successful in high-tech products market. Second, customer should be Ieant about advantages of the product and knowledge about the application as well, and then trigger their usefulness expectancy.

Character Segmentation using Side Profile Pattern (측면윤곽 패턴을 이용한 접합 문자 분할 연구)

  • Jung Minchul
    • Journal of Intelligence and Information Systems
    • /
    • v.10 no.3
    • /
    • pp.1-10
    • /
    • 2004
  • In this paper, a new character segmentation algorithm of machine printed character recognition is proposed. The new approach of the proposed character segmentation algorithm overcomes the weak points of both feature-based approaches and recognition-based approaches in character segmentation. This paper defines side profiles of touching characters. The character segmentation algorithm gives a candidate single character in touching characters by side profiles, without any help of character recognizer. It segments touching characters and decides the candidate single character by side profiles. This paper also defines cutting cost, which makes the proposed character segmentation find an optimal segmenting path. The performance of the proposed character segmentation algorithm in this paper has been obtained using a real envelope reader system, which can recognize addresses in U.S. mail pieces and sort the mail pieces. 3359 mail pieces were tested. The improvement was from $68.92\%\;to\;80.08\%$ by the proposed character segmentation.

  • PDF

A New Sender-Side Public-Key Deniable Encryption Scheme with Fast Decryption

  • Barakat, Tamer Mohamed
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.9
    • /
    • pp.3231-3249
    • /
    • 2014
  • Deniable encryption, introduced in 1997 by Canetti, Dwork, Naor, and Ostrovsky, guarantees that the sender or the receiver of a secret message is able to "fake" the message encrypted in a specific ciphertext in the presence of a coercing adversary, without the adversary detecting that he was not given the real message. Sender - side deniable encryption scheme is considered to be one of the classification of deniable encryption technique which defined as resilient against coercing the sender. M. H. Ibrahim presented a sender - side deniable encryption scheme which based on public key and uncertainty of Jacobi Symbol [6]. This scheme has several problems; (1) it can't be able to derive the fake message $M_f$ that belongs to a valid message set, (2) it is not secure against Quadratic Residue Problem (QRP), and (3) the decryption process is very slow because it is based dramatically on square root computation until reach the message as a Quadratic Non Residue (QNR). The first problem is solved by J. Howlader and S. Basu's scheme [7]; they presented a sender side encryption scheme that allows the sender to present a fake message $M_f$ from a valid message set, but it still suffers from the last two mentioned problems. In this paper we present a new sender-side deniable public-key encryption scheme with fast decryption by which the sender is able to lie about the encrypted message to a coercer and hence escape coercion. While the receiver is able to decrypt for the true message, the sender has the ability to open a fake message of his choice to the coercer which, when verified, gives the same ciphertext as the true message. Compared with both Ibrahim's scheme and J. Howlader and S. Basu's scheme, our scheme enjoys nice two features which solved the mentioned problems: (1) It is semantically secure against Quadratic Residue Problem; (2) It is as fast, in the decryption process, as other schemes. Finally, applying the proposed deniable encryption, we originally give a coercion resistant internet voting model without physical assumptions.

The analysis of tissue elasticity using computer-controlled ultrasonography in the affected upper limb of patients after breast cancer surgery

  • Chan-Hyuk Kwon;Min Woo Ha
    • Journal of the Korea Society of Computer and Information
    • /
    • v.29 no.6
    • /
    • pp.167-173
    • /
    • 2024
  • In this paper, we propse a quantitative research by investigating the subcutaneous tissue elasticity by using ultrasonography in lymphedema patients after breast cancer surgery. Lymphedema patients who took breast cancer operation were included. Thickness of subcutaneous tissue was assessed at two spots; 10cm below elbow (forearm) and 10cm above elbow (upper arm), not only in affected side but also in sound side. By using probe attached to real-time pressure sensor, stress-strain curves were obtained. We defined tissue elasticity as slope of that curve at range of 7.5~15% of strain to avoid toe region. By comparing the elasticity of normal side and that of affected side, lymphedema tissues were classified into 'softer' and 'harder' tissues. Overall 30 cases of lymphedema tissues and 30 cases of sound tissues were checked. The difference of the elasticity between normal and affected side ranged from -3.98 N/m2 to 1.40 N/m2. The lymphedema tissues were classified into 17 softer tissues and 13 harder tissues. No demographic and clinical values, including clinical stage of lymphedema, showed statistically meaningful differences between two groups. Evaluation of subcutaneous tissue elasticity with ultrasonography and real-time pressure sensor could be one of the useful tools for investigation of lymphedema tissue characteristics.

Transcoding from Distributed Video Coding to H.264/AVC Based on Motion Vectors of Side Information (보조정보의 움직임 벡터를 이용한 분산 비디오 코딩에서 H.264/AVC로의 트랜스코딩)

  • Min, Kyung-Yeon;Yoo, Sung-Eun;Sim, Dong-Gyu;Jeon, Byeung-Woo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.1
    • /
    • pp.108-122
    • /
    • 2011
  • In this paper, a transcoding method with low computational complexity and high coding efficiency is proposed to transcode distributed video coding (DVC) bitstreams to H.264/AVC ones. For the proposed high-performance transcoding with low complexity, not only Wyner-Ziv frames but also key frames can be transcoded with motion vectors estimated in generation of side information. As a motion vector is estimated from a key frame to a prior key frame for side information generation, the motion vector can be used to encode the intra key frame as a predicted frame. Motion estimation is performed with two predicted motion vectors. One is the motion vector from side information generation and the other is median of motion vectors of neighboring blocks. The proposed method selects the best motion vector between two motion vectors based on rate-distortion optimization. Coding efficiency can be improved with a small size of search range, because a motion vector estimated in side information generation is used as an initial motion vector for transcoding. In the experimental results, complexity of transcoder is reduced about 12% and bitrate performance increases about 28.7%.