• Title/Summary/Keyword: Zero-Padding

Search Result 39, Processing Time 0.026 seconds

A Gap Prepulse with a Principal Stimulus Yields a Combined Auditory Late Response

  • Lee, Jae-Hun;Jung, Jae Yun;Park, Ilyong
    • Journal of Audiology & Otology
    • /
    • v.24 no.3
    • /
    • pp.149-156
    • /
    • 2020
  • Background and Objectives: The gap prepulse inhibition of the acoustic startle response has been used to screen tinnitus in an animal model. Here, we examined changes in the auditory late response under various conditions of gap prepulse inhibition. Subjects and Methods: We recruited 19 healthy adults (5 males, 14 females) and their auditory late responses were recorded after various stimuli with or without gap prepulsing. The N1 and P2 responses were selected for analysis. The gap prepulse inhibition was estimated to determine the optimal auditory late response in the gap prepulse paradigm. Results: We found that the gap per se generated a response that was very similar to the response elicited by sound stimuli. This critically affected the gap associated with the maximal inhibition of the stimulus response. Among the various gap-stimulus intervals (GSIs) between the gap and principal stimulus, the GSI of 150 ms maximally inhibited the response. However, after zero padding was used to minimize artifacts after a P2 response to a gap stimulus, the differences among the GSIs disappeared. Conclusions: Overall, the data suggest that both the prepulse inhibition and the gap per se should be considered when using the gap prepulse paradigm to assess tinnitus in humans.

A Gap Prepulse with a Principal Stimulus Yields a Combined Auditory Late Response

  • Lee, Jae-Hun;Jung, Jae Yun;Park, Ilyong
    • Korean Journal of Audiology
    • /
    • v.24 no.3
    • /
    • pp.149-156
    • /
    • 2020
  • Background and Objectives: The gap prepulse inhibition of the acoustic startle response has been used to screen tinnitus in an animal model. Here, we examined changes in the auditory late response under various conditions of gap prepulse inhibition. Subjects and Methods: We recruited 19 healthy adults (5 males, 14 females) and their auditory late responses were recorded after various stimuli with or without gap prepulsing. The N1 and P2 responses were selected for analysis. The gap prepulse inhibition was estimated to determine the optimal auditory late response in the gap prepulse paradigm. Results: We found that the gap per se generated a response that was very similar to the response elicited by sound stimuli. This critically affected the gap associated with the maximal inhibition of the stimulus response. Among the various gap-stimulus intervals (GSIs) between the gap and principal stimulus, the GSI of 150 ms maximally inhibited the response. However, after zero padding was used to minimize artifacts after a P2 response to a gap stimulus, the differences among the GSIs disappeared. Conclusions: Overall, the data suggest that both the prepulse inhibition and the gap per se should be considered when using the gap prepulse paradigm to assess tinnitus in humans.

An Effective Method to Treat The Boundary Pixels for Image Compression with DWT (DWT를 이용한 영상압축을 위한 경계화소의 효과적인 처리방법)

  • 서영호;김종현;김대경;유지상;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.6A
    • /
    • pp.618-627
    • /
    • 2002
  • In processing images using 2 dimensional Discrete Wavelet Transform(2D-DWT), the method to process the pixels around the image boundary may affect the quality of image and the cost to implement in hardware and software. This paper proposed an effective method to treat the boundary pixels, which is apt to implement in hardware and software without losing the quality of the image costly. This method processes the 2-D image as 1-D array so that 2-D DWT is performed by considering the image with the serial-sequential data structure (Serial-Sequential Processing). To show the performance and easiness in implementation of the proposed method, an image compression codec which compresses image and reconstructs it has been implemented and experimented. It included log-scale fried quantizer, but the entropy coder was not implemented. From the experimental results, the proposed method showed the SNR of almost the same SNR(Signal to Noise Ratio) to the Periodic Expansion(PE) method when the compression ratio(excluding entropy coding) of 2:1, 15.3% higher than Symmetric Expansion(SE) method, and 9.3% higher than 0-pixel Padding Expansion(ZPE) method. Also PE method needed 12.99% more memory space than the proposed method. By considering only the compression process, SE and ZPE methods needed additional operations than the proposed one. In hardware implementation, the proposed method in this paper had 5.92% of overall circuit as the control circuit, while SE, PE, and ZPE method has 22%, 21,2%, and 11.9% as the control circuit, respectively. Consequently, the proposed method can be thought more effective in implementing software and hardware without losing any image quality in the usual image processing applications.

Efficient Polynomial Multiplication in Extension Field GF($p^n$) (확장체 GF($p^n$)에서 효율적인 다항식 곱셈 방법)

  • Chang Namsu;Kim Chang Han
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.42 no.5 s.335
    • /
    • pp.23-30
    • /
    • 2005
  • In the construction of an extension field, there is a connection between the polynomial multiplication method and the degree of polynomial. The existing methods, KO and MSK methods, efficiently reduce the complexity of coefficient-multiplication. However, when we construct the multiplication of an extension field using KO and MSK methods, the polynomials are padded with necessary number of zero coefficients in general. In this paper, we propose basic properties of KO and MSK methods and algorithm that can reduce coefficient-multiplications. The proposed algorithm is more reducible than the original KO and MSK methods. This characteristic makes the employment of this multiplier particularly suitable for applications characterized by specific space constrains, such as those based on smart cards, token hardware, mobile phone or other devices.

New Algorithm for Arbitrary-ratio Image Resizing in DCT Domain (DCT 영역에서 영상의 임의 비율 크기 변환을 위한 새로운 알고리즘)

  • Kim, Yong-Jae;Lee, Chang-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.2C
    • /
    • pp.113-123
    • /
    • 2007
  • In Ubiquitous communication environment, various conversions of images are essential, and most digital images are compressed by standard methods such as the Joint Photographic Expert Group (JPEG) and Motion Picture Expert Group (MPEG) which are based on the discrete cosine transform (DCT). In this paper, various image resizing algorithms in the DCT domain are analyzed, and a new image resizing algorithm, which shows superior performance compared with the conventional methods, is proposed. For arbitrary-ratio image resizing in the DCT domain, several blocks of $8{\times}8$ DCT coefficients are converted into one block using the conversion formula in the proposed algorithm, and the size of the inverse discrete cosine transform (IDCT) is decided optimally. The performance is analyzed by comparing the peak signal to noise ratio (PSNR) between original images and converted images. The performance of the proposed algorithm is better than that of the conventional algorithm, since the correlation of pixels in images is utilized more efficiently.

Keyhole Imaging Combined Phase Contrast MR Angiography Technique (Keyhole Imaging기법을 적용한 위상대조도 자기공명 혈관조영기법)

  • Lee, D.H.;Hong, C.P.;Han, B.S.;Lee, M.W.
    • Journal of Biomedical Engineering Research
    • /
    • v.33 no.2
    • /
    • pp.72-77
    • /
    • 2012
  • Phase Contrast MR Angiography(PC MRA) is excellent MRA technique for measuring the velocity of vessels in the human body. PC MRA need to at least four images for angiogram reconstruction and it caused longer scan time. Therefore, we used keyhole imaging combined PC MRA to reduce the scan time. However, keyhole imaging can lead the erroneous effects as loss of phase information or frequency discontinuous. In this study, we applied the keyhole imaging combined 2D PC MRA for improving the temporal resolution and also measured the velocity to evaluate the accuracy of phase information. We used 0.32T MRI scanner(Magfinder II, Scimedix, Korea). Using the 2D PC MRA pulse sequence, the vascular images for a human brain targeted on the Superior Sagittal Sinus(SSS) were obtained. We applied tukey window function for keyhole images to minimize the ringing artifact and erroneous factors that are induced frequency discontinuous and phase information loss. We also applied zero-padded algorithm to peripheral missing k-space lines to compare keyhole imaging results and the artifact power(AP) value was measured on the complex difference images to validate the image quality. Consider as based on our results, heavy image distortions and artifacts were shown until using at least 50% keyhole factor. Using above the 50% keyhole factors are shown well reconstructed and matched for magnitude images and velocity information measurements. In conclusion, we confirmed the image quality and velocity information of keyhole technique combined 2D PC MRA. Especially, measured velocity information through the keyhole imaging combination was similar to the velocity information of full sampled k-space image despite of frequency discontinuous and phase information loss in the keyhole imaging reconstruction process. Consequently, the keyhole imaging combined 2D PC MRA will give some clinical usefulness and advantages as improving the temporal resolution and measuring the velocity information via selecting the appropriate keyhole factor at low tesla MRI system.

Image Watermark Method Using Multiple Decoding Keys (다중 복호화 키들을 이용한 영상 워터마크 방법)

  • Lee, Hyung-Seok;Seo, Dong-Hoan;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.19 no.4
    • /
    • pp.262-269
    • /
    • 2008
  • In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.

A Study on the Resolution Analysis of Digital X-ray Images with increasing Thickness of PMMA (조직 등가물질 두께 증가에 따른 디지털 엑스선 영상의 해상도 분석에 관한 연구)

  • Kim, Junwoo
    • Journal of the Korean Society of Radiology
    • /
    • v.15 no.2
    • /
    • pp.173-179
    • /
    • 2021
  • Scattered x-ray generated by digital radiography systems also have the advantage of increasing signals, but ultimately detectability is reduced by decreasing resolution and increasing noise of x-ray images transmitted objects. An indirect method of measuring scattered x-ray in a modulation-transfer function (MTF) for evaluating resolution in a spatial-frequency domain can be considered as a drop in the MTF value corresponding to zero-frequency. In this study, polymethyl methacrylate (PMMA) was used as a patient tissue equivalent, and MTFs were obtained for various thicknesses to quantify the effect of scattered x-ray on resolution. X-ray image signals were observed to decrease by 35 ~ 83% with PMMA thickness increasing, which is determined by the absorption or scattering of x-rays in PMMA, resulting in reduced MTF and increased scatter fraction. The method to compensate for MTF degradation by PMMA resulted in the MTF inflation without considering the optical spreading generated by the indirect-conversion type detector. Data fitting or zero-padding are needed to compensate for MTF more reasonably on edge-spread function or line-spread function.

Image Encryption and Decryption System using Frequency Phase Encoding and Phase Wrapping Method (주파수 위상 부호화와 위상 랩핑 방법을 이용한 영상 암호화 및 복호화 시스템)

  • Seo, Dong-Hoan;Shin, Chang-Mok;Cho, Kyu-Bo
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.6
    • /
    • pp.507-513
    • /
    • 2006
  • In this paper, we propose an improved image encryption and fault-tolerance decryption method using phase wrapping and phase encoding in the frequency domain. To generate an encrypted image, an encrypting key which denotes the product of a phase-encoded virtual image, not an original image, and a random phase image is zero-padded and Fourier transformed and its real-valued data is phase-encoded. The decryption process is simply performed by performing the inverse Fourier transform for multiplication of the encrypted key with the decrypting key, made of the proposed phase wrapping method, in the output plane with a spatial filter. This process has the advantages of solving optical alignment and pixel-to-pixel mapping problems. The proposed method using the virtual image, which does not contain any information from the original image, prevents the possibility of counterfeiting from unauthorized people and also can be used as a current spatial light modulator technology by phase encoding of the real-valued data. Computer simulations show the validity of the encryption scheme and the robustness to noise of the encrypted key or the decryption key in the proposed technique.