• Title/Summary/Keyword: computer art

Search Result 1,211, Processing Time 0.023 seconds

Improved Sliding Shapes for Instance Segmentation of Amodal 3D Object

  • Lin, Jinhua;Yao, Yu;Wang, Yanjie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.11
    • /
    • pp.5555-5567
    • /
    • 2018
  • State-of-art instance segmentation networks are successful at generating 2D segmentation mask for region proposals with highest classification score, yet 3D object segmentation task is limited to geocentric embedding or detector of Sliding Shapes. To this end, we propose an amodal 3D instance segmentation network called A3IS-CNN, which extends the detector of Deep Sliding Shapes to amodal 3D instance segmentation by adding a new branch of 3D ConvNet called A3IS-branch. The A3IS-branch which takes 3D amodal ROI as input and 3D semantic instances as output is a fully convolution network(FCN) sharing convolutional layers with existing 3d RPN which takes 3D scene as input and 3D amodal proposals as output. For two branches share computation with each other, our 3D instance segmentation network adds only a small overhead of 0.25 fps to Deep Sliding Shapes, trading off accurate detection and point-to-point segmentation of instances. Experiments show that our 3D instance segmentation network achieves at least 10% to 50% improvement over the state-of-art network in running time, and outperforms the state-of-art 3D detectors by at least 16.1 AP.

Research on Camouflaged Encryption Scheme Based on Hadamard Matrix and Ghost Imaging Algorithm

  • Leihong, Zhang;Yang, Wang;Hualong, Ye;Runchu, Xu;Dawei, Zhang
    • Current Optics and Photonics
    • /
    • v.5 no.6
    • /
    • pp.686-698
    • /
    • 2021
  • A camouflaged encryption scheme based on Hadamard matrix and ghost imaging is proposed. In the process of the encryption, an orthogonal matrix is used as the projection pattern of ghost imaging to improve the definition of the reconstructed images. The ciphertext of the secret image is constrained to the camouflaged image. The key of the camouflaged image is obtained by the method of sparse decomposition by principal component orthogonal basis and the constrained ciphertext. The information of the secret image is hidden into the information of the camouflaged image which can improve the security of the system. In the decryption process, the authorized user needs to extract the key of the secret image according to the obtained random sequences. The real encrypted information can be obtained. Otherwise, the obtained image is the camouflaged image. In order to verify the feasibility, security and robustness of the encryption system, binary images and gray-scale images are selected for simulation and experiment. The results show that the proposed encryption system simplifies the calculation process, and also improves the definition of the reconstructed images and the security of the encryption system.

Approach to the possibility of Multimedia Art in the Digital Media World (디지털 미디어 환경에서의 멀티미디어 아트의 가능성에 대한 접근)

  • 장용훈
    • Archives of design research
    • /
    • v.16 no.3
    • /
    • pp.309-318
    • /
    • 2003
  • A work of Art is not supposed to be isolated from the world, but it should be influenced by its cultural background and situations of the times. Therefore, Art itself reflects its era. In other words, it is created being based on the thought of its artist and simultaneously interacting with external conditions or circumstances of the era, so it would also affect the cultural code of its society. This is why modern art made by the individual living in this complicated and diversified society is quite avant-garde. Various demands from its society and diversified senses have been influencing diversification of works of Art. Now we can say that a mode of art is also dose to current stream of the times. A lot of artists have been trying to get out of traditional way of presentation techniques and classification of genres. In that point, the emergence of Multimedia Alt is inevitable in this digital era. The terms of Internet or multimedia are now familiar with everybody in the world, and a lot of works like Technology Art, Information Art, Computer Art, Digital Art, New Media Art, and so on have been coming into the world by using multimedia. Unlike other works of Art, these works from multimedia are practically used by being combined with technologies. Hereupon, in this paper I would like to find out a concept of Multimedia Art, its social function, and the future prospect of this brand-new form of art.

  • PDF

A Study on Fashion illustration Based on Pop Art Technique (패션 일러스트레이션에서 보여지는 팝 아트적 표현 특성에 관한 연구)

  • Kim, Mi-Hyun
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.32 no.4
    • /
    • pp.659-668
    • /
    • 2008
  • Today, Fashion illustration has been diversified in its usage and respotlighted in the significance of its artistry by artists' interpretation and subjective perspectives. The purpose of this study is to find out theoretical reestablishment of this extended expression sphere and possible expression coverage of Fashion illustration. First, based on the Fashion illustration works revealing expressive features of Pop Art, this study reviews major considerations of Fashion illustration, i.e. assemblage, silk screen and new possible perspectives respectively. Therefore, based on the reviews, this study seeks to deduce pop art characteristics of expression technique found in Fashion illustration. Expression modes of Pop Art are represented broadly by assemblage, silk screen and new perspectives. Based on corresponding case analysis, this study could come to find out the following expressive features of pop art revealed in Fashion illustration: First, it is found that contemporary Fashion illustration pursues unbounded expressions and unprecedented styles owing to material variety. Second, it is found that contemporary Fashion illustration tries to adopt new and experimental techniques including computer program. Third, it is found that Fashion illustration characterized mainly by expressive features of Pop Art shows and pioneer a wide variety of application spheres including commercials(ads), newspaper or magazine illustration and cartoon ads simply beyond designer's creative drawing. Furthermore, it is expected that Pop Art's expressive features shown in Fashion illustration will evolve through a fusion with various experimental techniques, and keep having cultural and artistic influence in the future as well.

Reading Children's Mind from Digital Drawings based on Dominant Color Analysis using ART2 Clustering and Fuzzy Logic (ART2 군집화와 퍼지 논리를 이용한 디지털 그림의 색채 주조색 분석에 의한 아동 심리 분석)

  • Kim, Kwang-baek
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.6
    • /
    • pp.1203-1208
    • /
    • 2016
  • For young children who are not spontaneous or not accurate in verbal communication of their emotions and experiences, drawing is a good means of expressing their status in mind and thus drawing analysis with chromatics is a traditional tool for art therapy. Recently, children enjoy digital drawing via painting tools thus there is a growing needs to develop an automatic digital drawing analysis tool based on chromatics and art therapy theory. In this paper, we propose such an analyzing tool based on dominant color analysis. Technically, we use ART2 clustering and fuzzy logic to understand the fuzziness of subjects' status of mind expressed in their digital drawings. The frequency of color usage is fuzzified with respect to the membership functions. After applying fuzzy logic to this fuzzified central vector, we determine the dominant color and supporting colors from the digital drawings and children's status of mind is then analyzed according to the color-personality relationships based on Alschuler and Hattwick's historical researches.

Routing in Computer Networks: A Survey of Algorithms (컴퓨터 네트웍에서의 경로선정 :알고리즘의 개관)

  • 차동완;정남기;장석권
    • Journal of the Korean Operations Research and Management Science Society
    • /
    • v.9 no.2
    • /
    • pp.46-55
    • /
    • 1984
  • The purpose of this parer is to provide a survey of the state of the art of routing methods in store-and-forward computer networks. The survey is carried out in line with a new taxonomy: heuristic methods, user-optimization methods, and system-optimization methods. This taxonomy on routing algorithms is based on two viewpoints: the level of optimization and the relative difficulty for the implementation in real computer networks. Some actual methods implemented in real computer networks are surveyed as well as the theoretical studies in the literature. This paper concludes with some points in need of further researches.

  • PDF

The Knowledge Base-Constructing Method for Art Psychotherapy Expert System (그림에 의한 심리진단 전문가 시스템의 지식베이스 구축의 방법론)

  • Yang HyunSeung;Park SangSung;Song Seunguk;Park Meongae;Jeong Kyeoyong;jang Dongsik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.07b
    • /
    • pp.673-675
    • /
    • 2005
  • The art psychotherapy expert system is a computer system which helps to analyse one's psychology through pictures. However we need a standard criterion because the psychology, the target of the art psychotherapy, does not only have a ambiguous criterion but also a vast range. We're going to suggest a criterion in the field of the art psychotherapy by constructing systematic database through knowledge acquirement of the art psychotherapy expert system. In this study we introduce a system which enables systematic classification and confirmation of symptoms according to mental analyses. The suggested system enables confirmation of a classical structure and systematic classification of knowledges through conversation by extracting nouns through sentence analysis from the knowledge of descriptive form based on the clinical purpose of sentence analysis.

  • PDF

A Fault Diagnosis Based on Multilayer/ART2 Neural Networks (다층/ART2 신경회로망을 이용한 고장진단)

  • Lee, In-Soo;Yu, Du-Hyoung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.14 no.7
    • /
    • pp.830-837
    • /
    • 2004
  • Neural networks-based fault diagnosis algorithm to detect and isolate faults in the nonlinear systems is proposed. In the proposed method, the fault is detected when the errors between the system output and the multilayer neural network-based nominal model output cross a Predetermined threshold. Once a fault in the system is detected, the system outputs are transferred to the fault classifier by nultilayer/ART2 NN (adaptive resonance theory 2 neural network) for fault isolation. From the computer simulation results, it is verified that the proposed fault diagonal method can be performed successfully to detect and isolate faults in a nonlinear system.

Recent Advances in Cryptovirology: State-of-the-Art Crypto Mining and Crypto Ransomware Attacks

  • Zimba, Aaron;Wang, Zhaoshun;Chen, Hongsong;Mulenga, Mwenge
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.6
    • /
    • pp.3258-3279
    • /
    • 2019
  • Recently, ransomware has earned itself an infamous reputation as a force to reckon with in the cybercrime landscape. However, cybercriminals are adopting other unconventional means to seamlessly attain proceeds of cybercrime with little effort. Cybercriminals are now acquiring cryptocurrencies directly from benign Internet users without the need to extort a ransom from them, as is the case with ransomware. This paper investigates advances in the cryptovirology landscape by examining the state-of-the-art cryptoviral attacks. In our approach, we perform digital autopsy on the malware's source code and execute the different malware variants in a contained sandbox to deduce static and dynamic properties respectively. We examine three cryptoviral attack structures: browser-based crypto mining, memory resident crypto mining and cryptoviral extortion. These attack structures leave a trail of digital forensics evidence when the malware interacts with the file system and generates noise in form of network traffic when communicating with the C2 servers and crypto mining pools. The digital forensics evidence, which essentially are IOCs include network artifacts such as C2 server domains, IPs and cryptographic hash values of the downloaded files apart from the malware hash values. Such evidence can be used as seed into intrusion detection systems for mitigation purposes.

A Proposal of Interactive Hologram Art (인터랙티브 홀로그램 아트의 제시)

  • Lim, Soo-Yeon;Kim, Sang-Wook
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2012.05a
    • /
    • pp.368-370
    • /
    • 2012
  • 이 연구는 관객과 상호작용이 가능한 홀로그램 아트의 구성방안을 제시한다. 이를 위하여 홀로그램을 디스플레이하고 인터랙션하는 방법을 설명한다. 제시하는 인터랙티브 홀로그램 아트는 홀로그램이 관객과의 상호작용을 통하여 새로운 미디어 예술을 보일 수 있다. 즉, 기존의 단순한 홀로그램 표현 기법에서 진화하여 공간에서 상호작용을 할 수 있도록 하여 새로운 미디어 아트에 적용할 수 있다.

  • PDF