• Title/Summary/Keyword: intrinsic feature

Search Result 84, Processing Time 0.028 seconds

Video Augmentation of Virtual Object by Uncalibrated 3D Reconstruction from Video Frames (비디오 영상에서의 비보정 3차원 좌표 복원을 통한 가상 객체의 비디오 합성)

  • Park Jong-Seung;Sung Mee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.4
    • /
    • pp.421-433
    • /
    • 2006
  • This paper proposes a method to insert virtual objects into a real video stream based on feature tracking and camera pose estimation from a set of single-camera video frames. To insert or modify 3D shapes to target video frames, the transformation from the 3D objects to the projection of the objects onto the video frames should be revealed. It is shown that, without a camera calibration process, the 3D reconstruction is possible using multiple images from a single camera under the fixed internal camera parameters. The proposed approach is based on the simplification of the camera matrix of intrinsic parameters and the use of projective geometry. The method is particularly useful for augmented reality applications to insert or modify models to a real video stream. The proposed method is based on a linear parameter estimation approach for the auto-calibration step and it enhances the stability and reduces the execution time. Several experimental results are presented on real-world video streams, demonstrating the usefulness of our method for the augmented reality applications.

  • PDF

EMD based Cardiac Arrhythmia Classification using Multi-class SVM (다중 클래스 SVM을 이용한 EMD 기반의 부정맥 신호 분류)

  • Lee, Geum-Boon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.1
    • /
    • pp.16-22
    • /
    • 2010
  • Electrocardiogram(ECG) analysis and arrhythmia recognition are critical for diagnosis and treatment of ill patients. Cardiac arrhythmia is a condition in which heart beat may be irregular and presents a serious threat to the patient recovering from ventricular tachycardia (VT) and ventricular fibrillation (VF). Other arrhythmias like atrial premature contraction (APC), Premature ventricular contraction (PVC) and superventricular tachycardia (SVT) are important in diagnosing the heart diseases. This paper presented new method to classify various arrhythmias contrary to other techniques which are limited to only two or three arrhythmias. ECG is decomposed into Intrinsic Mode Functions (IMFs) by Empirical Mode Decomposition (EMD). Burg algorithm was performed on IMFs to obtain AR coefficients which can reduce the dimension of feature vector and utilized as Multi-class SVM inputs which is basically extended from binary SVM. We chose optimal parameters for SVM classifier, applied to arrhythmias classification and achieved the accuracies of detecting NSR, APC, PVC, SVT, VT and VP were 96.8% to 99.5%. The results showed that EMD was useful for the preprocessing and feature extraction and multi-class SVM for classification of cardiac arrhythmias, with high usefulness.

Psycho-acoustical analysis of program feature of Symphonie Fantastique using Zwicker's sound quality parameters (쯔비커의 음질 파라메터를 이용한 환상교향곡 표제성의 심리음향학적 분석)

  • Chung, Haewook;Jeong, Soo-Ran;Cheong, Cheolung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.36 no.1
    • /
    • pp.78-87
    • /
    • 2017
  • The goal of the present paper is to objectify the intrinsic subjectivity of sound as a media of music by applying psycho-acoustical methodology to the analysis of a musical work. First, 18 sound samples are extracted from "Symponie Fantastique" written by Hector Berlioz, which is a piece of program music, and then the objective Zwicher's sound quality parameters such as: Loudness, Sharpness, Roughness and Fluctuation Strength are evaluated for each of these sound samples. For subjective sound quality evaluation, 9 representative sound quality adjectives are extracted on a basis of program feature of Symponie Fantastique and the first jury test is carried out by using the numeric rating method and the paired comparison method. Three sound quality adjectives, "bright", "noisy", and "realistic" are extracted from the factor analysis of the first jury test result. On a basis of the computed sound metrics and the second jury test result for the three sound quality adjectives, three sound quality indexes are developed to represent the sound qualities of "Symponie Fantastique".

A quantitative assessment method of network information security vulnerability detection risk based on the meta feature system of network security data

  • Lin, Weiwei;Yang, Chaofan;Zhang, Zeqing;Xue, Xingsi;Haga, Reiko
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.12
    • /
    • pp.4531-4544
    • /
    • 2021
  • Because the traditional network information security vulnerability risk assessment method does not set the weight, it is easy for security personnel to fail to evaluate the value of information security vulnerability risk according to the calculation value of network centrality, resulting in poor evaluation effect. Therefore, based on the network security data element feature system, this study designed a quantitative assessment method of network information security vulnerability detection risk under single transmission state. In the case of single transmission state, the multi-dimensional analysis of network information security vulnerability is carried out by using the analysis model. On this basis, the weight is set, and the intrinsic attribute value of information security vulnerability is quantified by using the qualitative method. In order to comprehensively evaluate information security vulnerability, the efficacy coefficient method is used to transform information security vulnerability associated risk, and the information security vulnerability risk value is obtained, so as to realize the quantitative evaluation of network information security vulnerability detection under single transmission state. The calculated values of network centrality of the traditional method and the proposed method are tested respectively, and the evaluation of the two methods is evaluated according to the calculated results. The experimental results show that the proposed method can be used to calculate the network centrality value in the complex information security vulnerability space network, and the output evaluation result has a high signal-to-noise ratio, and the evaluation effect is obviously better than the traditional method.

Characteristics on the military look in modern fashion - focused on the post-2000 era - (현대패션에 나타난 밀리터리 룩의 특성 - 2000년 이후를 중심으로 -)

  • Kim, Sun-Young
    • Journal of the Korean Home Economics Association
    • /
    • v.44 no.9
    • /
    • pp.41-50
    • /
    • 2006
  • This study examines the characteristics of the military look in modern fashion. The materials for the study are mainly precedent studies and related literature, although fashion portfolios and magazines, domestic and international, are used for the exploratory study. The results of the study are as follows. First, the military look for women dismantles the sexual symbolism endowed with the clothes by expressing a neutral charm out of dichotomy image between genders. The neutral expression of the military look, different from the military look of the 20th century, provides a chance to feature a new image by pursuing more individual freedom than human itself. Second, the military-look emphasizes feminine sensual charm through exposing, concealing, or decorating with ornaments which are transformed from the elements of the military clothes, This is different from the past military look that expressed masculine rigidity through simplifying the details and emphasizing the male body silhouette. Third, the military look produces a deconstruction image instead of just showing its intrinsic thoughts or symbolic message through combining design elements or symbolic details of the military look with other images, transforming and exaggerating the shapes, or mixing the time point of views reinterpreting the present or the future image.

Conceptual design and preliminary characterization of serial array system of high-resolution MEMS accelerometers with embedded optical detection

  • Perez, Maximilian;Shkel, Andrei
    • Smart Structures and Systems
    • /
    • v.1 no.1
    • /
    • pp.63-82
    • /
    • 2005
  • This paper introduces a technology for robust and low maintenance cost sensor network capable to detect accelerations below a micro-g in a wide frequency bandwidth (above 1,000 Hz). Sensor networks with such performance are critical for navigation, seismology, acoustic sensing, and for the health monitoring of civil structures. The approach is based on the fabrication of an array of high sensitivity accelerometers, each utilizing Fabry-Perot cavity with wavelength-dependent reflectivity to allow embedded optical detection and serialization. The unique feature of the approach is that no local power source is required for each individual sensor. Instead one global light source is used, providing an input optical signal which propagates through an optical fiber network from sensor-to-sensor. The information from each sensor is embedded onto the transmitted light as an intrinsic wavelength division multiplexed signal. This optical "rainbow" of data is then assessed providing real-time sensing information from each sensor node in the network. This paper introduces the Fabry-Perot based accelerometer and examines its critical features, including the effects of imperfections and resolution estimates. It then presents serialization techniques for the creation of systems of arrayed sensors and examines the effects of serialization on sensor response. Finally, a fabrication process is proposed to create test structures for the critical components of the device, which are dynamically characterized.

Fingerprint Information Masking Algorithm By Using Multiple LBP Features (다중 LBP 피처를 이용한 지문 정보 마스킹 알고리즘)

  • Kim, Jin-Ho
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.12
    • /
    • pp.281-288
    • /
    • 2017
  • Financial service commission notified that fingerprint information of their documents should be deleted till 2019 to the financial industry and the public institution. Business solutions for fingerprint detection and masking in document images are introduced. In this paper, a fingerprint information masking algorithm is proposed by using the multiple LBP features to extract fingerprint's intrinsic characteristics for artificial neural network decision whether the candidate is a true fingerprint or not after segmentation of versatile fingerprint candidates from a document image. The experimental results of the proposed fingerprint masking algorithm for 3,497 document images that are saved in a financial industry show that 96.4% of fingerprint information is masked, hence this fingerprint masking algorithm can be used efficiently in real fingerprint masking tasks.

Band Alignment at CdS/wide-band-gap Cu(In,Ga)Se2 Hetero-junction by using PES/IPES

  • Kong, Sok-Hyun;Kima, Kyung-Hwan
    • Transactions on Electrical and Electronic Materials
    • /
    • v.6 no.5
    • /
    • pp.229-232
    • /
    • 2005
  • Direct characterization of band alignment at chemical bath deposition $(CBD)-CdS/Cu_{0.93}(In_{1-x}Ga_x)Se_2$ has been carried out by photoemission spectroscopy (PES) and inverse photoemission spectroscopy (IPES). Ar ion beam etching at the condition of the low ion kinetic energy of 400 eV yields a removal of surface contamination as well as successful development of intrinsic feature of each layer and the interfaces. Especially interior regions of the wide gap CIGS layers with a band gap of $1.4\~1.6\;eV$ were successfully exposed. IPES spectra revealed that conduction band offset (CBO) at the interface region over the wide gap CIGS of x = 0.60 and 0.75 was negative, where the conduction band minimum of CdS was lower than that of CIGS. It was also observed that an energy spacing between conduction band minimum (CBM) of CdS layer and valance band maximum (VBM) of $Cu_{0.93}(In_{0.25}Ga_{0.75})Se_2$ layer at interface region was no wider than that of the interface over the $Cu_{0.93}(In_{0.60}Ga_{0.40})Se_2$ layer.

Signaling for Synergistic Activation of Natural Killer Cells

  • Kwon, Hyung-Joon;Kim, Hun Sik
    • IMMUNE NETWORK
    • /
    • v.12 no.6
    • /
    • pp.240-246
    • /
    • 2012
  • Natural killer (NK) cells play a pivotal role in early surveillance against virus infection and cellular transformation, and are also implicated in the control of inflammatory response through their effector functions of direct lysis of target cells and cytokine secretion. NK cell activation toward target cell is determined by the net balance of signals transmitted from diverse activating and inhibitory receptors. A distinct feature of NK cell activation is that stimulation of resting NK cells with single activating receptor on its own cannot mount natural cytotoxicity. Instead, specific pairs of co-activation receptors are required to unleash NK cell activation via synergy- dependent mechanism. Because each co-activation receptor uses distinct signaling modules, NK cell synergy relies on the integration of such disparate signals. This explains why the study of the mechanism underlying NK cell synergy is important and necessary. Recent studies revealed that NK cell synergy depends on the integration of complementary signals converged at a critical checkpoint element but not on simple amplification of the individual signaling to overcome intrinsic activation threshold. This review focuses on the signaling events during NK cells activation and recent advances in the study of NK cell synergy.

Supervised Model for Identifying Differentially Expressed Genes in DNA Microarray Gene Expression Dataset Using Biological Pathway Information

  • Chung, Tae Su;Kim, Keewon;Kim, Ju Han
    • Genomics & Informatics
    • /
    • v.3 no.1
    • /
    • pp.30-34
    • /
    • 2005
  • Microarray technology makes it possible to measure the expressions of tens of thousands of genes simultaneously under various experimental conditions. Identifying differentially expressed genes in each single experimental condition is one of the most common first steps in microarray gene expression data analysis. Reasonable choices of thresholds for determining differentially expressed genes are used for the next-stap-analysis with suitable statistical significances. We present a supervised model for identifying DEGs using pathway information based on the global connectivity structure. Pathway information can be regarded as a collection of biological knowledge, thus we are trying to determine the optimal threshold so that the consequential connectivity structure can be the most compatible with the existing pathway information. The significant feature of our model is that it uses established knowledge as a reference to determine the direction of analyzing microarray dataset. In the most of previous work, only intrinsic information in the miroarray is used for the identifying DEGs. We hope that our proposed method could contribute to construct biologically meaningful structure from microarray datasets.