• Title/Summary/Keyword: the information poor

Search Result 1,945, Processing Time 0.029 seconds

Color Reproduction Based on Leakage Effect of LCD (LCD의 Leakage 현상을 고려한 색재현)

  • 허태욱;이상훈;한찬호;송규익
    • Proceedings of the IEEK Conference
    • /
    • 2000.11d
    • /
    • pp.243-246
    • /
    • 2000
  • Recently, PC monitor users have been replacing cathode ray tubes (CRT) with liquid crystal displays (LCD). But the chromaticity of the primaries are dependent on RGB input signals. And the colorimetry of LCD changes with gray scale and has a poor peformance in color reproduction. In this paper we propose the enhanced algorithm of color reproduction considering color leakage error and black subpixel error in LCD. In order to test peformance of this algorithm we use the colors of Macbeth colorcheck. As a result of experiments, it was confirmed that the color difference of the LCD using the proposed algorithm was considerably reduced.

  • PDF

Vehicle Tracking using Parametric Active Contour (Parametric Active Contour를 이용한 Vehicle Tracking)

  • 나상일;이웅희;조익환;정동석
    • Proceedings of the IEEK Conference
    • /
    • 2003.07d
    • /
    • pp.1411-1414
    • /
    • 2003
  • In this paper, vehicle tracking is implemented using parametric active contour. Extract objects from the background area is the essential step in vehicle tracking. We focus our algorithm on the situations such that the camera is fixed. However, if a simple and ordinary algorithm is adapted to achieve real-time processing, it produces much noise and the vehicle tracking results is poor. For this reason, in this paper, we propose a parametric active contour model algorithm to achieve better vehicle tracking. Experimental results show that the performance of the proposed algorithm is satisfactory.

  • PDF

Cryptanalysis of Hu-Niu-Yang's Multi-server Password Authenticated Key Agreement Schemes Using Smart Card

  • Lee, Sang-Gon;Lim, Meng-Hui;Lee, Hoon-Jae
    • Journal of information and communication convergence engineering
    • /
    • v.7 no.3
    • /
    • pp.340-344
    • /
    • 2009
  • Multi-server password authentication schemes enable remote users to obtain service from multiple servers with single password without separately registering to each server. In 2007, Hu-Niu-Yang proposed an improved efficient password authenticated key agreement scheme for multi-server architecture based on Chang-Lee's scheme proposed in 2004. This scheme is claimed to be more efficient and is able to overcome a few existing deficiencies in Chang-Lee's scheme. However, we find false claim of forward secrecy property and some potential threats such as offline dictionary attack, key-compromise attack, and poor reparability in their scheme. In this paper, we will discuss these issues in depth.

A New Operator Extracting Image Patch Based on EPLL

  • Zhang, Jianwei;Jiang, Tao;Zheng, Yuhui;Wang, Jin;Xie, Jiacen
    • Journal of Information Processing Systems
    • /
    • v.14 no.3
    • /
    • pp.590-599
    • /
    • 2018
  • Multivariate finite mixture model is becoming more and more popular in image processing. Performing image denoising from image patches to the whole image has been widely studied and applied. However, there remains a problem that the structure information is always ignored when transforming the patch into the vector form. In this paper, we study the operator which extracts patches from image and then transforms them to the vector form. Then, we find that some pixels which should be continuous in the image patches are discontinuous in the vector. Due to the poor anti-noise and the loss of structure information, we propose a new operator which may keep more information when extracting image patches. We compare the new operator with the old one by performing image denoising in Expected Patch Log Likelihood (EPLL) method, and we obtain better results in both visual effect and the value of PSNR.

A Bilateral Control for Telemanipulators with High Reduction Ratio Joints (고감속비의 관절을 가지는 원격조작기의 양방향 제어)

  • 안성호;윤지섭;이상정
    • Proceedings of the IEEK Conference
    • /
    • 2000.06e
    • /
    • pp.35-38
    • /
    • 2000
  • Since the telemanipulator consisting of high reduction ratio gear joints has a slow dynamics comparing with the master manipulator, its control signal is likely to be saturated resulting in poor tracking performance and deteriorated stability. This paper proposes a bilateral control scheme of a telemanipulator having high reduction ratio, which can compensate the control input saturation. The experimental results show that the proposed control scheme has excellent performances.

  • PDF

Six Sigma and the Cost of(Poor) Quality

  • Aca;U, Jichao-X
    • International Journal of Quality Innovation
    • /
    • v.3 no.2
    • /
    • pp.159-173
    • /
    • 2002
  • Any organization's Six Sigma program may be at high risk without heeding the lessons learned from the past and that tries to operate without a robust business foundation. A foundation that preferably should consist of stepping-stones such as a 5-S house-keeping program, an effective Integrated Management System (IMS), which includes a strong focus on planning for quality to fully capture the Voice of the Customer (VOC), and an organization-wide training scheme, as well as a reliable Cost of Poor Quality (COPQ) system. That's the best advise I can give to any organization that wishes to embark on a Six Sigma improvement program and hope to be successful. The paper will elaborate on the above issues and provide suggested solutions based on the review of published historical information and the experiences encountered over the last four decades by the author, as a quality practitioner and consultant, in industries that produced safety-critical product. This author maintains that few fundamentally new or useful things have been created in the field of Quality during the last couple of decades. Nevertheless, this paper deliberates on a number of relatively “newer” issues including the concept of “three types of customers”, the CTC, “Critical To Customer” term, the eight Quality Management Principles of the new ISO 9000 family, the growth of industry-specific standards, the adoption of Integrated Management Systems, the rebirth of AS2561 COQ standard, the spread of Six Sigma as well as related ASQ certification and the need for a robust business foundation to ensure Six Sigma survival.

Mobile Tracking Based on Area Partitioning

  • Lee, Jongchan;Lee, Moonho
    • Proceedings of the IEEK Conference
    • /
    • 2002.07c
    • /
    • pp.1709-1712
    • /
    • 2002
  • In the microcell- or picocell-based system the frequent movements of the mobile bring about excessive traffics into the networks. A mobile location estimation mechanism can facilitate both efficient resource allocation and better QoS provisioning through handoff optimization. Existing location estimation schemes consider only LOS model and have poor performance in presence of multi- path and shadowing. In this paper we study a novel scheme which can increase estimation accuracy by considering NLOS environment

  • PDF

Revitalization Strategy of Information Security Industry Using Cognitive Map Analysis (인지지도분석을 통한 정보보호 산업 활성화전략)

  • Lee, Jung Mann;Cho, Ilgu;Rim, Myung Hwan
    • Journal of Information Technology Applications and Management
    • /
    • v.23 no.2
    • /
    • pp.177-194
    • /
    • 2016
  • This study analyzed President Park's speeches and the government's industry policy in the field of information security using cognitive map. The relationship analysis between policy tool variables and policy goal variables was employed to derive revitalization strategy of information security. This paper found that entrepreneurship revitalization has very strong causality with expansion of domestic market and global market. But, on the other hand, HR development has very weak causality with job creation and future growth driver because the labor market in the information security industry is poor and its transfer rate to other industry is very high. This study showed that this cognitive map could be characterized by a scarcity of feedback loops and a strong emphasis on the positive loops in the structure of virtuous circle. In this paper, we also constructed a comprehensive cognitive map on the policy vision of information security, showing that there are a risk of cyber threat, an opportunity of new fusion security market, information security reinforcing circle, global economic circle, and domestic market circle.

A Comparative Analysis of Edge Detection Methods in Magnetic Data

  • Jeon, Taehwan;Rim, Hyoungrea;Park, Yeong-Sue
    • Journal of the Korean earth science society
    • /
    • v.36 no.5
    • /
    • pp.437-446
    • /
    • 2015
  • Many edge detection methods, based on horizontal and vertical derivatives, have been introduced to provide us with intuitive information about the horizontal distribution of a subsurface anomalous body. Understanding the characteristics of each edge detection method is important for selecting an optimized method. In order to compare the characteristics of the individual methods, this study applied each method to synthetic magnetic data created using homogeneous prisms with different sizes, the numbers of bodies, and spacings between them. Seven edge detection methods were comprehensively and quantitatively analyzed: the total horizontal derivative (HD), the vertical derivative (VD), the 3D analytic signal (AS), the title derivative (TD), the theta map (TM), the horizontal derivative of tilt angle (HTD), and the normalized total horizontal derivative (NHD). HD and VD showed average good performance for a single-body model, but failed to detect multiple bodies. AS traced the edge for a single-body model comparatively well, but it was unable to detect an angulated corner and multiple bodies at the same time. TD and TM performed well in delineating the edges of shallower and larger bodies, but they showed relatively poor performance for deeper and smaller bodies. In contrast, they had a significant advantage in detecting the edges of multiple bodies. HTD showed poor performance in tracing close bodies since it was sensitive to an interference effect. NHD showed great performance under an appropriate window.

Identification of Managerial Criteria for Efficient Coordination between a Manufacturer and Suppliers in Supply Chains (제조업체-협력업체간의 효율적 공급사슬 관리를 위한 평가기준 선정에 관한 연구)

  • Lee, Eon-Kyung;Kim, Sheung-Kwon;Ha, Sung-Do;Lee, Kyo-Weon
    • IE interfaces
    • /
    • v.13 no.3
    • /
    • pp.296-305
    • /
    • 2000
  • In supply chains, coordination between a manufacturer and suppliers is regarded as the most important issue when partnership of organizations is considered. Since the suppliers are external to the manufacturer and poor coordination between them results in excessive delays and ultimately leads to poor customer service, manufacturers need a new methodology to select suppliers and to manage and enhance the partnership between manufacturer and suppliers. We suggest a methodology that extends knowledge obtained from the supplier selection process to the supplier management process. We reserved a word, the supplier selection and management system (SSMS) for this methodology. In this paper, we explain how the SSMS is applied to a real supply chain. The methodology identifies the managerial criteria using information derived from supplier selection process and makes use of them in the supplier management process. These managerial criteria include key criteria that are major criteria required by the manufacturer for the best quality of parts from suppliers according to the character of each part, and weak criteria that show the shortcomings of selected suppliers as compared with alternative suppliers with regard to each criterion. The effectiveness of supplier management with managerial criteria was verified by a t-test and a correlation analysis with data collected and hypothesized from a Korean air-conditioner manufacturer.

  • PDF