• Title/Summary/Keyword: weighted transform

Search Result 152, Processing Time 0.022 seconds

Frequency Band Selection Exited Linear Prediction Wideband Speech/Audio Coding Using SBR (SBR을 이용한 주파수 밴드선택 여기 선형예측 광대역 음성/오디오 부호화)

  • Jang, Sunghoon;Lee, Insung
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.6
    • /
    • pp.556-562
    • /
    • 2013
  • This paper is aimed to improve performance of Band-Selection speech/audio Coder reconstucted band spectrum that is not sent by the comfort noise. To improve the performance, we use the Spectral Band Replication(SBR) technique instead of substitution of Comfort noise. To synthesize SBR signal, the SBR algorithm is referenced in selected signals and the spectrum synthesized by SBR is injected to non-selected band. Each sub-band spectrum has been energy-weighted by real audio signal. We propose the enhanced the Band-Selection Coder that utilizes synthesized SBR signal from selected signal instead of comfort noise.

Quantification of Cerebral Blood Flow Measurements by Magnetic Resonance Imaging Bolus Tracking

  • Park Byung-Rae
    • Biomedical Science Letters
    • /
    • v.11 no.2
    • /
    • pp.129-134
    • /
    • 2005
  • Three different deconvolution techniques for quantifying cerebral blood flow (CBF) from whole brain $T2^{\ast}-weighted$ bolus tracking images were implemented (parametric Fourier transform P-FT, parametric single value decomposition P-SVD and nonparametric single value decomposition NP-SVD). The techniques were tested on 206 regions from 38 hyperacute stroke patients. In the P-FT and P-SVD techniques, the tissue and arterial concentration time curves were fit to a gamma variate function and the resulting CBF values correlated very well $(CBF_{P-FT}\;=\;1.02{\cdot}CBF_{p-SVD},\;r^2\;=\;0.96)$. The NP-SVD CBF values correlated well with the P-FT CBF values only when a sufficient number of time series volumes were acquired to minimize tracer time curve truncation $(CBF_{P-FT}\;=\;0.92{\cdot}CBF_{NP-SVD},\;r^2\;=\;0.88)$. The correlation between the fitted CBV and the unfitted CBV values was also maximized in regions with minimal tracer time curve truncation $(CBV_{fit}\;=\;1.00{\cdot}CBV_{ Unfit},\;^r^2\;=\;0.89)$. When a sufficient number of time series volumes could not be acquired (due to scanner limitations) to avoid tracer time curve truncation, the P-FT and P-SVD techniques gave more reliable estimates of CBF than the NP-SVD technique.

  • PDF

Physical Layer Security Scheme Based on Polarization Modulation and WFRFT Processing for Dual-polarized Satellite Systems

  • Luo, Zhangkai;Wang, Huali;Zhou, Kaijie
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5610-5624
    • /
    • 2017
  • A novel scheme based on polarization modulation and the weighted fractional Fourier transform (PM-WFRFT) is proposed in this paper to enhance the physical layer security of dual-polarized satellite systems. This scheme utilizes the amplitude and phase of the carrier as information-bearing parameters to transmit the normal signal and conceals the confidential information in the carrier's polarization state (PS). After being processed by WFRFT, the characteristics of the transmit signal (including amplitude, phase and polarization state) vary randomly and in nearly Gaussian distribution. This makes the signal very difficult for an eavesdropper to recognize or capture. The WFRFT parameter is also encrypted by a pseudo-random sequence and updated in real time, which enhances its anti-interception performance. Furthermore, to prevent the polarization-based impairment to PM-WFRFT caused by depolarization in the wireless channel, two components of the polarized signal are transmitted respectively in two symbol periods; this prevents any mutual interference between the two orthogonally polarized components. Demodulation performance in the system was also assessed, then the proposed scheme was validated with a simulated dual-polarized satellite system.

Combustion Emission Gas Analysis & Hazard Assessment to the Litter Layer in Forest (임내 낙엽층의 연소 방출가스 분석 및 건강 위험성 평가)

  • Kim, Dong-Hyun;Lee, Myung-Bo
    • Proceedings of the Korea Institute of Fire Science and Engineering Conference
    • /
    • 2009.04a
    • /
    • pp.358-364
    • /
    • 2009
  • 본 연구에서는 우리나라 주요 침엽수종인 소나무(Pinus densiflora)와 활엽수종인 굴참나무(Quercus variabilis)의 낙엽에 대해 FTIR(Fourier Transform Infrared) 분광계를 이용하여 배출 연소가스 종류 및 농도를 측정하였다. 실험결과 소나무와 굴참나무 낙엽에서 Carbon monoxide, Carbon dioxide, Acetic acid, Butyl acetate, Ethylene, Methane, Methanol, Nitrogen dioxide, Ammonia, Hydrogen Fluoride, Sulfur dioxide, Hydrogen bromide 등 13개 연소가스가 검출되었고 굴참나무 낙엽에서는 Nitrogen monoxide가 추가로 검출되었다. 방출된 연소가스의 전체 농도는 소나무 낙엽이 굴참나무 낙엽에 비해 4.5배 많이 검출되었다. 특히, 시간가중평균가스농도(TWA : Time-weighted average, ppm) 기준을 초과하는 연소가스는 Carbon monoxide, Carbon dioxide, Butyl acetate가 검출되었고 단시간노출기준(STEL : Short Term Exposure Limit, ppm) 기준을 초과하는 연소가스는 Carbon monoxide, Carbon dioxide로 소나무 및 굴참나무 모두에서 나타났다. 이에 산불에서의 낙엽층 지표화 연소시 전체 가스 방출량의 99% 이상을 차지하고 있는 Carbon monoxide, Carbon dioxide의 건강 위험성이 높은 것으로 나타났다. 하지만, 검출된 다른 건강 위험성 가스의 경우에도 연소물질의 양이 증가할수록 연소가스의 농도가 높아져 건강안정성에 해가 있을 것으로 판단되며 또한 검출된 연소가스 중 나무의 주요구성 원소가 아닌 Bromide, Fluoride 화합물에 대해서는 토양으로부터의 오염 또는 분석과정에서의 노이즈로 인한 검출 등에 대한 보다 면밀한 검토가 필요할 것으로 판단된다.

  • PDF

Cyclic Shift Based Tone Reservation PAPR Reduction Scheme with Embedding Side Information for FBMC-OQAM Systems

  • Shi, Yongpeng;Xia, Yujie;Gao, Ya;Cui, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2879-2899
    • /
    • 2021
  • The tone reservation (TR) scheme is an attractive method to reduce peak-to-average power ratio (PAPR) in the filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) systems. However, the high PAPR of FBMC signal will severely degrades system performance. To address this issue, a cyclic shift based TR (CS-TR) scheme with embedding side information (SI) is proposed to reduce the PAPR of FBMC signals. At the transmitter, four candidate signals are first generated based on cyclic shift of the output of inverse discrete Fourier transform (IDFT), and the SI of the selected signal with minimum peak power among the four candidate signals is embedded in sparse symbols with quadrature phase-shift keying constellation. Then, the TR weighted by optimal scaling factor is employed to further reduce PAPR of the selected signal. At the receiver, a reliable SI detector is presented by determining the phase rotation of SI embedding symbols, and the transmitted data blocks can be correctly demodulated according to the detected SI. Simulation results show that the proposed scheme significantly outperforms the existing TR schemes in both PAPR reduction and bit error rate (BER) performances. In addition, the proposed scheme with detected SI can achieve the same BER performance compared to the one with perfect SI.

Face Spoofing Attack Detection Using Spatial Frequency and Gradient-Based Descriptor

  • Ali, Zahid;Park, Unsang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.892-911
    • /
    • 2019
  • Biometric recognition systems have been widely used for information security. Among the most popular biometric traits, there are fingerprint and face due to their high recognition accuracies. However, the security system that uses face recognition as the login method are vulnerable to face-spoofing attacks, from using printed photo or video of the valid user. In this study, we propose a fast and robust method to detect face-spoofing attacks based on the analysis of spatial frequency differences between the real and fake videos. We found that the effect of a spoofing attack stands out more prominently in certain regions of the 2D Fourier spectra and, therefore, it is adequate to use the information about those regions to classify the input video or image as real or fake. We adopt a divide-conquer-aggregate approach, where we first divide the frequency domain image into local blocks, classify each local block independently, and then aggregate all the classification results by the weighted-sum approach. The effectiveness of the methodology is demonstrated using two different publicly available databases, namely: 1) Replay Attack Database and 2) CASIA-Face Anti-Spoofing Database. Experimental results show that the proposed method provides state-of-the-art performance by processing fewer frames of each video.

Orthogonal variable spreading factor encoded unmanned aerial vehicle-assisted nonorthogonal multiple access system with hybrid physical layer security

  • Omor Faruk;Joarder Jafor Sadiqu;Kanapathippillai Cumanan;Shaikh Enayet Ullah
    • ETRI Journal
    • /
    • v.45 no.2
    • /
    • pp.213-225
    • /
    • 2023
  • Physical layer security (PLS) can improve the security of both terrestrial and nonterrestrial wireless communication networks. This study proposes a simplified framework for nonterrestrial cyclic prefixed orthogonal variable spreading factor (OVSF)-encoded multiple-input and multiple-output nonorthogonal multiple access (NOMA) systems to ensure complete network security. Various useful methods are implemented, where both improved sine map and multiple parameter-weighted-type fractional Fourier transform encryption schemes are combined to investigate the effects of hybrid PLS. In addition, OVSF coding with power domain NOMA for multi-user interference reduction and peak-toaverage power ratio (PAPR) reduction is introduced. The performance of $\frac{1}{2}$-rated convolutional, turbo, and repeat and accumulate channel coding with regularized zero-forcing signal detection for forward error correction and improved bit error rate (BER) are also investigated. Simulation results ratify the pertinence of the proposed system in terms of PLS and BER performance improvement with reasonable PAPR.

Martial Arts Moves Recognition Method Based on Visual Image

  • Husheng, Zhou
    • Journal of Information Processing Systems
    • /
    • v.18 no.6
    • /
    • pp.813-821
    • /
    • 2022
  • Intelligent monitoring, life entertainment, medical rehabilitation, and other fields are only a few examples where visual image technology is becoming increasingly sophisticated and playing a significant role. Recognizing Wushu, or martial arts, movements through the use of visual image technology helps promote and develop Wushu. In order to segment and extract the signals of Wushu movements, this study analyzes the denoising of the original data using the wavelet transform and provides a sliding window data segmentation technique. Wushu movement The Wushu movement recognition model is built based on the hidden Markov model (HMM). The HMM model is trained and taught with the help of the Baum-Welch algorithm, which is then enhanced using the frequency weighted training approach and the mean training method. To identify the dynamic Wushu movement, the Viterbi algorithm is used to determine the probability of the optimal state sequence for each Wushu movement model. In light of the foregoing, an HMM-based martial arts movements recognition model is developed. The recognition accuracy of the HMM model increases to 99.60% when the number of samples is 4,000, which is greater than the accuracy of the SVM (by 0.94%), the CNN (by 1.12%), and the BP (by 1.14%). From what has been discussed, it appears that the suggested system for detecting martial arts acts is trustworthy and effective, and that it may contribute to the growth of martial arts.

Improved AR-FGS Coding Scheme for Scalable Video Coding (확장형 비디오 부호화(SVC)의 AR-FGS 기법에 대한 부호화 성능 개선 기법)

  • Seo, Kwang-Deok;Jung, Soon-Heung;Kim, Jin-Soo;Kim, Jae-Gon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.12C
    • /
    • pp.1173-1183
    • /
    • 2006
  • In this paper, we propose an efficient method for improving visual quality of AR-FGS (Adaptive Reference FGS) which is adopted as a key scheme for SVC (Scalable Video Coding) or H.264 scalable extension. The standard FGS (Fine Granularity Scalability) adopts AR-FGS that introduces temporal prediction into FGS layer by using a high quality reference signal which is constructed by the weighted average between the base layer reconstructed imageand enhancement reference to improve the coding efficiency in the FGS layer. However, when the enhancement stream is truncated at certain bitstream position in transmission, the rest of the data of the FGS layer will not be available at the FGS decoder. Thus the most noticeable problem of using the enhancement layer in prediction is the degraded visual quality caused by drifting because of the mismatch between the reference frame used by the FGS encoder and that by the decoder. To solve this problem, we exploit the principle of cyclical block coding that is used to encode quantized transform coefficients in a cyclical manner in the FGS layer. Encoding block coefficients in a cyclical manner places 'higher-value' bits earlier in the bitstream. The quantized transform coefficients included in the ealry coding cycle of cyclical block coding have higher probability to be correctly received and decoded than the others included in the later cycle of the cyclical block coding. Therefore, we can minimize visual quality degradation caused by bitstream truncation by adjusting weighting factor to control the contribution of the bitstream produced in each coding cycle of cyclical block coding when constructing the enhancement layer reference frame. It is shown by simulations that the improved AR-FGS scheme outperforms the standard AR-FGS by about 1 dB in maximum in the reconstructed visual quality.

A Study on Multi-modal Near-IR Face and Iris Recognition on Mobile Phones (휴대폰 환경에서의 근적외선 얼굴 및 홍채 다중 인식 연구)

  • Park, Kang-Ryoung;Han, Song-Yi;Kang, Byung-Jun;Park, So-Young
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.2
    • /
    • pp.1-9
    • /
    • 2008
  • As the security requirements of mobile phones have been increasing, there have been extensive researches using one biometric feature (e.g., an iris, a fingerprint, or a face image) for authentication. Due to the limitation of uni-modal biometrics, we propose a method that combines face and iris images in order to improve accuracy in mobile environments. This paper presents four advantages and contributions over previous research. First, in order to capture both face and iris image at fast speed and simultaneously, we use a built-in conventional mega pixel camera in mobile phone, which is revised to capture the NIR (Near-InfraRed) face and iris image. Second, in order to increase the authentication accuracy of face and iris, we propose a score level fusion method based on SVM (Support Vector Machine). Third, to reduce the classification complexities of SVM and intra-variation of face and iris data, we normalize the input face and iris data, respectively. For face, a NIR illuminator and NIR passing filter on camera are used to reduce the illumination variance caused by environmental visible lighting and the consequent saturated region in face by the NIR illuminator is normalized by low processing logarithmic algorithm considering mobile phone. For iris, image transform into polar coordinate and iris code shifting are used for obtaining robust identification accuracy irrespective of image capturing condition. Fourth, to increase the processing speed on mobile phone, we use integer based face and iris authentication algorithms. Experimental results were tested with face and iris images by mega-pixel camera of mobile phone. It showed that the authentication accuracy using SVM was better than those of uni-modal (face or iris), SUM, MAX, NIN and weighted SUM rules.