2016 (468)
2015 (468)
2014 (462)
2013 (200)
2012 (118)
2011 (22)
2010 (16)
2009 (33)
2008 (37)
2007 (19)
2006 (5)
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The distributed fusion filtering problem is studied for multi-rate sampling stochastic singular linear systems with multiple sensors and stochastic multiplicative noises. The system is described at the highest sampling rate and different sensors may have different lower sampling rates. The white noise in measurement matrix is introduced to describe the stochastic disturbance. Firstly, based on decomposition in canonical form, the original singular system is transformed into fast and slow two subsystems. For the two reduced-order subsystems, the local filters (LFs) are given based on the “dummy” random variables. The cross-covariance matrices between any two local filtering errors are derived. Further, the distributed fusion filter weighted by matrices (FFWM) is obtained for the original singular system based on the well-known fusion algorithm in the linear minimum variance sense. Simulation example verifies the correctness and feasibility of the proposed algorithm.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.11-24
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cognitive radio-based wireless sensor network is the next-generation sensor network paradigm. Important to this emerging sensor network is the need to reduce energy consumption, paving way for ‘green’ communication among sensor nodes. Therefore, in this paper, we have proposed an energy-efficient, learning-inspired, adaptive and dynamic channel decision and access technique for cognitive radio-based wireless sensor networks. Using intelligent learning technique based on the previous experience, the cognitive radio-based wireless sensor network agent decides which available channel to access based on the energy-efficiency achievable by transmitting using the channel. From simulation results, we found that as the channel packet availability increases, the energy-efficiency of the channel increase. This lends credence to the fact that the proposed learning-inspired algorithm is significantly energy-efficient for cognitive radio-based wireless sensor networks.
Study on Personalized Course Generation Based on Layered Recommendation Algorithm
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.25-36
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The paper introduces the concept of a layered recommendation system (LRS) based on multi-dimensional feature vectors to implement personalized course generation model and algorithms. In this work, we present a personalized course generation algorithm based on the multi-dimensional feature vectors (PCG-LRS) and hybrid applications by content-based recommendations and collaborative filtering recommendation algorithm to generate personalized curriculums. Based on this algorithm, we introduce the teaching outline as the basis of the initial generated course and the final learning goals. The knowledge base of the courses can be constructed from the teaching outline. The initial personalized knowledge models of students are generated by pre-tests. These personalized knowledge models are the base of personalized course generation. This algorithm not only helps teachers to develop the overall curriculum teaching plan and to generate the curriculum automatically, but also meets the learning requirements of each individual student with different knowledge and abilities. Additionally, the layered recommendation algorithm recommends content within a large-scale knowledge base repository and resource base implement at different levels. The personalized recommendation algorithm is divided into a number of steps, which achieves an effective dimensionality reduction, reduces the amount of computation, and improves the courses generated algorithm.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.37-50
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Cervical cancer is one of the main causes of death by disease worldwide. In Peru, it holds the first place in frequency and represents 8% of deaths caused by sickness. To detect the disease in the early stages, one of the most used screening tests is the cervix Papanicolaou test. Currently, digital images are increasingly being used to improve Pap test efficiency. This work develops an algorithm based on adaptive thresholds, which will be used in Pap smear assisted quality control software. The first stage of the method is a pre-processing step, in which noise and background removal is done. Next, a block is segmented for each one of the points selected as not background, and a local threshold per block is calculated to search for cell nuclei. If a nucleus is detected, an artifact rejection follows, where only cell nuclei and inflammatory cells are left for the doctors to interpret. The method was validated with a set of 55 images containing 2317 cells. The algorithm successfully recognized 92.3% of the total nuclei in all images collected.
Application Research of Linear Programming on Mining Outliers of Time Series
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.51-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Based on data mining of outliers of time series, current studies have developed many methods, but there exist certain disadvantages for each method. This paper developed the method of mining outliers of time series based on linear programming model, verified high efficiency through an actual case and make up for the shortcoming of other methods.
Research on Wood Cell Shape Analysis Methods based on Fourier Descriptors
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.61-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The shape parameter of wood microscopic cell is one of the important parameters in the identification of wood species. Fourier Descriptors is often used to describe the boundaries of closed areas. The paper analyzes the slice images of five kinds of common wood cells, extracting the mathematical parameters of the cells, obtaining the average value and simulating the benchmark cell shape of the five wood species to provide data support for subsequent recognition experiments.
Depth based Sign Language Recognition System Using SVM
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.75-86
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose a sign language recognition system using an SVM (Support Vector Machine) and a depth camera. In particular, we focus on the Korean sign language. For the sign language system, we suggest two methods, one for the hand feature extraction stage and the other for the recognition stage. Hand features consist of the number of fingers, finger length, palm radius, and hand direction. To extract hand features, we use Distance Transform and a hand skeleton. This method is more accurate and faster than a traditional method that uses contours. To recognize hand posture, we develop a decision tree with hand features. For more accuracy, we use SVM to determine the threshold value in the decision tree. In the experiment results, we show that the suggested method is more accurate and faster when extracting hand features and recognizing hand postures.
Industrial Flame Edge Detection Algorithm Based on Gray Dominant Filter
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.87-96
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Industrial furnace flame detection is directly related to the safety and economic operation of boiler. The flame edge detection is one of the most key parts of the flame detection. At present, there are many edge detection algorithms for normal object but few for industrial flame edge detection which cannot provide fully support for furnace flame combustion stability, flame 3D reconstruction and flame temperature field reconstruction. One new industrial flame image edge detection algorithm based on industrial flame image characteristics is proposed in this paper. This algorithm can effectively remove noise level in flame image and well maintain flame image edge features, compute the gradients from multiple-directions for entirely detecting flame edge information. Moreover, this algorithm is verified by experiment in this paper to present high performance in resisting noise, and clearly see continuous flame edge curve, which reveals better effect in industrial flame edge detection than other edge detection algorithms.
An Empirical Approach for Estimation of the Software Development Effort
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.97-110
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The number of standards and methods has been developed for software estimation in the last many decades. These methods help practitioners and engineers to estimate the effort accurately, but they found their inability to estimate software precisely. In this paper, an empirical approach is developed to measure the software development effort. The well-known PROMISE data sets of 217 projects are collected and the several performance factors are used in this paper to validate the estimated results. This work also considers the most popular model for software effort estimating, i.e. COCOMO. And the result of the COCOMO model and proposed an empirical approach is compared with the actual effort, and concludes that the proposed approach estimates the software development effort better than COCOMO in several aspects.
Hopf Bifurcation Analysis in a Delayed Ratio-dependent Gause-type Predator-prey Models
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.111-120
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Two-sided Matching Decision with Two-granularity Uncertain and Incomplete Linguistic Terms
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.121-128
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With respect to the two-sided matching problem, where the agents’ preferences are in the format of two-granularity uncertain and incomplete linguistic terms, a matching method is presented. Some definitions on uncertain linguistic term and 2-tuple are firstly given. The two-sided matching problem with two-granularity uncertain and incomplete linguistic terms is described. Then, uncertain and incomplete linguistic term matrixes are transformed into 2-tuple matrixes. Furthermore, a multi-objective optimization model is developed by using the extended 2-tuple weighted average. By using the 2-tuple arithmetic mean, the normalization method and the linear weighted method, the multi-objective optimization model can be converted into a single-objective optimization model. By solving the optimization model, the matching alternative can be obtained. A matching example illustrates the feasibility and effectiveness of this method.
Multi-Event Identification with the Single Sensor
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.129-136
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Sensors perform various activities to detect in a recent environment of Internet of things and ubiquitous sensor network. A single sensor detects multi-events in some cases while multi-sensors detect a single event and report in some other cases. The study presented a way of data clustering to classify events detected by a single sensor in circumstances where information is obtained by a form of data stream. Data was grouped in three types of events when clustering was applied for sensor data detected and reported. The following results also showed that clustering distinguished the events in the consequent time timeslots. The clusters displayed changing patterns with time. This result would contribute to the study field of context inference based on data stream.
Research of the Interconnection of Workflow System Based on Web Service
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.137-152
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In order to achieve the interconnection between different workflow management systems, it was proposed that all the distributed workflow systems would be encapsulated as web services to perform the entire business process collaboratively by the way of processes’ composition in this paper. By analyzing the comparison between the composition of processes and ordinary Web service, we studied interactive control, the parameters required to be passed through the distributed workflow systems, the workflow system service’s interfaces and its packaging. Furthermore we put forward a general method of the workflow systems interactive interfaces’ extension and the way of the workflow service’s encapsulating and invoking. By this approach, it can easily combine the processes or process fragments which deployed on different workflow systems without other agents and components. It also provides support for the interconnection of the workflow systems in distributed environment, and ultimately achieves a coordinated operation between different workflow engines.
Study of Customer Experience under the Circumstances of Mobile Internet
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.153-158
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
These years, mobile internet, a new information communication technology (ICT), is developing quickly, stimulating the rise in demand for such products and services as intelligent terminals and mobile application clients, and in this way the marketing mode based on customer experience becomes popular. By using Customer Choice and Decision-making Theory in economics and investigating the market, this paper puts forward a Customer Experience-based Technology Adoption Model, which better explains the key influencing factors that may lead to the customers’ final purchases under the circumstance of mobile internet. These factors consist of functions, entertainment, practicability, and reasonable pricing. In the end, based on the study result above, this paper points out that in mobile internet the operators should simplify the application functions and improve the entertainment so as to promote the value of customer experience and thus guide the occurrence of purchasing activities of the customers.
Sum-Rate Capacity Evaluation Methodology for MIMO-OFDMA Systems
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.159-170
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Recently, the long-term evolution (LTE) system has emerged as a major concern within the 3rd Generation Partnership Project (3GPP and 3GPP2). Orthogonal frequency division multiple accesses (OFDMA) have been considered within the LTE system as a major technology for cellular radio access. In addition, numerous research groups have proposed the incorporation of technologies such as multi-user scheduling, multi-input multi-output (MIMO), and adaptive modulation and coding (AMC) into OFDMA. However, system-level simulation is required to assess how these technologies interact and to evaluate and optimize each technology with respect to system-level performance in real cellular environments. This article discusses an evaluation methodology of system-level simulation for a MIMO-OFDMA system. The approach by which the capacity evaluation of the MIMO-OFDMA system was conducted and resulting sum-rate capacity is discussed.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.171-186
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
To ensure fair packet broadcasting without service disruption in wireless network from one network cell to another is the key to successful mobile services. However, enforcing fair packet broadcasting is challenging because decision policies within the network cell though works efficiently, considerably reduces the energy consumption level. Using MAC protocol, communication framework gets improved by cooperatively localizing the system and achieves space-time synchronization. But redundancy occurs on cellular wireless network for higher energy levels. This work presents the design and implementation of collision free packet broadcasting in wireless network known as Consistent Shortcut Transfigure Path Construction (CSTPC) mechanism. Under this mechanism the main objective is to develop a transfigure path (i.e., alter path) when the link failure occurs during broadcasting (i.e.,) handover the call. Initially, consistent shortcut is created for constructing alter path and when the link gets failed packet handover takes place. Consistent shortcut is created by combining the Midpoint and Simpsons rule procedure. The Midpoint and Simpsons procedure creates the shortcut and with this reduces the rate of energy consumption gradually. Secondly, error rate on call handover is reduced using CSTPC mechanism by applying Estimation of Distribution algorithm. The constructed Estimation of Distribution algorithm in CSTPC mechanism feasibly handover the packets to neighboring base station with minimal error rate. In this way, minimal error rate avoids retransmission of packets due to the collision and path failure. Furthermore, the CSTPC mechanism reduce the energy consumption level on transfigure path construction and also avoids the retransmission of packets (i.e.,) call in wireless network. Experimental work is carried out using factors such as avoidance of retransmission rate, energy consumption rate, and call broadcasting efficiency.
Research of Power Battery Management System in Electric Vehicle
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.187-194
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Power battery management system is a very important part in electric vehicle. Currently, power battery management system is only monitor and control of the power batteries group voltage. This may cause a single battery over-charge and over-discharge, thus affecting cycle life of the power battery. In this paper, for each cell in the batteries group is monitored and controlled to prevent any battery over-charge and over-discharge. Hardware and software of power battery management system has been designed. Experimental results show that power battery management system can accurately monitor the power batteries, thereby ensuring the safety of the power batteries and prolonging the cycle life of the power batteries group.
Testing an Empirical Model for the Value Network of the Mobile Communication Industry in Korea
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.195-208
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The mobile communication industry evolves into a mobile communication industry ecosystem led by new keystone players (i.e., Apple and Google) and reflects the expansion of overall industrial competitiveness in size through conversion with other businesses. In this study, the modeling was done in a systematic method to derive the answers to the questions such as, which functions in the value chains of mobile communication industry contribute most to profit creation, what is the key resource, and what the new business model is. This study attempts to objectively identify derivation of factors and correlations between the configuration factors for competitiveness expansion for each industry. Specifically, we developed a dynamic model to predict the overall industry movement by theoretically establishing the modelling concept about value networking of the mobile communication industry ecosystem. Using the system dynamics methodology, coupled with professional interviews, this paper empirically tests the value network model that reflects open mobile communication ecosystem. The results show that the ecosystem of the mobile communication industry is evolving into an open form with the surfacing of portals and terminal production companies, suggesting the collapse of the traditional structure (Walled Garden).
Energy-Efficient Power Allocation in OFDM-based Relaying Networks
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.209-220
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
User Interface Construction for Recognition of Gesture and Voice
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.221-226
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we propose an efficient computing environment which implements the NUI (Natural User Interface) for computer operation by motion and voice and a foundation which can provide for contents of new form. The pc operation system and other computer become possible if the key necked technology is applied. If the KINECT technology is applied different pc operation is possible. Also, we show through the simulation that CUI (Computer User Interface) interacts naturally than the computer operation of the mouse and keyboard base.
Improved Multi-target Tracking Algorithm Based on Gaussian Mixture Particle PHD Filter
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.227-236
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The paper proposes Gaussian mixture particle probability hypothesis density filter(PHD) algorithm ,which can effectively solve the problem that the object number is changing or unknown, based on particle PHD filter. This algorithm calculates the object number and state by recursive procedure, avoiding the uncertainty of target state estimation caused by particle sampling and clustering. Gaussian mixture particle is introduced to effectively maintain the multi-modal distribution of each target,reducing the complexity of calculation.
Capacitive Fingerprint Sensor Circuit using Pseudo-Direct Scheme for Mobile Applications
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.237-248
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper proposes a fingerprint sensor cell and its structure using pseudo-direct scheme. The fingerprint sensor cell uses an internal transmitted (Tx) plate instead of using an external bezel as a contact for direct signal driving to finger. It uses an active output voltage feedback (AOVF) integrator and multiple integration scheme to maximize the sensitivity and improve signal-to-noise ratio (SNR) as well. The circuit models of combined fingerprint and Tx electrode were analyzed and simulated using MATLAB. And the proposed fingerprint sensor were designed and simulated with standard 0.35μm CMOS technology. Simulations verified that the proposed fingerprint sensor using pseudo-direct scheme can be effectively used as a personal authentication method especially in mobile applications.
Study on Importance Function for Particle Filter
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.249-258
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As an important nonlinear filter theory, particle filter is a heated issue in domestic and foreign researches. The option of importance density is one of the key steps of particle filter algorithm. The proper option of importance density can minish the negative influence of filter algorithm caused by degeneracy problem. This paper introduces several widely-used options of importance density systemically, and analyzes their features and applied perspectives respectively. The paper also advances a comprehensive method of importance density, analyzes its technical features, explores the adjudgement and improvement of this method based on various performance, and finally puts forward the necessary further study according to the engineer requirements.
Tiling Effect Performance Analysis
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.259-268
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In this paper, we present a tile effect generation algorithm. The presented method cuts a given pictures with small-size tiles and an original image is composed of those tiles. The size of tiles is generated by random function. We use four parameters: size of horizontal and vertical block, size of skip blocks in horizontal and vertical direction. The presented method is tested on McM dataset. Simulation results provide performance comparison in terms of PSNR, CMSE and FSIM.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.269-286
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Broadcasting and communications industries with traditional value chains, such as live performances, music, event planning, broadcasting, movies, publishing, and advertising, operate under planning, production, distribution, and consumption stages and have witnessed the fusion of planning and production, the simultaneous occurrence of production and distribution, and the convergence of producers and consumers, resulting in changes in the traditional value chain structure. This suggests a need for policymakers to examine these changes in the context of the ecosystem value chain and reconsider their goals to set appropriate human resources targets. This paper analyzes the importance of economic and scientific aspects of the impact media convergence has had on society, discerns the reason for changes in the value chain of broadcasting and communications industries from a multiphase and linear structure to a convergent value chain structure, and presents some suggestions for future policies on broadcast and communications media convergence technologies.
Design and Implementation of Teaching System for Mobile Cross-platform
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.287-296
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
With the development of mobile intelligent terminal, the mobile learning has become an efficient way to learn. However, there are a few work related to the mobile learning system construction in current China. This paper proposed a novel method based mobile cross-platform to construct the learning system, which can be used for teachers to teach and students to learn whenever and wherever. To meet the demand of the cross-platform and multi-terminal, we use the mobile Internet, the HTML5, the Responsive Web Design technology, and the MVC technology architecture. Experimental results show that the proposed method can work effectively and can be widely used in the teaching system.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.297-308
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Under the precondition that there is a common conceptual ground between public relations and public diplomacy, this study explores websites as a dialogue space for diplomatic offices and foreign publics. It examines how many embassies utilize social media and applies Kent and Taylor’s dialogic principles to the embassies’ official homepage and blog to compare how they manage its website as a communication tool to inform and engage the Korean publics.
OPT-VCG: A Novel Proposal for 3D SoC Test Optimization
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.309-320
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
As an emerging technology for on-chip interconnect scaling in vertical direction in semiconductor industry, through-silicon-via (TSV) demonstrates its advantages and has been adopted for 3D SoC implementation. Optimal test architecture and test scheduling are significant for stacked 3D SoC design. However existing design methods cannot achieve both optimal test time and individual rationality. In this paper, game theory based 3D SoC test architecture optimization and test scheduling method is proposed under constraints of the available number of TSVs for test time minimization and rational test band width allocation. VCG algorithm is brought to 3D SoC design. Three kinds of stacked SoCs are built using ITC’02 SoC test benchmarks, and experimental results on them show the advantages of the proposed method over prior work.
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.321-332
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Soft set theory proposed by Molodtsov is a new mathematical tool for dealing with the uncertain data. Soft set-based dimensionality reduction can be considered as a technique for feature selection. In this paper, we present an alternative technique for feature selection of traditional Malay musical instrument sounds dataset. The technique is based on matrices computation of multi-soft sets for dimensionality reduction. The dataset is taken from our previous work which consists of 1116 instances and 37 attributes of Malay Musical Instrument Sounds Dataset. The result shows that the obtained features of proposed technique are 35 out of 37 features.
Bayer Patterned Image Compression Based on Structure Conversion and APBT
보안공학연구지원센터(IJMUE) International Journal of Multimedia and Ubiquitous Engineering Vol.10 No.2 2015.02 pp.333-340
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
The color filter array (CFA) captures only one-third of the necessary color intensities and the full color image is generated from the captured data by interpolation. In recent years, the algorithm of Bayer patterned image compression based on “structure conversion” has achieved better image quality. On the basis of previous work, a new algorithm based on the all phase biorthogonal transform (APBT) and all phase IDCT (APIDCT) interpolation is proposed in this paper. Instead of the conventional JPEG compression, APBT is applied to the JPEG image compression (APBT-JPEG), which significantly reduces complex multiplications and makes the quantization table easier. In the interpolation step, APIDCT interpolation method is introduced. Experimental results show that the proposed algorithm outperforms the one based on “structure conversion”; and the APIDCT interpolation performs close to the conventional interpolation methods. Therefore, the algorithm proposed in this paper is more suitable for Bayer image compression.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.