Go to the main menu
Skip to content
Go to bottom
REFERENCE LINKING PLATFORM OF KOREA S&T JOURNALS
> Journal Vol & Issue
IEIE Transactions on Smart Processing and Computing
Journal Basic Information
Journal DOI :
The Institute of Electronics Engineers of Korea
Editor in Chief :
Volume & Issues
Volume 3, Issue 6 - Dec 2014
Volume 3, Issue 5 - Oct 2014
Volume 3, Issue 4 - Aug 2014
Volume 3, Issue 3 - Jun 2014
Volume 3, Issue 2 - Apr 2014
Volume 3, Issue 1 - Feb 2014
Selecting the target year
Minimum Statistics-Based Noise Power Estimation for Parametric Image Restoration
Yoo, Yoonjong ; Shin, Jeongho ; Paik, Joonki ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 41~51
DOI : 10.5573/IEIESPC.2014.3.2.41
This paper describes a method to estimate the noise power using the minimum statistics approach, which was originally proposed for audio processing. The proposed minimum statistics-based method separates a noisy image into multiple frequency bands using the three-level discrete wavelet transform. By assuming that the output of the high-pass filter contains both signal detail and noise, the proposed algorithm extracts the region of pure noise from the high frequency band using an appropriate threshold. The region of pure noise, which is free from the signal detail part and the DC component, is well suited for minimum statistics condition, where the noise power can be extracted easily. The proposed algorithm reduces the computational load significantly through the use of a simple processing architecture without iteration with an estimation accuracy greater than 90% for strong noise at 0 to 40dB SNR of the input image. Furthermore, the well restored image can be obtained using the estimated noise power information in parametric image restoration algorithms, such as the classical parametric Wiener or ForWaRD image restoration filters. The experimental results show that the proposed algorithm can estimate the noise power accurately, and is particularly suitable for fast, low-cost image restoration or enhancement applications.
Exact Histogram Specification Considering the Just Noticeable Difference
Jung, Seung-Won ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 52~58
DOI : 10.5573/IEIESPC.2014.3.2.52
Exact histogram specification (EHS) transforms the histogram of an input image into the specified histogram. In the conventional EHS techniques, the pixels are first sorted according to their graylevels, and the pixels that have the same graylevel are further differentiated according to the local average of the pixel values and the edge strength. The strictly ordered pixels are then mapped to the desired histogram. However, since the conventional sorting method is inherently dependent on the initial graylevel-based sorting, the contrast enhancement capability of the conventional EHS algorithms is restricted. We propose a modified EHS algorithm considering the just noticeable difference. In the proposed algorithm, the edge pixels are pre-processed such that the output edge pixels obtained by the modified EHS can result in the local contrast enhancement. Moreover, we introduce a new sorting method for the pixels that have the same graylevel. Experimental results show that the proposed algorithm provides better image enhancement performance compared to the conventional EHS algorithms.
Bounding volume estimation algorithm for image-based 3D object reconstruction
Jang, Tae Young ; Hwang, Sung Soo ; Kim, Hee-Dong ; Kim, Seong Dae ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 59~64
DOI : 10.5573/IEIESPC.2014.3.2.59
This paper presents a method for estimating the bounding volume for image-based 3D object reconstruction. The bounding volume of an object is a three-dimensional space where the object is expected to exist, and the size of the bounding volume strongly affects the resolution of the reconstructed geometry. Therefore, the size of a bounding volume should be as small as possible while it encloses an actual object. To this end, the proposed method uses a set of silhouettes of an object and generates a point cloud using a point filter. A bounding volume is then determined as the minimum sphere that encloses the point cloud. The experimental results show that the proposed method generates a bounding volume that encloses an actual object as small as possible.
Design and Load Map of the Next Generation Convergence Security Framework for Advanced Persistent Threat Attacks
Lee, Moongoo ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 65~73
DOI : 10.5573/IEIESPC.2014.3.2.65
An overall responding security-centered framework is necessary required for infringement accidents, failures, and cyber threats. On the other hand, the correspondence structures of existing administrative, technical, physical security have weakness in a system responding to complex attacks because each step is performed independently. This study will recognize all internal and external users as a potentially threatening element. To perform connectivity analysis regarding an action, an intelligent convergence security framework and road map is suggested. A suggested convergence security framework was constructed to be independent of an automatic framework, such as the conventional single solution for the priority defense system of APT of the latest attack type, which makes continuous reputational attacks to achieve its goals. This study suggested the next generation convergence security framework to have preemptive responses, possibly against an APT attack, consisting of the following five hierarchical layers: domain security, domain connection, action visibility, action control, and convergence correspondence. In the domain, the connection layer suggests a security instruction and direction in the domains of administrative, physical and technical security. The domain security layer has consistency of status information among the security domain. A visibility layer of an intelligent attack action consists of data gathering, comparison and decision cycle. The action control layer is a layer that controls the visibility action. Finally, the convergence corresponding layer suggests a corresponding system of before and after an APT attack. The administrative security domain had a security design based on organization, rule, process, and paper information. The physical security domain is designed to separate into a control layer and facility according to the threats of the control impossible and control possible. Each domain action executes visible and control steps, and is designed to have flexibility regarding security environmental changes. In this study, the framework to address an APT attack and load map will be used as an infrastructure corresponding to the next generation security.
Design of Tourism Application Based on RFID Technology
Lee, JiHyun ; Lee, JoonGoo ; Kim, SeonWook ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 74~82
DOI : 10.5573/IEIESPC.2014.3.2.74
Automatic identification is pervasive in many areas and its applicable areas are increasing gradually. 2D bar-code, NFC, and RFID technologies are representative examples of the automatic identification. This paper explains the implementation of mobile tourism application software on RFID technology. The mobile application provides the location and navigation information by combining the tag inventory and web database. The interactions among the user, application and database server are described in detail. This paper proposes a simple way of minimizing the efforts to build the entire system by storing the URLs for the tag and accessing existing tourism information services through the URLs.
Energy-Efficient Opportunistic Interference Alignment With MMSE Receiver
Shin, Won-Yong ; Yoon, Jangho ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 83~87
DOI : 10.5573/IEIESPC.2014.3.2.83
This paper introduces a refined opportunistic interference alignment (OIA) technique that uses minimum mean square error (MMSE) detection at the receivers in multiple-input multiple-output multi-cell uplink networks. In the OIA scheme under consideration, each user performs the optimal transmit beamforming and power control to minimize the level of interference generated to the other-cell base stations, as in the conventional energy-efficient OIA. The result showed that owing to the enhanced receiver structure, the OIA scheme shows much higher sum-rates than those of the conventional OIA with zero-forcing detection for all signal-to-noise ratio regions.
Photo-based Desktop Virtual Reality System Implemented on a Web-browser
Ohta, Masaya ; Otani, Hiroki ; Yamashita, Katsumi ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 88~95
DOI : 10.5573/IEIESPC.2014.3.2.88
This paper proposes a novel desktop virtual reality system. Based on the position of the user`s face, the proposed system selects the most appropriate image of an object from a set of photographs taken at various angles, and simply "pastes" it onto the display at the appropriate location and scale. Using this system, the users can intuitively feel the presence of the object.
Performance Comparison between LLVM and GCC Compilers for the AE32000 Embedded Processor
Park, Chanhyun ; Han, Miseon ; Lee, Hokyoon ; Cho, Myeongjin ; Kim, Seon Wook ;
IEIE Transactions on Smart Processing and Computing, volume 3, issue 2, 2014, Pages 96~102
DOI : 10.5573/IEIESPC.2014.3.2.96
The embedded processor market has grown rapidly and consistently with the appearance of mobile devices. In an embedded system, the power consumption and execution time are important factors affecting the performance. The system performance is determined by both hardware and software. Although the hardware architecture is high-end, the software runs slowly due to the low quality of codes. This study compared the performance of two major compilers, LLVM and GCC on a32-bit EISC embedded processor. The dynamic instructions and static code sizes were evaluated from these compilers with the EEMBC benchmarks.LLVM generally performed better in the ALU intensive benchmarks, whereas GCC produced a better register allocation and jump optimization. The dynamic instruction count and static code of GCCwere on average 8% and 7% lower than those of LLVM, respectively.