23 results on '"Dongsung Kim"'
Search Results
2. A Study on the Computing Tools for the Large Scale Corpus
- Author
-
dongsung Kim
- Subjects
Scale (ratio) ,Computer science ,General Arts and Humanities ,Data mining ,computer.software_genre ,computer - Published
- 2020
3. 내용분석 유효 케이스 추출을 위한 파이썬과 엑셀 활용 하이브리드형 접근법
- Author
-
Dongsung Kim and Hyung-Suk Kim
- Subjects
Computer science ,business.industry ,Content analysis ,Programming language ,Big data ,Python (programming language) ,Hybrid approach ,business ,computer.software_genre ,Web crawler ,computer ,computer.programming_language - Published
- 2020
4. Hardware-Aware Model Optimization Tool for Embedded Devices
- Author
-
Gábor Lóki, Marko Fabo, Christopher Alder, Daniel Vince, Nicolas Scotto Di Perto, Shayan Joya, Ákos Kiss, Dongsung Kim, Benjamin Rufus Duckworth, Attila Dusnoki, and Cagri Ozcinar
- Subjects
business.industry ,Computer science ,Embedded system ,business - Published
- 2021
5. Text Genre Detection Using Doc2Vec Word-embedding Language Model
- Author
-
Dongsung Kim
- Subjects
Word embedding ,Computer science ,business.industry ,General Medicine ,Artificial intelligence ,Language model ,business ,computer.software_genre ,computer ,Natural language processing - Published
- 2019
6. Evaluation of Interest Point Detectors for Data Authentication in Wireless Multimedia Sensor Network (WMSN)
- Author
-
Dongsung Kim
- Subjects
Authentication ,Computer science ,business.industry ,Detector ,Point (geometry) ,business ,Wireless multimedia sensor networks ,Computer network - Published
- 2019
7. Text Visualization and Concordance Retrieval Using Project Gutenberg
- Author
-
Dongsung Kim
- Subjects
Computer science ,Corpus linguistics ,business.industry ,Concordance ,General Medicine ,Artificial intelligence ,computer.software_genre ,business ,computer ,Natural language processing ,Visualization - Published
- 2018
8. Multi-categorical social media sentiment analysis of corporate events
- Author
-
Jongwoo Kim, Dongsung Kim, and Woobin Yun
- Subjects
Computer science ,Event (computing) ,Sentiment analysis ,Enterprise value ,Stakeholder ,02 engineering and technology ,Lexicon ,Data science ,020204 information systems ,0202 electrical engineering, electronic engineering, information engineering ,020201 artificial intelligence & image processing ,Social media ,Categorical variable ,Social network analysis - Abstract
It is indisputable that the public's sentiment toward corporations determines their brand image and enterprise value. Nonetheless, the majority of studies have merely focused on financial indexes and polarity-based sentiment analysis. The absence of an effective sentiment analysis method has limited corporations' opportunity to grasp and manage the public's sentiment systematically. In this research, we propose a practical multidimensional sentiment analysis methodology, which consists of constructing a multi-categorical lexicon process using morphological analysis, detecting corporate events with social network analysis, and classifying detected events by stakeholder-based event classification. We tested the proposed framework with data collected from Twitter. Examining the analysis, we concluded that the suggested approach provides more worthwhile information about how the public's sentiment is composed and what the causes are of each sentiment, which could not be identified from previous studies. We are also convinced about the feasibility of the proposed methodology for business purposes and the possibility of extended usage regardless of discipline.
- Published
- 2017
9. Content based image authentication using HOG feature descriptor
- Author
-
Jinse Shin, Christoph Ruland, and Dongsung Kim
- Subjects
Receiver operating characteristic ,Computer science ,business.industry ,Quantization (signal processing) ,Hash function ,Feature extraction ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Top-hat transform ,Pattern recognition ,Histogram of oriented gradients ,Feature (computer vision) ,Feature descriptor ,Computer vision ,Artificial intelligence ,Quantization (image processing) ,business ,Feature detection (computer vision) - Abstract
Although the perceptual image hashing is one of the promising techniques for image authentication, most existing methods cannot well distinguish content changing manipulations from acceptable content preserving modifications, especially when the size of the manipulated area is relatively small. In this regard, a new image hash algorithm is proposed to enhance the tamper detection capability by employing one of the most well-known local feature descriptors, Histogram of Oriented Gradients (HOG), for the feature extraction method. In this paper, image intensity transform using a random number generator, HOG feature computation, Successive Mean Quantization Transform (SMQT), and bit-level permutation are utilized to obtain a secure and robust hash value. Additionally, the performance of the proposed method is measured, and compared with existing algorithms by the Receiver Operating Characteristics (ROC) analysis.
- Published
- 2014
10. [Untitled]
- Author
-
Ramakant Nevatia and Dongsung Kim
- Subjects
Robotic systems ,Landmark ,Artificial Intelligence ,business.industry ,Computer science ,Human–computer interaction ,Formal language ,Doors ,Computer vision ,Artificial intelligence ,business ,Mobile robot navigation ,Desk - Abstract
We describe a robot system that can navigate in indoor environments, such as office buildings and laboratories, without having a detailed map of its environment and which can accept symbolic commands such as “go through the door on the left of the first desk on your right” (expressed in a formal language). Such a system can operate in different instances of similar environments and does not require the effort of constructing a detailed map of the environment. It is also not sensitive to changes in the environment such as those caused by moving furniture. It uses generic representations of the objects in the environment such as walls, desks and doors to recognize them for the purposes of landmark detection and avoids obstacles which may not be modeled explicitly.
- Published
- 1999
11. Recognition and localization of generic objects for indoor navigation using functionality
- Author
-
Ramakant Nevatia and Dongsung Kim
- Subjects
Computer science ,business.industry ,Orientation (computer vision) ,Robotics ,Object (computer science) ,Signal Processing ,Pattern recognition (psychology) ,Systems architecture ,Robot ,Computer vision ,Computer Vision and Pattern Recognition ,Artificial intelligence ,Representation (mathematics) ,business ,Geometric modeling - Abstract
Autonomous indoor navigation requires a robot to have abilities to recognize landmarks and to avoid obstacles. Our goal is to provide these abilities in a generic way so that the robot need not have an accurate and complete geometric model of all the objects in its environment. Rather, we wish to provide abilities to recognize common objects such as desks and doors which can be used as landmarks. We use a functionality-based representation for objects. Objects consist of functional parts, which are characterized by their significant surfaces, and by the accompanying functional evidence for them. Our system works with planar surfaces only and assumes that the objects are in a ‘standard’ pose. The localization and orientation of an object are represented with the most significant surface in an ‘s-map’. Our system has been tested on a number of real scenes where it performs robustly and efficiently; some results are shown in the paper.
- Published
- 1998
12. Segmentation by evolution for visualization of the lower extremity of the visible man
- Author
-
Jong-Hyo Kim, Jeong Won Lee, Heung Sik Kang, Kwang Suk Park, Dongsung Kim, and Jeong-Ho Lee
- Subjects
Leg ,Anatomy, Cross-Sectional ,Radiological and Ultrasound Technology ,Computer science ,business.industry ,Segmentation-based object categorization ,Process (computing) ,Scale-space segmentation ,Image segmentation ,Computer Science Applications ,Visualization ,Imaging, Three-Dimensional ,Humans ,Radiology, Nuclear Medicine and imaging ,Segmentation ,Computer vision ,Artificial intelligence ,business ,Scientific Posters and Demonstrations ,Drawback - Abstract
Medical image segmentation is the crucial process for three-dimensional (3D) modeling. Many studies have claimed to suggest more accurate ways of segmentation. However, such research seems to have the drawback that it works against the parsimony principle. These methods have to reesegment the regions of interest (ROls) for the already segmented data, without taking advantage of the vast amount of past segmentation results. The present report proposes a “seqrnentatlon by evolution” method. It is an advanced segmentation paradigm that incorporates the existing segmentation results. The “seqrnentation by evolution” paradigm was applied to the color images of the Visible Human data.
- Published
- 2001
13. A fully automatic vertebra segmentation method using 3D deformable fences
- Author
-
Yiebin Kim and Dongsung Kim
- Subjects
Computer science ,Gaussian ,Health Informatics ,symbols.namesake ,Imaging, Three-Dimensional ,medicine ,Humans ,Radiology, Nuclear Medicine and imaging ,Segmentation ,Computer vision ,Minimum cost path ,Radiological and Ultrasound Technology ,business.industry ,Computer Graphics and Computer-Aided Design ,Vertebra ,medicine.anatomical_structure ,Region growing ,Fully automatic ,symbols ,Cervical Vertebrae ,Radiographic Image Interpretation, Computer-Assisted ,Computer Vision and Pattern Recognition ,Artificial intelligence ,business ,Tomography, X-Ray Computed ,Volume (compression) - Abstract
In this paper, we propose a fully automatic method for vertebra segmentation in the CT volume data. The method constructs 3D fences that separate adjacent vertebrae from valley-emphasized Gaussian images. Initial curves for the 3D fences are extracted from intervertebral discs, detected with anatomical characteristics, then optimized using a deformable model. A minimum cost path finding method corrects any erroneous curves trapped into a local minimum. Final volume is labeled with help of the 3D fences by a fence-limited region growing method. This method has been applied to 50-patient data sets and has proved to be very successful.
- Published
- 2008
14. Guest-Aware Priority-Based Virtual Machine Scheduling for Highly Consolidated Server
- Author
-
Myeongjae Jeon, Hwanju Kim, Dongsung Kim, Joonwon Lee, and Euiseong Seo
- Subjects
Virtual finite-state machine ,Hardware virtualization ,Full virtualization ,Virtual machine ,Computer science ,Temporal isolation among virtual machines ,Operating system ,Hypervisor ,Virtualization ,computer.software_genre ,computer ,Scheduling (computing) - Abstract
The use of virtualization is rapidly expanding from server consolidation to various computing systems including PC, multimedia set-top box and gaming console. However, different from the server environment, timeliness response for the external input is an essential property for the user-interactive applications. To provide timeliness scheduling of virtual machine this paper presents a priority-based scheduling scheme for virtual machine monitors. The suggested scheduling scheme selects the next task to be scheduled based on the task priorities and the I/O usage stats of the virtual machines. The suggested algorithm was implemented and evaluated on Xen virtual machine monitor. The results showed that the average response time to I/O events is improved by 5~22% for highly consolidated environment.
- Published
- 2008
15. Transparent and Selective Real-Time Interrupt Services for Performance Improvement
- Author
-
Joonwon Lee, Yung-Joon Jung, Euiseong Seo, Jinkyu Jeong, Donghwan Kim, Dongsung Kim, Jin-Soo Kim, and Kanghee Kim
- Subjects
business.industry ,Computer science ,computer.software_genre ,Embedded operating system ,Scheduling (computing) ,Kernel (image processing) ,Embedded system ,Operating system ,Overall performance ,Performance improvement ,Interrupt ,business ,Real-time operating system ,computer - Abstract
The popularity of mobile and multimedia applications made real-time support a mandatory feature for embedded operating systems. However, the current situation is that the overall performance is significantly degraded due to the real-time support. This paper suggests a novel scheme to minimize the performance degradation in embedded operating systems with real-time support. Especially, we propose transparent and selective real-time interrupt services which transparently monitor the system and postpone interrupt handling that are not relevant to real-time tasks. The proposed scheme was implemented on the Linux 2.6 kernel and the experimental results show that our scheme improves the throughput by up to 86% for Hackbench benchmark while providing almost the same scheduling latency compared to the previous work.
- Published
- 2007
16. A method for recognition and localization of generic objects for indoor navigation
- Author
-
Ramakant Nevatia and Dongsung Kim
- Subjects
Surface (mathematics) ,Computer science ,business.industry ,Orientation (computer vision) ,3D single-object recognition ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Cognitive neuroscience of visual object recognition ,Mobile robot ,Object (computer science) ,Mobile robot navigation ,Robot ,Computer vision ,Artificial intelligence ,business - Abstract
We introduce an efficient method for recognition and localization of generic objects for robot navigation, which works on real scenes. The generic objects used in our experiments are desks and doors as they are suitable landmarks for navigation. The recognition method uses significant surfaces and accompanying functional evidence for recognition of such objects. Currently, our system works with planar surfaces only and assumes that the objects are in a "standard" pose. The localization and orientation of an object are represented with the most significant surface in an "s-map". Some results for laboratory scenes are given. >
- Published
- 2002
17. A straightforward algorithm for the quantification of power Doppler signals
- Author
-
Byung Ihn Choi, Kyobum Koo, Dongsung Kim, Seung Hyup Kim, Kyoung Ho Lee, Woo Sun Jun, Jong Hyo Kim, and Joon Koo Han
- Subjects
Pixel ,Computer science ,Just-noticeable difference ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Ultrasonography, Doppler ,General Medicine ,Standard deviation ,Software ,Region of interest ,Evaluation Studies as Topic ,Histogram ,Personal computer ,Image Processing, Computer-Assisted ,Radiology, Nuclear Medicine and imaging ,Segmentation ,business ,Algorithm ,Algorithms - Abstract
RATIONALE AND OBJECTIVES. To document a simple algorithm that quantifies power Doppler signals by computer-based statistical image analysis. METHODS. Personal computer-based software was developed. Color pixels representing power Doppler signals were separated from the background gray pixels in power Doppler images converted in BMP format. To avoid misregistration during this segmentation, a threshold value is required to adequately distinguish between gray and color pixels. Equating the intensity of each color pixel to a Power Value (PV), a histogram of Power Values in power Doppler images was obtained. RESULTS. The software was designed to allow users to adjust two thresholds (Difference Threshold and Intensity Threshold) by observing the segmentation results in real time. The software calculates the following indexes within any region of interest as defined by the operator: mean PV, peak PV, standard deviation of PV, percentage power Doppler area, and integrated PV per unit area. CONCLUSIONS. Power Doppler signals can be objectively quantified using this straightforward algorithm. This simple and practical method can be applied to comparative or longitudinal studies upon vascularity or blood flow.
- Published
- 2002
18. Object-tracking segmentation method: vertebra and rib segmentation in CT images
- Author
-
Dongsung Kim, Hanyoung Kim, and Heung Sik Kang
- Subjects
Computer science ,business.industry ,media_common.quotation_subject ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Scale-space segmentation ,Image segmentation ,Object (computer science) ,Tracking (particle physics) ,Image (mathematics) ,Video tracking ,Contrast (vision) ,Computer vision ,Segmentation ,Artificial intelligence ,business ,media_common - Abstract
This paper proposes a method that segments an object in 3D image slices by tracking not only the target objects to segment but also adjacent non-target objects. The tracking methodology enables the proposed method to detect and prevent a leakage, which is one of the most challenging problems in medical image segmentation. The method also provides an efficient way of modification of segmentation results by informing only suspicious image slices because of a leakage. The proposed method is applied to segment vertebrae in angio image slices in which blood vessels are enhanced with contrast media, and produced promising results in terms of both accuracy and efficiency.
- Published
- 2002
19. A segmentation method for 3D slice images: searching and bridging
- Author
-
Jiyoung Park, Kyobum Ku, and Dongsung Kim
- Subjects
Bridging (networking) ,Computer science ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Boundary (topology) ,Scale-space segmentation ,Interference (wave propagation) ,Accurate segmentation ,Image (mathematics) ,Medical imaging ,Segmentation ,Computer vision ,Artificial intelligence ,business - Abstract
Achieving accurate segmentation results is essential for quantitative diagnosis of disease using medical image. This paper proposes a searching-and-bridging method for robust and accurate segmentation of the proximal femur, which is challenging because it has complex shape, ambiguous boundary surfaces, and interference boundary of adjacent acetabulum.
- Published
- 2002
20. Integration of multiple segmentation methods using evaluation
- Author
-
Heung Sik Kang, Dongsung Kim, and Hanyoung Kim
- Subjects
Computer science ,Segmentation-based object categorization ,business.industry ,ComputingMethodologies_IMAGEPROCESSINGANDCOMPUTERVISION ,Boundary (topology) ,Scale-space segmentation ,Image segmentation ,Evaluation function ,Region growing ,Computer vision ,Segmentation ,Artificial intelligence ,Range segmentation ,business - Abstract
This paper proposes an approach integrating multiple segmentation methods in a systematic way, which can improve overall accuracy without deteriorating accuracy of highly confident segments of a boundary. A segmentation method produces boundary segments, which are then evaluated with an evaluation function considering pros/cons of the current and next methods to apply. Boundary segments with low confidence are replaced by next method while the other segments are kept. These steps are repeated until all segmentation methods are applied. Coarser and more robust method is applied earlier than the others. The proposed approach is implemented for the segmentation of muscles in the Visible Human color images. A balloon method, a minimum cost path finding method, and a Seeded Region Growing method are integrated. The final segmentation results showed improvements in both overall evaluation and segment-based evaluation.
- Published
- 2001
21. Representation and computation of the spatial environment for indoor navigation
- Author
-
Dongsung Kim and Ramakant Nevatia
- Subjects
Machine vision ,Computer science ,business.industry ,Robot ,Computer vision ,Mobile robot ,Motion planning ,Artificial intelligence ,Representation (mathematics) ,business ,Mobile robot navigation ,Block (data storage) ,Domain (software engineering) - Abstract
We introduce a spatial representation, s-map, for an indoor navigation robot. The s-map represents the locations of obstacles in a planar domain, where obstacles are defined as any objects that can block movement of the robot. In building the s-map, the viewing triangle constraint and the stability constraint are introduced for efficient verification of vertical surfaces. These verified vertical surfaces and 3-D segments of obstacles smaller than a robot, are mapped to the s-map by simply dropping height information. Thus, the s-map is made directly from 3-D segments with simple verification, and represents obstacles in a planar domain so that it becomes a navigable map for the robot without further processing. In addition to efficient map building, the s-map represents the environment more realistically and completely. Furthermore, the s-map converts many navigation problems in 3-D, such as map fusion and path planning, into 2-D ones. We present the analysis of the s-map in terms of complexity and reliability, and discuss its pros and cons. Moreover, we show the results of the s-maps for indoor environments. >
- Published
- 1994
22. Employment of frame accumulation and shaped function for upgrading low-light-level image detection sensitivity
- Author
-
Hongying Tang, Ling Lin, Jean Gao, Dongsung Kim, and Gang Li
- Subjects
Brightness ,Optics ,business.industry ,Computer science ,Shadow ,Frame (networking) ,Image processing ,Image sensor ,business ,Sensitivity (electronics) ,Signal ,Atomic and Molecular Physics, and Optics ,Image (mathematics) - Abstract
We demonstrate a novel method that employs a frame-accumulation and shaped-function technique to improve an image sensor's detection sensitivity using probability statistics. It can obtain the unbiased estimate for the low-light-level image signal, thus upgrading the signal-to-noise ratio to a high degree. It was verified by an experiment in a sealed box. By the help of a variable light beam-shaped function saw-tooth signal in front of a camera, the low-light-level shadow image that was invisible to the camera could be revealed clearly from the frame accumulation data. The method can surpass an image sensor's detection limitation.
23. On a new vocoder technique by the nonuniform sampling
- Author
-
Won Cheol Lee, Dongsung Kim, and Myung-Jin Bae
- Subjects
Computer science ,Gaussian ,Low-pass filter ,Speech coding ,Nonuniform sampling ,Sampling (statistics) ,Speech processing ,Speech enhancement ,symbols.namesake ,Gaussian noise ,Coherent sampling ,symbols ,Electronic engineering ,Waveform ,Algorithm ,Data compression - Abstract
To reduce the redundancy within samples that result from a uniform sampling method like PCM, nonuniform sampling or nonredundant-sample coding methods can be considered. However, it is well known that when conventional nonuniform sampling methods are applied directly to the speech signal, the required amount of data is comparable to, or more than that of the uniform sampling method. To overcome this problem, a new nonuniform sampling method is proposed, in which nonuniform sampling is applied to the low-pass filtered speech signal and the remaining signals are compensated by 16 colored Gaussian random noise with various noise levels. By this method, the speech signal waveform can be encoded by a 1.8 times larger compression ratio than that of the conventional nonuniform sampling method.
Catalog
Discovery Service for Jio Institute Digital Library
For full access to our library's resources, please sign in.