• Title/Summary/Keyword: 급속 OUR

Search Result 303, Processing Time 0.036 seconds

An Image Watermarking Method for Embedding Copyrighter's Audio Signal (저작권자의 음성 삽입을 위한 영상 워터마킹 방법)

  • Choi Jae-Seung;Kim Chung-Hwa;Koh Sung-Shik
    • The Journal of the Acoustical Society of Korea
    • /
    • v.24 no.4
    • /
    • pp.202-209
    • /
    • 2005
  • The rapid development of digital media and communication network urgently brings about the need of data certification technology to protect IPR (Intellectual property right). This paper proposed a new watermarking method for embedding owner's audio signal. Because this method uses an audio signal as a watermark to be embedded, it is very useful to claim the ownership aurally. And it has the advantage of restoring audio signal modified and especially removed by image removing attacks by applying our LBX(Linear Bit-expansion) interleaving. Three basic stages of our watermarking include: 1) Encode . analogue owner's audio signal by PCM and create new digital audio watermark, 2) Interleave an audio watermark by our LBX; and 3) Embed the interleaved audio watermark in the low frequency band on DTn (Discrete Haar Wavelet Transform) of image. The experimental results prove that this method is resistant to lossy JPEG compression as standard image compression and especially to cropping and rotation which remove a part of Image.

Estimation of 3D Rotation Information of Animation Character Face (애니메이션 캐릭터 얼굴의 3차원 회전정보 측정)

  • Jang, Seok-Woo;Weon, Sun-Hee;Choi, Hyung-Il
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.8
    • /
    • pp.49-56
    • /
    • 2011
  • Recently, animation contents has become extensively available along with the development of cultural industry. In this paper, we propose a method to analyze a face of animation character and extract 3D rotational information of the face. The suggested method first generates a dominant color model of a face by learning the face image of animation character. Our system then detects the face and its components with the model, and establishes two coordinate systems: base coordinate system and target coordinate system. Our system estimates three dimensional rotational information of the animation character face using the geometric relationship of the two coordinate systems. Finally, in order to visually represent the extracted 3D information, a 3D face model in which the rotation information is reflected is displayed. In experiments, we show that our method can extract 3D rotation information of a character face reasonably.

A research on effect of WBl CNC programming studing on learning accomplishment and motive (WBI CNC 프로그래밍 학습이 학업성취도 및 학습동기에 미치는 영향에 관한 연구)

  • Chi, Kang-Jae;Bae, Seok-Chan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.750-753
    • /
    • 2005
  • Internet service, a part of our life, requires the changes not only of environment in our life but also of people's sense of value. It also requires a quick change in the spear of education activities without exception. It brought a lot of changes into educational methods, our recognition on education, and various kinds of educational tools and environment. The introduction of WBI (Web Based Instruction) is one of the most important thing. This study have applied WBI to Industrial high school education to improve its quality and accomplish its effective teaching-learning. That is, we have applied CNC(Computerized Numerical Control) and Processing learning to machining center learning and have given students chances and various learning materials so that they could contact with new information. We aimed at testing and studying some effects on the improvements of learning accomplishment and motive in this study.

  • PDF

An Efficient Bot Detection Mechanism in Smartphones (스마트폰에서 효율적인 봇 탐지 기법)

  • Choe, Ujin;Park, Jiyeon;Jung, Jinman;Heo, Junyoung;Jeon, Gwangil
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.61-68
    • /
    • 2015
  • Recently, with increasing use of smartphones, the security threats also have increased rapidly. Especially, the compromised smartphone is very dangerous because it could be exploited in a DDOS attacks such as cyberterrorism as well as in the leakage of personal information. However, most bot detection mechanisms are still unsuitable for smartphone with its lower computing capability and limited battery capacity because they incur additional computational overheads or require pre-defined signatures. In this paper, we present an efficient bot detection mechanism in smartphones. Our mechanism detects effectively bots in outgoing traffic by using a correlation between user events and network traffic. We have implemented its prototype in Android smartphone and measured its performance. The evaluation results show that our mechanism provides low overhead to detect bots in smartphones.

A Web-based Cooperative Learning System using Extended TGT Model (확장된 TGT 모델을 이용한 웹기반 협동학습 시스템)

  • Kim, Kyong-Won;Hong, Euy-Seok
    • The Journal of the Korea Contents Association
    • /
    • v.9 no.12
    • /
    • pp.467-476
    • /
    • 2009
  • As web technology and educational environments are in rapid progress, web-based cooperative learning systems have gained a lot of interests. Recently some studies have attempted to combine a learning system and simple games that enable learners to actively participate and have high interests in learning. These studies are based on TGT model, a cooperative learning model using games, and mostly remain system design levels. A few implemented systems have many problems because they focus only on pure TGT model. To solve these problems, this paper builds a extended TGT model and a new web-based cooperative learning system using this new model. The extended part contains ideas such as expert learning from Jigsaw II model, improvement scores from STAD model and making game problems by learners. A system using pure TGT model and a suggested system are implemented and used by two classes of middle school students to evaluate our system. The experimental results show that our system outperforms the other system.

Design and Evaluation of a Rough Set Based Anomaly Detection Scheme Considering Weighted Feature Values (가중 특징 값을 고려한 러프 집합 기반 비정상 행위 탐지방법의 설계 및 평가)

  • Bae, Ihn-Han;Lee, Hwa-Ju;Lee, Kyung-Sook
    • Journal of Korea Multimedia Society
    • /
    • v.9 no.8
    • /
    • pp.1030-1036
    • /
    • 2006
  • The rapid proliferation of wireless networks and mobile computing applications has changed the landscape of network security. Anomaly detection is a pattern recognition task whose goal is to report the occurrence of abnormal or unknown behavior in a given system being monitored. This paper presents an efficient rough set based anomaly detection method that can effectively identify a group of especially harmful internal masqueraders in cellular mobile networks. Our scheme uses the trace data of wireless application layer by a user as feature value. Based on the feature values, the use pattern of a mobile's user can be captured by rough sets, and the abnormal behavior of the mobile can be also detected effectively by applying a roughness membership function considering weighted feature values. The performance of our scheme is evaluated by a simulation. Simulation results demonstrate that the anomalies are well detected by the method that assigns different weighted values to feature attributes depending on importance.

  • PDF

Delay based Authentication Model for Flooding of Service Tolerance of Rehabilitation Psychology Analysis System (재활심리분석시스템의 폭주서비스 감내를 위한 지연기반 인증모델)

  • Lim, Ho-Chan;Kim, Young-Soo
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.9
    • /
    • pp.2073-2081
    • /
    • 2013
  • Today's rapidly changing society can lead to maladaptive behaviors. In the situations, rehabilitation psychology analysis using the on-line test be needed to solve the problem. However, Internet-based rehabilitation psychology analysis by a malicious attacker may still be vulnerable to denial-of-service attacks. The service flooding attacks render the server incapable of providing its service to legitimate clients. Therefore the importance of implementing systems that prevent denial of service attacks and provide service to legitimate users cannot be overemphasized. In this paper, we propose a puzzle protocol which applies to authentication model. our gradually strengthening authentication model improves the availability and continuity of services and prevent denial of service attacks and we implement flooding of service tolerance system to verify the efficiency of our model. This system is expected to be ensure in the promotion of reliability.

Enhanced VLC-TDoA Algorithm for Indoor Positioning Without LED-ID (LED-ID 없이 실내 위치 추정이 가능한 개선된 VLC-TDoA 알고리즘)

  • Do, Trong-Hop;Hwang, Junho;Yoo, Myungsik
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.8
    • /
    • pp.672-678
    • /
    • 2013
  • In the recent year, along with the rapid development of LED technology, many applications using LEDs have been researched and indoor positioning is one of them. In particular, previous indoor positioning systems based on visible light communication combine triangulation manner such as AoA, ToA TDoA. But most of them needs transmitting unique ID of each LED panel. In this paper, we propose an non LED-ID based indoor positioning system in which the visible light radiated from LEDs is used to locate the position of receiver. Compared to current indoor positioning systems using LED light, our system has the advantages of simple implementation, low cost and high accuracy. Through the computer simulation, our system can achieve a high estimation accuracy of 3.6cm in average in the $5{\times}5{\times}3m^3$ room.

Patterning and Characterization of Co/Ni Composite Silicide using EIB (FIB를 이용한 CoNi 복합실리사이드 나노배선의 패턴가공과 형상 분석)

  • Song Oh-Sung;Kim Sang-Yeob;Jung Yoon-Ki
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.7 no.3
    • /
    • pp.332-337
    • /
    • 2006
  • We prepared 100 nm-thick CoNi composite silicide on a 70 nm-thick polysilicon substrate. Composite silicide laye.s were formed by rapid thermal annealing(RTA) at the temperatures of $700^{\circ}C,\;900^{\circ}C,\;1000^{\circ}C$ for 40 seconds. A Focused ion beam (FIB) was used to make nano-patterns with the operation range of 30 kV and $1{\sim}100$ pA. We investigated the change of thickness, line width, and the slope angle of the silicide patterns by FIB. More easily made with the FIB process than with the conventional polycide process. We successfully fabricated sub-100nm etched patterns with FIB condition of 30kv-30pA. Our result implies that we may integrate nano patterns with our newly proposed CoNi composite silicides.

  • PDF

Spatio-Temporal Index Structure based on KDB-Tree for Tracking Positions of Moving Objects (이동 객체의 위치 추적을 위한 KDB-트리 기반의 시공간 색인구조)

  • Seo Dong-Min;Bok Kyoung-Soo;Yoo Jae Soo;Lee Byoung-Yup
    • Journal of Internet Computing and Services
    • /
    • v.5 no.4
    • /
    • pp.77-94
    • /
    • 2004
  • Recently, the needs of index structure which manages moving objects efficiently have been increased because of the rapid development of location-based techniques. Existing index structures frequently need updates because moving objects change continuatively their positions. That caused entire performance loss of the index structures. In this paper, we propose a new index structure called the TPKDB-tree that is a spatio-temporal index structure based on KDB-tree. Our technique optimizes update costs and reduces a search time for moving objects and reduces unnecessary updates by expressing moving objects as linear functions. Thus, the TPKDB-tree efficiently supports the searches of future positions of moving objects by considering the changes of moving objects included in the node as time-parameter. To maximize space utilization, we propose the new update and split methods. Finally, we perform various experiments to show that our approach outperforms others.

  • PDF