• Title/Summary/Keyword: 보치환 기법

Search Result 29, Processing Time 0.021 seconds

Revisiting Permutation Transformation Scheme for Cancelable Face Recognition (취소 가능한 얼굴 인식을 지원하는 치환 변환 기법에 대한 고찰)

  • Kim, Koon-Soon;Kang, Jeon-Il;Lee, Kyung-Hee;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.6
    • /
    • pp.37-46
    • /
    • 2006
  • It is known to be hard to apply cryptographic one-way functions to the recognition system using bio-information directly. As one of the solutions about that problem there is a permutation transformation scheme. However, they did not show my algorithmic behavior or any performance analysis of the transformation by experiment. In this paper, by showing the recognition ratio of the transformed scheme by experiment, we prove that that scheme is sound. Also, we adopt their transformation to LDA(Linear Discriminant Analysis) to show the experimental results. In the negative side, we introduce a new type of attack against the permutation transformation schemes. finally, we briefly mention a generalization of the permutation transformation for countermeasure of the attack at the end of this paper.

Estimation of Equivalent Hydrodynamic Coefficients by Bean Permutation Technique (보치환법에 의한 등가 유체력계수 산정)

  • 박춘군
    • Journal of Korean Society of Coastal and Ocean Engineers
    • /
    • v.12 no.2
    • /
    • pp.81-86
    • /
    • 2000
  • For on-shore structures, dynamic analysis becomes increasingly important as the water depth increases and the structural configuration becoines slenderer. In this study, an estimation method for equivalent three dimensional (30) hydrodynamic coefficients is introduced as a part of beam permutation technique development. The beam pemlUtation technique is being developed for obtaining an equivalent beam to a frame structure in order to reduce the degrees of freedom and thus the analysis time significantly. Two 3D structures are used in order to verify the obtained equivalent 3D hydrodynamic coefficients. Two commercial softwares, ANSYS and SACS, are used for the verification. The results of the present analysis are found to be satisfactory in comparison with those by the two softwares.

  • PDF

A Study on the Beam Permutation Technique for Frame Type Offshore Structures (프레임형 해양구조물의 보치환 기법에 관한 연구)

  • Piao Chun-Jun;Park, Han-Il
    • Journal of Ocean Engineering and Technology
    • /
    • v.13 no.1 s.31
    • /
    • pp.23-28
    • /
    • 1999
  • For offshore structures, dynamic analysis becomes increasingly important as water depth increases and structural configuration becomes more slender. In the case of dynamic analysis of frame structures, much computer time and high cost are required due to many degrees of freedom, In this paper, a new technique of permutating a segment of frame structure to a beam is developed, which is called here Beam Permutation Technique. The technique is based on definition of stiffness matrix of the beam which is obtained by defining the actions(or forces) required to obtain unit translation or rotation for each degree of freedom wiht al other degree of freedom restrained to zero displacement or rotation. In the technique, an assumption is made that relative positions of nodes in the ends of the segment are not variable, The technique can significantly reduce the degrees of freedom of frame structures and thus the computiong time in dynamic analysis. The natural frequencies and static displacements of the permutated beam are obtained and compared to those of ANSYS with a good agreement.

  • PDF

Autonomous Parking of Car-Like Mobile Robot Using Docking Formation (도킹 포메이션을 이용한 차량형 이동 로봇의 자율 주차)

  • Kwon, Ji-Wook;Kim, Jin Hyo;Seo, Jiwon
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.10
    • /
    • pp.180-189
    • /
    • 2014
  • For a autonomous parking of unmanned car, this paper proposes a posture regulation algorithm of a car-like mobile robot, which is supported by a docking formation and a feedback linearization control law. Unlike the previous researches based on a path-planning and optimization algorithms, the autonomous car implemented the proposed autonomous parking algorithm can be parked without much computational burden and a high performance processor. Stability of the proposed docking formation and feedback linearization control law are analyzed and performance of the proposed algorithm is shown by implementing to the simulations with six scenarios and an actual car in the experiment place.

Shear Behavior of Reinforced Concrete Beams according to Replacement Ratio of Recycled Coarse Aggregate (순환 굵은골재 치환율에 따른 철근콘크리트 보의 전단거동)

  • Kim, Sang-Woo;Jeong, Chan-Yu;Jung, Chang-Kyo;Kim, Kil-Hee
    • Journal of the Korea Concrete Institute
    • /
    • v.24 no.2
    • /
    • pp.157-164
    • /
    • 2012
  • This study evaluates the shear performance of reinforced concrete beams with recycled coarse aggregates. A total of six specimens with various replacement ratios of recycled coarse aggregates (0%, 50%, and 100%) and different amount of shear reinforcement were cast and tested in this study. A finite element analysis was performed to predict the shear behavior of the specimens with natural or recycled coarse aggregates. The FE analysis was performed using a two-dimensional nonlinear FE analysis program based on the disturbed stress field model (DSFM), which is an extension of the modified compression field theory (MCFT). Experimental results showed that the specimens with 50% and 100% replacement ratios of recycled coarse aggregates had the similar shear strength compared to the specimen with natural aggregates, regardless of the replacement ratios of recycled coarse aggregates and the amount of the shear reinforcement. Furthermore, the comparison between experimental and analytical results showed that the proposed numerical modeling methods and the analytical model, DSFM, can be successfully used to predict the shear behavior of reinforced concrete beams with recycled coarse aggregates.

Assessment of Water and Pollutant Mass Balance by Soil Amendment on Infiltration Trench (침투도랑 토양치환의 물순환 및 비점오염물질저감 효과 평가)

  • Jeon, Minsu;Choi, Hyeseon;Kang, Heeman;Kim, Lee-hyung
    • Journal of Wetlands Research
    • /
    • v.22 no.2
    • /
    • pp.145-152
    • /
    • 2020
  • Highways are characterized by high non-point pollutant emissions due to high traffic volumes and sections that cause abrupt change in driving speed (i.e. rest stations, ticketing office, etc.). Most highways in Korea were constructed with layers that do not allow adequate infiltration. Moreover, non-point pollution reduction facilities were not commonly installed on domestic highways. This study was conducted to evaluate a facility treating highway runoff and develop a cost-effective design for infiltration facilities by using soil amendment techniques. Performing soil amendment increased the hydraulic retention time (HRT) and infiltration rate in the facility by approximately 30% and 20%, respectively. The facility's efficiency of removing non-point pollutants (Total Suspend Soiled (TSS), Chemical Oxygen Demand(COD), Biological Oxygen Demand(BOD), Total Nitrogen (TN) and Total Phosphorus, (TP) were also increased by 20%. Performing soil amendment on areas with low permeability can increase the infiltration rates by improving the storage volume capacity, HRT, and infiltration area. The application of infiltration facilities on areas with low permeability should comply with the guidelines presented in the Ministry of Environment's Standards for installation of non-point pollution reduction facilities. However, soil amendment may be necessary if the soil infiltration rate is less than 13 mm/hr.

Generating Test Data for Deep Neural Network Model using Synonym Replacement (동의어 치환을 이용한 심층 신경망 모델의 테스트 데이터 생성)

  • Lee, Min-soo;Lee, Chan-gun
    • Journal of Software Engineering Society
    • /
    • v.28 no.1
    • /
    • pp.23-28
    • /
    • 2019
  • Recently, in order to effectively test deep neural network model for image processing application, researches have actively conducted to automatically generate data in corner-case that is not correctly predicted by the model. This paper proposes test data generation method that selects arbitrary words from input of system and transforms them into synonyms in order to test the bug reporter automatic assignment system based on sentence classification deep neural network model. In addition, we compare and evaluate the case of using proposed test data generation and the case of using existing difference-inducing test data generations based on various neuron coverages.

Effective Simulation Technology for Near Shore Current Flow (연안해수유동에 관한 효율적인 수치계산기법)

  • Yoon, B.S.;Rho, J.H.;Fujino, M.;Hamada, T.
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.32 no.4
    • /
    • pp.38-47
    • /
    • 1995
  • The three-dimensional multi-layer computer simulation technology for tidal current developed in the previous study is updated to a new version. many improvements are achieved by following changes : (1) No-reflection condition is adopted instead of no-gradient condition as an open boundary condition. (2) Time marching algorithm is changed so that velocity and pressure(surface movement) might be salved in turn at different time step (3) Convection term in equation of motion is estimated by upwind differencing scheme instead of central differencing. The stability is improved considerably and the steady state is achieved within 2 tidal periods which is about 3 times shorter than that of the old version. Moreover, fluctuations in time disappeared by introducing the new time marching technique. An application to the real near shore area(near Inchon harbor) is performed by the new version. Simulated results are compared with those by the simulation total developed in the University of Tokyo. Validity and effectiveness of the two simulation technologies are chocked through the comparative research works.

  • PDF

Novelty Detection on Web-server Log Dataset (웹서버 로그 데이터의 이상상태 탐지 기법)

  • Lee, Hwaseong;Kim, Ki Su
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.23 no.10
    • /
    • pp.1311-1319
    • /
    • 2019
  • Currently, the web environment is a commonly used area for sharing information and conducting business. It is becoming an attack point for external hacking targeting on personal information leakage or system failure. Conventional signature-based detection is used in cyber threat but signature-based detection has a limitation that it is difficult to detect the pattern when it is changed like polymorphism. In particular, injection attack is known to the most critical security risks based on web vulnerabilities and various variants are possible at any time. In this paper, we propose a novelty detection technique to detect abnormal state that deviates from the normal state on web-server log dataset(WSLD). The proposed method is a machine learning-based technique to detect a minor anomalous data that tends to be different from a large number of normal data after replacing strings in web-server log dataset with vectors using machine learning-based embedding algorithm.

Image Dequantization using Optimization (최적화 기반 영상 역양자화)

  • Choi, Min-Gyu;Kim, Tae-Hoon;Ahn, Jong-Woo
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.7
    • /
    • pp.296-303
    • /
    • 2007
  • Color quantization replaces the color of each pixel with the closest representative color, and thus it makes the resulting image partitioned into uniformly-colored regions. As a consequence, continuous, detailed variations of color over the corresponding regions in the original image are lost through color quantization. In this paper. we present a novel blind scheme for restoring such variations from a color-quantized input image without it priori knowledge of the quantization method. Our scheme identifies which pairs of uniformly-colored regions in the input image should have continuous variations of color in the resulting image. Then, such regions are seamlessly stitched through optimization while preserving the closest representative colors. The user can optionally indicate which regions should be separated or stitched by scribbling constraint brushes across the regions. We demonstrate the effectiveness of our approach through diverse examples, such as photographs, cartoons, and artistic illustrations.