• Title/Summary/Keyword: 산학원본

Search Result 18, Processing Time 0.025 seconds

Park Yul and His San Hak Won Bon(算學原本) (박율의 산학원본)

  • Kim, Young-Wook;Hong, Sung-Sa;Hong, Young-Hee
    • Journal for History of Mathematics
    • /
    • v.18 no.4
    • /
    • pp.1-16
    • /
    • 2005
  • Chosun dynasty mathematician Park Yul (1621 - ?) wrote San Hak Won Bon(算學原本) which was posthumously published in 1700 by his son Park Du Se (朴斗世). It is the first mathematics book whose publishing date is known, although we have Muk Sa Jib San Bub (默思集算法) by Gyung Sun Jing (慶善徵, 1616-?). San Hak Won Bon is the first Chosun book which deals with tian yuan shu (天元術) and was quoted by many Chosun authors. We do find it in the library in Korea University. In this paper, we investigate its contents together with its historical significance and influences to the development of Chosun dynasty Mathematics and conclude that Park Yul is one of the most prominent Chosun dynasty mathematicians.

  • PDF

산학원본의 구조

  • Kim, Yeong-Uk;Hong, Seong-Sa
    • Proceedings of the Korean Society for History of Mathematics Conference
    • /
    • 2005.11a
    • /
    • pp.7-7
    • /
    • 2005
  • PDF

Embedding Binary Watermark Image using DWT Coefficients (이산 웨이블릿 변환계수를 이용한 이진 워터마크 영상)

  • Park, Kwang-Chae;Bae, Ceol-Soo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.15 no.10
    • /
    • pp.6317-6321
    • /
    • 2014
  • Multimedia documents can be transferred quickly and easily across the Internet, and has attracted considerable interest in multimedia security and multimedia copyright protection. This paper proposes an animage watermarking scheme embedding a binary watermark image using Discrete Wavelet Transform (DWT) coefficients. The original image is transformed to the wavelet domain and decomposed in subbands. The binary watermark image, as a sequence of bits, is embedded into the middle frequency subbands. The original image is not needed to detect the watermark image. The proposed method detected fewer watermark bits but produced an approximately 10dB higher PSNR than the max/min method.

A Study on Classification of CNN-based Linux Malware using Image Processing Techniques (영상처리기법을 이용한 CNN 기반 리눅스 악성코드 분류 연구)

  • Kim, Se-Jin;Kim, Do-Yeon;Lee, Hoo-Ki;Lee, Tae-Jin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.21 no.9
    • /
    • pp.634-642
    • /
    • 2020
  • With the proliferation of Internet of Things (IoT) devices, using the Linux operating system in various architectures has increased. Also, security threats against Linux-based IoT devices are increasing, and malware variants based on existing malware are constantly appearing. In this paper, we propose a system where the binary data of a visualized Executable and Linkable Format (ELF) file is applied to Local Binary Pattern (LBP) image processing techniques and a median filter to classify malware in a Convolutional Neural Network (CNN). As a result, the original image showed the highest accuracy and F1-score at 98.77%, and reproducibility also showed the highest score at 98.55%. For the median filter, the highest precision was 99.19%, and the lowest false positive rate was 0.008%. Using the LBP technique confirmed that the overall result was lower than putting the original ELF file through the median filter. When the results of putting the original file through image processing techniques were classified by majority, it was confirmed that the accuracy, precision, F1-score, and false positive rate were better than putting the original file through the median filter. In the future, the proposed system will be used to classify malware families or add other image processing techniques to improve the accuracy of majority vote classification. Or maybe we mean "the use of Linux O/S distributions for various architectures has increased" instead? If not, please rephrase as intended.

딥러닝 기반 얼굴인식 모델에 대한 변조 영역 제한 기만공격

  • Ryu, Gwonsang;Park, Hosung;Choi, Daeseon
    • Review of KIISC
    • /
    • v.29 no.3
    • /
    • pp.44-50
    • /
    • 2019
  • 최근 딥러닝 기술은 다양한 분야에서 놀라운 성능을 보여주고 있어 많은 서비스에 적용되고 있다. 얼굴인식 또한 딥러닝 기술을 접목하여 높은 수준으로 얼굴인식이 가능해졌다. 하지만 딥러닝 기술은 원본 이미지를 최소한으로 변조시켜 딥러닝 모델의 오인식을 발생시키는 적대적 예제에 취약하다. 이에 따라, 본 논문에서는 딥러닝 기반 얼굴인식 시스템에 대해 적대적 예제를 이용하여 기만공격 실험을 수행하였으며 실제 얼굴에 분장할 수 있는 영역을 고려하여 설정된 변조 영역에 따른 기만공격 성능을 분석한다.

Approximate Solutions of Equations in Chosun Mathematics (방정식(方程式)의 근사해(近似解))

  • Hong, Sung-Sa;Hong, Young-Hee;Kim, Chang-Il
    • Journal for History of Mathematics
    • /
    • v.25 no.3
    • /
    • pp.1-14
    • /
    • 2012
  • Since JiuZhang SuanShu(九章算術), the basic field of the traditional mathemtics in Eastern Asia is the field of rational numbers and hence irrational solutions of equations should be replaced by rational approximations. Thus approximate solutions of equations became a very important subject in theory of equations. We first investigate the history of approximate solutions in Chinese sources and then compare them with those in Chosun mathematics. The theory of approximate solutions in Chosun has been established in SanHakWonBon(算學原本) written by Park Yul(1621 - 1668) and JuSeoGwanGyun(籌書管見, 1718) by Cho Tae Gu(趙泰耉, 1660-1723). We show that unlike the Chinese counterpart, Park and Cho were concerned with errors of approximate solutions and tried to find better approximate solutions.

2D/3D Video Conversion Method using Differential Depth Information by Grouped Object (그룹화된 객체별 깊이정보를 차등 적용한 2D/3D 동영상 변환 기법)

  • Han, Sung-Ho;Hong, Yeong-Pyo;Lee, Jong-Yong;Lee, Sang-Hun
    • Proceedings of the KAIS Fall Conference
    • /
    • 2011.12b
    • /
    • pp.445-448
    • /
    • 2011
  • 본 논문은 그룹화된 객체별 깊이정보를 차등 적용한 2D/3D 동영상 변환 기법에 관한 연구이다. 기존의 연구에서는 프레임의 움직임 정보와 기하학적 깊이 단서를 이용해 깊이정보를 추출하여 2D/3D 동영상 변환을 한다. 그러나 영상의 움직임 정보를 획득할 수 없는 영역의 경우 정확한 깊이정보를 얻을 수 없어 해당 영역의 3D 효과를 얻을 수 없는 문제점이 있다. 제안하는 기법에서는 객체 및 배경을 추출하고 움직임 정보와 기하학적 단서를 이용한 깊이정보를 그룹화된 객체별 차등 적용하여 움직임 정보가 없는 영역에서도 3D 효과를 얻을 수 있는 방법을 제안한다. 최종적으로 원본 영상과 생성된 깊이맵을 DIBR(Depth Image Based Rendering) 과정을 통해 3D 동영상을 생성한 결과 움직임 정보가 없는 영역에서도 3D 효과를 얻을 수 있었다.

  • PDF

Digital Watermarking System for Copyright Protection of Web Image (웹 이미지의 저작권 보호를 위한 디지털 워터마킹 시스템)

  • Cho, Jung-Won
    • Proceedings of the KAIS Fall Conference
    • /
    • 2006.05a
    • /
    • pp.510-512
    • /
    • 2006
  • 본 논문에서는 원본 이미지에 저작권자의 저작권 정보를 삽입함으로써 저작권을 보호하고 차후 불법적인 도용을 방지하기 위해, 숫자와 로고로 구성된 워터마크 생성, 삽입 및 검출, 검증 시스템을 설계 및 구현한다. 본 시스템은 콘텐츠의 특성과 저작권자의 요구에 따라 워터마크를 숫자 또는 로고로 선택해서 구성할 수 있으며, 디지털 오디오 워터마킹 시스템과 마찬가지로 저작권 보호에 대한 전문지식이 없는 일반관리자도 용이하게 이용할 수 있는 사용자 인터페이스를 갖추도록 설계하였다. 이러한 디지털 이미지 워터마킹의 적용을 통한 소유권 및 저작권 보호는 궁극적으로 문화콘텐츠 등의 콘텐츠 제작 의뢰자로 하여금 제작 의지를 강화하여 제작 의뢰 건수를 증가시킬 수 있을 것으로 기대된다.

  • PDF

Jewelry Design Automization using a 3D CAD (3차원 CAD를 활용한 주얼리 원본 자동화 연구)

  • 고지연;송오성;류지호;신성호
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.2 no.2
    • /
    • pp.95-99
    • /
    • 2001
  • We can embody a variable size of high classic industrial material. and jewelry design within 5 hours. using a rapid prototype 3D CAD, which includes 30 kinds of database selected by jewelry designers. If the jewelry can be investigated and the customer can modify it right away ; then the qualify of the jewelry is much better. Based on our investigation. we can reduce 30$\%$ of the development cost by using a standard database. We can also create a new design with complex design element in the database. Therefore, we may reduce the production time to less than 5 hours by using a Powerful technique system rather than producing hand-made jewelry, which can take more than 27 hours.

  • PDF

Digital Watermarking System for Copyright Protection of Web Image (웹 이미지의 저작권 보호를 위한 디지털 워터마킹 시스템)

  • Cho, Jung-Won;Jeong, Seung-Do;Rhee, Yoon-Jung
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.12
    • /
    • pp.3682-3687
    • /
    • 2009
  • In this paper, we design and implement watermarking system which create, insert and detect watermark comprised of number or logo to protect copyright and to prevent illegal plagiarism through inserting copyrighting information of owner into the original image. In the proposed system, the number or logo as watermark is selectively inserted according to characteristics of the original contents or requirement of copyrighter. The system also has convenient user interface which general administrator who hasn't expert knowledge for the protection of copyright uses easily. Ownership and copyright protection using digital watermarking technology intensifies creating volition of clients who want to create contents such as cultural contents, Thus, we can expect increasing requests for creating contents such as cultural contents.