• Title/Summary/Keyword: 엔트로피 기법

Search Result 258, Processing Time 0.023 seconds

DNA Watermarking Method based on Random Codon Circular Code (랜덤 코돈 원형 부호 기반의 DNA 워터마킹)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.3
    • /
    • pp.318-329
    • /
    • 2013
  • This paper proposes a DNA watermarking method for the privacy protection and the prevention of illegal copy. The proposed method allocates codons to random circular angles by using random mapping table and selects triplet codons for embedding target with the help of the Lipschitz regularity value of local modulus maxima of codon circular angles. Then the watermark is embedded into circular angles of triplet codons without changing the codes of amino acids in a DNA. The length and location of target triplet codons depend on the random mapping table for 64 codons that includes start and stop codons. This table is used as the watermark key and can be applied on any codon sequence regardless of the length of sequence. If this table is unknown, it is very difficult to detect the length and location of them for extracting the watermark. We evaluated our method and DNA-crypt watermarking of Heider method on the condition of similar capacity. From evaluation results, we verified that our method has lower base changing rate than DNA-crypt and has lower bit error rate on point mutation and insertions/deletions than DNA-crypt. Furthermore, we verified that the entropy of random mapping table and the locaton of triplet codons is high, meaning that the watermark security has high level.

A Study on the Vulnerability Assessment of Solar Power Generation Facilities Considering Disaster Information (재해정보를 고려한 태양광발전시설의 취약성 평가에 관한 연구)

  • Heejin Pyo
    • Land and Housing Review
    • /
    • v.15 no.2
    • /
    • pp.57-71
    • /
    • 2024
  • This study aims to develop an evaluation method for solar power facilities considering disaster impacts and to analyse the vulnerabilities of existing facilities. Haenam-gun in Jeollanam-do, where the reassessment of existing facilities is urgent, was selected as the study area. To evaluate the vulnerability from a more objective perspective, principal component analysis and entropy methods were utilised. Seven vulnerability assessment indicators were selected: maximum hourly rainfall, maximum wind speed, number of typhoon occurrence days, number of rainfall days lasting more than five days, maximum daily rainfall, impermeable area ratio, and population density. Among these, maximum hourly rainfall, maximum wind speed, maximum daily rainfall, and number of rainfall days lasting more than five days were found to have the highest weights. The overlay of the derived weights showed that the southeastern regions of Haenam-eup and Bukil-myeon were classified as Grade 1 and 2, whereas the northern regions of Hwawon-myeon, Sani-myeon, and Munnae-myeon were classified as Grade 4 and 5, indicating differences in vulnerability. Of the 2,133 facilities evaluated, 91.1% were classified as Grade 3 or higher, indicating a generally favourable condition. However, there were more Grade 1 facilities than Grade 2, highlighting the need for countermeasures. This study is significant in that it evaluates solar power facilities considering urban disaster resilience and is expected to be used as a basic resource for the installation of new facilities or the management and operation of existing ones.

(Image Analysis of Electrophoresis Gels by using Region Growing with Multiple Peaks) (다중 피크의 영역 성장 기법에 의한 전기영동 젤의 영상 분석)

  • 김영원;전병환
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.5_6
    • /
    • pp.444-453
    • /
    • 2003
  • Recently, a great interest of bio-technology(BT) is concentrated and the image analysis technique for electrophoresis gels is highly requested to analyze genetic information or to look for some new bio-activation materials. For this purpose, the location and quantity of each band in a lane should be measured. In most of existing techniques, the approach of peak searching in a profile of a lane is used. But this peak is improper as the representative of a band, because its location does not correspond to that of the brightest pixel or the center of gravity. Also, it is improper to measure band quantity in most of these approaches because various enhancement processes are commonly applied to original images to extract peaks easily. In this paper, we adopt an approach to measure accumulated brightness as a band quantity in each band region, which Is extracted by not using any process of changing relative brightness, and the gravity center of the region is calculated as a band location. Actually, we first extract lanes with an entropy-based threshold calculated on a gel-image histogram. And then, three other methods are proposed and applied to extract bands. In the MER method, peaks and valleys are searched on a vertical search line by which each lane is bisected. And the minimum enclosing rectangle of each band is set between successive two valleys. On the other hand, in the RG-1 method, each band is extracted by using region growing with a peak as a seed, separating overlapped neighbor bands. In the RG-2 method, peaks and valleys are searched on two vertical lines by which each lane is trisected, and the left and right peaks nay be paired up if they seem to belong to the same band, and then each band region is grown up with a peak or both peaks if exist. To compare above three methods, we have measured the location and amount of bands. As a result, the average errors in band location of MER, RG-1, and RG-2 were 6%, 3%, and 1%, respectively, when the lane length is normalized to a unit value. And the average errors in band amount were 8%, 5%, and 2%, respectively, when the sum of band amount is normalized to a unit value. In conclusion, RG-2 was shown to be more reliable in the accuracy of measuring the location and amount of bands.

Tegumental ultrastructure of juvenile and adult Echinostoma cinetorchis (이전고환극구흡충 유약충 및 성충의 표피 미세구조)

  • 이순형;전호승
    • Parasites, Hosts and Diseases
    • /
    • v.30 no.2
    • /
    • pp.65-74
    • /
    • 1992
  • The tegumental ultrastructure of juvenile and adult Echinostoma cinetorchis (Trematoda: Echinostomatidae) was observed by scanning electron microscopy. Three-day (juvenile) and 16-day (adult) worms were harvested from rats (Sprague-Dawley) experimentally fed the metacercariae from the laboratory-infected fresh water snail, Hippeutis cantori. The worms were fifed with 2.5% glutaraldehyde, processed routinely, and observed by an ISI Korea DS-130 scanning electron microscope. The 3-day old juvenile worms were elongated and ventrally curved, with their ventral sucker near the anterior two-fifths of the body. The head crown was bearing 37∼38 collar spines arranged in a zigzag pattern. The lips of the oral and ventral suckers had 8 and 5 type II sensory papillae respectively, and bewteen the spines, a few type III papillae were observed. Tongue or spade-shape spines were distributed anteriorly to the ventral sucker, whereas peg-like spines were distributed posteriorly and became sparse toward the posterior body. The spines of the dorsal surface were similar to those of the ventral surface. The 16-day old adults were leaf-like, and their oral and ventral suckers were located very closely. Aspinous head crown, oral and ventral suckers had type II and type III sensory papillae, and numerous type I papillae were distributed on the tegument anterior to the ventral sucker. Scale-like spines, with broad base and round tip, were distributed densely on the tegument anterior to the ventral sucker but they became sparse posteriorly. At the dorsal surface, spines were observed at times only at the anterior body. The results showed that the tegument of E. cinetorchis is similar to that of other echinostomes, but differs in the number and arrangement of collar spines, shape and distribution of tegumenal spines, and type and distribution of sensory papillae.

  • PDF

Adaptive Data Hiding Techniques for Secure Communication of Images (영상 보안통신을 위한 적응적인 데이터 은닉 기술)

  • 서영호;김수민;김동욱
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.5C
    • /
    • pp.664-672
    • /
    • 2004
  • Widespread popularity of wireless data communication devices, coupled with the availability of higher bandwidths, has led to an increased user demand for content-rich media such as images and videos. Since such content often tends to be private, sensitive, or paid for, there exists a requirement for securing such communication. However, solutions that rely only on traditional compute-intensive security mechanisms are unsuitable for resource-constrained wireless and embedded devices. In this paper, we propose a selective partial image encryption scheme for image data hiding , which enables highly efficient secure communication of image data to and from resource constrained wireless devices. The encryption scheme is invoked during the image compression process, with the encryption being performed between the quantizer and the entropy coder stages. Three data selection schemes are proposed: subband selection, data bit selection and random selection. We show that these schemes make secure communication of images feasible for constrained embed-ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of ded devices. In addition we demonstrate how these schemes can be dynamically configured to trade-off the amount of data hiding achieved with the computation requirements imposed on the wireless devices. Experiments conducted on over 500 test images reveal that, by using our techniques, the fraction of data to be encrypted with our scheme varies between 0.0244% and 0.39% of the original image size. The peak signal to noise ratios (PSNR) of the encrypted image were observed to vary between about 9.5㏈ to 7.5㏈. In addition, visual test indicate that our schemes are capable of providing a high degree of data hiding with much lower computational costs.

A Spatial Statistical Approach to Migration Studies: Exploring the Spatial Heterogeneity in Place-Specific Distance Parameters (인구이동 연구에 대한 공간통계학적 접근: 장소특수적 거리 패러미터의 추출과 공간적 패턴 분석)

  • Lee, Sang-Il
    • Journal of the Korean association of regional geographers
    • /
    • v.7 no.3
    • /
    • pp.107-120
    • /
    • 2001
  • This study is concerned with providing a reliable procedure of calibrating a set of places specific distance parameters and with applying it to U.S. inter-State migration flows between 1985 and 1900. It attempts to conform to recent advances in quantitative geography that are characterized by an integration of ESDA(exploratory spatial data analysis) and local statistics. ESDA aims to detect the spatial clustering and heterogeneity by visualizing and exploring spatial patterns. A local statistic is defined as a statistically processed value given to each location as opposed to a global statistic that only captures an average trend across a whole study region. Whereas a global distance parameter estimates an averaged level of the friction of distance, place-specific distance parameters calibrate spatially varying effects of distance. It is presented that a poisson regression with an adequately specified design matrix yields a set of either origin-or destination-specific distance parameters. A case study demonstrates that the proposed model is a reliable device of measuring a spatial dimension of migration, and that place-specific distance parameters are spatially heterogeneous as well as spatially clustered.

  • PDF

Anomaly Detection for User Action with Generative Adversarial Networks (적대적 생성 모델을 활용한 사용자 행위 이상 탐지 방법)

  • Choi, Nam woong;Kim, Wooju
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.3
    • /
    • pp.43-62
    • /
    • 2019
  • At one time, the anomaly detection sector dominated the method of determining whether there was an abnormality based on the statistics derived from specific data. This methodology was possible because the dimension of the data was simple in the past, so the classical statistical method could work effectively. However, as the characteristics of data have changed complexly in the era of big data, it has become more difficult to accurately analyze and predict the data that occurs throughout the industry in the conventional way. Therefore, SVM and Decision Tree based supervised learning algorithms were used. However, there is peculiarity that supervised learning based model can only accurately predict the test data, when the number of classes is equal to the number of normal classes and most of the data generated in the industry has unbalanced data class. Therefore, the predicted results are not always valid when supervised learning model is applied. In order to overcome these drawbacks, many studies now use the unsupervised learning-based model that is not influenced by class distribution, such as autoencoder or generative adversarial networks. In this paper, we propose a method to detect anomalies using generative adversarial networks. AnoGAN, introduced in the study of Thomas et al (2017), is a classification model that performs abnormal detection of medical images. It was composed of a Convolution Neural Net and was used in the field of detection. On the other hand, sequencing data abnormality detection using generative adversarial network is a lack of research papers compared to image data. Of course, in Li et al (2018), a study by Li et al (LSTM), a type of recurrent neural network, has proposed a model to classify the abnormities of numerical sequence data, but it has not been used for categorical sequence data, as well as feature matching method applied by salans et al.(2016). So it suggests that there are a number of studies to be tried on in the ideal classification of sequence data through a generative adversarial Network. In order to learn the sequence data, the structure of the generative adversarial networks is composed of LSTM, and the 2 stacked-LSTM of the generator is composed of 32-dim hidden unit layers and 64-dim hidden unit layers. The LSTM of the discriminator consists of 64-dim hidden unit layer were used. In the process of deriving abnormal scores from existing paper of Anomaly Detection for Sequence data, entropy values of probability of actual data are used in the process of deriving abnormal scores. but in this paper, as mentioned earlier, abnormal scores have been derived by using feature matching techniques. In addition, the process of optimizing latent variables was designed with LSTM to improve model performance. The modified form of generative adversarial model was more accurate in all experiments than the autoencoder in terms of precision and was approximately 7% higher in accuracy. In terms of Robustness, Generative adversarial networks also performed better than autoencoder. Because generative adversarial networks can learn data distribution from real categorical sequence data, Unaffected by a single normal data. But autoencoder is not. Result of Robustness test showed that he accuracy of the autocoder was 92%, the accuracy of the hostile neural network was 96%, and in terms of sensitivity, the autocoder was 40% and the hostile neural network was 51%. In this paper, experiments have also been conducted to show how much performance changes due to differences in the optimization structure of potential variables. As a result, the level of 1% was improved in terms of sensitivity. These results suggest that it presented a new perspective on optimizing latent variable that were relatively insignificant.

Prediction of Distribution Changes of Carpinus laxiflora and C. tschonoskii Based on Climate Change Scenarios Using MaxEnt Model (MaxEnt 모델링을 이용한 기후변화 시나리오에 따른 서어나무 (Carpinus laxiflora)와 개서어나무 (C. tschonoskii)의 분포변화 예측)

  • Lee, Min-Ki;Chun, Jung-Hwa;Lee, Chang-Bae
    • Korean Journal of Agricultural and Forest Meteorology
    • /
    • v.23 no.1
    • /
    • pp.55-67
    • /
    • 2021
  • Hornbeams (Carpinus spp.), which are widely distributed in South Korea, are recognized as one of the most abundant species at climax stage in the temperate forests. Although the distribution and vegetation structure of the C. laxiflora community have been reported, little ecological information of C. tschonoskii is available. Little effort was made to examine the distribution shift of these species under the future climate conditions. This study was conducted to predict potential shifts in the distribution of C. laxiflora and C. tschonoskii in 2050s and 2090s under the two sets of climate change scenarios, RCP4.5 and RCP8.5. The MaxEnt model was used to predict the spatial distribution of two species using the occurrence data derived from the 6th National Forest Inventory data as well as climate and topography data. It was found that the main factors for the distribution of C. laxiflora were elevation, temperature seasonality, and mean annual precipitation. The distribution of C. tschonoskii, was influenced by temperature seasonality, mean annual precipitation, and mean diurnal rang. It was projected that the total habitat area of the C. laxiflora could increase by 1.05% and 1.11% under RCP 4.5 and RCP 8.5 scenarios, respectively. It was also predicted that the distributional area of C. tschonoskii could expand under the future climate conditions. These results highlighted that the climate change would have considerable impact on the spatial distribution of C. laxiflora and C. tschonoskii. These also suggested that ecological information derived from climate change impact assessment study can be used to develop proper forest management practices in response to climate change.