• Title/Summary/Keyword: 코드상관

Search Result 302, Processing Time 0.04 seconds

Security of Image Information using Steganography and QR Code in IoT (IoT에서 스테가노그라피와 QR 코드를 이용한 영상 정보의 보안)

  • Im, Yong-Soon;Kang, Eun-Young;Park, Jae-Pyo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.15 no.2
    • /
    • pp.31-37
    • /
    • 2015
  • The security of the image information is very important in many areas of the IoT(Internet of Things), and study a number of ways to display the security (copyright, etc.). In this paper, information of image that is used by the IoT is converted to a DCT(Discrete Cosine Transform) and QC(Quantization Coefficient). And watermark (message) is to create a new encoded message(WMQR) through a QR Code. QC and WMQR applies LSB steganography techniques, can get the security (copyright, etc.) of image information. LSB steganographic techniques may be inserted according to a message (Watermark) to determine the location (Secret Key). The encoded image is sent to the recipient via the Internet. The reverse process can be obtained image and a QR code, a watermark (Message). A method for extracting a watermark from the security of the image information is coded using only the image and Secret Key, through the DCT and quantization process, so obtained by separating the watermark (Message) for the image. In this paper, we were able to improve the security of the method of image information, the image quality of the image by the simulations (PSNR), in turn, benefits were also normalized correlation (NC) and security.

Particle Based Discrete Element Modeling of Hydraulic Stimulation of Geothermal Reservoirs, Induced Seismicity and Fault Zone Deformation (수리자극에 의한 지열저류층에서의 유도지진과 단층대의 변형에 관한 입자기반 개별요소법 모델링 연구)

  • Yoon, Jeoung Seok;Hakimhashemi, Amir;Zang, Arno;Zimmermann, Gunter
    • Tunnel and Underground Space
    • /
    • v.23 no.6
    • /
    • pp.493-505
    • /
    • 2013
  • This numerical study investigates seismicity and fault slip induced by fluid injection in deep geothermal reservoir with pre-existing fractures and fault. Particle Flow Code 2D is used with additionally implemented hydro-mechanical coupled fluid flow algorithm and acoustic emission moment tensor inversion algorithm. The output of the model includes spatio-temporal evolution of induced seismicity (hypocenter locations and magnitudes) and fault deformation (failure and slip) in relation to fluid pressure distribution. The model is applied to a case of fluid injection with constant rates changing in three steps using different fluid characters, i.e. the viscosity, and different injection locations. In fractured reservoir, spatio-temporal distribution of the induced seismicity differs significantly depending on the viscosity of the fracturing fluid. In a fractured reservoir, injection of low viscosity fluid results in larger volume of induced seismicity cloud as the fluid can migrate easily to the reservoir and cause large number and magnitude of induced seismicity in the post-shut-in period. In a faulted reservoir, fault deformation (co-seismic failure and aseismic slip) can occur by a small perturbation of fracturing fluid (<0.1 MPa) can be induced when the injection location is set close to the fault. The presented numerical model technique can practically be used in geothermal industry to predict the induced seismicity pattern and magnitude distribution resulting from hydraulic stimulation of geothermal reservoirs prior to actual injection operation.

Studies on the Nest site Selection and Characteristics of Habitat use of Long-tailed Tits Aegithalos caudatus in Korea (한국에서 번식하는 오목눈이의 둥지장소 선택과 서식지 이용 특성)

  • Baek, Chung-yeol;Lee, Jin-hee;No, Sun-ho;Jang, Kyung-Hee;Cho, Sam-rae
    • Korean Journal of Environment and Ecology
    • /
    • v.30 no.5
    • /
    • pp.829-836
    • /
    • 2016
  • This study was carried out on Kongju National University and its neighboring area, Mt. Gyeryong national park and Mt. Worak national park in the breeding season of long-tailed tits Aegithalos caudaatus from 2008 to 2012. The result of the inquiry, the nests were found in 15 species of trees, and this result shows me it's not choosy about them. But after having classified them according to the features and analyzed them, long-tailed tits preferred evergreen needleleaf tree and deciduous broad-leaf tree and deciduous bush, especially evergreen needleleaf tree. The concealment rate of long-tailed tits' nests was $11.61{\pm}4.79%]\;4.38{\pm}2.19%$(n=29) in Kongju National University and it's neighboring area, $6.06{\pm}2.31%$(n=43) in Mt. Gyeryong national park and $4.38{\pm}2.19%$(n=32) in Mt. Worak national park. By regional groups, the concealment rates of neighboring nests were almost same, but there are no differences among the areas. The average of the color codes was $26.52{\pm}16.14$(n=32) that those of the nest subtract from those of surroundings of the nest. The nests were procryptic according to their surroundings, and if their nest in a tree were evergreen needleleaf trees, they were made of moss. while if the trees of nest in a tree were yellow because of fungus, made of dried moss, they were yellow, too.

A Study for Hybrid Honeypot Systems (하이브리드 허니팟 시스템에 대한 연구)

  • Lee, Moon-Goo
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.51 no.11
    • /
    • pp.127-133
    • /
    • 2014
  • In order to protect information asset from various malicious code, Honeypot system is implemented. Honeypot system is designed to elicit attacks so that internal system is not attacked or it is designed to collect malicious code information. However, existing honeypot system is designed for the purpose of collecting information, so it is designed to induce inflows of attackers positively by establishing disguised server or disguised client server and by providing disguised contents. In case of establishing disguised server, it should reinstall hardware in a cycle of one year because of frequent disk input and output. In case of establishing disguised client server, it has operating problem such as procuring professional labor force because it has a limit to automize the analysis of acquired information. To solve and supplement operating problem and previous problem of honeypot's hardware, this thesis suggested hybrid honeypot. Suggested hybrid honeypot has honeywall, analyzed server and combined console and it processes by categorizing attacking types into two types. It is designed that disguise (inducement) and false response (emulation) are connected to common switch area to operate high level interaction server, which is type 1 and low level interaction server, which is type 2. This hybrid honeypot operates low level honeypot and high level honeypot. Analysis server converts hacking types into hash value and separates it into correlation analysis algorithm and sends it to honeywall. Integrated monitoring console implements continuous monitoring, so it is expected that not only analyzing information about recent hacking method and attacking tool but also it provides effects of anticipative security response.

Development of simple tools for algal bloom diagnosis in agricultural lakes (농업용 호소의 조류 발생 진단을 위한 간편 도구의 개발)

  • Nam, Gui-Sook;Lee, Seung-Heon;Jo, Hyun-Jung;Park, Joo-Hyun;Cho, Young-Cheol
    • Korean Journal of Environmental Biology
    • /
    • v.37 no.3
    • /
    • pp.433-445
    • /
    • 2019
  • This study was designed to develop simple tools to easily and efficiently predict the occurrence of algal bloom in agricultural lakes. Physicochemical water quality parameters were examined to reflect the phytoplankton productivity in 182 samples collected from 15 agricultural lakes from April to October 2018. Total phytoplankton abundance was significantly correlated with chlorophyll-a (Chl-a) (r=0.666) and Secchi depth (SD) (r= -0.351). The abundances of cyanobacteria and harmful cyanobacteria were also correlated with Chl-a (r=0.664, r=0.353) and SD (r= -0.340, r= -0.338), respectively, but not with total nitrogen (TN) and total phosphorus (TP). The Chl-a concentration was correlated with SD (r= -0.434), showing a higher similarity than phytoplankton abundance. Therefore, Chl-a and SD were selected as diagnostic factors for algal bloom prediction, instead of analyzing the standing crop of harmful cyanobacteria used in algae alarm systems. Specifically, accurate diagnoses were made using realtime SD measurements. The algal bloom diagnostic tool is an inverse cone-shaped container with an algal bloom diagnosis chart that modified SD and turbidity measurement methods. Lake water was collected to observe the number of rings visible in the container or the number indicated in each ring, depending on the degree of algal bloom,and to determine the final stage of algal blooming by comparison to the colorimetric level on the diagnosis chart. For an accurate diagnosis, we presented 4-step diagnostic criteria based on the concentration of Chl-a and the number of rings and a fan-shaped algal bloom diagnosis chart with Hexa code names. This tool eliminated the variables and errors of previous methods and the results were easily interpreted. This study is expected to facilitate the diagnosis of algal bloom in agricultural lakes and the establishment of an efficient algal bloom management plan.

A Comparative Study on Relationship between Advertising Sociology and Illustration - Focused on the Images of Modern Women in Commercial Posters in Korea and China- (일러스트레이션과 광고 사회학의 관계 - 한국과 중국의 상품광고 포스터속의 근대 여성이미지를 중심으로-)

  • Jang, Mee-Kyung
    • Archives of design research
    • /
    • v.18 no.2 s.60
    • /
    • pp.27-36
    • /
    • 2005
  • Illustrations in advertisement uses various social and cultural codes to stimulate the desire to buy in consumers in the first place, since this is an economic phenomenon orchestrated to sell a product. Hence, factors outside the product per se, such as tradition, social issues and class consciousness are introduced. Especially, in modern advertisement a strategy is adopted to differentiate standard products produced by mass production. In order to do so, such factors as mentioned above become as important as physical characteristics of the product per se and its usage value. As a result, phrases or images used for advertisement can have independent influences on the society irrespective of the sales effects on the product. In this respect, it is fair to state that advertisement reflects the phases and consciousness of a given period as a cultural phenomenon. Therefore, based on the premise of characteristics and roles attributed to the advertisement, this thesis proposes to make a comparative study on the images of women in commercial advertisement in Korea during Japanese Imperialism and China during Cultural Colonial period dating from 1900 to 1945. The starting point of this research will cover the period of foreign trade and Japanese Imperialism in Korea and interference of Western Power in China. It will also investigate on the birth of Korean advertisement by Japanese Imperialists and Chinese modern advertisement along with the modernization of Shanghai. Then, I propose to present the illustrations of women in advertisements based on comparative study of their characteristics and expressions as observed in several case studies both in Korea and China. Connotative meanings in such advertisement will be investigated in the context of political, economic and cultural dominance.

  • PDF

An Analysis of Relationship between Industry Security Education and Capability: Case Centric on Insider Leakage (보안교육과 보안관리 역량의 상관관계 분석: 인가된 내부자 기밀유출사례를 중심으로)

  • Lee, Chi-Seok;Kim, Yanghoon
    • The Journal of Society for e-Business Studies
    • /
    • v.20 no.2
    • /
    • pp.27-36
    • /
    • 2015
  • Current leakage of industrial technologies with revealing state secret against nation is gradually increasing and scope of the spill is diversified from technology-oriented leakage to new economic security sector like information and communication, electrical and electronic, defense industry, illegal export of strategic material, economic order disturbance by foreign country, infringement of intellectual property, etc. So the spill damage can affect not only leaked company but also national interests and entire domestic industry. According to statistics from National Industrial Security Center of National Intelligence Service, a major cause of technology leakage is not only by external things about hacking and malignant code, but internal leakage of former and current employees account for about 80%. And technology leakage due to temptation of money and personal interests followed by technology leakage of subcontractor is steadily increased. Most studies in the field of security have tended to focus on measuring security capability of company in order to prevent leakage core assets or developing measurement Indicators for management rather than security activities of the company members that is most important. Therefore, this study analyzes the effect of most underlying security education in security activities on security capabilities of enterprise. As a result, it indicates that security education have a positive(+) correlation with security capabilities.

The Design of Optimal Filters in Vector-Quantized Subband Codecs (벡터양자화된 부대역 코덱에서 최적필터의 구현)

  • 지인호
    • The Journal of the Acoustical Society of Korea
    • /
    • v.19 no.1
    • /
    • pp.97-102
    • /
    • 2000
  • Subband coding is to divide the signal frequency band into a set of uncorrelated frequency bands by filtering and then to encode each of these subbands using a bit allocation rationale matched to the signal energy in that subband. The actual coding of the subband signal can be done using waveform encoding techniques such as PCM, DPCM and vector quantizer(VQ) in order to obtain higher data compression. Most researchers have focused on the error in the quantizer, but not on the overall reconstruction error and its dependence on the filter bank. This paper provides a thorough analysis of subband codecs and further development of optimum filter bank design using vector quantizer. We compute the mean squared reconstruction error(MSE) which depends on N the number of entries in each code book, k the length of each code word, and on the filter bank coefficients. We form this MSE measure in terms of the equivalent quantization model and find the optimum FIR filter coefficients for each channel in the M-band structure for a given bit rate, given filter length, and given input signal correlation model. Specific design examples are worked out for 4-tap filter in 2-band paraunitary filter bank structure. These optimum paraunitary filter coefficients are obtained by using Monte Carlo simulation. We expect that the results of this work could be contributed to study on the optimum design of subband codecs using vector quantizer.

  • PDF

A Study on the Performance Improvement of Bar Code Reader for the Automatic Processing of the Mail Items (우편물 자동처리를 위한 바코드 판독기 성능개선에 관한 연구)

  • Park, Moon-Sung;Nam, Yun-Seok;Kim, Hey-Kyu
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2001.04b
    • /
    • pp.731-734
    • /
    • 2001
  • 우편물을 집배원이 배달하는 순서로 자동구분 처리하기 위한 요소기술 줌에서 4-state 바코드 시스템이 개발되고 있으며 우편번호, 배달순서코드, 고객정보 등이 적용될 예정이다. 기존의 고객 바코드 판독 시스템은 우편물상의 바코드 심볼로지가 존재하는 판독대상 영역의 기울기가 ${\pm}4.47^{\circ}$ 이하이고, 심볼의 훼손과 잡영이 없을 경우에 $79{\sim}100msec(35,000{\sim}45,000$통/시간)의 속도로 자동 구분 정보가 판독된다. 본 논문에서는 판독범위 및 판독성능을 개선을 위하여 CCD(Charge Coupled Device) 센서로부터 획득된 이미지상에서 존재하는 심볼로지 정보의 고속판독 방법을 제시한 것이다. 이 판독방법은 그레이(gray) 이미지 바탕면의 경계값(threshold) 기울기 분포를 기준으로 2개의 경계값을 설정하여 판독대상 정보를 획득하였다. 또한, 4-state 바코드 심볼로지의 존재 가능성 영역만을 탐색하고, 판독대상 영역에서 트래커(tracker)를 탐색하여 심볼로지의 기울기값, 심볼로지 경계값, 심볼위치 좌표값을 생성한 후 심볼값이 판독한 것이다. 판독시험 결과는 판독대상 영역의 심볼로지가 ${\pm}45^{\circ}$ 기울어지고, 잡영이 존재할 경우에도 $30{\sim}60msec(58,000{\sim}l16,000$통/시간) 이내에 판독되었다. 우편물 자동구분용 바코드 판독기로써 적용될 경우에 판독속도가 평균 57.25% 이상 개선되고, 판독범위의 확장으로 0.2%의 기계적인 오류(이송과정예서의 Jam 발생 비율)를 제외할 경우에 거의 99.8% 우편물을 판독하여 자동구분 처리할 수 있게 될 것으로 기대된다.onebook 엑세스 모들(Server Phonebook Access Module)로 구성되어 있다.외 보다 높았다(I/O ratio 2.5). BTEX의 상대적 함량도 실내가 실외보다 높아 실내에도 발생원이 있음을 암시하고 있다. 자료 분석결과 유치원 실내의 벤젠은 실외로부터 유입되고 있었고, 톨루엔, 에틸벤젠, 크실렌은 실외뿐 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는 피험자의 머리 움직임에 의하여 도파민 유리가 과대평가되었으며 이는 이 연구에서 제안한 영상정합을 이용한 움직임 보정기법에 의해서 개선되었다. 답이 없는 문제, 문제 만

  • PDF

The Parallel Recovery Method for High Availability in Shared-Nothing Spatial Database Cluster (비공유 공간 데이터베이스 클러스터에서 고가용성을 위한 병렬 회복 기법)

  • You, Byeong-Seob;Jang, Yong-Il;Lee, Sun-Jo;Bae, Hae-Young
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2003.11c
    • /
    • pp.1529-1532
    • /
    • 2003
  • 최근 인터넷과 모바일 시스템이 급속히 발달함에 따라 이를 통하여 지리정보와 같은 공간데이터를 제공하는 서비스가 증가하였다. 이는 대용량 데이터에 대한 관리 및 빠른 처리와 급증하는 사용자에 대한 높은 동시처리량 및 높은 안정성을 요구하였고, 이를 해결하기 위하여 비공유 공간 데이터베이스 클러스터가 개발되었다. 비공유 공간 데이터베이스 클러스터는 고가용성을 위한 구조로서 문제가 발생할 경우 다른 백업노드가 대신하여 서비스를 지속시킨다. 그러나 기존의 비공유 공간 데이터베이스 클러스터는 클러스터 구성에 대한 회복을 위하여 로그를 계속 유지하므로 로그를 남기기 위해 보통의 질의처리 성능이 저하되었으며 로그 유지를 위한 비용이 증가하였다. 또한 노드단위의 로그를 갖기 때문에 클러스터 구성에 대한 회복이 직렬적으로 이루어져 고가용성을 위한 빠른 회복이 불가능 하였다. 따라서 본 논문에서는 비공유 공간 데이터베이스 클러스터에서 고가용성을 위한 병렬 회복 기법을 제안한다. 이를 위해 클러스터 구성에 대한 회복을 위한 클러스터 로그를 정의한다. 정의된 클러스터 로그는 마스터 테이블이 존재하는 노드에서 그룹내 다른 노드가 정지된 것을 감지할 때 남기기 시작한다. 정지된 노드는 자체회복을 마친 후 클러스터 구성에 대한 회복을 하는 단계에서 존재하는 복제본 테이블 각각에 대한 클러스터 로그를 병렬적으로 받아 회복을 한다. 따라서 정지된 노드가 발생할 경우에만 클러스터 로그를 남기므로 보통의 질의처리의 성능 저하가 없고 클러스터 로그 유지 비용이 적으며, 클러스터 구성에 대한 회복시 테이블단위의 병렬적인 회복으로 대용량 데이터인 공간데이터에 대해 빠르게 회복할 수 있어 가용성을 향상시킨다.들을 문법으로 작성하였으며, PGS를 통해 생성된 어휘 정보를 가지고 스캐너를 구성하였으며, 파싱테이블을 가지고 파서를 설계하였다. 파서의 출력으로 AST가 생성되면 번역기는 AST를 탐색하면서 의미적으로 동등한 MSIL 코드를 생성하도록 시스템을 컴파일러 기법을 이용하여 모듈별로 구성하였다.적용하였다.n rate compared with conventional face recognition algorithms. 아니라 실내에서도 발생하고 있었다. 정량한 8개 화합물 각각과 총 휘발성 유기화합물의 스피어만 상관계수는 벤젠을 제외하고는 모두 유의하였다. 이중 톨루엔과 크실렌은 총 휘발성 유기화합물과 좋은 상관성 (톨루엔 0.76, 크실렌, 0.87)을 나타내었다. 이 연구는 톨루엔과 크실렌이 총 휘발성 유기화합물의 좋은 지표를 사용될 있고, 톨루엔, 에틸벤젠, 크실렌 등 많은 휘발성 유기화합물의 발생원은 실외뿐 아니라 실내에도 있음을 나타내고 있다.>10)의 $[^{18}F]F_2$를 얻었다. 결론: $^{18}O(p,n)^{18}F$ 핵반응을 이용하여 친전자성 방사성동위원소 $[^{18}F]F_2$를 생산하였다. 표적 챔버는 알루미늄으로 제작하였으며 본 연구에서 연구된 $[^{18}F]F_2$가스는 친핵성 치환반응으로 방사성동위원소를 도입하기 어려운 다양한 방사성의 약품개발에 유용하게 이용될 수 있을 것이다.었으나 움직임 보정 후 영상을 이용하여 비교한 경우, 결합능 변화가 선조체 영역에서 국한되어 나타나며 그 유의성이 움직임 보정 전에 비하여 낮음을 알 수 있었다. 결론: 뇌활성화 과제 수행시에 동반되는

  • PDF