• Title/Summary/Keyword: Area masking

Search Result 69, Processing Time 0.023 seconds

지표 물리탐사법을 이용한 염/담수 영역의 고분해능 영상화

  • 박권규;신제현;박윤성;황세호
    • Proceedings of the Korean Society of Soil and Groundwater Environment Conference
    • /
    • 2004.09a
    • /
    • pp.446-449
    • /
    • 2004
  • High resolution geophysical imaging to delineate costal aquifer and seawater- freshwater interface has been applied in Baesu-eup, Yeonggwang-gun, Jeolla province Electrical resistivity information from vertical electrical sounding and 2-D electrical resistivity survey is key parameter to map equivalent Nacl concentration map over the survey area. Seismic velocity from refraction tomographic survey, on the other hand, gives more reliable information on the subsurface stratagraphy than electrical resistivity methods which frequently suffer from low resolution due to masking effect. We imaged high-resolution 3-D structure of costal aquifer by correlating the electrical resistivity with seismic velocity, and mapped equivalent NaCl concentration map using resistivity and hydro-geological information from well logging.

  • PDF

A Study on the de-identification of Personal Information of Hotel Users (호텔 이용 고객의 개인정보 비식별화 방안에 관한 연구)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.12 no.4
    • /
    • pp.51-58
    • /
    • 2016
  • In the area of hotel and tourism sector, various research are analyzed using big data. Big data is being generated by any digital devices around us all the times. All the digital process and social media exchange produces the big data. In this paper, we analyzed the de-identification method of big data to use the personal information of hotel guests. Through the analysis of these big data, hotel can provide differentiated and diverse services to hotel guests and can improve the service and support the marketing of hotels. If the hotel wants to use the information of the guest, the private data should be de-identified. There are several de-identification methods of personal information such as pseudonymisation, aggregation, data reduction, data suppression and data masking. Using the comparison of these methods, the pseudonymisation is discriminated to the suitable methods for the analysis of information for the hotel guest. Also, among the pseudonymisation methods, the t-closeness was analyzed to the secure and efficient method for the de-identification of personal information in hotel.

A Wide Field Survey of Intracluster Globular Clusters in Coma and Perseus Galaxy Clusters

  • O, Seong-A;Lee, Myung Gyoon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.45 no.1
    • /
    • pp.62.2-62.2
    • /
    • 2020
  • Globular clusters(GCs) are found not only around galaxies (galaxy GCs), but also between galaxies in galaxy clusters (intracluster GCs; ICGCs). The ICGCs, which are not bound to any of cluster member galaxies, are governed by the galaxy clutster potential. ICGCs have been detected in the wide field of Virgo and Fornax galaxy clusters. However, previous surveys covered only a small fraction of Coma and Perseus. In this study we present a wide field survey of these two galaxy clusters, using Subaru Hyper Suprime-Cam(HSC) archival images, covering a circular field with diameter of ~1.8 deg. We select ICGC candidates, by masking the images of bright galaxies and choosing point sources in the remaining area. We find thousands of ICGCs in each galaxy cluster. These ICGCs show a bimodal color distribution, which is dominated by blue GCs. We investigate spatial distributions and radial number density profiles of the blue and red ICGCs in each galaxy cluster. Implications of the results will be discussed.

  • PDF

A Modified SDB Technology and Its Application to High-Power Semiconductor Devices (새로운 SDB 기술과 대용량 반도체소자에의 응용)

  • Kim, E.D.;Park, J.M.;Kim, S.C.;Min, M.G.;Lee, Y.S.;Song, J.K.;Kostina, A. L.
    • Proceedings of the KIEE Conference
    • /
    • 1995.11a
    • /
    • pp.348-351
    • /
    • 1995
  • A modified silicon direct bonding method has been developed alloying an intimate contact between grooved and smooth mirror-polished oxide-free silicon wafers. A regular set of grooves was formed during preparation of heavily doped $p^+$-type grid network by oxide-masking und boron diffusion. Void-free bonded interfaces with filing of the grooves were observed by x-ray diffraction topography, infrared, optical. and scanning electron microscope techniques. The presence of regularly formed grooves in bending plane results in the substantial decrease of dislocation over large areas near the interface. Moreover two strongly misoriented waters could be successfully bonded by new technique. Diodes with bonded a pn-junction yielded a value of the ideality factor n about 1.5 and the uniform distribution of series resistance over the whole area of horded pn-structure. The suitability of the modified technique was confirmed by I - V characteristics of power diodes and reversly switched-on dynistor(RSD) with a working area about $12cm^2$. Both devices demonstrated breakdown voltages close to the calculation values.

  • PDF

A Nonlinear Image Enhancement Method for Digital Mammogram (디지털 맘모그램을 위한 비선형 영상 향상 방법)

  • Jeon, Geum-Sang;Kim, Sang-Hee
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.14 no.1
    • /
    • pp.6-12
    • /
    • 2013
  • Mammography is the most common technique for the early detection of breast cancer. To diagnose correctly and treat of breast cancer efficiently, many image enhancement methods have been developed. This paper presents a nonlinear image enhancement method for the enhancement of digital mammogram. The proposed method is composed of a nonlinear function for brightness improvement and a nonlinear filter for contrast enhancement. The nonlinear function improves the brightness of dark area and extends the dynamic range of bright area, and the nonlinear filter efficiently enhances the specific regions and objects of the mammogram. The final enhanced image was obtained by combining the processed image with the nonlinear function and the filtered image with the nonlinear filter. The proposed nonlinear image enhancement method was confirmed the enhanced performance comparing with other existing methods.

Molecular Pharmacological Interaction of Phenylbutazone to Human Neutrophil Elastase

  • Kang, Koo-Il
    • The Korean Journal of Physiology and Pharmacology
    • /
    • v.2 no.3
    • /
    • pp.385-393
    • /
    • 1998
  • Human neutrophil elastase (HNElastase, EC 3.4.21.37), a causative factor of inflammatory diseases, was purified by Ultrogel AcA54 gel filtration and CM-Sephadex ion exchange chromatography. HNElastase was inhibited by phenylbutazone in a concentration dependent manner up to 0.4 mM, but as the concentration increased, the inhibitory effect gradually diminished. Binding of phenylbutazone to the human neutrophil elastase caused strong Raman shifts at 200, 440, and 1194 $cm^{-1}$. The peak at 1194 $cm^{-1}$ might be evidence of the presence $of\;-N=N-{\Phi}$ radical. The core area of the elastase, according to the visual molecular model of human neutrophil elastase, was structurally stable. A deeply situated active center was at the core area surrounded by hydrophobic amino acids. Directly neighboring the active site was one positively charged atom and two atoms carrying a negative charge, which enabled the enzyme and the drug to form a strong interaction. Phenylbutazone may form a binding, similar to a key & lock system to the atoms carrying opposite charges near the active site of the enzyme molecule. Furthermore, the hydrophobicity of the surrounding amino acid near the active site seemed to enhance the binding strength of phenylbutazone. Binding of phenylbutazone near the active site may cause masking of the active site, preventing the substrate from approaching the active site and inhibiting elastase activity.

  • PDF

Extraction of Computer Image Analysis Information by Desk Top Computer from Beef Carcass Cross Sections

  • Karnuah, A.B.;Moriya, K.;Sasaki, Y.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.12 no.8
    • /
    • pp.1171-1176
    • /
    • 1999
  • The precision and reliability of the Computer Image Analysis technique using a desk top computer for extracting information from carcass cross section scans was evaluated by the repeatability (R) and coefficient of variation (CV) for error variance. The 6th and 7th ribs cross section of carcasses from 55 fattened Japanese Black steers were used. The image analysis was conducted using a desk top computer (Macintosh-Apple Vision 1710 Display) connected to a scanner and an image capture camera. Two software applications, Adobe Photoshop and Mac Scope were used interchangeably. The information extracted and measured were individual muscle area, circumference length, long and short axes lengths, muscle direction; distance between any two muscle centers of gravity; cross section total area, lean, fat, and bone. The information was extracted after the processes of scanning, digitization, masking, muscle separation, and binarization. When using the Computer Image Analysis technique by desk top computer, proper digitization and selection of scanning resolution are very important in order to obtain accurate information. The R-values for muscle area, circumference, long and axes lengths, and direction ranged from 0.95 to 0.99, whereas those of the distance between any two muscle centers of gravity ranged from 0.96 to 0.99, respectively. For the cross section total area, lean, fat, and bone it ranged from 0.83 to 0.99. Excellent repeatability measurements were observed for muscle direction and distance between any two muscle centers of gravity. The results indicate that the Computer Image Analysis technique using a desk top computer for extracting information from carcass cross section is reliable and has high precision.

Implementation of Main Computation Board for Safety Improvement of railway system (철도시스템의 안전성 향상을 위한 주연산보드 구현)

  • Park, Joo-Yul;Kim, Hyo-Sang;Lee, Joon-Hwan;Kim, Bong-Taek;Chung, Ki-Seok
    • Proceedings of the KSR Conference
    • /
    • 2011.05a
    • /
    • pp.1195-1201
    • /
    • 2011
  • Since the release of safety standard IEC 61508 which defines functional safety of electronic safety-related systems, SIL(Safety Integrity Level) certification for railway systems has gained lots of attention lately. In this paper, we propose a new design technique of the computer board for train control systems with high reliability and safety. The board is designed with TMR(Triple Modular Redundancy) using a certified SIL3 Texas Instrument(TI)'s TMS570 MCU(Micro-Controller Unit) to guarantee safety and reliability. TMR for the control device is implemented on FPGA(Field Programmable Gate Array) which integrates a comparator, a CAN(Controller Area Network) communication module, built-in self-error checking, error discriminant function to improve the reliability of the board. Even if a malfunction of a processing module occurs, the safety control function based on the proposed technique lets the system operate properly by detecting and masking the malfunction. An RTOS (Real Time Operation System) called FreeRTOS is ported on the board so that reliable and stable operation and convenient software development can be provided.

  • PDF

HVS Based Digital Watermarking Using the POCS Theory (POCS 이론을 이용한 인간시각시스템 기반 디지털 워터마킹)

  • Kim, Hee-Jung;Seo, Yong-Su;Kim, Ji-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.8 no.4
    • /
    • pp.516-524
    • /
    • 2005
  • In this paper, a new watermarking scheme based on the POCS theory and human visual system is proposed. Using the POCS theory, watermarks are embedded into imperceptible image regions such as edge and strong texture area in the spatial domain. Also it is inserted into middle frequency band in the transform domain to achieve the robustness against compression and filtering, etc. In addition, different gain factors are employed into blocks classified by considering texture masking effect. By doing so, the proposed method has a novel property of having both the imperceptibility and the robustness simultaneously. Simulation results show that the proposed method has an excellent performance better than conventional approaches.

  • PDF

A Study on UCC and Information Security for Personal Image Contents Based on CCTV-UCC Interconnected with Smart-phone and Mobile Web

  • Cho, Seongsoo;Lee, Soowook
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.56-64
    • /
    • 2015
  • The personal image information compiled through closed-circuit television (CCTV) will be open to the internet with the technology such as Long-Tail, Mash-Up, Collective Intelligence, Tagging, Open Application Programming Interface (Open-API), Syndication, Podcasting and Asynchronous JavaScript and XML (AJAX). The movie User Created Contents (UCC) connected to the internet with the skill of web 2.0 has the effects of abuse and threat without precedent. The purpose of this research is to develop the institutional and technological method to reduce these effects. As a result of this research, in terms of technology this paper suggests Privacy Zone Masking, IP Filtering, Intrusion-detection System (IDS), Secure Sockets Layer (SSL), public key infrastructure (PKI), Hash and PDF Socket. While in terms of management this paper suggests Privacy Commons and Privacy Zone. Based on CCTV-UCC linked to the above network, the research regarding personal image information security is expected to aid in realizing insight and practical personal image information as a specific device in the following research.