• Title/Summary/Keyword: Block patterns

Search Result 336, Processing Time 0.024 seconds

Watermarking Algorithm for 1-bit Image Authentication using Block operation (블록별 연산을 이용한 1-bit 영상의 원본 증명용 워터마킹 알고리즘)

  • 박용정;권오진
    • Proceedings of the IEEK Conference
    • /
    • 2003.07e
    • /
    • pp.1791-1794
    • /
    • 2003
  • In this Paper, we propose a new watermarking algorithm for 1-bit image authentication using block operation. Observing 3${\times}$3 block patterns, we find the regions to watermark, We describe a specific scheme how to generate data to embed and find pixels most probably invisible under modifications. We also show the experimental results of proposed algorithm.

  • PDF

The Tuning of Oscillation Frequency by the Analysis of Characteristics of each Block in Ceramic VCO (세라믹 VCO의 Block 특성 분석을 통한 주파수 튜닝)

  • Yoo Chan-Sei;Lee Woo-Sung
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.11 no.2 s.31
    • /
    • pp.49-52
    • /
    • 2004
  • Ceramic components and modules using LTCC passives are being performed and on the passives included in modules have been studied nowadays. However the characteristics changes of passives in ceramic module due to the coupling between patterns, so each block in module, must be analyzed in the state of module including coupling factors. In our research, characteristics of each block of VCO, resonator part, oscillator part, output part were measured and analyzed to allow the prediction of behavior of VCO.

  • PDF

A Probe Detection based on Private Cloud using BlockChain (블록체인을 적용한 사설 클라우드 기반 침입시도탐지)

  • Lee, Seyul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.14 no.2
    • /
    • pp.11-17
    • /
    • 2018
  • IDS/IPS and networked computer systems are playing an increasingly important role in our society. They have been the targets of a malicious attacks that actually turn into intrusions. That is why computer security has become an important concern for network administrators. Recently, various Detection/Prevention System schemes have been proposed based on various technologies. However, the techniques, which have been applied in many systems is useful for existing intrusion patterns on standard-only systems. Therefore, probe detection of private clouds using BlockChain has become a major security protection technology to detection potential attacks. In addition, BlockChain and Probe detection need to take into account the relationship between the various factors. We should develop a new probe detection technology that uses BlockChain to fine new pattern detection probes in cloud service security in the end. In this paper, we propose a probe detection using Fuzzy Cognitive Map(FCM) and Self Adaptive Module(SAM) based on service security using BlockChain technology.

ON NILPOTENCE INDICES OF SIGN PATTERNS

  • Erickson, Craig;Kim, In-Jae
    • Communications of the Korean Mathematical Society
    • /
    • v.25 no.1
    • /
    • pp.11-18
    • /
    • 2010
  • The work in this paper was motivated by [3], where Eschenbach and Li listed four 4 by 4 sign patterns, conjectured to be nilpotent sign patterns of nilpotence index at least 3. These sign patterns with no zero entries, called full sign patterns, are shown to be potentially nilpotent of nilpotence index 3. We also generalize these sign patterns of order 4 so that we provide classes of n by n sign patterns of nilpotence indices at least 3, if they are potentially nilpotent. Furthermore it is shown that if a full sign pattern A of order n has nilpotence index k with $2{\leq}k{\leq}n-1$, then sign pattern A has nilpotent realizations of nilpotence indices k, k + 1, $\ldots$, n. Hence, the four 4 by 4 sign patterns in [3, page 91] also allow nilpotent realizations of nilpotence index 4.

Numerical and experimental study of the flow characteristics around two vertical cylinders (2개의 수직실린더 주위 유동 특성 연구)

  • Shin Young-S.;Jo Chul-H.;Jeong Uh-C.
    • Proceedings of the KSME Conference
    • /
    • 2002.08a
    • /
    • pp.213-216
    • /
    • 2002
  • In this paper, flow patterns around two vertical cylinders were investigated numerically and experimentally Flow patterns between cylinders are very complex and interative. Changing gaps between cylinders the flow patterns are measured and numerically studied at a fixed comming velocity. The experiment has beeen conducted in circulating water channel with PIV system and manometer, and numerical analysis has been made by F.D.M. and multi block method. The results can be applied in the understanding and design of multiple pile array structures.

  • PDF

A Built-In Self-Test Method for CMOS Circuits (CMOS 테스트를 위한 Built-In Self-Test 회로설계)

  • 김윤홍;임인칠
    • Journal of the Korean Institute of Telematics and Electronics B
    • /
    • v.29B no.9
    • /
    • pp.1-7
    • /
    • 1992
  • This paper proposes a built-in self-test tchnique for CMOS circuits. To detect a stuck-open fault in CMOS circuits, two consequent test patterns is required. The ordered pairs of test patterns for stuck-open faults are generated by feedback shift registers of extended length. A nonlinear feedback shift register is designed by the merging method and reordering algorithms of test patterns proposed in this paper. And a new multifunctional BILBO (Built-In Logic Block Observer) is designed to perform both test pattern generation and signature analysis efficiently.

  • PDF

Effect of Electrical Field on Blockcopolymer Patterning (블록공중합체 패턴 형성시 전계에 의한 영향)

  • Hwang, Sung-Min;Kim, Kyoung-Seob;Kim, Nam-Hoon;Roh, Yong-Han
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2007.11a
    • /
    • pp.63-64
    • /
    • 2007
  • Polystyrene-block-polymethyl methacrylate (PS-b-PMMA) can pattern nanoscale structures over large areas. However these patterns have a short-range order. These short-range order limits their utility in some applications. Consequently, we have to overcome this limitation of block-copolymer. In this study we added a electrical field to the standard block-copolymer patterning method for long-range ordered arrays of nanostructures. This method is conformed by annealing a block copolymer with applied voltages. It is very simple method that do not have any additional hour. In this reason it can be applied easily for other nanostructure fabrications. This method opens up a new route to the controlled phase separation of block copolymers with precise place of the nanostructures.

  • PDF

A Study of the Ankle Joint to Mechanical Energy in Crouching Start According to the Backward Block Inclined Angle Increase (크라우칭(Crouching) 스타트 시 뒤 블록 각도 변화에 따른 발목 관절의 기계적 에너지에 대한 연구)

  • Kwon, Moon-Seok;Shin, Seong-Hyoo
    • Korean Journal of Applied Biomechanics
    • /
    • v.15 no.1
    • /
    • pp.19-28
    • /
    • 2005
  • The purpose of this study was to improve the ankle joint to mechanical energy in Crouching start according to the backward block inclined angle(F, F(+1), F(+2)) increase. For purpose of this study the ankle joint was considered as a single hinge joint rotation about a transverse axis. A two-dimensional(sagittal plane) analysis was performed on data collected from 3 spriters(university student). During Crouching start, the ankle joint moment showed a similar patterns according to the backward block inclined angle increase. The peak values of ankle joint moment was plantar flexion approximately 80% throughout the contact phase for Crouching start. The absorbed and generated energy represented different values from the backward block inclined angle increase at ankle joint. On the backward block inclined angle F, subject A($55^{\circ}$) and C($50^{\circ}$) Produced energy generation more than other block inclined angles. On the backward block inclined angle F(+2), subject B($50^{\circ}$) showed largest energy generation.

Practical Use of Apparel CAD System by the Classification of Basic Pattern Block (패턴의 Block화(化)에 의(依)한 어패럴 CAD System의 활용(活用))

  • Lee, Hyoung Sook;Kim, Ok Kyung
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.17 no.3
    • /
    • pp.391-406
    • /
    • 1993
  • The purpose of this study was to utilize of apparel CAD System by the classification of the basic pattern block in pattern making process. Gerber AM-300 CAD System was used for this study. The results form this study were as follows; 1. New shirts block were developed. 2. The sensory test was applied to evaluate the new shirts block for women by comparing it with Japanese Bunka shirts blouse pattern making method. According to a statistical analysis of the result of the 20 items on the questionnaire, the 19 items showed significant difference(${\alpha}{\leq}0.01$)between the two, with the new shirts block having higher scores. 3. A basic pattern block was selected by the design sketch. 4. P/D/S were enabled to be constructed directly from a block pattern. The drawing, deletion. duplication, and movement of all points and lines in the pattern might be made freely, and the split, pivot, and movement of the pattern, and the attachment of two patterns were possible. 5. Automatic grading of finished pattern have been developed by creation and modification of grading rules of block pattern.

  • PDF

Anomalous Event Detection in Traffic Video Based on Sequential Temporal Patterns of Spatial Interval Events

  • Ashok Kumar, P.M.;Vaidehi, V.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.169-189
    • /
    • 2015
  • Detection of anomalous events from video streams is a challenging problem in many video surveillance applications. One such application that has received significant attention from the computer vision community is traffic video surveillance. In this paper, a Lossy Count based Sequential Temporal Pattern mining approach (LC-STP) is proposed for detecting spatio-temporal abnormal events (such as a traffic violation at junction) from sequences of video streams. The proposed approach relies mainly on spatial abstractions of each object, mining frequent temporal patterns in a sequence of video frames to form a regular temporal pattern. In order to detect each object in every frame, the input video is first pre-processed by applying Gaussian Mixture Models. After the detection of foreground objects, the tracking is carried out using block motion estimation by the three-step search method. The primitive events of the object are represented by assigning spatial and temporal symbols corresponding to their location and time information. These primitive events are analyzed to form a temporal pattern in a sequence of video frames, representing temporal relation between various object's primitive events. This is repeated for each window of sequences, and the support for temporal sequence is obtained based on LC-STP to discover regular patterns of normal events. Events deviating from these patterns are identified as anomalies. Unlike the traditional frequent item set mining methods, the proposed method generates maximal frequent patterns without candidate generation. Furthermore, experimental results show that the proposed method performs well and can detect video anomalies in real traffic video data.