• Title/Summary/Keyword: HIDE

Search Result 326, Processing Time 0.026 seconds

Calibration Mirror Mechanism with Fail-Safe Function (결함안전 기능을 고려한 교정 반사경 구동장치)

  • Lee, Kyong-Min;Oh, Hyun-Ung
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.39 no.7
    • /
    • pp.682-687
    • /
    • 2011
  • Calibration mirror mechanism has been widely used for on-board calibration with black body. The calibration mirror is deployed to reflect the radiation energy from the black body to the image sensor for calibrating the sensor system. After the calibration, the calibration mirror is stowed not to hide a main optical path. It also has a fail-safe function which can stow the mirror by just removing the input power of motor when the calibration mirror is stopped at certain position during the calibration. In the present work, the operation concept, design, torque analysis and functional test results of the calibration mirror mechanism with the aforementioned function have been introduced and investigated.

Evaluation of platform switching and its clinical application (Platform switching(또는 Platform shifting) 개념 및 임상적용에 관한 고찰)

  • Yang, Byoung-Eun;Song, Sang-Hun;Kim, Seong-Gon
    • The Journal of the Korean dental association
    • /
    • v.45 no.9 s.460
    • /
    • pp.562-570
    • /
    • 2007
  • Many dentists and patients expect that implant function and esthetics will not change over time. However, even the most successful implant restorations with ideal position, vertical height, and occlusion can be aesthetically pleasing, but may hide a common problem. Many dentists noticed that there can be some circumferential bone loss around the neck of the implants. To circumvent this bone loss, a "platform switching" concept was introduced recently. The basic concept of platform switching is by moving the fixture-abutment interface further away from the crestal bone to minimize crestal bone loss. Since crestal bone loss is a multifactor problem, it is important to consider microgap formation and micromotion between the implant and abutment because platform switching does not solve the problem on its own. In this article, we reviewed studies concerning platform switching and discussed the clinical application and the problems that may occur with its use.

  • PDF

A study of keep the Secret information of Random Sized Images from using Indestructible Security

  • Woo, Seon-mi;Lee, Malrey;Lee, Hyang Ran
    • International journal of advanced smart convergence
    • /
    • v.5 no.1
    • /
    • pp.23-29
    • /
    • 2016
  • The information is to be considered as important part of any network, the communication nodes within network can able to communicate and transmit information by the means of configured LAN/WAN, or/and using internet technology. Thus, vast enhancement has been made in- exchanging of information over transmission media, this should be beneficial in various disciplines of modern client/server applications but at other side, several massive vulnerabilities have been directly/in-directly associated with them. To resolve the security issues, a security mechanism is proposed which hide the sensitive information of images before transmitting to networks. Random size image samples have used and encrypted to protect them from unauthorized entities. The encryption mechanism manipulates the sample images, and corresponding secret codes are generated which help to protect the images from adversaries. To provide an indestructible security mechanism, cryptography algorithms are deployed and considered as best solutions to keep the secret information of images.

Privacy-Preserving ID-based Service in Anonymity-based Ubiquitous Computing Environment (익명기반 유비쿼터스 환경의 프라이버시 보장 ID기반 서비스)

  • Kim Hak-Joon;Hwang Kyoung-Soon;Lee Keon Myung
    • Journal of the Korean Institute of Intelligent Systems
    • /
    • v.15 no.1
    • /
    • pp.65-68
    • /
    • 2005
  • Privacy preservation is crucial in ubiquitous computing environment in which lots of privacy- sensitive information can be collected and distributed without appropriate control. The anonymity-based approach is a famous one used for privacy preservation communication, which allows users to use pseudonyms instead of real ID so as not to reveal their identities. This approach is effective in that it can hide the identity of users. However, it makes it difficult to provide ID-based services like buddy service, dangerous area alert, P2P communication in the ubiquitous computing. We proposes a system architecture which enables ID-based services in the ubiquitous computing environment employing anonymity - based privacy - preserving approach.

Image Recognition based on Adaptive Deep Learning (적응적 딥러닝 학습 기반 영상 인식)

  • Kim, Jin-Woo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.1
    • /
    • pp.113-117
    • /
    • 2018
  • Human emotions are revealed by various factors. Words, actions, facial expressions, attire and so on. But people know how to hide their feelings. So we can not easily guess its sensitivity using one factor. We decided to pay attention to behaviors and facial expressions in order to solve these problems. Behavior and facial expression can not be easily concealed without constant effort and training. In this paper, we propose an algorithm to estimate human emotion through combination of two results by gradually learning human behavior and facial expression with little data through the deep learning method. Through this algorithm, we can more comprehensively grasp human emotions.

Interactive Conflict Detection and Resolution for Personalized Features

  • Amyot Daniel;Gray Tom;Liscano Ramir;Logrippo Luigi;Sincennes Jacques
    • Journal of Communications and Networks
    • /
    • v.7 no.3
    • /
    • pp.353-366
    • /
    • 2005
  • In future telecommunications systems, behaviour will be defined by inexperienced users for many different purposes, often by specifying requirements in the form of policies. The call processing language (CPL) was developed by the IETF in order to make it possible to define telephony policies in an Internet telephony environment. However, user-defined policies can hide inconsistencies or feature interactions. In this paper, a method and a tool are proposed to flag inconsistencies in a set of policies and to assist the user in correcting them. These policies can be defined by the user in a user-friendly language or derived automatically from a CPL script. The approach builds on a pre-existing logic programming tool that is able to identify inconsistencies in feature definitions. Our new tool is capable of explaining in user-oriented terminology the inconsistencies flagged, to suggest possible solutions, and to implement the chosen solution. It is sensitive to the types of features and interactions that will be created by naive users. This tool is also capable of assembling a set of individual policies specified in a user-friendly manner into a single CPL script in an appropriate priority order for execution by telecommunication systems.

PESQ-Based Selection of Efficient Partial Encryption Set for Compressed Speech

  • Yang, Hae-Yong;Lee, Kyung-Hoon;Lee, Sang-Han;Ko, Sung-Jea
    • ETRI Journal
    • /
    • v.31 no.4
    • /
    • pp.408-418
    • /
    • 2009
  • Adopting an encryption function in voice over Wi-Fi service incurs problems such as additional power consumption and degradation of communication quality. To overcome these problems, a partial encryption (PE) algorithm for compressed speech was recently introduced. However, from the security point of view, the partial encryption sets (PESs) of the conventional PE algorithm still have much room for improvement. This paper proposes a new selection method for finding a smaller PES while maintaining the security level of encrypted speech. The proposed PES selection method employs the perceptual evaluation of the speech quality (PESQ) algorithm to objectively measure the distortion of speech. The proposed method is applied to the ITU-T G.729 speech codec, and content protection capability is verified by a range of tests and a reconstruction attack. The experimental results show that encrypting only 20% of the compressed bitstream is sufficient to effectively hide the entire content of speech.

A Study on Dropping Behavior and Survey Improvement Methods for Siberian Flying Squirrel(Pteromys volans) (하늘다람쥐(Pteromys volans) 배설습성과 조사기법 개선방안 연구)

  • Woo, Donggul;Choi, Taeyoung;Lee, Sanggyu;Ha, Jeongok
    • Journal of Environmental Impact Assessment
    • /
    • v.22 no.6
    • /
    • pp.569-579
    • /
    • 2013
  • To identify the characteristics of the dropping habits and to provide improved methods for sign survey of Siberian flying squirrels Pteromys volans, an investigation was carried out in Jirisan National Park from April 2012 to May 2013. The latrines of study area were checked once a month and the characteristics of dropping behavior were camera trapped. The feces of Siberian flying squirrel were found on the point which tree forked, mostly from November to May. The squirrel actively presents in forked tree mainly on the September to April. The Siberian flying squirrel is found to be a typical nocturnal animal as it actively move between 6p.m. to 7a.m.. The study found that squirrel does feeding and dropping in the winter time on forked tree. On the point which tree forked could be a good place for the squirrel to hide from their predator when there is no leaf on the tree. Conducting the sign survey is advisable from November to May, as well as with the careful approach to the animals. As Siberian flying squirrel is an endangered species, adjusting the survey period is mandatory, especially when doing environmental impact assessment and a research on its dwelling areas.

PARTITIONING OF LIPID IN THE BODY OF FAT-TAILED LAMBS AS INFLUENCED BY DOCKING AND SEX

  • Abouheif, M.A.;Kraidees, M.S.;Shatat, R.A.
    • Asian-Australasian Journal of Animal Sciences
    • /
    • v.6 no.1
    • /
    • pp.79-86
    • /
    • 1993
  • Twelve docked and 12 intact Najdi lambs of equal numbers of males and females were slaughtered at 40 kg shorn shrunk body weight, Lipid in all empty body fat components; namely, subcutaneous, intermuscular, intramuscular, omental, mesenteric, channel, perirenal, pericardial, tail, viscera, bone and hide, were determined. Except for ram lambs, which had a lower percentage of lipid in intermuscular partition in loin cut, sex did not influence the relative proportion of subcutaneous or intermuscular fat in each wholesale cut. The data also showed that docking did not change the distribution of lipid in intermuscular and intramuscular fat partitions in each wholesale cut. Docked lambs tended to accumulate lower proportions of the lipid in subcutaneous fat component in the cuts located along the dorsal line than intact lambs. The total amount of lipid deposited in the empty body of ewe lamb was heavier in weight than that of ram lamb. Docking had no effect on the distribution of total lipid in the empty body, except for subcutaneous fat component, being greater in docked lambs than did intact ones. Generally, the highest proportion of fat was associated with subcutaneous depot followed, in order, by intermuscular, mesenteric, tail, intramuscular and omental fat partitions.

The Effects of Corporate Social Responsibility on Corporate Activity: Comparing Domestic and Multinational Corporations in Korea

  • Jung, Young-Su;Kang, Shin-Ae
    • Journal of Distribution Science
    • /
    • v.14 no.12
    • /
    • pp.31-41
    • /
    • 2016
  • Purpose - This study investigates whether corporate social responsibility(hereafter CSR) management activities affect companies' performance. Depending on the CSR management activities and companies' type (national and multinational), we examined whether there is any difference in their CSR activities on Corporate Performance. Research design, data, and methodology - Data were collected from 230 surveys with a sample group consisting of employees in multinational corporations located in Seoul and Gyeonggi and 224 copies were used from 3 May 2016 to 17 May 2016. The data was analyzed by SPSS 21.0. Results - The empirical results show that CSR management activities positively influence on financial and non-financial corporate achievement and CSR may be interpreted as a strategic method to improve corporate value. But the impacts of CSR activities on performance were different between domestic and multinational corporations. The reason that the legal responsibility was overruled as a factor for financial and non-financial achievement in domestic company may be that CSR management activity is perceived as an indulgence to hide or beautify negative behavior regarding corporate illegal behavior, thus it does not deliver value. Conclusions - CSR activities can be delivered differently between domestic and multinational corporations, and further study should be done why there are differences between corporations.