• Title/Summary/Keyword: Hides

Search Result 79, Processing Time 0.022 seconds

A Study on the Patchwork in the Costumes of the Arctic Regions

  • Moon, Shin-Ae;Kim, Moon-Sook
    • The International Journal of Costume Culture
    • /
    • v.6 no.1
    • /
    • pp.30-37
    • /
    • 2003
  • The most distinctive feature of the costumes of the Arctic regions from Alaska to Siberia centering around the Bering Sea connecting Asia to North America, is that each tribe makes clothes adequate to the climate and their lifestyles with animal hides obtained from hunting in their habitation. Furs or fish skins, the main materials for clothing, are characteristically cut into many pieces, and thus piece-joining patchwork is used to make or decorate garments. Patchwork is the technique that can create new designs with 3-dimensional and various combinations by modifying the simple materials, and also has the advantage of fitting the body without a certain cut line. Therefore, the patchwork found in the Arctic costumes may be developed from folk costume designs with limited materials like fur into new ones for modern or future costumes.

  • PDF

Automatic Detection of Work Distraction with Deep Learning Technique for Remote Management of Telecommuting

  • Lee, Wan Yeon
    • International journal of advanced smart convergence
    • /
    • v.10 no.1
    • /
    • pp.82-88
    • /
    • 2021
  • In this paper, we propose an automatic detection scheme of work distraction for remote management of telecommuting. The proposed scheme periodically captures two consequent computer screens and generates the difference image of these two captured images. The scheme applies the difference image to our deep learning model and makes a decision of abnormal patterns in the difference image. Our deep learning model is designed with the transfer learning technique of VGG16 deep learning. When the scheme detects an abnormal pattern in the difference image, it hides all texts in the difference images to protect disclosure of privacy-related information. Evaluation shows that the proposed scheme provides about 96% detection accuracy.

Adaptive data hiding scheme based on magic matrix of flexible dimension

  • Wu, Hua;Horng, Ji-Hwei;Chang, Chin-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.9
    • /
    • pp.3348-3364
    • /
    • 2021
  • Magic matrix-based data hiding schemes are applied to transmit secret information through open communication channels safely. With the development of various magic matrices, some higher dimensional magic matrices are proposed for improving the security level. However, with the limitation of computing resource and the requirement of real time processing, these higher dimensional magic matrix-based methods are not advantageous. Hence, a kind of data hiding scheme based on a single or a group of multi-dimensional flexible magic matrices is proposed in this paper, whose magic matrix can be expanded to higher dimensional ones with less computing resource. Furthermore, an adaptive mechanism is proposed to reduce the embedding distortion. Adapting to the secret data, the magic matrix with least distortion is chosen to embed the data and a marker bit is exploited to record the choice. Experimental results confirm that the proposed scheme hides data with high security and a better visual quality.

An Improved Reversible Data Hiding Technique using Histogram Characteristics of Image

  • Soo-Mok, Jung
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.15 no.1
    • /
    • pp.63-69
    • /
    • 2023
  • In this paper, we propose an effective reversible data hiding technique that increases the confidential data hiding amount of the NSAS technique itself by utilizing the characteristics of image. The proposed technique shifts the histogram using multiple zeros of the histogram and hides 2 bits of confidential data at each peak point. Using the proposed technique, the amount of confidential data that can be hidden is doubled compared to the existing technique, and high-quality stego-image can be created. Confidential data can be restored without loss from the stego- image, and the original cover image can be restored without loss. Through experiments, it was confirmed that the proposed technique can hide twice as much confidential data than the existing technique, and the image quality of the stego-image is very good with a maximum of 39.75dB.

Tracing surrogate bacteria inoculated on hide through the beef slaughtering process

  • Kim, Seongjoon;Kim, Sukwon;Kim, Sung Kwan;Choi, Kwanghoon;Kim, Jinman;Choe, Nonghoon
    • Korean Journal of Veterinary Research
    • /
    • v.62 no.1
    • /
    • pp.5.1-5.5
    • /
    • 2022
  • Many countries have imposed regulations relating to concerns that hide contamination will affect the cleanliness of abattoirs. However, South Korea has not indicated any clear criteria. The purpose of this study is to use surrogate bacteria to measure the contamination in abattoirs caused by contaminated cattle hides. The swab contact method and plate count method are used. Surrogate bacteria are found in most internal environments after the final process. These surrogates remained on the carcass even after the final washing process. This paper is the first study in South Korea that use surrogate bacteria to analyze contamination levels in abattoirs.

Classification of Make-up (현대 메이크 업의 분류)

  • Shin, Seong-Yoon;Shin, Kwang-Seong;Nam, Soo-Tai
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.05a
    • /
    • pp.344-345
    • /
    • 2021
  • In this paper, the classification and types of makeup were newly written appropriately for the present day. And the exact meaning of makeup was newly designated. Make-up protects the skin from various external environmental changes. In addition, it has a beautification function that hides many flaws in our skin and makes it beautiful.

  • PDF

Virus Inactivation during the Manufacture of a Collagen Type I from Bovine Hides (소 가죽 유래 Type I Collagen 생산 공정에서 바이러스 불활화)

  • Bae, Jung Eun;Kim, Chan Kyung;Kim, Sungpo;Yang, Eun Kyung;Kim, In Seop
    • Korean Journal of Microbiology
    • /
    • v.48 no.4
    • /
    • pp.314-318
    • /
    • 2012
  • Most types of collagen used for biomedical applications, such as cell therapy and tissue engineering, are derived from animal tissues. Therefore, special precautions must be taken during the production of these proteins in order to assure against the possibility of the products transmitting infectious diseases to the recipients. The ability to remove and/or inactivate known and potential viral contaminants during the manufacturing process is an ever-increasingly important parameter in assessing the safety of biomedical products. The purpose of this study was to evaluate the efficacies of the 70% ethanol treatment and pepsin treatment at pH 2.0 for the inactivation of bovine viruses during the manufacture of collagen type I from bovine hides. A variety of experimental model viruses for bovine viruses including bovine herpes virus (BHV), bovine viral diarrhea virus (BVDV), bovine parainfluenza 3 virus (BPIV-3), and bovine parvovirus (BPV), were chosen for the evaluation of viral inactivation efficacy. BHV, BVDV, BPIV-3, and BPV were effectively inactivated to undetectable levels within 1 h of 70% ethanol treatment for 24 h, with log reduction factors of ${\geq}5.58$, ${\geq}5.32$, ${\geq}5.11$, and ${\geq}3.42$, respectively. BHV, BVDV, BPIV-3, and BPV were also effectively inactivated to undetectable levels within 5 days of pepsin treatment for 14 days, with the log reduction factors of ${\geq}7.08$, ${\geq}6.60$, ${\geq}5.60$, and ${\geq}3.59$, respectively. The cumulative virus reduction factors of BHV, BVDV, BPIV-3, and BPV were ${\geq}12.66$, ${\geq}11.92$, ${\geq}10.71$, and ${\geq}7.01$. These results indicate that the production process for collagen type I from bovine hides has a sufficient virus-reducing capacity to achieve a high margin of virus safety.

Empirical Bayes Problem With Random Sample Size Components

  • Jung, Inha
    • Journal of the Korean Statistical Society
    • /
    • v.20 no.1
    • /
    • pp.67-76
    • /
    • 1991
  • The empirical Bayes version involves ″independent″ repetitions(a sequence) of the component decision problem. With the varying sample size possible, these are not identical components. However, we impose the usual assumption that the parameters sequence $\theta$=($\theta$$_1$, $\theta$$_2$, …) consists of independent G-distributed parameters where G is unknown. We assume that G $\in$ g, a known family of distributions. The sample size $N_i$ and the decisin rule $d_i$ for component i of the sequence are determined in an evolutionary way. The sample size $N_1$ and the decision rule $d_1$$\in$ $D_{N1}$ used in the first component are fixed and chosen in advance. The sample size $N_2$and the decision rule $d_2$ are functions of *see full text($\underline{X}^1$equation omitted), the observations in the first component. In general, $N_i$ is an integer-valued function of *see full text(equation omitted) and, given $N_i$, $d_i$ is a $D_{Ni}$/-valued function of *see full text(equation omitted). The action chosen in the i-th component is *(equation omitted) which hides the display of dependence on *(equation omitted). We construct an empirical Bayes decision rule for estimating normal mean and show that it is asymptotically optimal.

  • PDF

OKAYAMA PLANET SEARCH PROGRAM

  • SATO BUN'EI
    • Journal of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.315-318
    • /
    • 2005
  • We have carried out a precise Doppler survey of G-type giants aiming to unveil the properties of planetary systems in intermediate-mass stars ($1.5-5M_{\bigodot}$). G-type giants are promising targets for Doppler planet searches around massive stars, because they are slow-rotators and have many sharp absorption lines in their spectra and their surface activities are relatively low in contrast to their younger counterparts on the main-sequence (B-A stars). We are now monitoring radial velocities of about 300 late G-type (including early K-type) giants using HIgh Dispersion Echelle Spectrograph (HIDES) at Okayama Astrophysical Observatory. We have achieved a Doppler precision of about 6-7 m/s over a time span of 3 years using an iodine absorption cell. We found that most of the targets have radial velocity scatters of ${\sigma}{\~} 10-20 m\;s^{-1}$ over 1-3 years, with the most stable reaching levels of 6-8 m $s^{-1}$. Up to now, we have succeeded in discovering the first extrasolar planet around a G-type giant star HD 104985, and also found several candidates showing significant radial velocity variations, suggesting the existence of stellar and substellar companions. Observations have continued to establish their variability.

User Key-based Fragile Watermarking for Detecting Image Modification (영상 변형 검출을 위한 사용자 Key기반 Fragile 워터마킹)

  • Im, Jae-Hyeon;Sim, Hyeok-Jae;Jeon, Byeong-U
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.38 no.5
    • /
    • pp.474-485
    • /
    • 2001
  • This paper proposes a user-key-based fragile watermarking for detecting image modification. The embedding data in a form of binary image for authentication are inserted to the DCT coefficients of each block of the given image. To minimize possible exposure of being watermarked and the location of insertion, it is proposed to utilize a user-specific key in randomizing those information. Each DCT block hides one bit of data, all of which represent the user-specific authentication data. Experiments with 5 real images demonstrate that the proposed method not only detects whether there is modification or not, but also the actual location of modification with minimal visual deterioration. However, the proposed method has room for improvement against its loss of watermark by an attack of compression by more than 50%.

  • PDF