• Title/Summary/Keyword: Look-Up

Search Result 1,195, Processing Time 0.023 seconds

Robust Blind Watermarking in Medical Images Using by Polar Transformation (의료영상에서 Polar 변환을 적용한 강인한 블라인드 워터마킹 기법)

  • 김태호;남기철;박무훈
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2004.05b
    • /
    • pp.241-246
    • /
    • 2004
  • Medical images are being managed more by PACS in general medical institutions. It is important to protect patients from being invaded their privacy related to the images. It is also necessary to confirm the ownership, the right of properity of the medical images and notice whether the data are modified. In this paper, we propose a robust watermarking against RST attacks in medical images on the PACS. The proposed scheme modifies and improves Log-Polar Mapping and Fourier Mellin Transform in order to realize and recover serious image degradation and watermark data loss caused by the conversion between cartesian coordinate and log-polar coordinate. We used the radius and theta Look Up Table to solve the realization of the Fourier Mellin Transform, and inserted a watermark into 2D-DFT magnitudes using Spread Spectrum. Experimental results shows that this method are robust to several attack.

  • PDF

The Influence of the Youth Culture on the Street Fashion - On the Focus in 1960s - (청소년(靑少年) 문화(文化)가 스트리트 패션에 미친 영향(影響) - 1960년대(年代)를 중심(中心)으로 -)

  • Kan, Moon-Ja
    • Journal of Fashion Business
    • /
    • v.2 no.1
    • /
    • pp.35-48
    • /
    • 1998
  • The purpose of this paper is to examine the street fashion, which is influenced by the youth culture in 1960s. Youth culture is the youth subculture which appeared multiform in the 1960s. It tried to create a new culture by subverting the ruling class culture with their combative life style and peculiar appearance which are distinguished from mother culture. Youth cultures as youth subculture are symbolically expressed in their style which had strong characteristics of sub-fashion and anti-fashion, and which are different from mother fashion in shape. Therefore youth subculture fashion had an effect on street fashion in the 60s. The influence that the youth culture fashion had had on the street fashion is summarized as follows: Beats fashion was intelligency look on black dress, black polo-neck shirts, black trousers, black glasses and heavy black eyeliner. Mods fashion was neat style on Edwardian suit with narrow trousers, pointer-toeshoes and smooth croped hair. Folkis fashion was ethnic look, middle east asian look, peasant look, Indian style, south america look, gypsy style, natural materials, natural dying, tie-dye, beads and hand made ornaments. Rockers fashion was violence appearance categorized 'blue collar' on black leather jacket decorated with metal studs and hand-painted insignia, blue jeans and boots for motor bike. Swinging London & the Psychedelics fashion was blend mods look with pschedelic color and motive pattern. Hippie fashion was intermix pschedelic and natural or ethnic style. It was appear to be a meaningless, unpredictable assortment of diverse items and style. Faded and tattered jeans, army jackets, vintage hat, beads, embroidered headband, white sheets, diverse theatrical costumes, sandals or bare feet, granny dress, peasant blouse, blanket cape, tie-dye T-shirts and long hair. Greasers fashion was adorned black leather jacket with chains, fringing, badges, insignia and sleeves had been crudely ripped off. They came to be known wore jeans so soaked with oil. Skinheads fashion was aggressive working class identity with donkey jacket, jeans rolled up, collarless union shirts, heavy boots, braces and hair cropped short.

  • PDF

Failure Prediction of Metal Oxide Varistor Using Nonlinear Surge Look-up Table Based on Experimental Data

  • Kim, Young Sun
    • Transactions on Electrical and Electronic Materials
    • /
    • v.16 no.6
    • /
    • pp.317-322
    • /
    • 2015
  • The metal oxide varistor (MOV) is a major component of the surge protection devices (SPDs) currently in use. The device is judged to be faulty when fatigue caused by the continuous inflow of lightning accumulates and reaches the damage limit. In many cases, induced lightning resulting from lightning strikes flows in to the device several times per second in succession. Therefore, the frequency or the rate at which the SPD is actually exposed to stress, called a surge, is outside the range of human perception. For this reason, the protective device should be replaced if it actually approaches the end of its life even though it is not faulty at present, currently no basis exists for making the judgment of remaining lifetime. Up to now, the life of an MOV has been predicted solely based on the number of inflow surges, irrespective of the magnitude of the surge current or the amount of energy that has flowed through the device. In this study, nonlinear data that shows the damage to an MOV depending on the count of surge and the amount of input current were collected through a high-voltage test. Then, a failure prediction algorithm was proposed by preparing a look-up table using the results of the test. The proposed method was experimentally verified using an impulse surge generator

Regrasp Planner Using Look-up Table (참조표를 이용한 재파지 계획기)

  • Jo, Gyeong-Rae;Lee, Jong-Won;Kim, Mun-Sang;Song, Jae-Bok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.24 no.4 s.175
    • /
    • pp.848-857
    • /
    • 2000
  • A pick-and-place operation in 3-dimensional environment is basic operation for human and multi-purpose manipulators. However, there may be a difficult problem for such manipulators. Especially, if the object cannot be moved with a single grasp, regrasping, which can be a time-consuming process, should be carried out. Regrasping, given initial and final pose of the target object, is a construction of sequential transition of object poses that are compatible with two poses in the point of grasp configuration. This paper presents a novel approach for solving regrasp problem. The approach consists of a preprocessing and a planning stage. Preprocessing, which is done only once for a given robot, generates a look-up table which has information of kinematically feasible task space of end-effector through all the workspace. Then, using the table planning automatically determines possible intermediate location, pose and regrasp sequence leading from the pick-up to put-down grasp. Experiments show that the presented is complete in the total workspace. The regrasp planner was combined with existing path.

Application of the New Calibration Algorithm of a Straight-Type Five-Hole Pressure Probe (직선형 5공 압력프로브의 새로운 교정 알고리듬 적용)

  • Kim, Jang-Kweon;Oh, Seok-Hyung
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.32 no.11
    • /
    • pp.863-869
    • /
    • 2008
  • This paper investigated the new calibration algorithm of a straight-type five-hole pressure probe for measuring three-dimensional flow velocity components. This new calibration algorithm was used for velocity data reduction from the calibration map and based on the combination of a look-up, a binary search algorithm and a geometry transformation including the translation and reflection of nodes in a calibration map. The calibration map was expanded up to the application angle, ${\pm}55^{\circ}$ of a probe. This velocity data reduction method showed a perfect performance without any kind of interpolating errors in calculating yaw and pitch angles from the calibration map. Moreover, when it was applied to an actual flow field including a swirling flow, a good result came out on the whole.

Look-Up Table Based Implementations of SHA-3 Finalists: JH, Keccak and Skein

  • Latif, Kashif;Aziz, Arshad;Mahboob, Athar
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.6 no.9
    • /
    • pp.2388-2404
    • /
    • 2012
  • Cryptographic hash functions are widely used in many information security applications like digital signatures, message authentication codes (MACs), and other forms of authentication. In response to recent advances in cryptanalysis of commonly used hash algorithms, National Institute of Standards and Technology (NIST) announced a publicly open competition for selection of new standard Secure Hash Algorithm called SHA-3. One important aspect of this competition is evaluation of hardware performances of the candidates. In this work we present efficient hardware implementations of SHA-3 finalists: JH, Keccak and Skein. We propose high speed architectures using Look-Up Table (LUT) resources on FPGAs, to minimize chip area and to reduce critical path lengths. This approach allows us to design data paths of SHA-3 finalists with minimum resources and higher clock frequencies. We implemented and investigated the performance of these candidates on modern and latest FPGA devices from Xilinx. This work serves as performance investigation of leading SHA-3 finalists on most up-to-date FPGAs.

A Study on Real-Time Loudness Metering Algorithm for Digital Broadcasting (디지털 방송용 오디오 레벨 계측 알고리즘의 실시간화 연구)

  • Park Seong-Gyoon
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.4 s.95
    • /
    • pp.427-437
    • /
    • 2005
  • In this paper, the perceived audio level metering algorithm of digital audio sound to be able to operate in real-time is proposed. Through analyzing a conventional recommendation ITU-RBS1387-I for objective audio quality analysis, FFT-based loudness metering algorithm is implemented and the real-time method of that algorithm was advised and proved. The proposed method is based on look-up table. In order to prove the proved method, using 23 pure tones and 30 preselected digital audio samples, its performance and operation time is evaluated. Its performance, compared with an original algorithm's, have a good figure of less than $2\;\%$ error even if look-up table related with spectral spreading have large level resolution of $10\;\cal{dB}$. The proposed algorithm take only 1/21 of original algorithm's measuring time. Also, in the proposed algorithm auditory pitch group energy calculation take 1/450 of original algorithm's and excitation calculation take 1/3.57. In conclusion, the proposed algorithm is expected to be implemented into DSP-based real-time loudness meter.

A Study on the Effective Design for Figure of Middle Aged Women (중년여성의 체형에 적합한 의복형태와 면분할 및 배치 방안에 관한 연구)

  • 김옥진
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.21 no.7
    • /
    • pp.1173-1183
    • /
    • 1997
  • In order to flatter the figures of average middle aged women by determining harmonious proportions for their costume forms, this study evaluates effects of varying design details of jackets(coats) with blouses and slacks using a ranking test and paired comparisons test. The result from clothing design C-2 which has the best design effect were as follows; 1. In order to look taller, the jacket(coats) is divided vertical long line and it has the emphasis point close to the face. 2. In order to make shoulder width look wider, armhole seam line attached 1-2 cm from the shoulder point. 3. In order to make chest width look slimmer, division was made up of a tailored collar with a deep V-neckline. 4. In order to make waist circumference look slimmer, the jacket has more fitted waist line than loosed it and tailored collar with a deep V-neckline. 5. In the case of the division of upper and lower garments, when the division was closer to the golden section, i.e., when the jacket hemline is hipline and slacks length is the heel excluded length of shoe heels, the overall appearance was better. 6. The V-neckline looked better, when it was cut along a long acute angle to the waist line. Because of dividing along above factors 1-6 i.e., clothing design C-2 was overall harmonious. Appropriate division of costume forms made for an aesthetic composition, which flattered the body types of middle aged women and presented harmonious, beautiful costume design effects. It made the women look taller, slim and balanced, and highlighted middle aged women's sense of beauty.

  • PDF

A Scalable Word-based RSA Cryptoprocessor with PCI Interface Using Pseudo Carry Look-ahead Adder (가상 캐리 예측 덧셈기와 PCI 인터페이스를 갖는 분할형 워드 기반 RSA 암호 칩의 설계)

  • Gwon, Taek-Won;Choe, Jun-Rim
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.8
    • /
    • pp.34-41
    • /
    • 2002
  • This paper describes a scalable implementation method of a word-based RSA cryptoprocessor using pseudo carry look-ahead adder The basic organization of the modular multiplier consists of two layers of carry-save adders (CSA) and a reduced carry generation and Propagation scheme called the pseudo carry look-ahead adder for the high-speed final addition. The proposed modular multiplier does not need complicated shift and alignment blocks to generate the next word at each clock cycle. Therefore, the proposed architecture reduces the hardware resources and speeds up the modular computation. We implemented a single-chip 1024-bit RSA cryptoprocessor based on the word-based modular multiplier with 256 datapaths in 0.5${\mu}{\textrm}{m}$ SOG technology after verifying the proposed architectures using FPGA with PCI bus.

Collaborative Governance in Philippine Science and Technology Parks: A closer look at the UP - Ayala Land Technohub

  • Sale, Jonathan P.
    • World Technopolis Review
    • /
    • v.4 no.1
    • /
    • pp.23-32
    • /
    • 2015
  • Public-private partnerships (PPPs) are very popular governance practices, as they enable the private partner to engage in business and have profits while the public partner improves the provision of public services. PPPs are organizational arrangements with a sector-crossing or sector-blurring nature, and are modes of governance - governance by partnerships or collaborative governance (Schuppert 2011). New models and applications of PPPs have been developed over time. Collaborative governance entails information exchange, action or movement harmonization, resource sharing, and capacity enhancement among the partners (Sale 2011; 2012a). As the national university, the University of the Philippines (UP) serves as a research university in various fields of expertise and specialization by conducting basic and applied research and development, and promoting research in various colleges and universities, and contributing to the dissemination and application of knowledge, among other purposes. (Republic Act 9500) It is the site of two (2) science and technology parks (Sale 2012b), one of which is the UP - Ayala Land Technohub. A collaboration between industry and the academe, the Technohub is envisioned as an integrated community of science and technology companies building a dynamic learning and entrepreneurial laboratory (UP-AyalaLand Technohub). This paper takes a closer look at the UP - Ayala Land Technohub as an example of a PPP or collaborative governance in science and technology parks. Have information exchange, action or movement harmonization, resource sharing, and capacity enhancement taken place in the Technohub? What are some significant outcomes of, and issues arising from, the PPP? What assessment indicators may be used? Is a governance instrument needed?