• Title/Summary/Keyword: Operation Scheme

Search Result 1,984, Processing Time 0.035 seconds

A novel Reversible Data Hiding Scheme based on Modulo Operation and Histogram Shifting (모듈러 연산과 히스토그램 이동에 기반한 새로운 가역 정보 은닉 기법)

  • Kim, Dae-Soo;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.15 no.5
    • /
    • pp.639-650
    • /
    • 2012
  • In 2009, Tsai et al. proposed reversible image hiding scheme using linear prediction coding and histogram shifting. Tsai et al.'s scheme improved the hiding capacity of Ni et al.'s scheme by using the prediction coding and two histograms. However, Tsai et al.'s scheme has problems. In the prediction coding, the basic pixel is not used from embedding procedure. Many additional communication data are generated because two peak and zero point pairs are generated by each block. To solve the problems, this paper proposes a novel reversible data hiding scheme based on modulo operation and histogram shifting. In experimental results, the hiding capacity was increased by 28% than Tsai et al.'s scheme. However, the additional communication data was decreased by 71%.

Railroad Travel Demand Estimation System Suggestion (철도수송수요 예측시스템 제안)

  • Min, Jae-Hong
    • Proceedings of the KSR Conference
    • /
    • 2003.10b
    • /
    • pp.3-7
    • /
    • 2003
  • It is very difficult to find optimal train operation plan when analyzing the economic investment using traditional railroad travel demand estimation method. Train operation plan depends on travel demand and vice versa. To solve this problem, this study suggests a demand estimation method to address an optimal train operation scheme with the modal spilt using initial train operation plan and trip assignment.

  • PDF

Analysis of Operation Areas for Automatically Tuning Burst Size-based Loss Differentiation Scheme Suitable for Transferring High Resolution Medical Data (고해상도 의학 데이터 전송에 적합한 자동 제어 버스트 크기 기반 손실 차등화 기법을 위한 동작 영역 분석)

  • Lee, Yonggyu
    • Journal of Digital Convergence
    • /
    • v.20 no.4
    • /
    • pp.459-468
    • /
    • 2022
  • In medical area, very high resolution images, which is loss sensitive data, are used. Therefore, the use of optical internet with high bandwidth and the transmission of high realiability is required. However, according to the nature of the Internet, various data use the same bandwidth and a new scheme is needed to differentiate effectively these data. In order to achieve the differentiation, optical delay line buffers are used. However, these buffers is constructed based on some optimal values such as the average offered load, measured data burst length, and basic delay unit. Once the buffers are installed, they are impossible to reinstall new buffers. So, the scheme changing burst length dynamically was considered. However, this method is highly unstable. Therefore, in this article, in order to guarantee the stable operation of the scheme, the analysis of operation conditions is performed. With the analysis together with the scheme, high resolution medical data with the higher class can transmit stably without loss.

Dead Block-Aware Adaptive Write Scheme for MLC STT-MRAM Caches

  • Hong, Seokin
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.1-9
    • /
    • 2020
  • In this paper, we propose an efficient adaptive write scheme that improves the performance of write operation in MLC STT-MRAM caches. The key idea of the proposed scheme is to perform the write operation fast if the target MLC STT-MRAM cells contain a dead block. Even if the fast write operation on the MLC STT-MRAM evicts a cache block from the MLC STT-MRAM cells, its performance impact is low if the evicted block is a dead block which is not used in the future. Through experimental evaluation with a memory simulator, we show that the proposed adaptive write scheme improves the performance of the MLC STT-MRAM caches by 17% on average.

RawPEACH: Multiband CSMA/CA-Based Cognitive Radio Networks

  • Chong, Jo-Woon;Sung, Young-Chul;Sung, Dan-Keun
    • Journal of Communications and Networks
    • /
    • v.11 no.2
    • /
    • pp.175-186
    • /
    • 2009
  • A new medium access control (MAC) scheme embedding physical channels into multiband carrier sense multiple access/collision avoidance (CSMA/CA) networks is proposed to provide strict quality of service (QoS) guarantee to high priority users. In the proposed scheme, two priority classes of users, primary and secondary users, are supported. For primary users physical channels are provided to ensure strict QoS, whereas secondary users are provided with best-effort service using CSMA/CA modified for multiband operation. The performance of the proposed MAC scheme is investigated using a new multiband CSMA/CA Markov chain model capturing the primary user activity and the operation of secondary users in multiple bands. The throughput of secondary users is obtained as a function of the primary user activity and other CSMA/CA parameters. It is shown that the new MAC scheme yields larger throughput than the conventional single-band CSMA/CA when both schemes use the same bandwidth.

Secret Image Sharing Scheme using Matrix Decomposition and Adversary Structure (행렬 분해와 공격자 구조를 이용한 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.17 no.8
    • /
    • pp.953-960
    • /
    • 2014
  • In Shamir's (t,n)-threshold based secret image sharing schemes, there exists a problem that the secret image can be reconstructed when an arbitrary attacker becomes aware of t secret image pieces, or t participants are malicious collusion. It is because that utilizes linear combination polynomial arithmetic operation. In order to overcome the problem, we propose a secret image sharing scheme using matrix decomposition and adversary structure. In the proposed scheme, there is no reconstruction of the secret image even when an arbitrary attacker become aware of t secret image pieces. Also, we utilize a simple matrix decomposition operation in order to improve the security of the secret image. In experiments, we show that performances of embedding capacity and image distortion ratio of the proposed scheme are superior to previous schemes.

A design of floating-point multiplier for superscalar microprocessor (수퍼스칼라 마이크로프로세서용 부동 소수점 승산기의 설계)

  • 최병윤;이문기
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.21 no.5
    • /
    • pp.1332-1344
    • /
    • 1996
  • This paper presents a pipelined floating point multiplier(FMUL) for superscalar microprocessors that conbines radix-16 recoding scheme based on signed-digit(SD) number system and new rouding and normalization scheme. The new rounding and normalization scheme enable the FMUL to compute sticky bit in parallel with multiple operation and elminate timing delay due to post-normalization. By expoliting SD radix-16 recoding scheme, we can achieves further reduction of silicon area and computation time. The FMUL can execute signle-precision or double-precision floating-point multiply operation through three-stage pipelined datapath and support IEEE standard 754. The algorithm andstructure of the designed multiplier have been successfully verified through Verilog HOL modeling and simulation.

  • PDF

Detection for Operation Chain: Histogram Equalization and Dither-like Operation

  • Chen, Zhipeng;Zhao, Yao;Ni, Rongrong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.9
    • /
    • pp.3751-3770
    • /
    • 2015
  • Many sorts of image processing software facilitate image editing and also generate a great number of doctored images. Forensic technology emerges to detect the unintentional or malicious image operations. Most of forensic methods focus on the detection of single operations. However, a series of operations may be used to sequentially manipulate an image, which makes the operation detection problem complex. Forensic investigators always want to know as much exhaustive information about a suspicious image's entire processing history as possible. The detection of the operation chain, consisting of a series of operations, is a significant and challenging problem in the research field of forensics. In this paper, based on the histogram distribution uniformity of a manipulated image, we propose an operation chain detection scheme to identify histogram equalization (HE) followed by the dither-like operation (DLO). Two histogram features and a local spatial feature are utilized to further determine which DLO may have been applied. Both theoretical analysis and experimental results verify the effectiveness of our proposed scheme for both global and local scenarios.

A Study on Recalculation of the Long-Term Recycling Rate of New EPR Target Items (EPR 신규 대상품목의 장기 재활용목표율 재산정에 관한 연구)

  • Lee, Hee-Nahm;Choi, Yoon-Jeong
    • Journal of the Korea Safety Management & Science
    • /
    • v.13 no.4
    • /
    • pp.193-199
    • /
    • 2011
  • In the past annual recycling obligation rate calculation of Extended Producer Responsibility (EPR) system, it was difficult to operate the system efficiently, because responsible producers passively participated in the scheme only bent on achieving annual obligation without long-term plan. Thus, a new scheme of long-term recycling obligation rate began to be established every five year from 2008 in order to give the basis for the notice of annual specific operation standard and recycling obligation, thereby helping responsible producers to make a preparation with a plan and giving expectation of active operation of the scheme. However, in the operation of long-term recycling target program, while the development of prediction models and the evaluation for existing items has been conducted in various ways, applications for a new target items and the evaluation are quite insufficient. Therefore, in this study, problems in implementing long-term recycling goal of new target items will be examined, and more objective and rational long-term recycling rate calculation and the operation standard will be proposed. Thus, the long-term recycling target will play a role as a pacemaker to steadily improve the recycling performance of target items, and responsible producers will be expected to increase the achievement with the realistic capacity.

Transition Control of Standby and Operation Modes of Wireless Charging System for Inspection Robots

  • Liu, Han;Tan, Linlin;Huang, Xueliang;Czarkowski, Dariusz
    • Journal of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.691-701
    • /
    • 2019
  • To solve the problems in the contact charging of inspection robots, a wireless charging system for inspection robots and a control strategy are introduced in this paper. Circuit models of a wireless power system with a compound compensation circuit and a three-phase Class-D resonant inverter are set up based on circuit theory. An output voltage control method based on the equal spread regulation of the phase difference between adjacent phases and the parameter correction method in the primary compound compensation circuit are proposed. The dynamic characteristics of the key parameters varying with the secondary coil position are obtained to further investigate the adaptive location scheme during the access and exit processes of moving robots. Combining the output voltage control method and the adaptive location scheme, a transition control strategy for the standby and operation modes of the wireless charging systems for inspection robots is put forward to realize the system characteristics including the low standby power in the standby mode and the high receiving power in the operation mode. Finally, experiments are designed and conducted to verify the correctness of the theoretical research.