• Title/Summary/Keyword: Transform Domain

Search Result 1,210, Processing Time 0.03 seconds

Single Path Phase-only Security System using Phase-encoded XOR Operations in Fourier Plane (푸리에 영역에서의 위상 변조 Exclusive-OR 연산을 이용한 단일 경로 위상 암호화 시스템)

  • Shin, Chang-Mok;Cho, Kyu-Bo;Kim, Soo-Joong;Noh, Duck-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.16 no.4
    • /
    • pp.326-333
    • /
    • 2005
  • Phase-only encryption scheme using exclusive-OR rules in Fourier plane and a single path decryption system are presented. A zero-padded original image, multiplied by a random phase image, is Fourier transformed and its real-valued data is encrypted with key data by using XOR rules. A decryption is simply performed based on 2-1 setup with spatial filter by Fourier transform for multiplying phase-only encrypted data by phase-only key data, which are obtained by phase-encoding process, and spatial filtering for zero-order elimination in inverse-Fourier plane. Since the encryption process is peformed in Fourier plane, proposed encryption scheme is more tolerant to loss of key information by scratching or cutting than previous XOR encryption method in space domain. Compare with previous phase-visualization systems, due to the simple architecture without a reference wave, our system is basically robust to mechanical vibrations and fluctuations. Numerical simulations have confirmed the proposed technique as high-level encryption and simple decryption architecture.

Impact of Group Delay in RF BPF on Impulse Radio Systems (임펄스 라디오 시스템에서 RF 대역 통과 필터의 군지연 영향 분석)

  • Myoung Seong-Sik;Kwon Bong-Su;Kim Young-Hwan;Yook Jong-Gwan
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.16 no.4 s.95
    • /
    • pp.380-388
    • /
    • 2005
  • This paper presents analysis results of the effects of RF filter characteristics on the system performance of impulse radio. The impulse radio system transmits modulated pulses having very short time duration and information can be extracted in receiver side based on cross-correlation between received and transmitted pulses. Accordingly, the pulse distortion due to in-band group delay variation can cause serious system performance degradation. In general, RF bandpass filters inevitably cause group delay difference to the signal passing through the filter which is proportional to its skirt characteristic due to its resonance phenomenon. For time as well as frequency domain analysis, small signal scattering parameter $S_{21}$ and its Fourier transform are used to characterize output pulse waveform under the condition that the input and output ports are matched. The output pulse waveform of the filter is predicted based on convolution integral between input pulse and filter transfer function, and resulting BER performances in the BPM and PPM based impulse radio system are calculated.

A Study on Estimation of a Beat Spectrum in a FMCW Radar (FMCW 레이다에서의 비트 스펙트럼 추정에 관한 연구)

  • Lee, Jong-Gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.13 no.12
    • /
    • pp.2511-2517
    • /
    • 2009
  • Recently, a FMCW radar is used for the various purposes in the short range detection and tracking of targets. The main advantages of a FMCWradar are the comparative simplicity of implementation and the low peak power transmission characterizing the very low probability of signal interception. Since it uses the frequency modulated continuous wave for transmission and demodulation, the received beat frequency represents the range and Doppler information of targets. Detection and extraction of useful information from targets are performed in this beat frequency domain. Therefore, the resolution and accuracy in the estimation of a beat spectrum are very important. However, using the conventional FFT estimation method, the high resolution spectrum estimation with a low sidelobe level is not possible if the acquisition time is very short in receiving target echoes. This kind of problems deteriorates the detection performance of adjacent targets having the large magnitude differences in return echoes and also degrades the reliability of the extracted information. Therefore, in this paper, the model parameter estimation methods such as autoregressive and eigenvector spectrum estimation are applied to mitigate these problems. Also, simulation results are compared and analyzed for further improvement.

Design of Multiple-symbol Lookup Table for Fast Thumbnail Generation in Compressed Domain (압축영역에서 빠른 축소 영상 추출을 위한 다중부호 룩업테이블 설계)

  • Yoon, Ja-Cheon;Sull, Sanghoon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.413-421
    • /
    • 2005
  • As the population of HDTV is growing, among many useful features of modern set top boxes (STBs) or digital video recorders (DVRs), video browsing, visual bookmark, and picture-in-picture capabilities are very frequently required. These features typically employ reduced-size versions of video frames, or thumbnail images. Most thumbnail generation approaches generate DC images directly from a compressed video stream. A discrete cosine transform (DCT) coefficient for which the frequency is zero in both dimensions in a compressed block is called a DC coefficient and is simply used to construct a DC image. If a block has been encoded with field DCT, a few AC coefficients are needed to generate the DC image in addition to a DC coefficient. However, the bit length of a codeword coded with variable length coding (VLC) cannot be determined until the previous VLC codeword has been decoded, thus it is required that all codewords should be fully decoded regardless of their necessary for DC image generation. In this paper, we propose a method especially for fast DC image generation from an I-frame using multiple-symbol lookup table (mLUT). The experimental results show that the method using the mLUT improves the performance greatly by reducing LUT count by 50$\%$.

Between Regime Change and Political Development: Myanmar's Defective Democracy and the Task for the Political Development (체제 전환과 정치발전의 사이에서: 미얀마의 결손민주주의와 정치발전의 과제)

  • JANG, Junyoung
    • The Southeast Asian review
    • /
    • v.28 no.4
    • /
    • pp.161-196
    • /
    • 2018
  • The major object of this study is to analyze the political development of Myanmar's civilian government on the concept of defective democracy, and to investigate the main actors who delayed or stymied political development and their interrelation. In doing so, this study suggests the tasks required for political development overcoming the current political structure and behavior. The civilian government, which was launched in 2016, failed to achieve positive political development by following the behavior of military authoritarianism in terms of exercise of power and decision making structure. On the perspective of the government, delegative democracy and domain democracy have been strengthening since one person has taken over all political power and hesitate to take horizontal accountability for each power organizations. The military, which is responsible for national defence and security seeks illiberal democracy and exclusive democracy, keeping on an undemocratic constitution by the military and Burman ethnocentrism. The reasons why defective democracy has been occurred are that the lack of a group to run a democratic institutions and the limitation of power structure that fails to adhere to the principle of civilian control to the military due to long-term military rule. Therefore, there is a need for military's come back to barracks and transform the power structure to democratic of the civilian government which is tamed an authoritarian order for the political development in Myanmar. In order to achieve this, this study concludes that setting up a empowered democratic government is required.

Natural Frequency Measurement for Scour Damage Assessment of Caisson Pier (교량 우물통 기초의 세굴피해 평가를 위한 고유진동수 측정)

  • Nguyen, Quang-Thien-Buu;Ko, Seok-Jun;Jung, Gyungja;Lee, Ju-Hyung;Yoo, Min-Taek;Kim, Sung-Ryul
    • Journal of the Korean Geotechnical Society
    • /
    • v.37 no.11
    • /
    • pp.51-60
    • /
    • 2021
  • River scour erodes the soil around the pier, reducing the lateral bearing capacity of the pier and lowering the stability of the structure. In this study, in order to examine the effect of scouring on the stability of the structure, an experiment was performed to measure the natural frequency of the pier according to the excavation of the surrounding ground. Impact vibration test was conducted on the pier with the caisson foundation of the Mangyeonggang Bridge, which is scheduled to be demolished. Accelerometers were attached to the top, center, and bottom of the pier and the acceleration responses were measured by hitting those three points. The experimental results showed that the top hit showed consistent and reasonable results of the acceleration responses according to the hitting position. The measured accelerations were converted to the frequency domain through Fast Fourier Transform (FFT), and then the natural frequency was determined. In addition, to analyze the scour effect on the natural frequency of the pier, the ground around the pier was excavated and the natural frequency change was analyzed. As a result, the natural frequency showed the decreasing tendency according to the excavation depth, but the decrease was small due to the large stiffness of the caisson foundation.

Discovery of a Novel Cellobiose Dehydrogenase from Cellulomonas palmilytica EW123 and Its Sugar Acids Production

  • Ake-kavitch Siriatcharanon;Sawannee Sutheeworapong;Sirilak Baramee;Rattiya Waeonukul;Patthra Pason;Akihiko Kosugi;Ayaka Uke;Khanok Ratanakhanokchai;Chakrit Tachaapaikoon
    • Journal of Microbiology and Biotechnology
    • /
    • v.34 no.2
    • /
    • pp.457-466
    • /
    • 2024
  • Cellobiose dehydrogenases (CDHs) are a group of enzymes belonging to the hemoflavoenzyme group, which are mostly found in fungi. They play an important role in the production of acid sugar. In this research, CDH annotated from the actinobacterium Cellulomonas palmilytica EW123 (CpCDH) was cloned and characterized. The CpCDH exhibited a domain architecture resembling class-I CDH found in Basidiomycota. The cytochrome c and flavin-containing dehydrogenase domains in CpCDH showed an extra-long evolutionary distance compared to fungal CDH. The amino acid sequence of CpCDH revealed conservative catalytic amino acids and a distinct flavin adenine dinucleotide region specific to CDH, setting it apart from closely related sequences. The physicochemical properties of CpCDH displayed optimal pH conditions similar to those of CDHs but differed in terms of optimal temperature. The CpCDH displayed excellent enzymatic activity at low temperatures (below 30℃), unlike other CDHs. Moreover, CpCDH showed the highest substrate specificity for disaccharides such as cellobiose and lactose, which contain a glucose molecule at the non-reducing end. The catalytic efficiency of CpCDH for cellobiose and lactose were 2.05 × 105 and 9.06 × 104 (M-1 s-1), respectively. The result from the Fourier-transform infrared spectroscopy (FT-IR) spectra confirmed the presence of cellobionic and lactobionic acids as the oxidative products of CpCDH. This study establishes CpCDH as a novel and attractive bacterial CDH, representing the first report of its kind in the Cellulomonas genus.

Integrity evaluation of rock bolt installed in rock slope using sound waves (음파를 이용한 암반사면에 설치된 록볼트의 건전도 평가)

  • Jong-Sub Lee;Jung-Doung Yu
    • Journal of Korean Tunnelling and Underground Space Association
    • /
    • v.26 no.5
    • /
    • pp.385-401
    • /
    • 2024
  • Rock bolts play a crucial role in reinforcing rock slopes. However, a poorly grouted rock bolt occasionally occurs, potentially compromising the stability of a rock slope. The purpose of this study is to evaluate the integrity of a rock bolt using sound waves. In experiments, a total of five rock bolts are prepared, one of which is intact while the other four are poorly grouted. The grouted ratios of four poorly grouted rock bolts are 80%, 70%, 60%, and 50%, respectively, and nongrouted sections are introduced at the upper part of the rock bolts. Rock bolts are installed in a concrete block to simulate rock bolts embedded in a rock slope. Sound waves are generated by impacting the head of the rock bolt and measured using the built-in microphone of a smartphone. Measured sound waves are analyzed in frequency domain through Fourier transform. Results show that the predominant frequency of sound waves decreases as the grouted ratio decreases. This study suggests that the predominant frequency of sound waves can be an effective indicator for evaluating the integrity of the rock bolt.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Prediction of DEA based Efficiency Rating for Venture Business Using Multi-class SVM (다분류 SVM을 이용한 DEA기반 벤처기업 효율성등급 예측모형)

  • Park, Ji-Young;Hong, Tae-Ho
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.139-155
    • /
    • 2009
  • For the last few decades, many studies have tried to explore and unveil venture companies' success factors and unique features in order to identify the sources of such companies' competitive advantages over their rivals. Such venture companies have shown tendency to give high returns for investors generally making the best use of information technology. For this reason, many venture companies are keen on attracting avid investors' attention. Investors generally make their investment decisions by carefully examining the evaluation criteria of the alternatives. To them, credit rating information provided by international rating agencies, such as Standard and Poor's, Moody's and Fitch is crucial source as to such pivotal concerns as companies stability, growth, and risk status. But these types of information are generated only for the companies issuing corporate bonds, not venture companies. Therefore, this study proposes a method for evaluating venture businesses by presenting our recent empirical results using financial data of Korean venture companies listed on KOSDAQ in Korea exchange. In addition, this paper used multi-class SVM for the prediction of DEA-based efficiency rating for venture businesses, which was derived from our proposed method. Our approach sheds light on ways to locate efficient companies generating high level of profits. Above all, in determining effective ways to evaluate a venture firm's efficiency, it is important to understand the major contributing factors of such efficiency. Therefore, this paper is constructed on the basis of following two ideas to classify which companies are more efficient venture companies: i) making DEA based multi-class rating for sample companies and ii) developing multi-class SVM-based efficiency prediction model for classifying all companies. First, the Data Envelopment Analysis(DEA) is a non-parametric multiple input-output efficiency technique that measures the relative efficiency of decision making units(DMUs) using a linear programming based model. It is non-parametric because it requires no assumption on the shape or parameters of the underlying production function. DEA has been already widely applied for evaluating the relative efficiency of DMUs. Recently, a number of DEA based studies have evaluated the efficiency of various types of companies, such as internet companies and venture companies. It has been also applied to corporate credit ratings. In this study we utilized DEA for sorting venture companies by efficiency based ratings. The Support Vector Machine(SVM), on the other hand, is a popular technique for solving data classification problems. In this paper, we employed SVM to classify the efficiency ratings in IT venture companies according to the results of DEA. The SVM method was first developed by Vapnik (1995). As one of many machine learning techniques, SVM is based on a statistical theory. Thus far, the method has shown good performances especially in generalizing capacity in classification tasks, resulting in numerous applications in many areas of business, SVM is basically the algorithm that finds the maximum margin hyperplane, which is the maximum separation between classes. According to this method, support vectors are the closest to the maximum margin hyperplane. If it is impossible to classify, we can use the kernel function. In the case of nonlinear class boundaries, we can transform the inputs into a high-dimensional feature space, This is the original input space and is mapped into a high-dimensional dot-product space. Many studies applied SVM to the prediction of bankruptcy, the forecast a financial time series, and the problem of estimating credit rating, In this study we employed SVM for developing data mining-based efficiency prediction model. We used the Gaussian radial function as a kernel function of SVM. In multi-class SVM, we adopted one-against-one approach between binary classification method and two all-together methods, proposed by Weston and Watkins(1999) and Crammer and Singer(2000), respectively. In this research, we used corporate information of 154 companies listed on KOSDAQ market in Korea exchange. We obtained companies' financial information of 2005 from the KIS(Korea Information Service, Inc.). Using this data, we made multi-class rating with DEA efficiency and built multi-class prediction model based data mining. Among three manners of multi-classification, the hit ratio of the Weston and Watkins method is the best in the test data set. In multi classification problems as efficiency ratings of venture business, it is very useful for investors to know the class with errors, one class difference, when it is difficult to find out the accurate class in the actual market. So we presented accuracy results within 1-class errors, and the Weston and Watkins method showed 85.7% accuracy in our test samples. We conclude that the DEA based multi-class approach in venture business generates more information than the binary classification problem, notwithstanding its efficiency level. We believe this model can help investors in decision making as it provides a reliably tool to evaluate venture companies in the financial domain. For the future research, we perceive the need to enhance such areas as the variable selection process, the parameter selection of kernel function, the generalization, and the sample size of multi-class.