• Title/Summary/Keyword: binary number

Search Result 773, Processing Time 0.031 seconds

Digital Watermarking using Bit Concealment in Wavelet Transform Domain (웨이브렛 영역에서의 비트 은닉을 이용한 디지털워터마킹)

  • Sung, Kwang-Jin;Kim, Min-Tae;Lee, Jong-Hyuck;Jee, Inn-Ho;Ahn, Hong-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.8 no.2
    • /
    • pp.1-8
    • /
    • 2008
  • The object of watermarking is to prevent from copying and distributing without the copyright or right of ownership. In case of using watermark as an image data we can detect watermark whether an original image exists or not. In this paper, we proposed that an image data is used for watermark and the watermark is detected without an original image. After the original image is transformed with DWT and the watermark is transformed with DCT, they are transformed with binary number. We calculate an optimal bit position for concealing watermark of an original binary image and insert the watermark and determine the best position for robustness against JPEG compression, filtering, and resampling attacks within inserted watermark image. In this paper, we are able to confirm the right of copyright and ownership easily while using invisible watermark and also we can detect a watermark without an original image.

  • PDF

An Efficient Test Method for a Full-Custom Design of a High-Speed Binary Multiplier (풀커스텀 (full-custom) 고속 곱셈기 회로의 효율적인 테스트 방안)

  • Moon, San-Gook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.830-833
    • /
    • 2007
  • In this paper, we implemented a $17{\times}17b$ binary digital multiplier using radix-4 Booth;s algorithmand proposed an efficient testing methodology for the full-custom design. A two-stage pipeline architecture was applied to achieve higher throughput and 4:2 adders were used for regular layout structure in the Wallace tree partition. Several chips were fabricated using LG Semicon 0.6-um 3-Metal N-well CMOS technology. We did fault simulations efficiently using the proposed test method resulting in the reduction of the number of faulty nodes by 88%. The chip contains 9115 transistors and the core area occupies $1135^*1545$ mm2. The functional tests using ATS-2 tester showed that it can operate with 24 MHz clock at 5.0 V at room temperature.

  • PDF

A Parallel Match Method for Path-oriented Query Processing in iW- Databases (XML 데이타베이스에서 경로-지향 질의처리를 위한 병렬 매치 방법)

  • Park Hee-Sook;Cho Woo-Hyun
    • Journal of KIISE:Databases
    • /
    • v.32 no.5
    • /
    • pp.558-566
    • /
    • 2005
  • The XML is the new standard fir data representation and exchange on the Internet. In this paper, we describe a new approach for evaluating a path-oriented query against XML document. In our approach, we propose the Parallel Match Indexing Fabric to speed up evaluation of path-oriented query using path signature and design the parallel match algorithm to perform a match process between a path signature of input query and path signatures of elements stored in the database. To construct a structure of the parallel match indexing, we first make the binary tie for all path signatures on an XML document and then which trie is transformed to the Parallel Match Indexing Fabric. Also we use the Parallel Match Indexing Fabric and a parallel match algorithm for executing a search operation of a path-oriented query. In our proposed approach, Time complexity of the algorithm is proportional to the logarithm of the number of path signatures in the XML document.

Amplitude and Phase Variant SLM Scheme for PAPR Reduction in QAM Modulated OFDM Signals (직교 주파수 분할 다중화 신호의 최대전력 대 평균전력의 비 감소를 위한 크기 및 위상 변이 선택 사상 기법)

  • Jeon, Hyun-Bae;Kim, Ki-Hoon;No, Jong-Seon;Shin, Dong-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.2C
    • /
    • pp.203-209
    • /
    • 2010
  • In this paper, we propose a new selected mapping (SLM) scheme for reducing peak to average power ratio (PAPR) of orthogonal frequency division multiplexing (OFDM) signals modulated with quadrature amplitude modulation (QAM), called amplitude and phase variant SLM (APSLM). Contrary to the conventional SLM which rotates the phases of QAM symbols in the frequency domain, the proposed scheme changes the magnitudes as well as the phases of QAM symbols by applying binary sequences to the binary data sequence before mapped to QAM symbols. Simulation results show that the proposed scheme has better PAPR reduction performance than the conventional SLM scheme for the QAM modulated OFDM signals, especially for the small number of subcarriers.

The Condensation Pressure Drop of Alternative Refrigerants for R-22 in Small Diameter Tubes (세관내 R-22 대체냉매의 응축압력강항에 관한 연구)

  • O, Hu-Gyu;Son, Chang-Hyo;Choe, Yeong-Seok;Kim, Gi-Su
    • Transactions of the Korean Society of Mechanical Engineers B
    • /
    • v.25 no.9
    • /
    • pp.1245-1252
    • /
    • 2001
  • The condensation pressure drop for pure refrigerants R-22, R-134a, and a binary refrigerant mixture R-410A flowing in a small diameter tube was investigated. The test section is a counterflow heat exchanger with refrigerant flowing in the inner tube and coolant flowing in the annulus. The test section consists of 1220 [mm] length with horizontal copper tube of 3.38 [mm] outer diameter and 1.77 [mm] inner diameter. The refrigerant mass fluxes ranged from 450 to 1050 [kg/(㎡$.$s)] and the average inlet and outlet qualities were 0.05 and 0.95, respectively. The main experimental results were summarized as follows : In the case of single-phase flow, the pressure drop of R-134a is much higher than that of R-22 and R-410A for the same Reynolds number. The friction factors for small diameter tubes are higher than those predicted by Blasius equation. In the case of two-phase flow, the pressure drop increases with increasing mass flux and decreasing quality. The pressure drop of R-134a is much higher than that of R-22 and R-410A for the same mass flux. Most of correlations proposed in the large diameter tube showed enormous deviations with experimental data. However, the correlation predicted by Honda et al showed relatively good agreement with experimental data for R-134.

Real-time Classification of Internet Application Traffic using a Hierarchical Multi-class SVM

  • Yu, Jae-Hak;Lee, Han-Sung;Im, Young-Hee;Kim, Myung-Sup;Park, Dai-Hee
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.4 no.5
    • /
    • pp.859-876
    • /
    • 2010
  • In this paper, we propose a hierarchical application traffic classification system as an alternative means to overcome the limitations of the port number and payload based methodologies, which are traditionally considered traffic classification methods. The proposed system is a new classification model that hierarchically combines a binary classifier SVM and Support Vector Data Descriptions (SVDDs). The proposed system selects an optimal attribute subset from the bi-directional traffic flows generated by our traffic analysis system (KU-MON) that enables real-time collection and analysis of campus traffic. The system is composed of three layers: The first layer is a binary classifier SVM that performs rapid classification between P2P and non-P2P traffic. The second layer classifies P2P traffic into file-sharing, messenger and TV, based on three SVDDs. The third layer performs specialized classification of all individual application traffic types. Since the proposed system enables both coarse- and fine-grained classification, it can guarantee efficient resource management, such as a stable network environment, seamless bandwidth guarantee and appropriate QoS. Moreover, even when a new application emerges, it can be easily adapted for incremental updating and scaling. Only additional training for the new part of the application traffic is needed instead of retraining the entire system. The performance of the proposed system is validated via experiments which confirm that its recall and precision measures are satisfactory.

An Analysis of Mastering Concept and Connection with Operations in Natural Number and Fraction in Elementary School Mathematics (초등 수학에서 자연수와 분수의 사칙연산에 대한 개념 익히기 및 연산 사이의 연결 분석)

  • Roh, Eun Hwan;Jeong, Sang Tae;Kim, Min Jeong
    • Journal of Elementary Mathematics Education in Korea
    • /
    • v.19 no.4
    • /
    • pp.563-588
    • /
    • 2015
  • In elementary school, didactical transposition is inevitable due to several reasons. In mathematics, addition and multiplication are taught as binary operations, subtraction and division are taught as unary operations. But in elementary school, we try to teach all the four operations as binary operations by didactical transposition. In 'Mastering' the concepts of the four operations, the way of concept introduction is dealt importantantly. So it is different from understanding the four operations. In this study, we analyzed the four operations of natural numbers and fractions from two perspectives: concept understanding (how to introduce concepts and how to choose an operation) and connection between the operations. As a result, following implications were obtained. In division of fractions, students attempted a connection with multiplication of fractions right away without choosing an operation, based on the situation. Also, to understand division of fractions itself, integrate division of fractions presented from the second semester of the fifth grade to the first semester of the sixth grade are needed. In addition, this result can be useful in the future textbook development.

An Improved Backoff Algorithm for the Random Access Protocol for the Ranging Subchannel of IEEE 802.16 Networks (IEEE 802.16 환경의 레인징 부채널에서 랜덤액세스 프로토콜의 Backoff 알고리즘 성능 향상 기법)

  • Kwon, Jeong-Min;Lee, Hyong-Woo;Cho, Choong-Ho
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.12A
    • /
    • pp.1267-1275
    • /
    • 2007
  • An improved backoff algorithm for retransmission randomization for OFDMA/CDMA/slotted ALOHA used in the ranging subchannel of IEEE 802.16 network is proposed. Exploiting the fact that a base station coordinates channel access using UL-/DL-MAP in the IEEE 802.16 networks, we propose a minor modification of the existing IEEE 802.16 in order to increase throughput, decrease delay variation and achieve a graceful performance degradation in case of overload channel condition of the random access protocol. The algorithm basically estimates the number of backlogged users and arrival rate using which, the BS calculates retransmission probability for the subscriber stations involved in a collision. Computer simulation is performed to demonstrate the effectiveness of the proposed algorithm and to compare the performance with existing binary exponential backoff algorithm.

Color Image Segmentation for Region-Based Image Retrieval (영역기반 이미지 검색을 위한 칼라 이미지 세그멘테이션)

  • Whang, Whan-Kyu
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.1
    • /
    • pp.11-24
    • /
    • 2008
  • Region-based image retrieval techniques, which divide image into similar regions having similar characteristics and examine similarities among divided regions, were proposed to support an efficient low-dimensional color indexing scheme. However, color image segmentation techniques are required additionally. The problem of segmentation is difficult because of a large variety of color and texture. It is known to be difficult to identify image regions containing the same color-texture pattern in natural scenes. In this paper we propose an automatic color image segmentation algorithm. The colors in each image are first quantized to reduce the number of colors. The gray level of image representing the outline edge of image is constructed in terms of Fisher's multi-class linear discriminant on quantized images. The gray level of image is transformed into a binary edge image. The edge showing the outline of the binary edge image links to the nearest edge if disconnected. Finally, the final segmentation image is obtained by merging similar regions. In this paper we design and implement a region-based image retrieval system using the proposed segmentation. A variety of experiments show that the proposed segmentation scheme provides good segmentation results on a variety of images.

Study of Static Analysis and Ensemble-Based Linux Malware Classification (정적 분석과 앙상블 기반의 리눅스 악성코드 분류 연구)

  • Hwang, Jun-ho;Lee, Tae-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.6
    • /
    • pp.1327-1337
    • /
    • 2019
  • With the growth of the IoT market, malware security threats are steadily increasing for devices that use the linux architecture. However, except for the major malware causing serious security damage such as Mirai, there is no related technology or research of security community about linux malware. In addition, the diversity of devices, vendors, and architectures in the IoT environment is further intensifying, and the difficulty in handling linux malware is also increasing. Therefore, in this paper, we propose an analysis system based on ELF which is the main format of linux architecture, and a binary based analysis system considering IoT environment. The ELF-based analysis system can be pre-classified for a large number of malicious codes at a relatively high speed and a relatively low-speed binary-based analysis system can classify all the data that are not preprocessed. These two processes are supposed to complement each other and effectively classify linux-based malware.