• Title/Summary/Keyword: digital property

Search Result 738, Processing Time 0.024 seconds

The Studies on the Semen Property and Preservation of Korean Jindo Dogs (한국 진도견 정액의 성상 및 보존성에 관한 연구)

  • 박병권;박창식;이성호;박영석
    • Korean Journal of Animal Reproduction
    • /
    • v.21 no.4
    • /
    • pp.405-409
    • /
    • 1997
  • This study was carried out to investigate the general characteristics such as semen volume, pH, sperm motility and sperm concentration of the semen collected from Korean Jindo dogs by the mothod of Digital manipulation of penis, and the effect of temperature and preservation time on motility of fresh semen. Multiple ejaculates were collected from four male Korean Jindo dogs. The results obtained in this experiment were as follows : 1. Average semen volume per ejaculate, semen pH, sperm motility and sperm concentration of the second fraction and the small volume of third fraction from the ejaculate were 3.29ml, 6.30, 96.70% and 1.64$\times$108 cells/ml, respectively. 2. Average semen volume per ejaculate, semen pH, sperm motility and sperm concentration of the first fraction from the ejaculate were 1.16ml, 6.10, 6.67% and 5.07$\times$105cells/ml. Average semen volume per ejaculate, semen pH, sperm motility and sperm concentration of the second fraction from the ejaculate were 2.30ml, 6.33, 97.66% and 1.92$\times$108cells/ml. Average semen volume per ejaculate, semen pH, sperm motility and sperm concentration of the third fraction from the ejaculate were 3.24ml, 6.51, 93.33% and 3.13$\times$107cells/ml. 3. Motility of fresh semen during preservation were higher at 17$^{\circ}C$ than at 5$^{\circ}C$ or 36$^{\circ}C$. When preservation temeprature was 17$^{\circ}C$, motility were 95.75% at 1 h, 90.00% at 6 h, 84.25% at 12 h, 68.00% at 18 h, 36.25% at 24 h and 28.75% at 30 h, respectively.

  • PDF

Active Narrative of Digital Game and Improvisation (디지털 게임의 능동서사와 즉흥연기)

  • Yu, Hui-Beom;Sung, Jung-Hwan
    • Journal of Korea Game Society
    • /
    • v.16 no.2
    • /
    • pp.75-86
    • /
    • 2016
  • Game studies of theatrical approach explained interactive property of game in humanistic background. Those studies analyze the game, and based on Aristoteles Poetic Attribute. But theatrical approach has a problem by user's unpredictable intervention in narrative (Active narrative). This paper intended to see in the glance of any impact on the Aristotelian model by active narrative. As a result of the active narrative remake the causality between materials of drama. Also, it can be seen to define a kind of the "Improvisation" in theatrical view. But it exposed a essential difference in the form an expression by substance and material of media. It was defined forms of improvisation in the gaming environment which are 'Self-generated Individuality', 'Self-definition Faction', 'Eccentric Behavior Contending', 'Trolling' and 'Bug Play'. Finally this paper proposes the characteristics of the improvisation of the game and the direction to be improved game analysis model in humanities through forms of improvisation in game environment.

Copyright Problems In case of the Image Synthetics of Computer Graphics (컴퓨터 그래픽 합성 이미지의 저작권 문제에 관한 고찰)

  • 이향숙
    • Archives of design research
    • /
    • v.11 no.2
    • /
    • pp.59-68
    • /
    • 1998
  • A work as human's creatures are transformed to bits and multimedia. In the modem society which is governed by simulation, infornlation is symbolized and becoming easily reached to anyone. Thus, collections of image and composition can show a new world beyond the ethical viewpoint. The problem with worries about the differnce between the original and a copy and disappearence of the meaning in postmodern era is the problem of how to set the intellectual properties and copyrights.In this situation, sharing of information according to the theoretical concepts and process of digitalization of photos in the era of information-intensive society was presented. The ethics of intellectual properties and copyrights and in postmordern era were driven. After reviewing the intellectual properties in the era of national information infrastructure of twenty-first century and by identifying the problems, the directions of what we have to do as image makers, and the intellectual properties and copyright.

  • PDF

SPECIFIC ANALYSIS OF WEB CAMERA AND HIGH RESOLUTION PLANETARY IMAGING (웹 카메라의 특성 분석 및 고해상도 행성촬영)

  • Park, Young-Sik;Lee, Dong-Ju;Jin, Ho;Han, Won-Yong;Park, Jang-Hyun
    • Journal of Astronomy and Space Sciences
    • /
    • v.23 no.4
    • /
    • pp.453-464
    • /
    • 2006
  • Web camera is usually used for video communication between PC, it has small sensing area, cannot using long exposure application, so that is insufficient for astronomical application. But web camera is suitable for bright planet, moon, it doesn't need long exposure time. So many amateur astronomer using web camera for planetary imaging. We used ToUcam manufactured by Phillips for planetary imaging and Registax commercial program for a video file combining. And then, we are measure a property of web camera, such as linearity, gain that is usually using for analysis of CCD performance. Because of using combine technic selected high quality image from video frame, this method on take higher resolution planetary imaging than one shot image by film, digital camera and CCD. We describe a planetary observing method and a video frame combine method.

Development of Sound Frequency Analyser using an Ultra-Low Power MCU (초저전력 Micro Controller Unit(MCU)를 활용한 소리 주파수 분석기 개발)

  • Choi, Jae-Hoon;Chung, Yong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.4
    • /
    • pp.403-410
    • /
    • 2016
  • Materials made of metals have their own manifest resonant frequencies. Using this property, the quality test of products from the factory can be performed. An impact is applied to the product and the frequencies of the sound and/or vibration are measured using high-end equipments. They use a general purpose computer or a DSP(: Digital Signal Processor)-based stand-alone system which is usually too large in-size to carry and expensive to build. In this paper, we introduce a system that is developed based on a MSP430 MCU(:Micro-Controller Unit) from TI(: Texas Instruments). The ultra-low power MSP430 MCUs make it possible to make a frequency analyzer in a very small size without the need of using a large-size battery. The proposed system can be used in situations where the frequency analyzer should be carried easily with an investigator and should be built at low cost sacrificing some accuracy. We implemented the system using a launchpad supplied by TI and could confirm that the proposed system could identify with a high-accuracy the frequencies of various artificial and natural sounds.

VMProtect Operation Principle Analysis and Automatic Deobfuscation Implementation (VMProtect 동작원리 분석 및 자동 역난독화 구현)

  • Bang, Cheol-ho;Suk, Jae Hyuk;Lee, Sang-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.30 no.4
    • /
    • pp.605-616
    • /
    • 2020
  • Obfuscation technology delays the analysis of a program by modifying internal logic such as data structure and control flow while maintaining the program's functionality. However, the application of such obfuscation technology to malicious code frequently occurs to reduce the detection rate of malware in antivirus software. The obfuscation technology applied to protect software intellectual property is applied to the malicious code in reverse, which not only lowers the detection rate of the malicious code but also makes it difficult to analyze and thus makes it difficult to identify the functionality of the malicious code. The study of reverse obfuscation techniques that can be closely restored should also continue. This paper analyzes the characteristics of obfuscated code with the option of Pack the Output File and Import Protection among detailed obfuscation technologies provided by VMProtect 3.4.0, a popular tool among commercial obfuscation tools. We present a de-obfuscation algorithm.

A Study on the Scope of the Development of Ship Communication in the GMDSS (GMDSS도입에 따른 선박통신의 발전방향에 관한 연구)

  • 신현식;김기문
    • Journal of the Korean Institute of Navigation
    • /
    • v.18 no.1
    • /
    • pp.39-61
    • /
    • 1994
  • GMDSS(the Global Maritime Distress and Safety System), which is utilizing recently developed systems such as satellite communications and positioning system, digital communication system, computer and microelectronics technology, etc., has been adopted by International Maritime Orgnization(IMO) and coordina-ted with such organization as the International Telecommunication Union(ITU), World Meteorological Organizatoion(WMO), etc. This system took effect partly on February 1st 1992 according to the 1988 SOLAS Amemdments and, after some more complementary measures, will be fully operational by February 1st 1999. Comparing with the existing communication system, the new system is mainly based on the latest scientific technologies, and therefore overall countermeasure will be necessary to accept the system reasonably. GMDSS will transform the current communication system basically and be the major factor to change the demand and supply of personnel for radio communication. To cope with the system assertively, regulations relating to the radio installation, the posting of radio operators, the bounds of their duty, etc. must be established and the demand and supply of radio operators to meet the system must be accomplished pertinently. Moreover, the technique and quality of the person-nel responsible for the system must be upgraded to carry out the obligations by international regulations as well as to ensure the safety of life and property at sea. Looking into the actual situations of our country, every regulation relating to the GMDSS has been improved, but the concerned educational institutions and administrations have not yet prepared the rational and concrete schemes on the educational methods and adquate procedures for the system. Therefore, in this thesis, the author intends to propose directions for improving the courses and contents of education of the relating educational institutions and to suggest rational schemes for balancing the demand and supply of personnel to the administrative anthorty concerned.

  • PDF

Feature Extraction by Line-clustering Segmentation Method (선군집분할방법에 의한 특징 추출)

  • Hwang Jae-Ho
    • The KIPS Transactions:PartB
    • /
    • v.13B no.4 s.107
    • /
    • pp.401-408
    • /
    • 2006
  • In this paper, we propose a new class of segmentation technique for feature extraction based on the statistical and regional classification at each vertical or horizontal line of digital image data. Data is processed and clustered at each line, different from the point or space process. They are designed to segment gray-scale sectional images using a horizontal and vertical line process due to their statistical and property differences, and to extract the feature. The techniques presented here show efficient results in case of the gray level overlap and not having threshold image. Such images are also not easy to be segmented by the global or local threshold methods. Line pixels inform us the sectionable data, and can be set according to cluster quality due to the differences of histogram and statistical data. The total segmentation on line clusters can be obtained by adaptive extension onto the horizontal axis. Each processed region has its own pixel value, resulting in feature extraction. The advantage and effectiveness of the line-cluster approach are both shown theoretically and demonstrated through the region-segmental carotid artery medical image processing.

Keyword Search and Ranking Methods on Semantic Web Documents (시맨틱 웹 문서에 대한 키워드 검색 및 랭킹 기법)

  • Kim, Youn-Hee;Oh, Sung-Kyun
    • Journal of Satellite, Information and Communications
    • /
    • v.7 no.3
    • /
    • pp.86-93
    • /
    • 2012
  • In this paper, we propose keyword search and ranking methods for OWL documents that describe metadata and ontology on the Semantic Web. The proposed keyword search method defines a unit of keyword search result as an information resource and expands a scope of query keyword to names of class and property or literal data. And we reflected derived information by inference in the keyword search by considering the elements of OWL documents such as hierarchical relationship of classes or properties and equal relationship of classes. In addition, our method can search a large number of information resources that are relevant to query keywords because of information resources indirectly associated with query keywords through semantic relationship. Our ranking method can improve user's search satisfaction because of involving a variety of factors in the ranking by considering the characteristics of OWL. The proposed methods can be used to retrieve digital contents, such as broadcast programs.

Geometric Multiple Watermarking Scheme for Mobile 3D Content Based on Anonymous Buyer-Seller Watermarking Protocol (익명 Buyer-Seller 워터마킹 프로토콜 기반 모바일 3D 콘텐츠의 기하학적 다중 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Seong-Geun;Kwon, Ki-Ryong
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.2
    • /
    • pp.244-256
    • /
    • 2009
  • This paper presents multiple watermarking method for the copyright protection and the prevention of illegal copying of mobile 3D contents. The proposed method embeds an unique watermark and a WCA watermark into the spatial and encryption domains of mobile 3D content based on anonymous Buyer-Seller watermarking protocol. The seller generates an unique watermark and embeds it into the distribution of vertex data of 3D content object. After receiving the encrypted watermark from WCA, the seller embeds it into the encrypted vertex data by using operator that satisfies the privacy homo morphic property. The proposed method was implemented using a mobile content tool, Power VR MBX and experimental results verified that the proposed method was capable of copyright protection and preventing illegal copying, as the watermarks were also accurately extracted in the case of geometrical attacks, such as noise addition, data accuracy variation, and data up/down scaling.

  • PDF