• Title/Summary/Keyword: embedding ratio

Search Result 101, Processing Time 0.026 seconds

Vibration analysis of sandwich sectorial plates considering FG wavy CNT-reinforced face sheets

  • Tahouneh, Vahid
    • Steel and Composite Structures
    • /
    • v.28 no.5
    • /
    • pp.541-557
    • /
    • 2018
  • This paper presents the influence of carbon nanotubes (CNTs) waviness and aspect ratio on the vibrational behavior of functionally graded nanocomposite sandwich annular sector plates resting on two-parameter elastic foundations. The carbon nanotube-reinforced (CNTR) sandwich plate has smooth variation of CNT fraction along the thickness direction. The distributions of CNTs are considered functionally graded (FG) or uniform along the thickness and their mechanical properties are estimated by an extended rule of mixture. In this study, the classical theory concerning the mechanical efficiency of a matrix embedding finite length fibers has been modified by introducing the tube-to-tube random contact, which explicitly accounts for the progressive reduction of the tubes' effective aspect ratio as the filler content increases. Effects of CNT distribution, volume fraction, aspect ratio and waviness, and also effects of Pasternak's elastic foundation coefficients, sandwich plate thickness, face sheets thickness and plate aspect ratio are investigated on the free vibration of the sandwich plates with wavy CNT-reinforced face sheets. The study is carried out based on three-dimensional theory of elasticity and in contrary to two-dimensional theories, such as classical, the first- and the higher-order shear deformation plate theories, this approach does not neglect transverse normal deformations. The sandwich annular sector plate is assumed to be simply supported in the radial edges while any arbitrary boundary conditions are applied to the other two circular edges including simply supported, clamped and free.

Effects of CNTs waviness and aspect ratio on vibrational response of FG-sector plate

  • Tahouneh, Vahid
    • Steel and Composite Structures
    • /
    • v.25 no.6
    • /
    • pp.649-661
    • /
    • 2017
  • This paper is motivated by the lack of studies in the technical literature concerning to the influence of carbon nanotubes (CNTs) waviness and aspect ratio on the vibrational behavior of functionally graded nanocomposite annular sector plates resting on two-parameter elastic foundations. The carbon nanotube-reinforced (CNTR) plate has smooth variation of CNT fraction based on the power-law distribution in the thickness direction, and the material properties are also estimated by the extended rule of mixture. In this study, the classical theory concerning the mechanical efficiency of a matrix embedding finite length fibers has been modified by introducing the tube-to-tube random contact, which explicitly accounts for the progressive reduction of the tubes' effective aspect ratio as the filler content increases. Parametric studies are carried out to highlight the influence of CNTs volume fraction, waviness and aspect ratio, boundary conditions and elastic foundation on vibrational behavior of FG-CNT thick sectorial plates. The study is carried out based on three-dimensional theory of elasticity and in contrary to two-dimensional theories, such as classical, the first- and the higher-order shear deformation plate theories, this approach does not neglect transverse normal deformations. The annular sector plate is assumed to be simply supported in the radial edges while any arbitrary boundary conditions are applied to the other two circular edges including simply supported, clamped and free. For an overall comprehension on 3-D vibration of annular sector plates, some mode shape contour plots are reported in this research work.

Development of Audio Watermark Decoding Model Using Support Vector Machine (Support Vector Machine을 이용한 오디오 워터마크 디코딩 모델 개발)

  • Seo, Yejin;Cho, Sangjin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.33 no.6
    • /
    • pp.400-406
    • /
    • 2014
  • This paper describes a robust watermark decoding model using a SVM(Support Vector Machine). First, the embedding process is performed inversely for a watermarked signal. And then the watermark is extracted using the proposed model. For SVM training of the proposed model, data are generated that are watermarks extracted from sounds containing watermarks by four different embedding schemes. BER(Bit Error Rate) values of the data are utilized to determine a threshold value employed to create training set. To evaluate the robustness, 14 attacks selected in StirMark, SMDI and STEP2000 benchmarking are applied. Consequently, the proposed model outperformed previous method in PSNR(Peak Signal to Noise Ratio) and BER. It is noticeable that the proposed method achieves BER 1% below in the case of PSNR greater than 10 dB.

N-type Si Schottky Junction Photoelectric Device Using Nickel and Silver (Ni과 Ag 금속을 이용한 N-type Si Schottky Junction 광전소자)

  • Seo, Cheolwon;Hong, Seung-Hyouk;Yun, Ju-Hyung;Kim, Joondong
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.27 no.6
    • /
    • pp.389-393
    • /
    • 2014
  • A thin metal-embedding Schottky device was fabricated for an efficient photoelectric device. Semitransparent thick of 10 nm metal layers were deposited by sputtering of Ag and Ni on a Si substrate. The (111) N-type Si wafers with one-side polished, 450~500 ${\mu}m$ and resistivity $1{\sim}20{\Omega}{\cdot}cm$ were used. High rectifying ratio about 100 from Ni-Schottky device was achieved. This design would provide an effective scheme for high-performing photoelectric devices.

A Proactive Secret Image Sharing Scheme over GF(28) (유한 체상에서의 사전 비밀이미지 공유 기법)

  • Hyun, Suhng-Ill;Shin, Sang-Ho;Yoo, Kee-Young
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.5
    • /
    • pp.577-590
    • /
    • 2013
  • Shamir's (k,n)-threshold secret sharing scheme is not secure against cheating by attacker because the signature of participants is omitted. To prevent cheating, many schemes have been proposed, and a proactive secret sharing is one of those. The proactive secret sharing is a method to update shares in the secret sharing scheme at irregular intervals. In this paper, a proactive image secret sharing scheme over $GF(2^8)$ is proposed for the first time. For the past 30 years, Galois field operation is widely used in order to perform the efficient and secure bit operation in cryptography, and the proposed scheme with update phase of shadow image over $GF(2^8)$) at irregular intervals provides the lossless and non-compromising of secret image. To evaluate security and efficiency of images (i.e. cover and shadow images) distortion between the proposed scheme and the previous schemes, embedding capacity and PSNR are compared in experiments. The experimental results show that the performances of the embedding capacity and image distortion ratio of the proposed scheme are superior to the previous schemes.

An Economic Evaluation of Thread Embedding Acupuncture for the Treatment of Lumbar Herniated Intervertebral Disc in a Randomized Controlled Clinical Trial

  • Kim, Ha-Na;Kim, Jun-Yeon;Park, Kyeong-Ju;Hwang, Ji-Min;Jang, Jun-Yeong;Jo, Min-Gi;Ko, Min-Jung;Chae, Sang-Yeup;Kim, Jung-Hyun;Goo, Bonhyuk;Park, Yeon-Cheol;Seo, Byung-Kwan;Baek, Yong-Hyeon;Nam, Sang-Soo
    • Journal of Acupuncture Research
    • /
    • v.38 no.4
    • /
    • pp.312-319
    • /
    • 2021
  • Background: Lumbar herniated intervertebral disc (LHIVD) is a frequently presented condition/disease in Korean medical institutions. In this study, the economics of thread embedding acupuncture (TEA) was evaluated in a randomized controlled trial comparing TEA with sham TEA (STEA). Methods: This economic evaluation was analyzed from a limited social perspective, and the per-protocol set was from a basic analysis perspective. The cost-effectiveness analysis was based on the change in visual analog scale score, and the cost-utility analysis was based on the quality-adjusted life years. The final results were expressed as the average cost-effectiveness ratio and incremental cost-effectiveness ratio, and furthermore sensitivity analysis was performed to confirm the robustness of the results observed. Results: The cost-effectiveness analysis showed that TEA was 9,908 won lower than STEA, while the decrease in 100 mm visual analog scale score was 8.5 mm greater in the TEA group compared with the STEA group (p > 0.05). The cost-utility analysis showed that TEA was 9,908 won lower than STEA, while the quality-adjusted life years of TEA was 0.0026 years higher than STEA (p > 0.05). These results were robust in the sensitivity analysis, but were not statistically significant. Conclusion: In treating LHIVD, TEA appeared to have cost-effectiveness and cost-utility compared with STEA. However, there were no significant differences between the groups in terms of cost, effectiveness, and utility indicators. Therefore, results must be interpreted prudently; this study was the 1st to conduct an economic evaluation of TEA for LHIVD.

Embedment Properties of Reflective Beads for Thermoplastic Road Markings (열가소성 차선도장에서 반사유리알의 함침특성)

  • Hong, In Kwon;Lee, Chang Geun;Lee, Seung Bum
    • Applied Chemistry for Engineering
    • /
    • v.26 no.2
    • /
    • pp.199-204
    • /
    • 2015
  • Thermoplastic road markings are one of the most widely used road markings in the world. However, the durability of domestic road markings is relatively shorter than that of the global average of, approximately, three years. To overcome it, the conventional thermoplastic road markings were prepared by adding polyolefin and oxidized PE wax to conventional petroleum resin. In addition, the melting viscosity was designed below 500 cP at $220^{\circ}C$ as well as the optimum viscosity for spray painting, and embedding ratio of glass beads were controlled about 50~60% by spraying in an interval of 1 second. Also the glass bead adhesive ratio was improved by reducing the amount of $CaCO_3$ below 40 wt%. The retroreflectivity was tested under four different conditions to evaluate the abrasion resistance of thermoplastic road markings. The retroreflectivity coefficient satisfied the international standard ($150mcd{\cdot}m^{-2}{\cdot}lux^{-1}$) in this study, and TPRM-7 was determined as an optimal ratio.

A New Mobile Watermarking Scheme Based on Display-capture

  • Bae, Jong-Wook;Jung, Sung-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.12 no.6
    • /
    • pp.815-823
    • /
    • 2009
  • Most of existing watermarking schemes insert and extract a watermark, focusing on the visual conservation of an original image. However, existing watermarking schemes could be difficult for a watermark detection in case of various distortion caused by display-capture devices. Therefore, we propose a new display-capture based mobile watermarking scheme. The proposed watermarking scheme is a new concept for embedding a watermark, which uses the generated image instead of a given original image. For effective watermark decoding, we also present a method for detecting the background image whose error bit can not be corrected because of various heavy distortion and for avoiding it from the decoding process. For this scheme, we adopt distortion coefficients of camera calibration when we separate a background image from a captured image. For finding available correction bits of ECC through the decoding process, we capture 30,000 images and then calculate the separation ratio of a background image and the average error bits per an image. As experimental result, the separation ratio of a background image is about 96.5% in 30,000 captured image. And the false alarm ratio shows about $5.18{\times}10^{-4}$ in the separated background image. And also we can confirm the availability of real-time processing because the mean execution time is about 82ms per an image for capturing and decoding.

  • PDF

Experimental Verification of the Versatility of SPAM-based Image Steganalysis (SPAM 기반 영상 스테그아날리시스의 범용성에 대한 실험적 검증)

  • Kim, Jaeyoung;Park, Hanhoon;Park, Jong-Il
    • Journal of Broadcast Engineering
    • /
    • v.23 no.4
    • /
    • pp.526-535
    • /
    • 2018
  • Many steganography algorithms have been studied, and steganalysis for detecting stego images which steganography is applied to has also been studied in parallel. Especially, in the case of the image steganalysis, the features such as ALE, SPAM, and SRMQ are extracted from the statistical characteristics of the image, and stego images are classified by learning the classifier using various machine learning algorithms. However, these studies did not consider the effect of image size, aspect ratio, or message-embedding rate, and thus the features might not function normally for images with conditions different from those used in the their studies. In this paper, we analyze the classification rate of the SPAM-based image stegnalysis against variety image sizes aspect ratios and message-embedding rates and verify its versatility.

Application and Evaluation of Vector Map Watermarking Algorithm for Robustness Enhancement (강인성 향상을 위한 벡터 맵 워터마킹 알고리즘의 적용과 평가)

  • Won, Sung Min;Park, Soo Hong
    • Spatial Information Research
    • /
    • v.21 no.3
    • /
    • pp.31-43
    • /
    • 2013
  • Although the vector map data possesses much higher values than other types of multimedia, the data copyright and the protection against illegal duplication are still far away from the attention. This paper proposes a novel watermarking technique which is both robust to diverse attacks and optimized to a vector map structure. Six approaches are proposed for the design of the watermarking algorithm: point-based approach, building a minimum perimeter triangle, watermark embedding in the length ratio, referencing to the pixel position of the watermark image, grouping, and using the one-way function. Our method preserves the characteristics of watermarking such as embedding effectiveness, fidelity, and false positive rate, while maintaining robustness to all types of attack except a noise attack. Furthermore, our method is a blind scheme in which robustness is independent of the map data. Finally, our method provides a solution to the challenging issue of degraded robustness under severe simplification attacks.