• Title/Summary/Keyword: multiple transform

Search Result 472, Processing Time 0.029 seconds

Point Cloud Video Codec using 3D DCT based Motion Estimation and Motion Compensation (3D DCT를 활용한 포인트 클라우드의 움직임 예측 및 보상 기법)

  • Lee, Minseok;Kim, Boyeun;Yoon, Sangeun;Hwang, Yonghae;Kim, Junsik;Kim, Kyuheon
    • Journal of Broadcast Engineering
    • /
    • v.26 no.6
    • /
    • pp.680-691
    • /
    • 2021
  • Due to the recent developments of attaining 3D contents by using devices such as 3D scanners, the diversity of the contents being used in AR(Augmented Reality)/VR(Virutal Reality) fields is significantly increasing. There are several ways to represent 3D data, and using point clouds is one of them. A point cloud is a cluster of points, having the advantage of being able to attain actual 3D data with high precision. However, in order to express 3D contents, much more data is required compared to that of 2D images. The size of data needed to represent dynamic 3D point cloud objects that consists of multiple frames is especially big, and that is why an efficient compression technology for this kind of data must be developed. In this paper, a motion estimation and compensation method for dynamic point cloud objects using 3D DCT is proposed. This will lead to switching the 3D video frames into I frames and P frames, which ensures higher compression ratio. Then, we confirm the compression efficiency of the proposed technology by comparing it with the anchor technology, an Intra-frame based compression method, and 2D-DCT based V-PCC.

E-Governance Practices in Developing Countries. Its Benefits and Challenges. -The Case of Pakistan- (개발도상국의 전자정부 시행에 따른 장점과 문제 -파키스탄 중심으로-)

  • Aftab, Muhammad
    • Industry Promotion Research
    • /
    • v.4 no.1
    • /
    • pp.79-86
    • /
    • 2019
  • The quality of service delivery by governments to their citizens is a subject of concern in the contemporary society. E-governance is a critical aspect that is transforming government operation and service delivery to citizens and other bodies through application of information technology. This research explores the state of e-governing focusing on nations that are developing with special attention to Pakistan. The difficulties and benefits encountered are identified. The results are vital for implementers of e-governing systems in these countries. The methodology applied entails a secondary research that involves analysis and synthesis of literature relating the research topic. The results reveal that Pakistan has made incredible steps in setting up e-governance systems with growth in internet use and access of data from a digital platform. The findings reveal that e-government is associated with multiple benefits including enhanced quality of services, cost efficiency in service provision, enhance transparency and elimination of corruption, provide the basis for eradication of poverty, boost economic stability of a country, and provide room for direct democracy. The research also found that developing countries experience challenges in form of financial constraints, poor ICT infrastructure, illiteracy on e-government, political consensus constraints, legal obstacles, social and cultural constraints. E-government has the capability to transform the quality of governance provided by governments, and policymakers and implementers should address the constraints that act as a hindrance to its implementation.

The Design and implementation of parallel processing system using the $Nios^{(R)}$ II embedded processor ($Nios^{(R)}$ II 임베디드 프로세서를 사용한 병렬처리 시스템의 설계 및 구현)

  • Lee, Si-Hyun
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.97-103
    • /
    • 2009
  • In this thesis, we discuss the implementation of parallel processing system which is able to get a high degree of efficiency(size, cost, performance and flexibility) by using $Nios^{(R)}$ II(32bit RISC(Reduced Instruction Set Computer) processor) embedded processor in DE2-$70^{(R)}$ reference board. The designed Parallel processing system is master-slave, shared memory and MIMD(Mu1tiple Instruction-Multiple Data stream) architecture with 4-processor. For performance test of system, N-point FFT is used. The result is represented speed-up as follow; in the case of using 2-processor(core), speed-up is shown as average 1.8 times as 1-processor's. When 4-processor, the speed-up is shown as average 2.4 times as it's.

Design and Implementation of Biological Signal Measurement Algorithm for Remote Patient Monitoring based on IoT (IoT기반 원격환자모니터링을 위한 생체신호 측정 알고리즘 설계 및 구현)

  • Jung, Ae-Ran;You, Yong-Min;Lee, Sang-Joon
    • Asia-pacific Journal of Multimedia Services Convergent with Art, Humanities, and Sociology
    • /
    • v.8 no.6
    • /
    • pp.957-966
    • /
    • 2018
  • Recently, the demand for remote patient monitoring based on IoT has been increased due to aging population and an increase in single-person household. A non-contact biological signal measurement system using multiple IR-UWB radars for remote patient monitoring is proposed in this paper. To reduce error signals, a multilayer Subtraction algorithm is applied because when the background subtraction algorithm was applied to the biological signal processing, errors occurred such as voltage noise and staircase phenomenon. Therefore, a multilayer background subtraction algorithm is applied to reduce error occurrence. The multilayer background subtraction algorithm extracts the signal by calculating the amount of change between the previous clutter and the current clutter. In this study, the SVD algorithm is used. We applied the improved multilayer background subtraction algorithm to biological signal measurement and computed the respiration rate through Fast Fourier Transform (FFT). To verify the proposed system using IR-UWB radars and multilayer background subtraction algorithm, the respiration rate was measured. The validity of this study was verified by obtaining a precision of 97.36% as a result of a control experiment with Neulog's attachment type breathing apparatus. The implemented algorithm improves the inconvenience of the existing contact wearable method.

Receptor binding motif surrounding sites in the Spike 1 protein of infectious bronchitis virus have high susceptibility to mutation related to selective pressure

  • Seung-Min Hong;Seung-Ji Kim;Se-Hee An;Jiye Kim;Eun-Jin Ha;Howon Kim;Hyuk-Joon Kwon;Kang-Seuk Choi
    • Journal of Veterinary Science
    • /
    • v.24 no.4
    • /
    • pp.51.1-51.17
    • /
    • 2023
  • Background: To date, various genotypes of infectious bronchitis virus (IBV) have co-circulated and in Korea, GI-15 and GI-19 lineages were prevailing. The spike protein, particularly S1 subunit, is responsible for receptor binding, contains hypervariable regions and is also responsible for the emerging of novel variants. Objective: This study aims to investigate the putative major amino acid substitutions for the variants in GI-19. Methods: The S1 sequence data of IBV isolated from 1986 to 2021 in Korea (n = 188) were analyzed. Sequence alignments were carried out using Multiple alignment using Fast Fourier Transform of Geneious prime. The phylogenetic tree was generated using MEGA-11 (ver. 11.0.10) and Bayesian analysis was performed by BEAST v1.10.4. Selective pressure was analyzed via online server Datamonkey. Highlights and visualization of putative critical amino acid were conducted by using PyMol software (version 2.3). Results: Most (93.5%) belonged to the GI-19 lineage in Korea, and the GI-19 lineage was further divided into seven subgroups: KM91-like (Clade A and B), K40/09-like, QX-like (I-IV). Positive selection was identified at nine and six residues in S1 for KM91-like and QX-like IBVs, respectively. In addition, several positive selection sites of S1-NTD were indicated to have mutations at common locations even when new clades were generated. They were all located on the lateral surface of the quaternary structure of the S1 subunits in close proximity to the receptor-binding motif (RBM), putative RBM motif and neutralizing antigenic sites in S1. Conclusions: Our results suggest RBM surrounding sites in the S1 subunit of IBV are highly susceptible to mutation by selective pressure during evolution.

Domestic and International Experts' Perception of Policy and Direction on STEAM Education (융합인재교육(STEAM)의 정책과 실행 방향에 대한 국내외 전문가들의 인식)

  • Jung, Jaehwa;Jeon, Jaedon;Lee, Hyonyong
    • Journal of Science Education
    • /
    • v.39 no.3
    • /
    • pp.358-375
    • /
    • 2015
  • The purposes of this study were to investigate the value, necessity and legitimacy of STEAM Education and to propose practical approaching methods for STEAM Education to be applicable in Korea through a variety of literature review, case studies and collecting suggestions from domestic and international educational experts. The research questions are as follows: (1) To investigate the perception, understanding and recognitions of domestic and foreign professionals in STEAM education. (2) To analyze policy implications for an improvement in STEAM. The following aspects of STEAM were found to be challenges in our current STEAM policy after analyzing multiple questionnaires with the professionals and case studies including their experiences, understanding, supports and directions of the policy from the governments. The results indicate that (1) there was a lack of precise and conceptual understanding of STEAM in respect to experience. Training sessions for teachers in this field to help transform their perception is necessary. Development of practical programs with an easy access is also required. It is important to get the aims of related educational activities recognized by the professionals and established standards for an evaluation. The experts perceived that a theme-based learning is the most preferred and effective approaching method and the programs that develop creative thinking and learning applicable to practice are required to promote. (2) The results indicate that there was a lack of programs and inducements for supporting outstanding STEAM educators. It is shown that making an appropriate environment for STEAM education takes the first priority before training numbers of teachers unilaterally, thus securing enough budget seems critical. The professionals also emphasize on developing specialized teaching materials that include diverse inter-related subjects such as science technology, engineering, arts and humanities and social science with diverse viewpoints and advanced technology. This work requires a STEAM network for teachers to link up and share their materials, documents and experiences. It is necessary to get corporations, universities, and research centers participated in the network. (3) With respect to direction, it is necessary to propose policy that makes STEAM education ordinary and more practical in the present education system. The professionals have recommended training sessions that help develop creative thinking and amalgamative problem-solving techniques. They require reducing the workload of teachers and changing teachers' perspectives towards STEAM. They further urge a tight cooperation between departments of the government related with STEAM.

  • PDF

Mineralogical Characteristics of Naturally Occurring Asbestos (NOA) at Daero-ri, Seosan, Chungnam, Korea (충남 서산 대로리 일대 자연발생석면의 광물학적 특성)

  • Jung, Haemin;Shin, Joodo;Kim, Yumi;Park, Jaebong;Roh, Yul
    • Economic and Environmental Geology
    • /
    • v.47 no.5
    • /
    • pp.467-477
    • /
    • 2014
  • Naturally occurring asbestos (NOA) occurs in rocks and soils as a result of natural weathering and human activities. The asbestos have been associated with ultramafic and mafic rocks, and carbonate rock. The previous studies on NOA were mainly limited to ultramafic and mafic rock-hosted asbestos in Korea. But, studies on carbonatehosted asbestos are relatively rare. Therefore, the purposes of this study were to investigate mineralogical characteristics of carbonate-hosted and metapelite-hosted NOA and to examine genesis of NOA occurred in the both rocks. The study area was Daerori, Seosan, Chungnam Province, Korea. The major rock formation consisted of limestone and schist which have been known to contain asbestos. Sampling was performed at outcrop which contained carbonate rock showing acicular asbestos crystals as well as pegmatitic intrusion that contacted with carbonate rock. PLM, XRD, EPMA, and EDS analyses were used to characterize mineral assemblages, mineralogical characteristics, and crystal habits of amphiboles and other minerals. BSEM images were also used to examine the genesis of asbestos minerals. The amphibole group was observed in all of the carbonate rocks, and actinolite and tremolite were identified in all rocks. These mineral habits were mainly micro-acicular crystals or secondary asbestiform minerals on the surface of non-asbestiform minerals appearing split end of columnar crystals produced by weathering. BSEM images showed residual textures of samples. The residual textures of carbonate rocks showed dolomite-tremolite-diopside mineral assemblages that formed during prograde metasomatism stage. Some carbonate rock also showed diopside-tremolite-talc mineral assemblages which were formed during retrograde metasomatism stage, as the residual textures. In result the presence of asbestos actinolite-tremolite in the carbonate rocks were confirmed in the areas where actinolite-tremolite asbestos was influenced by low temperature hydrothermal solution during metasomatism stage. These asbestos minerals showed the acicular asbestiform minerals, but even non-asbestiform minerals, a bundle or columnar shape, could transform to asbestiform minerals as potential NOA by weathering because the end of columnar shape of non-asbestiform minerals appeared as multiple acicular shaped fibers.

A digital Audio Watermarking Algorithm using 2D Barcode (2차원 바코드를 이용한 오디오 워터마킹 알고리즘)

  • Bae, Kyoung-Yul
    • Journal of Intelligence and Information Systems
    • /
    • v.17 no.2
    • /
    • pp.97-107
    • /
    • 2011
  • Nowadays there are a lot of issues about copyright infringement in the Internet world because the digital content on the network can be copied and delivered easily. Indeed the copied version has same quality with the original one. So, copyright owners and content provider want a powerful solution to protect their content. The popular one of the solutions was DRM (digital rights management) that is based on encryption technology and rights control. However, DRM-free service was launched after Steve Jobs who is CEO of Apple proposed a new music service paradigm without DRM, and the DRM is disappeared at the online music market. Even though the online music service decided to not equip the DRM solution, copyright owners and content providers are still searching a solution to protect their content. A solution to replace the DRM technology is digital audio watermarking technology which can embed copyright information into the music. In this paper, the author proposed a new audio watermarking algorithm with two approaches. First, the watermark information is generated by two dimensional barcode which has error correction code. So, the information can be recovered by itself if the errors fall into the range of the error tolerance. The other one is to use chirp sequence of CDMA (code division multiple access). These make the algorithm robust to the several malicious attacks. There are many 2D barcodes. Especially, QR code which is one of the matrix barcodes can express the information and the expression is freer than that of the other matrix barcodes. QR code has the square patterns with double at the three corners and these indicate the boundary of the symbol. This feature of the QR code is proper to express the watermark information. That is, because the QR code is 2D barcodes, nonlinear code and matrix code, it can be modulated to the spread spectrum and can be used for the watermarking algorithm. The proposed algorithm assigns the different spread spectrum sequences to the individual users respectively. In the case that the assigned code sequences are orthogonal, we can identify the watermark information of the individual user from an audio content. The algorithm used the Walsh code as an orthogonal code. The watermark information is rearranged to the 1D sequence from 2D barcode and modulated by the Walsh code. The modulated watermark information is embedded into the DCT (discrete cosine transform) domain of the original audio content. For the performance evaluation, I used 3 audio samples, "Amazing Grace", "Oh! Carol" and "Take me home country roads", The attacks for the robustness test were MP3 compression, echo attack, and sub woofer boost. The MP3 compression was performed by a tool of Cool Edit Pro 2.0. The specification of MP3 was CBR(Constant Bit Rate) 128kbps, 44,100Hz, and stereo. The echo attack had the echo with initial volume 70%, decay 75%, and delay 100msec. The sub woofer boost attack was a modification attack of low frequency part in the Fourier coefficients. The test results showed the proposed algorithm is robust to the attacks. In the MP3 attack, the strength of the watermark information is not affected, and then the watermark can be detected from all of the sample audios. In the sub woofer boost attack, the watermark was detected when the strength is 0.3. Also, in the case of echo attack, the watermark can be identified if the strength is greater and equal than 0.5.

The Prediction of DEA based Efficiency Rating for Venture Business Using Multi-class SVM (다분류 SVM을 이용한 DEA기반 벤처기업 효율성등급 예측모형)

  • Park, Ji-Young;Hong, Tae-Ho
    • Asia pacific journal of information systems
    • /
    • v.19 no.2
    • /
    • pp.139-155
    • /
    • 2009
  • For the last few decades, many studies have tried to explore and unveil venture companies' success factors and unique features in order to identify the sources of such companies' competitive advantages over their rivals. Such venture companies have shown tendency to give high returns for investors generally making the best use of information technology. For this reason, many venture companies are keen on attracting avid investors' attention. Investors generally make their investment decisions by carefully examining the evaluation criteria of the alternatives. To them, credit rating information provided by international rating agencies, such as Standard and Poor's, Moody's and Fitch is crucial source as to such pivotal concerns as companies stability, growth, and risk status. But these types of information are generated only for the companies issuing corporate bonds, not venture companies. Therefore, this study proposes a method for evaluating venture businesses by presenting our recent empirical results using financial data of Korean venture companies listed on KOSDAQ in Korea exchange. In addition, this paper used multi-class SVM for the prediction of DEA-based efficiency rating for venture businesses, which was derived from our proposed method. Our approach sheds light on ways to locate efficient companies generating high level of profits. Above all, in determining effective ways to evaluate a venture firm's efficiency, it is important to understand the major contributing factors of such efficiency. Therefore, this paper is constructed on the basis of following two ideas to classify which companies are more efficient venture companies: i) making DEA based multi-class rating for sample companies and ii) developing multi-class SVM-based efficiency prediction model for classifying all companies. First, the Data Envelopment Analysis(DEA) is a non-parametric multiple input-output efficiency technique that measures the relative efficiency of decision making units(DMUs) using a linear programming based model. It is non-parametric because it requires no assumption on the shape or parameters of the underlying production function. DEA has been already widely applied for evaluating the relative efficiency of DMUs. Recently, a number of DEA based studies have evaluated the efficiency of various types of companies, such as internet companies and venture companies. It has been also applied to corporate credit ratings. In this study we utilized DEA for sorting venture companies by efficiency based ratings. The Support Vector Machine(SVM), on the other hand, is a popular technique for solving data classification problems. In this paper, we employed SVM to classify the efficiency ratings in IT venture companies according to the results of DEA. The SVM method was first developed by Vapnik (1995). As one of many machine learning techniques, SVM is based on a statistical theory. Thus far, the method has shown good performances especially in generalizing capacity in classification tasks, resulting in numerous applications in many areas of business, SVM is basically the algorithm that finds the maximum margin hyperplane, which is the maximum separation between classes. According to this method, support vectors are the closest to the maximum margin hyperplane. If it is impossible to classify, we can use the kernel function. In the case of nonlinear class boundaries, we can transform the inputs into a high-dimensional feature space, This is the original input space and is mapped into a high-dimensional dot-product space. Many studies applied SVM to the prediction of bankruptcy, the forecast a financial time series, and the problem of estimating credit rating, In this study we employed SVM for developing data mining-based efficiency prediction model. We used the Gaussian radial function as a kernel function of SVM. In multi-class SVM, we adopted one-against-one approach between binary classification method and two all-together methods, proposed by Weston and Watkins(1999) and Crammer and Singer(2000), respectively. In this research, we used corporate information of 154 companies listed on KOSDAQ market in Korea exchange. We obtained companies' financial information of 2005 from the KIS(Korea Information Service, Inc.). Using this data, we made multi-class rating with DEA efficiency and built multi-class prediction model based data mining. Among three manners of multi-classification, the hit ratio of the Weston and Watkins method is the best in the test data set. In multi classification problems as efficiency ratings of venture business, it is very useful for investors to know the class with errors, one class difference, when it is difficult to find out the accurate class in the actual market. So we presented accuracy results within 1-class errors, and the Weston and Watkins method showed 85.7% accuracy in our test samples. We conclude that the DEA based multi-class approach in venture business generates more information than the binary classification problem, notwithstanding its efficiency level. We believe this model can help investors in decision making as it provides a reliably tool to evaluate venture companies in the financial domain. For the future research, we perceive the need to enhance such areas as the variable selection process, the parameter selection of kernel function, the generalization, and the sample size of multi-class.

Design of a Bit-Serial Divider in GF(2$^{m}$ ) for Elliptic Curve Cryptosystem (타원곡선 암호시스템을 위한 GF(2$^{m}$ )상의 비트-시리얼 나눗셈기 설계)

  • 김창훈;홍춘표;김남식;권순학
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.27 no.12C
    • /
    • pp.1288-1298
    • /
    • 2002
  • To implement elliptic curve cryptosystem in GF(2$\^$m/) at high speed, a fast divider is required. Although bit-parallel architecture is well suited for high speed division operations, elliptic curve cryptosystem requires large m(at least 163) to support a sufficient security. In other words, since the bit-parallel architecture has an area complexity of 0(m$\^$m/), it is not suited for this application. In this paper, we propose a new serial-in serial-out systolic array for computing division operations in GF(2$\^$m/) using the standard basis representation. Based on a modified version of tile binary extended greatest common divisor algorithm, we obtain a new data dependence graph and design an efficient bit-serial systolic divider. The proposed divider has 0(m) time complexity and 0(m) area complexity. If input data come in continuously, the proposed divider can produce division results at a rate of one per m clock cycles, after an initial delay of 5m-2 cycles. Analysis shows that the proposed divider provides a significant reduction in both chip area and computational delay time compared to previously proposed systolic dividers with the same I/O format. Since the proposed divider can perform division operations at high speed with the reduced chip area, it is well suited for division circuit of elliptic curve cryptosystem. Furthermore, since the proposed architecture does not restrict the choice of irreducible polynomial, and has a unidirectional data flow and regularity, it provides a high flexibility and scalability with respect to the field size m.