• Title/Summary/Keyword: normal embedding

Search Result 53, Processing Time 0.025 seconds

NOTE ON NORMAL EMBEDDING

  • Yi, Seung-Hun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.39 no.2
    • /
    • pp.289-297
    • /
    • 2002
  • It was shown by L. Polterovich ([3]) that if L is a totally real submanifold of a symplectic manifold $(M,\omega)$ and L is parallelizable then L is normal. So we try to find an answer to the question of whether there is a compatible almost complex structure J on the symplectic vector bundle $TM$\mid$_{L}$ such that $TL{\cap}JTL=0$ assuming L is normal and parallelizable. Although we could not reach an answer, we observed that the claim holds at the vector space level. And related to the question, we showed that for a symplectic vector bundle $(M,\omega)$ of rank 2n and $E=E_1{\bigoplus}E_2$, where $E=E_1,E_2$are Lagrangian subbundles of E, there is an almost complex structure J on E compatible with ${\omega}$ and $JE_1=E_2$. And finally we provide a necessary and sufficient condition for a given embedding into a symplectic manifold to be normal.

Storage Feature-Based Watermarking Algorithm with Coordinate Values Preservation for Vector Line Data

  • Zhou, Qifei;Ren, Na;Zhu, Changqing;Tong, Deyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.7
    • /
    • pp.3475-3496
    • /
    • 2018
  • Most of current watermarking algorithms for GIS vector data embed copyright information by means of modifying the coordinate values, which will do harm to its quality and accuracy. To preserve the fidelity of vector line data and protect its copyright at the same time, a lossless watermarking algorithm is proposed based on storage feature in this paper. Firstly, the superiority of embedding watermark based on storage feature is demonstrated theoretically and technically. Then, the basic concepts and operations on storage feature have been defined including length and angle of the polyline feature. In the process of embedding watermark, the watermark information is embedded into directions of polyline feature by the quantitative mechanism, while the positions of embedding watermark are determined by the feature length. Hence, the watermark can be extracted by the same geometric features without original data or watermark. Finally, experiments have been conducted to show that coordinate values remain unchanged after embedding watermark. Moreover, experimental results are presented to illustrate the effectiveness of the method.

WEAKLY LAGRANGIAN EMBEDDING AND PRODUCT MANIFOLDS

  • Byun, Yang-Hyun;Yi, Seung-Hun
    • Bulletin of the Korean Mathematical Society
    • /
    • v.35 no.4
    • /
    • pp.809-817
    • /
    • 1998
  • We investigate when the product of two smooth manifolds admits a weakly Lagrangian embedding. Prove that, if $M^m$ and $N^n$ are smooth manifolds such that M admits a weakly Lagrangian embedding into ${\mathbb}C^m$ whose normal bundle has a nowhere vanishing section and N admits a weakly Lagrangian immersion into ${\mathbb}C^n$, then $M \times N$ admits a weakly Lagrangian embedding into ${\mathbb}C^{m+n}$. As a corollary, we obtain that $S^m {\times} S^n$ admits a weakly Lagrangian embedding into ${\mathbb}C^{m+n}$ if n=1,3. We investigate the problem of whether $S^m{\times}S^n$ in general admits a weakly Lagrangian embedding into ${\mathbb} C^{m+n}$.

  • PDF

Emerging Topic Detection Using Text Embedding and Anomaly Pattern Detection in Text Streaming Data (텍스트 스트리밍 데이터에서 텍스트 임베딩과 이상 패턴 탐지를 이용한 신규 주제 발생 탐지)

  • Choi, Semok;Park, Cheong Hee
    • Journal of Korea Multimedia Society
    • /
    • v.23 no.9
    • /
    • pp.1181-1190
    • /
    • 2020
  • Detection of an anomaly pattern deviating normal data distribution in streaming data is an important technique in many application areas. In this paper, a method for detection of an newly emerging pattern in text streaming data which is an ordered sequence of texts is proposed based on text embedding and anomaly pattern detection. Using text embedding methods such as BOW(Bag Of Words), Word2Vec, and BERT, the detection performance of the proposed method is compared. Experimental results show that anomaly pattern detection using BERT embedding gave an average F1 value of 0.85 and the F1 value of 1 in three cases among five test cases.

Cyclic Shift Based Tone Reservation PAPR Reduction Scheme with Embedding Side Information for FBMC-OQAM Systems

  • Shi, Yongpeng;Xia, Yujie;Gao, Ya;Cui, Jianhua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.8
    • /
    • pp.2879-2899
    • /
    • 2021
  • The tone reservation (TR) scheme is an attractive method to reduce peak-to-average power ratio (PAPR) in the filter bank multicarrier with offset quadrature amplitude modulation (FBMC-OQAM) systems. However, the high PAPR of FBMC signal will severely degrades system performance. To address this issue, a cyclic shift based TR (CS-TR) scheme with embedding side information (SI) is proposed to reduce the PAPR of FBMC signals. At the transmitter, four candidate signals are first generated based on cyclic shift of the output of inverse discrete Fourier transform (IDFT), and the SI of the selected signal with minimum peak power among the four candidate signals is embedded in sparse symbols with quadrature phase-shift keying constellation. Then, the TR weighted by optimal scaling factor is employed to further reduce PAPR of the selected signal. At the receiver, a reliable SI detector is presented by determining the phase rotation of SI embedding symbols, and the transmitted data blocks can be correctly demodulated according to the detected SI. Simulation results show that the proposed scheme significantly outperforms the existing TR schemes in both PAPR reduction and bit error rate (BER) performances. In addition, the proposed scheme with detected SI can achieve the same BER performance compared to the one with perfect SI.

A Case of Idiopathic Oculomotor Nerve Palsy Treated with Korean Medicine Including Needle-embedding Therapy (매선요법을 병행한 특발성 동안신경마비 한방치험 1례)

  • Song, Ji-Hoon;Choi, Jung-Hwa;Kim, Jong-Han;Jung, Min-Yeong;Park, Soo-Yeon
    • The Journal of Korean Medicine Ophthalmology and Otolaryngology and Dermatology
    • /
    • v.33 no.3
    • /
    • pp.138-152
    • /
    • 2020
  • Objectives : The aim of this study is to report a case of idiopathic oculomotor nerve palsy improved by Korean Medicine therapy including needle-embedding therapy. Methods : We treated a 69-year old male patient who has Rt. ptosis, Rt. eye movement impairment, and dizziness with various Korean medical therapy including acupuncture, Bojungikgitanggami, and Hominis Placenta pharmacopuncture. To promote recovery, we additionally performed needle-embedding therapy to periocular acupoints. Results : Ptosis started to remarkably improve after performing needle-embedding therapy. After 54 days of treatment, ptosis and eye movement impairment of Rt. eye were significantly improved similar to the normal eye. Dizziness was cured in a few days after administration. Conclusions : This case suggests Korean medicine including needle-embedding therapy is effective against oculomotor nerve palsy symptoms especially for ptosis.

Theoretical formulations of current and unique Rayleigh waves with impedance boundary condition embedding normal stress

  • Nguyen, Xuan Quynh;Lee, Dongkyu
    • Smart Structures and Systems
    • /
    • v.29 no.2
    • /
    • pp.279-286
    • /
    • 2022
  • In this article, a novel propagation formulation of Rayleigh waves in a compressible isotropic half-space with impedance boundary condition is proposed by embedding the normal stress. In a two-dimensional case, it is assumed that a design boundary is free of normal traction and a shear traction depends on linearly a normal component of displacements multiplied by frequencies. Therefore, impedance boundary conditions affect the normal stress, where the impedance parameters correspond to dimensions of stresses over velocity. On the other hand, vanished impedance values are traction-free boundary conditions. The main purpose of this article is to present theoretically the existence and uniqueness of a Rayleigh wave formulation relying on secular equation's mathematical analyses. Its velocity varies along with the impedance parameters. Moreover, numerical experiments with different values for the velocity of Rayleigh waves are carried out. The present Rayleigh waves study is a fundamental step in analyzing the cause and effect of physical states such as building or structure damages resulting from natural dynamics. The results of the study generate a basic design formulation theory to test the effects of Rayleigh waves affecting structures when an earthquake occurs. The presence and uniqueness of the proposed formulation is verified by mutual comparisons of several numerical examples.

SMS Text Messages Filtering using Word Embedding and Deep Learning Techniques (워드 임베딩과 딥러닝 기법을 이용한 SMS 문자 메시지 필터링)

  • Lee, Hyun Young;Kang, Seung Shik
    • Smart Media Journal
    • /
    • v.7 no.4
    • /
    • pp.24-29
    • /
    • 2018
  • Text analysis technique for natural language processing in deep learning represents words in vector form through word embedding. In this paper, we propose a method of constructing a document vector and classifying it into spam and normal text message, using word embedding and deep learning method. Automatic spacing applied in the preprocessing process ensures that words with similar context are adjacently represented in vector space. Additionally, the intentional word formation errors with non-alphabetic or extraordinary characters are designed to avoid being blocked by spam message filter. Two embedding algorithms, CBOW and skip grams, are used to produce the sentence vector and the performance and the accuracy of deep learning based spam filter model are measured by comparing to those of SVM Light.

Reversible Multipurpose Watermarking Algorithm Using ResNet and Perceptual Hashing

  • Mingfang Jiang;Hengfu Yang
    • Journal of Information Processing Systems
    • /
    • v.19 no.6
    • /
    • pp.756-766
    • /
    • 2023
  • To effectively track the illegal use of digital images and maintain the security of digital image communication on the Internet, this paper proposes a reversible multipurpose image watermarking algorithm based on a deep residual network (ResNet) and perceptual hashing (also called MWR). The algorithm first combines perceptual image hashing to generate a digital fingerprint that depends on the user's identity information and image characteristics. Then it embeds the removable visible watermark and digital fingerprint in two different regions of the orthogonal separation of the image. The embedding strength of the digital fingerprint is computed using ResNet. Because of the embedding of the removable visible watermark, the conflict between the copyright notice and the user's browsing is balanced. Moreover, image authentication and traitor tracking are realized through digital fingerprint insertion. The experiments show that the scheme has good visual transparency and watermark visibility. The use of chaotic mapping in the visible watermark insertion process enhances the security of the multipurpose watermark scheme, and unauthorized users without correct keys cannot effectively remove the visible watermark.

Detection of System Abnormal State by Cyber Attack (사이버 공격에 의한 시스템 이상상태 탐지 기법)

  • Yoon, Yeo-jeong;Jung, You-jin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.5
    • /
    • pp.1027-1037
    • /
    • 2019
  • Conventional cyber-attack detection solutions are generally based on signature-based or malicious behavior analysis so that have had difficulty in detecting unknown method-based attacks. Since the various information occurring all the time reflects the state of the system, by modeling it in a steady state and detecting an abnormal state, an unknown attack can be detected. Since a variety of system information occurs in a string form, word embedding, ie, techniques for converting strings into vectors preserving their order and semantics, can be used for modeling and detection. Novelty Detection, which is a technique for detecting a small number of abnormal data in a plurality of normal data, can be performed in order to detect an abnormal condition. This paper proposes a method to detect system anomaly by cyber attack using embedding and novelty detection.