• Title/Summary/Keyword: random media

Search Result 366, Processing Time 0.023 seconds

An LDPC Code Replication Scheme Suitable for Cloud Computing (클라우드 컴퓨팅에 적합한 LDPC 부호 복제 기법)

  • Kim, Se-Hoe;Lee, Won-Joo;Jeon, Chang-Ho
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.2
    • /
    • pp.134-142
    • /
    • 2012
  • This paper analyze an LDPC code replication method suitable for cloud computing. First, we determine the number of blocks suitable for cloud computing through analysis of the performance for the file availability and storage overhead. Also we determine the type of LDPC code appropriate for cloud computing through the performance for three types of LDPC codes. Finally we present the graph random generation method and the comparing method of each generated LDPC code's performance by the iterative decoding process. By the simulation, we confirmed the best graph's regularity is left-regular or least left-regular. Also, we confirmed the best graph's total number of edges are minimum value or near the minimum value.

Isolation of Lipase Producing Yeast and Optimization of Cultivation Condition (Lipase 생산 효모균주의 분리 및 배양조건 최적화)

  • 박명훈;류현진;오경근
    • KSBB Journal
    • /
    • v.19 no.2
    • /
    • pp.148-153
    • /
    • 2004
  • Lipase catalyzes the hydrolysis of glycerides into fatty acids and glycerol. The study of microbial lipases has been stimulated in resent years. It is due to the potential uses of lipases in esterification of oils to glycerol, alcohols and carbohydrates. Development of lipase producing yeast has been focused concerning to the utilization of yeast culture for animal feed. In this study, yeast like cells was isolated from a waste oil and sludge. A strain having higher lipase activity was selected by random mutagenesis using UV-radiation. The optimal cultivation conditions in submerged culture were examined in terms of lipase production. 2.0% of high fructose syrup, 1,0% of CSL, and 1.0% of olive oil were selected as the nutritional media for the production of lipase. The maximum lipase activity of 1.12 U/ml and viable cell number of 8.8${\times}$10$\^$7/ cells/mL were obtained at 27$^{\circ}C$ with an initial pH of 5.0.

Microstructure and Magnetic Properties of Hexagonal Barium-Ferrite (BaM) Thin Films with Various Underlayers (여러 하지층을 첨가한 Hexagonal Barium-Ferrite(BaM) 박막의 미세구조와 자기적 특성)

  • 김동현;남인탁;흥양기
    • Journal of the Korean Magnetics Society
    • /
    • v.11 no.3
    • /
    • pp.122-128
    • /
    • 2001
  • In this paper, we studied structural and magnetic properties of Ba-ferrite thin film deposited on Si(100) substrate with various underlayers. Ba-ferrite thin films with various underlayers were deposited by reactive RF/DC magnetron sputtering system at room temperature. various underlayers was reactive sputtered with O$_2$. After deposition, the thin films were annealed at 850 $^{\circ}C$ to get the crystallized sample. Underlayers were used to prevent interdiffusion from Ba-ferrite thin film to substrate. The growth of Ba-ferrite thin films was influenced by underlayers. Easy magnetization direction is in-plane. From these results the Ba-ferrite film with various underlayers can be used as longitudinal recording media.

  • PDF

Mycelial Propagation and Molecular Phylogenetic Relationships of Commercially Cultivated Agrocybe cylindracea based on ITS Sequences and RAPD

  • Alam, Nuhu;Kim, Jeong-Hwa;Shim, Mi-Ja;Lee, U-Youn;Lee, Tae-Soo
    • Mycobiology
    • /
    • v.38 no.2
    • /
    • pp.89-96
    • /
    • 2010
  • This study evaluated the optimal vegetative growth conditions and molecular phylogenetic relationships of eleven strains of Agrocybe cylindracea collected from different ecological regions of Korea, China and Taiwan. The optimal temperature and pH for mycelial growth were observed at $25^{\circ}C$ and 6. Potato dextrose agar and Hennerberg were the favorable media for vegetative growth, whereas glucose tryptone was unfavorable. Dextrin, maltose, and fructose were the most effective carbon sources. The most suitable nitrogen sources were arginine and glycine, whereas methionine, alanine, histidine, and urea were least effective for the mycelial propagation of A. cylindracea. The internal transcribed spacer (ITS) regions of rDNA were amplified using PCR. The sequence of ITS2 was more variable than that of ITS1, while the 5.8S sequences were identical. The reciprocal homologies of the ITS sequences ranged from 98 to 100%. The strains were also analyzed by random amplification of polymorphic DNA (RAPD) using 20 arbitrary primers. Fifteen primers efficiently amplified the genomic DNA. The average number of polymorphic bands observed per primer was 3.8. The numbers of amplified bands varied based on the primers and strains, with polymorphic fragments ranging from 0.1 to 2.9 kb. The results of RAPD analysis were similar to the ITS region sequences. The results revealed that RAPD and ITS techniques were well suited for detecting the genetic diversity of all A. cylindracea strains tested.

A Study of Probabilistic Groundwater Flow Modeling Considering the Uncertainty of Hydraulic Conductivity (수리전도도의 불확실성을 고려한 확률론적 지하수 유동해석에 관한 연구)

  • Ryu Dong-Woo;Son Bong-Ki;Song Won-Kyong;Joo Kwang-Soo
    • Tunnel and Underground Space
    • /
    • v.15 no.2 s.55
    • /
    • pp.145-156
    • /
    • 2005
  • MODFLOW, 3-D finite difference code, is widely used to model groundwater flow and has been used to assess the effect of excavations on the groundwater system due to construction of subways and mountain tunnels. The results of numerical analysis depend on boundary conditions, initial conditions, conceptual models and hydrogeological properties. Therefore, its accuracy can only be enhanced using more realistic and field oriented input parameters. In this study, SA(simulated annealing) was used to integrate hydraulic conductivities from a few of injection tests with geophysical reference images. The realizations of hydraulic conductivity random field are obtained and then groundwater flows in each geostatistically equivalent media are analyzed with a numerical simulation. This approach can give probabilistic results of groundwater flow modeling considering the uncertainty of hydrogeological medium. In other words, this approach makes it possible to quantify the propagation of uncertainty of hydraulic conductivities into groundwater flow.

Adaptive Wavelet Transform for Hologram Compression (홀로그램 압축을 위한 적응적 웨이블릿 변환)

  • Kim, Jin-Kyum;Oh, Kwan-Jung;Kim, Jin-Woong;Kim, Dong-Wook;Seo, Young-Ho
    • Journal of Broadcast Engineering
    • /
    • v.26 no.2
    • /
    • pp.143-154
    • /
    • 2021
  • In this paper, we propose a method of compressing digital hologram standardized data provided by JPEG Pleno. In numerical reconstruction of digital holograms, the addition of random phases for visualization reduces speckle noise due to interference and doubles the compression efficiency of holograms. Holograms are composed of completely complex floating point data, and due to ultra-high resolution and speckle noise, it is essential to develop a compression technology tailored to the characteristics of the hologram. First, frequency characteristics of hologram data are analyzed using various wavelet filters to analyze energy concentration according to filter types. Second, we introduce the subband selection algorithm using energy concentration. Finally, the JPEG2000, SPIHT, H.264 results using the Daubechies 9/7 wavelet filter of JPEG2000 and the proposed method are used to compress and restore, and the efficiency is analyzed through quantitative quality evaluation compared to the compression rate.

Reversible Data Hiding in Permutation-based Encrypted Images with Strong Privacy

  • Shiu, Chih-Wei;Chen, Yu-Chi;Hong, Wien
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.13 no.2
    • /
    • pp.1020-1042
    • /
    • 2019
  • Reversible data hiding in encrypted images (RDHEI) provides some real-time cloud applications; i.e. the cloud, acting as a data-hider, automatically embeds timestamp in the encrypted image uploaded by a content owner. Many existing methods of RDHEI only satisfy user privacy in which the data-hider does not know the original image, but leaks owner privacy in which the receiver can obtains the original image by decryption and extraction. In the literature, the method of Zhang et al. is the one providing weak content-owner privacy in which the content-owner and data-hider have to share a data-hiding key. In this paper, we take care of the stronger notion, called strong content-owner privacy, and achieve it by presenting a new reversible data hiding in encrypted images. In the proposed method, image decryption and message extraction are separately controlled by different types of keys, and thus such functionalities are decoupled to solve the privacy problem. At the technique level, the original image is segmented along a Hilbert filling curve. To keep image privacy, segments are transformed into an encrypted image by using random permutation. The encrypted image does not reveal significant information about the original one. Data embedment can be realized by using pixel histogram-style hiding, since this property, can be preserved before or after encryption. The proposed method is a modular method to compile some specific reversible data hiding to those in encrypted image with content owner privacy. Finally, our experimental results show that the image quality is 50.85dB when the averaged payload is 0.12bpp.

A Medical Staff Identification System by Using of Beacon, Iris Recognition and Blockchain (비콘과 홍채인식, 블록체인 기반의 의료진 신분확인 시스템 제안)

  • Lim, Se Jin;Kwon, Hyeok Dong;Seo, Hwa Jeong
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.10 no.1
    • /
    • pp.1-6
    • /
    • 2021
  • Recently, incidents such as proxy surgery (unlicensed medical practice) have been reported in the media that threaten the safety of patients. Alternatives such as the introduction of operating room surveillance camera devices to prevent proxy surgery are emerging, but there are practical difficulties in implementing them due to strong opposition from the medical community. However, the social credibility of doctors is falling as incidents such as proxy surgery occur frequently. In this paper, we propose a medical staff identification system combining Beacon and iris recognition. The system adds reliability by operating on the blockchain network. The system performs primary identification by performing user authentication through iris recognition and proves that the medical staff is in the operating room through beacons. It also ensures patient trust in the surgeon by receiving beacon signals in the background and performing iris authentication at random intervals to prevent medical staff from leaving the operating room after only performing initial certification.

Ensemble Machine Learning Model Based YouTube Spam Comment Detection (앙상블 머신러닝 모델 기반 유튜브 스팸 댓글 탐지)

  • Jeong, Min Chul;Lee, Jihyeon;Oh, Hayoung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.5
    • /
    • pp.576-583
    • /
    • 2020
  • This paper proposes a technique to determine the spam comments on YouTube, which have recently seen tremendous growth. On YouTube, the spammers appeared to promote their channels or videos in popular videos or leave comments unrelated to the video, as it is possible to monetize through advertising. YouTube is running and operating its own spam blocking system, but still has failed to block them properly and efficiently. Therefore, we examined related studies on YouTube spam comment screening and conducted classification experiments with six different machine learning techniques (Decision tree, Logistic regression, Bernoulli Naive Bayes, Random Forest, Support vector machine with linear kernel, Support vector machine with Gaussian kernel) and ensemble model combining these techniques in the comment data from popular music videos - Psy, Katy Perry, LMFAO, Eminem and Shakira.

Factors of Korea-China Product Trade According to GVC Changes: Focused on FTA

  • Kwak, Su-Young;Choi, Mun-Seong;Kim, Yong-Hwan;Lee, Do-Hyung
    • Journal of Korea Trade
    • /
    • v.24 no.8
    • /
    • pp.133-152
    • /
    • 2020
  • Purpose - The purpose of this study is to analyze the determinants of commodity trade in Korea and China and to examine the implications of China's GVC shift from export to domestic market on its impact on Korea's trade. Design/methodology - This study selected 30 major trading partner countries. The dependent variable is the trade volume, and the independent variables are general economic factors such as gross domestic product (GDP), GDP per capita, distance, and FTA. Findings - The trade pattern of Korea's commodities shows that GDP has a positive relationship with trade, import, and export. Distance has a significant negative relationship with total trade, import, and export. FTA is significant for import but it is not significant for total trade and export. The trade pattern of China's commodities shows that GDP has a significant positive relationship with total trade, import, and export. Distance has a negative relationship with trade, import, and export. GDP per capita is not significant for total trade and import, but it is significant for export. FTA is significant for total trade and export, but it is not significant for import. Originality/value - Existing papers were studied mainly in certain industrial sectors such as agriculture, manufacturing, automobile industry and steel industry. This paper attempts to collects vast amounts of data about the 30 countries of Korea and China respectively and analyzes by Random Effect Model dividing the goods (0 to 9) in units of STIC (Rev. 4). The major contribution is that the decision factors affecting commodity trade can be analyzed in SITC units (0-9) to obtain analysis results that are subdivided by product group and organized by product.