• Title/Summary/Keyword: traditional experiments

Search Result 1,060, Processing Time 0.029 seconds

A Key Exchange Protocol based on the Steganography with the QR code (스테가노그라피 기법이 적용된 QR코드 이미지 기반의 키 교환 프로토콜)

  • Lee, Gil-Je;Yoon, Eun-Jun;Yoo, Kee-Young
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.6
    • /
    • pp.173-179
    • /
    • 2013
  • The traditional key exchange protocols are transmitted by using the cryptographic. However, these protocols are compromised by the attacker. To solve this problem, this paper proposes a key exchange protocol based on the steganography with the QR code. The steganography technique embed secret information to the images, documents, videos, and MP3 files and transmit to the others. The attacker can't know that the transmission data is the secret data. Therefore, the sender transmits efficiently and safely the secret data to the others. In additional, the cover image is using the QR code image to insert the secret key. If attackers scan the QR code, then they just read the information or connect URL. They can not be recognized that the QR code image is hiding the secret key. The experiments compare the QR code image with the well-known image about the distortion and the safety.

Extracting Gold from Pyrite Roster Cinder by Ultra-Fine-Grinding/Resin-in-Pulp

  • Guo, Bingkun;Wei, Junting
    • Proceedings of the IEEK Conference
    • /
    • 2001.10a
    • /
    • pp.337-341
    • /
    • 2001
  • A new method to extract gold from pyrite roster cinder, which combines ultra-fine-grinding with resin-in-pulp, has been studied in this paper. Compared with traditional leaching technology, it can short leaching time, avoid complex filter process, lower sodium cyanide consumption and increase gold recovery by 35%. During leaching, aluminium oxide ball was used as stirred medium, hydrogen peroxide as leaching aid and sodium hexametaphosphate as grinding aid. With the high efficiency and chemistry effect of ultra-fine-grinding, the leaching process was developed and the gold leaching rate may reach 88%. With AM-2 Б resin as abosorber and sulfocarbamide (TU) as eluent, gold was recovered from cyanide pulp by resin-in-pulp. AM-2 Б resin has good adsorbability in cyanide solution(pH=10). It was easy to elude gold from the loaded resin with 0.1㏖/L cholhydric acid and 1㏖/L sulfocabamide. The effect of contact time, temperature and acidity etc. on the gold absorption had been examined with static methods. The results showed that the adsorption and desorption of gold could both reach over 98%. The effects of flow rate of solution on dynamic adsorption and elution of gold had been examined with dynamic methods. Breakthrough curve and elution curve had been drawn in this paper. A mild condition was determined through a number of experiments: leaching time 2 hours, liquid solid ratio 4:1, sodium cyanide 3kg/t, hydrogen peroxide 0.05%, sodium hexametaphosphate 0.05%; adsorption time 30 minutes, temperature 10-3$0^{\circ}C$, resin($m\ell$) solid(g) ratio 1:10, eluent resin ratio 10-20:1, velocity of eluent $1.5m\ell$/min. Under the mild condition, the gold recovery may reach 85%.

  • PDF

Stereo System for Tracking Moving Object using Log-Polar Transformation and ZDF (로그폴라 변환과 ZDF를 이용한 이동 물체 추적 스테레오 시스템)

  • Yoon, Jong-Kun;Park, Il-;Lee, Yong-Bum;Chien, Sung-Il
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.1
    • /
    • pp.61-69
    • /
    • 2002
  • Active stereo vision system allows us to localize a target object by passing only the features of small disparities without heavy computation for identifying the target. This simple method, however, is not applicable to the situations where a distracting background is included or the target and other objects are located on the zero disparity area simultaneously To alleviate these problems, we combined filtering with foveation which employs high resolution in the center of the visual field and suppresses the periphery which is usually less interesting. We adopted an image pyramid or log-polar transformation for foveated imaging representation. We also extracted the stereo disparity of the target by using projection to keep the stereo disparity small during tracking. Our experiments show that log-polar transformation is superior to either an image pyramid or traditional method in separating a target from the distracting background and fairly enhances the tracking performance.

Improving Lane Marking Detection by Combining Horizontal 1-D LoG Filtered Scale Space and Variable Thresholding (수평 1-D LoG 필터링 스케일 공간과 가변적 문턱처리의 결합에 의한 차선 마킹 검출 개선)

  • Yoo, Hyeon-Joong
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.49 no.4
    • /
    • pp.85-94
    • /
    • 2012
  • Lane marking detection is essential to both ITS and DAS systems. The objective of this paper is to provide more robust technique for lane marking detection than traditional techniques by using scale-space technique. Variable thresholding that is based on the local statistics may be very effective for detecting such objects as lane markings that have prominent intensities. However, such techniques that only rely on local statistics have limitations containing irrelevant areas as well. We reduce the candidate areas by combining the variable thresholding result with cost-efficient horizontal 1D LoG filtered scale space. Through experiments using practical images, we could achieve significant improvement over the techniques based not only on the variable thresholding but also on the Hough transform that is another very popular technique for this purpose.

A Study on the Characteristics of Opinion Retrieval Using Term Statistical Analysis in Opinion Documents (의견 문서의 단어 통계 분석을 통한 의견 검색 특성에 관한 연구)

  • Han, Kyoung-Soo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.11
    • /
    • pp.21-29
    • /
    • 2010
  • Opinion retrieval which searches the opinions expressed in documents by users cannot outperform significantly yet traditional topical retrieval which searches the facts. Therefore, the focus of this paper is to identify the statistical characteristics which can be applied to opinion retrieval by comparing and analyzing the term statistics of opinion and non-opinion documents in the blog domain. The TREC Blogs06 collection and 150 TREC topics are used in the experiments. The difference between term probability distributions in opinion documents is measured by JS divergence, and the difference according to the topic types and topic domains is also investigated. Moreover, the term probabilities of opinion terms are analyzed comparatively. The main findings of this study include the following: it is necessary to consider the topic-specific characteristics for the opinion detection; it is effective to extract positive and negative opinion terms according to the topics; the topic types are complementary to the topic domains; and special attention has to be given to the usage of the positive opinion terms.

A Research on the Traditional Food Materials for Developing Medicinal Food and the Direction of Applying the Theories of Oriental Medicine (약선(藥膳)음식 개발을 위한 전통 식품재료와 한의학이론의 적용방향에 관한 연구)

  • Bok Hye-Ja;Lee Gui-Joo;Song Joo-Eum
    • Journal of the East Asian Society of Dietary Life
    • /
    • v.15 no.3
    • /
    • pp.346-356
    • /
    • 2005
  • This study was conducted to investigate how to apply the theories of oriental medicine appropriately, which direction should be taken, and how it should be developed The results are as follows. First, to develop medicinal cuisine, it is necessary to grasp the theoretical system, considering Ohaeng and Omi, the five viscera and the six entrails, organs and body, by raising the level of understanding comprehensively about the relationship between the characteristics of each groups of Sasang Constitutions and the theories of Eumyangohaeng, and the relationship between the theory of Kimi. and food, and then to explain developed medicinal cuisine and apply those theories to inventing new ones. Secondly, to develop medicinal cuisine for health enhancement, it is also required not only to consider constitutions but also to suggest the need of knowledge for moderation in terms of regimen along with the theory of Kimi. Thirdly, to develop medicinal cuisine according to the perspective of Kimi. Theory, what should be taken into account is not only the understanding of the characteristics of food materials, but also the properties of them that the theory of Kimi, Eumyangohaeng, and Sasang Constitutions share so that it is possible to invent medicinal cuisine which is good for anybody to protect disease specific to a certain group of constitutions with, and serves as the dietary regimen customed to each constitution group. Lastly, the scientific effect of the medicinal cuisine which is developed according to the theory of Kimi., Eumyangohaeng, and Sasang Constitutions should be verified by scientific researches and clinical experiments. And it is believed to be essential for the government to make efforts to set a standard and laws to validate the medicinal effects and the process of assessment so that the systematic development can be encouraged, and to prepare guidance to food development for national health improvement.

  • PDF

Mining Implicit Correlations between Users with the Same Role for Trust-Aware Recommendation

  • Liu, Haifeng;Yang, Zhuo;Zhang, Jun;Bai, Xiaomei;Wang, Wei;Xia, Feng
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.4892-4911
    • /
    • 2015
  • Trust as one of important social relations has attracted much attention from researchers in the field of social network-based recommender systems. In trust network-based recommender systems, there exist normally two roles for users, truster and trustee. Most of trust-based methods generally utilize explicit links between truster and trustee to find similar neighbors for recommendation. However, there possibly exist implicit correlations between users, especially for users with the same role (truster or trustee). In this paper, we propose a novel Collaborative Filtering method called CF-TC, which exploits Trust Context to discover implicit correlation between users with the same role for recommendation. In this method, each user is first represented by the same-role users who are co-occurring with the user. Then, similarities between users with the same role are measured based on obtained user representation. Finally, two variants of our method are proposed to fuse these computed similarities into traditional collaborative filtering for rating prediction. Using two publicly available real-world Epinions and Ciao datasets, we conduct comprehensive experiments to compare the performance of our proposed method with some existing benchmark methods. The results show that CF-TC outperforms other baseline methods in terms of RMSE, MAE, and recall.

Efficient Verifiable Top-k Queries in Two-tiered Wireless Sensor Networks

  • Dai, Hua;Yang, Geng;Huang, Haiping;Xiao, Fu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.6
    • /
    • pp.2111-2131
    • /
    • 2015
  • Tiered wireless sensor network is a network model of flexibility and robustness, which consists of the traditional resource-limited sensor nodes and the resource-abundant storage nodes. In such architecture, collected data from the sensor nodes are periodically submitted to the nearby storage nodes for archive purpose. When a query is requested, storage nodes also process the query and return qualified data as the result to the base station. The role of the storage nodes leads to an attack prone situation and leaves them more vulnerable in a hostile environment. If any of them is compromised, fake data may be injected into and/or qualified data may be discarded. And the base station would receive incorrect answers incurring malfunction to applications. In this paper, an efficient verifiable top-k query processing scheme called EVTQ is proposed, which is capable of verifying the authentication and completeness of the results. Collected data items with the embedded information of ordering and adjacent relationship through a hashed message authentication coding function, which serves as a validation code, are submitted from the sensor nodes to the storage nodes. Any injected or incomplete data in the returned result from a corresponded storage node is detected by the validation code at the base station. For saving communication cost, two optimized solutions that fuse and compress validation codes are presented. Experiments on communication cost show the proposed method is more efficiency than previous works.

A video transmission system for a high quality and fault tolerance based on multiple paths using TCP/IP (다중 경로를 이용한 TCP/IP 기반 고품질 및 고장 감내 비디오 전송 시스템)

  • Kim, Nam-Su;Lee, Jong-Yeol;Pyun, Kihyun
    • Journal of Internet Computing and Services
    • /
    • v.15 no.6
    • /
    • pp.1-8
    • /
    • 2014
  • As the e-learning spreads widely and demands on the internet video service, transmitting video data for many users over the Internet becomes popular. To satisfy this needs, the traditional approach uses a tree structure that uses the video server as the root node. However, this approach has the danger of stopping the video service even when one of the nodes along the path has a some problem. In this paper, we propose a video-on-demand service that uses multiple paths. We add new paths for backup and speed up for transmitting the video data. We show by simulation experiments that our approach provides a high-quality of video service.

Effects of Talmyung-san on the Cultured Rat Myocardiac Cell and Vascular Smooth Muscle Cell (탈명산(奪命散)이 배양심근세포(培養心筋細胞) 및 혈관평골근세포(血管平滑筋細胞)에 미치는 영향(影響))

  • Seong, Gang-Gyeong;Bag, Se-Hong
    • The Journal of Internal Korean Medicine
    • /
    • v.21 no.1
    • /
    • pp.46-54
    • /
    • 2000
  • Objectives : Talmyung-san(TMS) has been used for treatment of brain diseases in Chinese traditional medicine. However, little is known about the mechanism by which TMS rescues brain cells from ischemic damages. To elucidate the protective mechanisms of TMS, we execute experiments. Methods : The effects of TMS on ischemia/reperfusion-induced cytotoxicity and generation of nitric oxide(NO) are investigated in primary neonatal myocardial cells and A7rS, aortic smooth muscle cell line. Results : Ischemia/reperfusion itself induces severe myocardial cell death in vitro. However, treatment of the cells with TMS significantly reduces both ischemia/reperfusion-induced myocardial cell death and LDH release. In addition, pretreatment of TMS before reperfusion recovers the lose of beating rates alter ischemia/reperfusion. For a while, the water extract of TMS stimulates myocardial cells to produce NO in a dose dependent manner and it protects the damage of ischemia/reperfusion-induced myocardial cells. Furthermore, the protective effects of the water extract of TMS is mimicked by treatment of sodium nitroprusside, an exogenous NO donor. NG-monomethyl-L-arginine (NGMMA), a specific inhibitor of nitric oxide synthase(NOS), significantly blocks the protective effects of TMS on the cells after ischemia/reperfusion. In addition, on ischemia the water extract of TMS induce NO in A7r5 cell. Conclusions : Taken together, we suggest that the protective effects of TMS against ischemia/reperfusion-induced myocardial damages may be mediated by NO production of myocardial and vascular smooth muscle cell during ischemic condition.

  • PDF