• Title/Summary/Keyword: 비대칭 임계치

Search Result 13, Processing Time 0.025 seconds

Effective Watermark Detection Using Asymmetric Thresholds (비대칭 임계치를 이용한 효과적인 워터마크 검출 방법)

  • Shin, Chang-Doon;Oh, Hae-Seok
    • The KIPS Transactions:PartB
    • /
    • v.10B no.6
    • /
    • pp.619-628
    • /
    • 2003
  • In this paper, an effective watermark detection technique in the wavelet transform domain is proposed. In this proposed method, the image is 2-level wavelet transformed, and then the watermark with a binary logo is embedded into middle band except baseband and high band to consider Invisibility and robustness. In this paper, we use an asymmetric thresholds watermarking (ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. In watermark detection phase, the detection value is not changed when the difference of the selected wavelet neighboring coefficient pairs Is smaller than specific value. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

An Enhanced Adaptive Time Slot Assignment using Access Statistic in TD/CDMA TDD system (TD/CDMA TDD 시스템에서 접근 통계를 사용한 적응형 타임슬롯 할당 알고리즘)

  • 박소영;김낙명
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.26 no.10A
    • /
    • pp.1645-1652
    • /
    • 2001
  • 제3세대 이동 통신 시스템에서 상향 링크와 하향 링크 사이에 불균형적인 타임 슬롯 할당이 가능한 TD/CDMA TDD 시스템은 비대칭적인 트래픽을 효과적으로 분배하는데 적합하다. 게다가 TD/CDMA TDD 시스템은 슬롯이 시간 영역과 코드 영역에서 정의되기 때문에 유효 자원의 statistical multiplexing이 매우 효과적이다. 그러나 상향 링크와 하향 링크사이의 트래픽의 비대칭성을 반영하기 위해서 타임 슬롯을 최적으로 할당시킬 수 있는 동적 경계선이 요구된다. 본 논문에서 슬롯의 하향 링크부분이 이동국의 접근 시도의 정도에 따라 최대화되는 새로운 최적의 TDD 경계선 제어 움직임 알고리즘을 제안하였다. 제안된 알고리즘에서 이동국의 평균 접근 시도가 미리 정의된 상한 임계치를 초과할 경우, TDD 경계선은 평균 접근 시도가 다른 하한 임계치 아래로 내려갈 때까지 프레임의 중앙에 위치한다. 본 논문에서 모의실험 결과를 통하여 제안된 알고리즘이 기존의 TDD 경계선 알고리즘보다 데이터 트래픽의 평균 접근 지연과 음성 트래픽의 블록킹 확률 측면에서 훨씬 더 좋은 성능을 나타냄을 입증하였다.

  • PDF

Improvement of Received Optical Power Sensitivity in Asymmetric 2.5Gbps/1.2Gbps Passive Optical Network with Inverse Return to Zero(RZ) coded Downstream and NRZ upstream re-modulation (역 RZ 부호로 코딩된 하향신호의 재변조를 이용한 비대칭 2.5Gbps/622Mbps 수동 광가입자 망에서의 수신 감도의 개선)

  • Park, Sang-Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.3
    • /
    • pp.65-72
    • /
    • 2010
  • We propose the asymmetric 2.5Gbps/622Mbps PON(Passive Optical Network) in order to reduce the bandwith of filter at receiver with inverse RZ(Return to Zero) code coded downstream and NRZ(Non Return to Zero) upstream re-modulation. I theoretically analyze BER(Bit Error Rate) performance and the power sensitivity with the optimal threshold level by performing simulation with MATLAB according to the types of downstream data. The results have shown that the optimal threshold level at the optical receiver could be saturated at 0.33 as the optical received power increase more than -26dBm to keep $10^{-12}$ of BER to a minimum. Also the power sensitivity is more improved by about 3dB by fixing the threshold level at 0.33 than the conventional receiver. The proposed system can be a useful technology for optical access networks with asymmetric upstream and downstream data rates because the optical receiver can be used without controlling threshold levels and that does not require a light source in optical network unit (ONU) and its control circuits in the optical line termination (OLT).

Hybrid Asymmetric Watermarking using Correlation and Critical Criteria (상관도와 임계치 방식을 이용한 다중검출 비대칭 워터마킹)

  • Li De;Kim Jong-Weon;Choi Jong-Uk
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.7C
    • /
    • pp.726-734
    • /
    • 2005
  • Traditional watermarking technologies are symmetric method which embedding and detection keys are the same. Although the symmetric watermarking method is easy to detect the watermark, this method has weakness against to malicious attacks remove or modify the watermark information when the symmetric key is disclosure. Recently, the asymmetric watermarking method that has different keys to embed and detect is watched by several researchers as a next generation watermarking technology. In this paper, hybrid asymmetric watermarking algorithm is proposed. This algorithm is composed of correlation detection method and critical criteria method. Each method can be individually used to detect watermark from a watermarked content. Hybrid asymmetric detection is complement between two methods, and more feasible than when each method is used respectively, Private key and public key are generated by secure linear transformation and specific matrix. As a result, we have proved the proposed algorithm is secured than symmetric watermarking algorithms. This algorithm can expand to multi bits embedding watermark system and is robust to JPEG and JPEG2000 compression.

Threshold Level Setting of a Receiver in Optical Subscriber Network with Manchester Coded Downstream and NRZ Upstream Re-modulation for the Improvement of Upstream Data Ratios (맨체스터 부호로 코딩된 하향신호의 재변조를 이용한 광가입자 망에서 상향속도개선을 위한 임계치의 설정)

  • Park, Sang-Jo
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.175-185
    • /
    • 2011
  • The threshold level of a receiver is analyzed for the simplification of system and the improvement of upstream data ratios in optical subscriber network of which the upstream date rate and the optical transmitted power are changed to meet the requested BER (Bit Error Rate) defined per interactive multimedia services. In asynchronous optical subscriber network of which the upstream to downstream data ratios are 1:1/2, 1:1/4, 1:1/8 and 1:1/16 with manchester coded downstream and NRZ (Non Return to Zero) downstream re-modulation, the BER performance is theoretically analyzed and it is performed by simulation with MATLAB according to the four types of downstream data for four models. The results have shown that in the cases which the upstream to downstream data ratios are 1:1/4, 1:1/8 and 1:1/16 the conventional receiver with threshold level of 1/2 can be applied regardless of average received optical powers and the BER is not much deteriorated compared with using the optimal threshold level. In the case that the upstream to downstream data ratio is 1:1/2 the threshold level in an optical receiver could be fixed at 1/3 and the BER is not much deteriorated compared with using the optimal threshold level as the average received optical power increases.

Threshold Setup of Retransmission for Reliable Data Forwarding in Wireless Sensor Networks (무선센서네트워크에서 신뢰성 있는 데이터 전송을 위한 재전송 임계치 설정 기법)

  • Cha, Myungsu;Choe, Junseong;Shon, Minhan;Choo, Hyunseung
    • Proceedings of the Korea Information Processing Society Conference
    • /
    • 2011.11a
    • /
    • pp.668-670
    • /
    • 2011
  • 최근의 많은 연구들은 센서네트워크에서 무선링크들이 신뢰적이지 않고, 비대칭적인 것을 보여준다. 하지만 센서네트워크에서 신뢰성있는 통신은 매우 중요하기 때문에 ACK 메시지를 이용해 데이터 전송의 신뢰성을 높이는 기법들이 제안된다. 이 기법들은 전송노드가 수신노드로부터 데이터전송에 대한 ACK 메시지를 수신하여 데이터 전송의 신뢰성을 보장한다. 이 기법들 중 하나인 PDF 기법은 순방향 링크퀄리티를 이용하여 데이터 재전송 임계치를 설정한다. 이를 통해 데이터전송은 성공했지만, ACK 메시지 수신 실패로 발생하는 데이터 재전송을 최소화하여 불필요한 에너지 사용을 방지할 수 있다. 하지만 이 기법은 순방향 링크퀄리티에 따라 매우 다른 전송 성공률을 갖는다. 따라서 데이터의 신뢰성있는 전송을 보장할 수 없다. 본 논문은 순방향 링크퀄리티에 관계없이 일정한 전송 성공률을 갖는 TSR 기법을 제안한다. 본 기법은 에너지 효율적이며 신뢰성있는 데이터 전송을 보장한다.

A Polarity Based Blind Watermarking Method Considering Wavelet Coefficients Change (웨이블릿 계수 변화량을 고려한 극성 기반 블라인드 워터마킹 기법)

  • 신창둔
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.5
    • /
    • pp.744-754
    • /
    • 2004
  • In this paper, a polarity based blind watermarking method considering wavelet coefficients modification is proposed. In this proposed method, we use an asymmetric thresholds watermarking(ATW) in which detection threshold is higher than inserting threshold in order to enhance watermark detection ratio in attacked images. Also, in order to reduce errors in the detected value of watermarks according to small changes in the coefficient values when detecting watermarks, it set the range for movement variation of the coefficients and lowered the sensitivity of variation by ignoring the variations that fall into this range. For this purpose, the polarity preservation threshold $\beta$ was set and a watermark was detected based on the polarity only for the difference that was larger than $\beta$. The experimental results show that the proposed method has good quality and is robust to various attacks such as the JPEG lossy compression, noise addition, cropping, blurring, etc.

  • PDF

Performance Analysis of Asynchronous 2.5 Gbps / 622Mbps Optical Subscriber Network with Manchester coded Downstream and NRZ upstream re-modulation (맨체스터 부호로 코딩된 하향신호의 재변조를 이용한 비동기 2.5 Gbps / 622 Mbps 광가입자 망의 성능 분석)

  • Park, Sang-Jo;Kim, Bong-Kyu
    • Korean Journal of Optics and Photonics
    • /
    • v.20 no.3
    • /
    • pp.143-147
    • /
    • 2009
  • We propose an asymmetrical 2.5 Gbps / 622 Mbps bidirectional optical subscriber network with Manchester coded downstream and NRZ (Non-Return-to-Zero) upstream remodulation. The proposed system has important characteristics in the optical network unit (ONU): it does not require a light source or the usual control circuits such as wavelength control and output power control, and it is possible to use a synchronization scheme between upstream and downstream data. We theoretically analyze BER(Bit Error Rate) performance of upstream data remodulated with Manchester coded downstream according to the types of NRZ downstream data and perform simulations with MATLAB. The BER performance and the receiver sensitivity have been improved by 3 dB by adjusting threshold levels compared to the conventional receiver. The results have shown the remodulation scheme with Manchester coded downstream could be a useful technology for asynchronous and asymmetric optical subscriber networks with low cost and simple structures.

A Recidivism Prediction Model Based on XGBoost Considering Asymmetric Error Costs (비대칭 오류 비용을 고려한 XGBoost 기반 재범 예측 모델)

  • Won, Ha-Ram;Shim, Jae-Seung;Ahn, Hyunchul
    • Journal of Intelligence and Information Systems
    • /
    • v.25 no.1
    • /
    • pp.127-137
    • /
    • 2019
  • Recidivism prediction has been a subject of constant research by experts since the early 1970s. But it has become more important as committed crimes by recidivist steadily increase. Especially, in the 1990s, after the US and Canada adopted the 'Recidivism Risk Assessment Report' as a decisive criterion during trial and parole screening, research on recidivism prediction became more active. And in the same period, empirical studies on 'Recidivism Factors' were started even at Korea. Even though most recidivism prediction studies have so far focused on factors of recidivism or the accuracy of recidivism prediction, it is important to minimize the prediction misclassification cost, because recidivism prediction has an asymmetric error cost structure. In general, the cost of misrecognizing people who do not cause recidivism to cause recidivism is lower than the cost of incorrectly classifying people who would cause recidivism. Because the former increases only the additional monitoring costs, while the latter increases the amount of social, and economic costs. Therefore, in this paper, we propose an XGBoost(eXtream Gradient Boosting; XGB) based recidivism prediction model considering asymmetric error cost. In the first step of the model, XGB, being recognized as high performance ensemble method in the field of data mining, was applied. And the results of XGB were compared with various prediction models such as LOGIT(logistic regression analysis), DT(decision trees), ANN(artificial neural networks), and SVM(support vector machines). In the next step, the threshold is optimized to minimize the total misclassification cost, which is the weighted average of FNE(False Negative Error) and FPE(False Positive Error). To verify the usefulness of the model, the model was applied to a real recidivism prediction dataset. As a result, it was confirmed that the XGB model not only showed better prediction accuracy than other prediction models but also reduced the cost of misclassification most effectively.

Extensional Buckling Analysis of Asymmetric Curved Beams Using DQM (미분구적법(DQM)을 사용한 비대칭 곡선 보의 신장 좌굴해석)

  • Kang, Ki-Jun
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.4
    • /
    • pp.594-600
    • /
    • 2021
  • Curved beam structures are generally used as components in structures such as railroad bridges and vehicles. The stability analysis of curved beams has been studied by a large number of researchers. Due to the complexities of structural components, it is difficult to obtain an analytical solution for any boundary conditions. In order to overcome these difficulties, the differential quadrature method (DQM) has been applied for a large number of cases. In this study, DQM was used to solve the complicated partial differential equations for buckling analysis of curved beams. The governing differential equation was deduced and solved for beams subjected to uniformly distributed radial loads. Critical loads were calculated with various opening angles, boundary conditions, and parameters. The results of the DQM were compared with exact solutions for available cases, and the DQM gave outstanding accuracy even when only a small number of grid points was used. Critical loads were also calculated for the in-plane inextensional buckling of the asymmetric curved beams, and two theories were compared. The study of a beam with extensibility of the arch axis shows that the effects on the critical loads are significant.