• Title/Summary/Keyword: 주소정보

Search Result 1,330, Processing Time 0.027 seconds

Design of Stereo Image Match Processor for Real Time Stereo Matching (실시간 스테레오 정합을 위한 스테레오 영상 정합 프로세서 설계)

  • Kim, Yeon-Jae;Sim, Deok-Seon
    • Journal of the Institute of Electronics Engineers of Korea SC
    • /
    • v.37 no.2
    • /
    • pp.50-59
    • /
    • 2000
  • Stereo vision is a technique extracting depth information from stereo images, which are two images that view an object or a scene from different locations. The most important procedure in stereo vision, which is called stereo matching, is to find the same points in stereo images. It is difficult to match stereo images in real time because stereo matching requires heavy calculation. In this Paper we design a digital VLSI to Process stereo matching in real time, which we call stereo image match processor (SIMP). For implementation of real time stereo matching, sliding memory and minimum selection tree are presented. SIMP is designed with pipeline architecture and parallel processing. SIMP takes 64 gray level 64$\times$64 stereo images and yields 8 level 64 $\times$64 disparity map by 3 bit disparity and 12 bit address outputs. SIMP can process stereo images with process speed of 240 frames/sec.

  • PDF

Full mouth rehabilitation of class III patient with disharmonious occlusal plane: A case report (Class III 악간관계와 교합평면 부조화를 보이는 환자의 전악수복증례)

  • Kim, Hayeong;Paek, Janghyun;Kwon, Kung-Rock;Pae, Ahran
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.54 no.4
    • /
    • pp.451-457
    • /
    • 2016
  • Prosthodontic decision-making process is done through analysis of clinical information and mutual communication between patient and dentist. When opposing teeth are extruded due to missing tooth or tooth defects, selection of appropriate treatment plan and predictory prognosis can be complicated in functional rehabilitation. In case of severely disharmonious occlusal plane result from extruded teeth, re-establishment of the occlusal plane is required, if necessary via prudent evaluation. In this case, class III patient had unesthetic appearance and mastication discomfort caused by disharmonious occlusal plane due to severe extrusion. Through a structured diagnostic process, appropriate treatment plan was selected. Esthetic and functional results were obtained through from full mouth rehabilitation with re-establishment of the occlusal plane.

A Scalable and Practical Authentication Protocol in Mobile IP (Mobile IP에서 확장성과 실용성 있는 인증 프로토콜 제안 및 분석)

  • Lee, Yong;Lee, Goo-Yeon
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.42 no.11
    • /
    • pp.35-44
    • /
    • 2005
  • In Mobile IP protocol, because a mobile node still uses its home IP address even though it moves to foreign network from home network, authentication among mobile node, foreign network and home network is critical issue. Many researches about this issue have been based on shared secret, for example mobile node and home agent authenticate each other with pre-shared symmetry key. And they missed several security issues such as replay attack. Although public key scheme could be applied to this issue easily, since the public key cryptography is computationally complicated, it still has the problem that it is not practical to realistic environment. In this paper, we describe several security issues in Mobile IP protocol. And we propose new Mobile IP authentication protocol that is applicable to realistic environment using public key algorithm based on certificate. It has scalability for mobile nodes and is applicable to the original Mobile IP protocol without any change. Finally we prove security of the proposed protocol and that it might not affect performance of the original Mobile IP protocol.

A Study on the Transition of Elements of the Book Colophon in Korea (우리나라의 도서 판권기 기술요소 변천 고찰)

  • Lee, Myoung-Gyu
    • Journal of Korean Library and Information Science Society
    • /
    • v.41 no.3
    • /
    • pp.329-349
    • /
    • 2010
  • Colophon means an element to describe bibliographic areas of the concerned book on the specific space like a back of the title page or the last page of a book. Colophon functioned as an information source when cataloging in a library, an area concerning the copyright and as an useful information to readers. The publication of a new book has begun since early 1900s in Korea. And the element of the colophon is dependent on changes in the social and cultural environment. Among the element of the colophon early 1900s until now, the elements consistently appear on the title and the author, a place of publication, a publisher, the date of publication and the price. Additional the elements according to the change of social environment are the edition, ISBN, the registration of publisher, the address of publisher and an author career. On the other hand, omitted elements are the address of author, the account number and the seal. In the future, the size of the book is additionally wanted to describe in the colophon.

  • PDF

Internal Network Partition Security Model Based Authentication using BlockChain Management Server in Cloud Environment (클라우드 환경에서 블록체인관리서버를 이용한 인증기반 내부망 분리 보안 모델)

  • Kim, Young Soo;Lee, Byoung Yup
    • The Journal of the Korea Contents Association
    • /
    • v.18 no.6
    • /
    • pp.434-442
    • /
    • 2018
  • Recently, the threat to the security and damage of important data leaked by devices of intranet infected by malicious code through the Internet have been increasing. Therefore, the partitioned intranet model that blocks access to the server for business use by implementing authentication of devices connected to the intranet is required. For this, logical net partition with the VDI(Virtual Desktop Infrastructure) method is no information exchange between physical devices connected to the intranet and the virtual device so that it could prevent data leakage and improve security but it is vulnerable to the attack to expose internal data, which has access to the server for business connecting a nonregistered device into the intranet. In order to protect the server for business, we suggest a blockchain based network partition model applying blockchain technology to VDI. It contributes to decrease in threat to expose internal data by improving not only capability to verify forgery of devices, which is the vulnerability of the VDI based logical net partition, but also the integrity of the devices.

Block Turbo Codes for High Order Modulation and Transmission Over a Fast Fading Environment (고차원변조 방식 및 고속 페이딩 전송 환경을 위한 블럭터보부호)

  • Jin, Xianggunag;Kim, Soo-Young;Kim, Won-Yong;Cho, Yong-Hoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37 no.6A
    • /
    • pp.420-425
    • /
    • 2012
  • A forward error correction (FEC) coding techniques is one of time diversity techniques with which the effect of channel impairments due to noise and fading are spreaded over independently, and thus the performance could be improved. Therefore, the performance of the FEC scheme can be maximized if we minimize the correlation of channel information across over a codeword. In this paper, we propose a block turbo code with the maximized time diversity effect which may be reduced due to utilization of high order modulation schemes and due to transmission over a comparatively fast fading environment. Especially, we propose a very simple formula to calculate the address of coded bit allocation, and thus we do not need any additional outer interleavers, i.e., inter-codeword interleavers. The simulation resuts investigated in this paper reveal that the proposed scheme can provide the performance gain of more than a few decibels compared to the conventional schemes.

Authentication Method based on AAA to Traverse the VPN Gateway in Mobile IPv4 (Mobile IPv4에서 VPN 게이트웨이 통과를 위한 AAA 기반의 인증 방법)

  • Kim, Mi-Young;Mun, Young-Song
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.4B
    • /
    • pp.191-199
    • /
    • 2007
  • Mobile node has to register its current location to Home Agent when it moves to another network while away from home. However, the registration procedure cannot be completed successfully when Home Agent is protected by the VPN gateway which guards MN's home network and discards the unauthorized packets incoming from outside as a lack of security association(SA) between the Care-of address and security policy of the home network so that the binding registration message without SA is discarded smoothly by the VPN gateway. This paper presents the authentication and key exchange scheme using the AAA infrastructure for a user in Internet to access the home network behind the VPN gateway. By defining the role of authentication and tunnel processing for each agent or relay entity, this paper presents the procedure to register the current location to its Home Agent with secure manner. Performance result shows cost improvement up to 40% comparing with existing scheme in terms of the packet loss cost, the property of mobility and traffic.

A Study on the Effects of Intangible attribute of Hallyu in China on Korean National Image (중국에서 간접적 한류체험의 국가이미지 효과 분석)

  • Lee, Ji-Na
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.1
    • /
    • pp.93-98
    • /
    • 2020
  • The study aims to understand how indirect hallyu experiences in the Chinese market affect Korea's national brand image and willingness to purchase Korean goods from the perspective of "content consumption" and "recognition of Korea's." To that end, a total of 178 Chinese university students in the Beijing and Shanghai regions were analyzed. According to research and analysis, the perception of indirect hallyu experience has had a positive affection not only on the Korean national image but also on the willingness to purchase Korean products. Also, the halo effect came as Korea's national image had a positive effect on quite a lot of intentions to buy Korean merchandise. The recognition of South Korea can be enhanced by the spread of hallyu, which can be a decisive gauge of a favorable impression of the country in a short time.

An Improved Handoff and Resource Reservation Scheme Using Triggers in Wireless Network (이동망에서 트리거를 이용한 향상된 핸드오프 메커니즘 및 자원예약 방안)

  • Lee, Don-Su;Min, Sang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.32 no.10B
    • /
    • pp.630-637
    • /
    • 2007
  • In this paper, we propose an effective handoff mechanism using events at the layer 2 and a tunnel-based mechanism that is performed by sharing information of a mobile node and anticipated-based handoff. Also, we propose a novel anticipated-reservation mechanism using the events triggered at layer 2 to make easy a resource reservation procedure. Comparing with the existing mobile IPv6 handoff mechanism, our proposed handoff mechanism can reduce an amount of handoff latency and traffic volume between access routers where handoff is performed. In the anticipated-reservation mechanism, the amount of signaling traffics between an mobile node and the correspondent nodes can be reduced and then the allocation of resource can be accomplished. We present the performance of our proposed handoff mechanism in the wireless network environment by ns-2 simulation. Although the anticipated-reservation mechanism including a proxy agent is explained without performance evaluation, we can validate the operation of our proposed model only by the procedure of message flow.

Implementation of Web services for Slip Data Process (전표데이터 처리를 위한 웹서비스 구현)

  • 황의철;정민영;정선태
    • The Journal of the Korea Contents Association
    • /
    • v.3 no.2
    • /
    • pp.57-64
    • /
    • 2003
  • A Web Service is an URL addressable set of functionality that is exposed over a network to serve as a building Hock for creating distributed applications. SOAP is a protocol that Web Service consumers often use, when they request and response to a Web Service, and it is a lightweight, XML-based protocol over HTTP for exchange to information in decentralized, distributed environments. A Web Service is very useful forimplementing common functions in especially a large size business area, because it is invoked by a protocol like HTTP or SOAP that we easily use, and by an XML-based data format In this paper, we implement Web Services that process dip data by computers in enterprise accounts in order to enhance the transparency and productivity of enterprises. we analyse the structure of slip data, design dip database, implement stored procedures for manipulating data of slip database, and make thorn controlled by Web Services. The result of this paper will contribute to the standardization and activation of accounting process systems for e-business area.

  • PDF