In this paper, we propose an image watermark method using multiple decoding keys. The advantages of this method are that the multiple original images are reconstructed by using multiple decoding keys in the same watermark image, and that the quality of reconstructed images is clearly enhanced based on the idea of Walsh code without any side lobe components in the decoding process. The zero-padded original images, multiplied with random-phase pattern to each other, are Fourier transformed. Encoded images are then obtained by taking the real-valued data from these Fourier transformed images. The embedding images are obtained by the product of independent Walsh codes, and these spreaded phase-encoded images which are multiplied with new random-phase images. Also we obtain the decoding keys by multiplying these random-phase images with the same Walsh code images used in the embedding images. A watermark image is then made from the linear superposition of the weighted embedding images and a cover image, which is multiplied with a new independent Walsh code. The original image is simply reconstructed by the inverse-Fourier transform of the despreaded image of the multiplication between the watermark image and the decoding key. Computer simulations demonstrate the efficiency of the proposed watermark method with multiple decoding keys and a good robustness to the external attacks such as cropping and compression.
Park, Jea-Hoon;Moon, Sang-Jae;Ha, Jae-Cheol;Lee, Hoon-Jae
Journal of the Korea Institute of Information Security & Cryptology
/
v.18
no.5
/
pp.93-101
/
2008
Side channel attacks are well known as one of the most powerful physical attacks against low-power cryptographic devices and do not take into account of the target's theoretical security. As an important succeeding factor in side channel attacks (specifically in DPAs), exact time-axis alignment methods are used to overcome misalignments caused by trigger jittering, noise and even some countermeasures intentionally applied to defend against side channel attacks such as random clock generation. However, the currently existing alignment methods consider only on the position of signals on time-axis, which is ineffective for certain countermeasures based on time-axis misalignments. This paper proposes a new signal alignment method based on interpolation and decimation techniques. Our proposal can align the size as well as the signals' position on time-axis. The validity of our proposed method is then evaluated experimentally with a smart card chip, and the results demonstrated that the proposed method is more efficient than the existing alignment methods.
Journal of the Korea Institute of Information Security & Cryptology
/
v.13
no.3
/
pp.17-26
/
2003
Recently, as the internet is widespread rapidly among the public, people can use a variety of useful information services through the internet. Accordingly, the protection of information supplied by computer networks 5 has become a matter of primary concern on the whole world. To accede to the realistic demands, it has been worked out some countermeasures to cultivate the experts in information security by the government and many educational facilities. Already the government authority has carried out the each kinds of concerning projects under the framed a policy, Five-Year Development Plan for Information Security Technology. Also, many domestic universities perceives such an international trend, and so they frame their plans to train for the experts in this field, including to found a department with respect to the information security. They are ready to execute their tangible works, such as establishment of educational goal, development of teaching materials, planning curriculum, construction of laboratories and ensuring instructors. Moreover, such universities lead to their students who want to be information security experts to get the fundamental knowledge to lay the foundation for acquiring the information security technology in their bachelor course. In this note, we survey and analyze the curricula of newly-established or member-extended departments with respect to information security fields of some leading universities in the inside and outside of the country, and in conclusion, we propose the effective model of curriculum and educational goal to train the students for the information security experts.
This study investigated the effects of the urban forest and street trees on flow and temperature distribution in the Daegu National Debt Redemption Movement Memorial Park. For this, we implemented tree-drag and tree-cooling parameterization schemes in a computational fluid dynamics (CFD) model and validated the simulated wind speeds, wind directions, and air temperatures against the measured ones. We used the wind speeds, wind directions, air temperatures predicted by the local data assimilation and prediction system (LDAPS) as the inflow boundary conditions. To investigate the flow and thermal characteristics in the presence of trees in the target area, we conducted numerical experiments in the absence and presence of trees. In the absence of trees, strong winds and monotonous flows were formed inside the park, because there were no obstacles inducing friction. The temperature was inversely proportional to the wind speed. In the presence of trees, the wind speeds(temperatures) were reduced by more than 40 (5)% inside the park with a high planting density due to the tree drag (cooling) effect, and those also affected the wind speeds and temperatures outside the park. Even near the roadside, the wind speeds and temperatures were generally reduced by the trees, but the wind speeds and air temperatures increased partly due to the change in the flow pattern caused by tree drag.
The problem of maritime accidents due to the carelessness of fishing vessels, which is affected by the aging of fishing vessel operators. And there is navigation, communication and fish finder that is installed inside the narrow bridge of a fishing vessel. Therefore these system are monitors as many as of each terminal, which is bad influence on obscuring view of front sea from a fishing vessel bridge. In addition a large problem, it is occurs to reduce of the information recognition ability due to the confusion, which is can not check the display information each of screen equipments. Therefore, there has been demand to simply integrated the equipment, and it has wanted the integrated support system of these equipment. The display must be provided on a fishing vessels such as electronic charts, communications equipments and fish detection into one case. In this paper, the integrated system will be installed the GPS plotter, AIS, VHF-DSC, V-pass, fish finder and power supply in the narrow wheelhouse on a fishing vessel, which is configured in one case and operated by multi function display (MFD). The MFD is integrated to simplify for several multi terminals and provided necessary information on a single screen. This integration fishery support system will has improved in sea safety operation and fishery environment of fishing vessels by this implementation.
In the implementation of a P300 speller, rows and columns paradigm (RCP) is most commonly used. However, the RCP remains subject to adjacency-distraction error and double-flash problems. This study suggests a novel P300 speller stimuli presentation-the sub-block paradigm (SBP) that is likely to solve the problems effectively. Fifteen subjects participated in this experiment where both SBP and RCP were used to implement the P300 speller. Electroencephalography (EEG) activity was recorded from Fz, Cz, Pz, Oz, P3, P4, PO7, and PO8. Each paradigm consisted of a training phase to train a classifier and a testing phase to evaluate the speller. Eighteen characters were used for the target stimuli in the training phase. Additionally, 5 subjects were required to spell 50 characters and the rest of the subjects were to spell 25 characters in the testing phase. Classification accuracy results show that average accuracy was significantly higher in SBP as of 83.73% than that of RCP as of 66.40%. Grand mean event-related potentials (ERPs) at Pz show that positive peak amplitude for the target stimuli was greater in SBP compared to that of RCP. It was found that subjects tended to attend more to the characters in SBP. According to the participants' ratings on how comfortable they were with using each type of paradigm on 7-point Likert scale, most subjects responded 'very difficult' in RCP while responding 'medium' and 'easy' in SBP. The result showed that SBP was felt more comfortable than RCP by the subjects. In sum, the SBP was more correct in P300 speller performance as well as more convenient for users than the RCP. The actual limitations in the study were discussed in the last part of this paper.
Park, Ji-Man;Yi, Tae-Kyoung;Jung, Je-Kyo;Kim, Yong;Park, Eun-Jin;Han, Chong-Hyun;Koak, Jai-Young;Kim, Seong-Kyun;Heo, Seong-Joo
The Journal of Korean Academy of Prosthodontics
/
v.48
no.4
/
pp.294-300
/
2010
Purpose: The template-guided implant surgery offers several advantages over the traditional approach. The purpose of this study was to evaluate the accuracy of coordinate synchronization procedure with 5-axis milling machine for surgical template fabrication by means of reverse engineering through universal CAD software. Materials and methods: The study was performed on ten edentulous models with imbedded gutta percha stoppings which were hidden under silicon gingival form. The platform for synchordination was formed on the bottom side of models and these casts were imaged in Cone beam CT. Vectors of stoppings were extracted and transferred to those of planned implant on virtual planning software. Depth of milling process was set to the level of one half of stoppings and the coordinate of the data was synchronized to the model image. Synchronization of milling coordinate was done by the conversion process for the platform for the synchordination located on the bottom of the model. The models were fixed on the synchordination plate of 5-axis milling machine and drilling was done as the planned vector and depth based on the synchronized data with twist drill of the same diameter as GP stopping. For the 3D rendering and image merging, the impression tray was set on the conbeam CT and pre- and post- CT acquiring was done with the model fixed on the impression body. The accuracy analysis was done with Solidworks (Dassault systems, Concord, USA) by measuring vector of stopping’s top and bottom centers of experimental model through merging and reverse engineering the planned and post-drilling CT image. Correlations among the parameters were tested by means of Pearson correlation coefficient and calculated with SPSS (release 14.0, SPSS Inc. Chicago, USA) ($\alpha$ = 0.05). Results: Due to the declination, GP remnant on upper half of stoppings was observed for every drilled bores. The deviation between planned image and drilled bore that was reverse engineered was 0.31 (0.15 - 0.42) mm at the entrance, 0.36 (0.24 - 0.51) mm at the apex, and angular deviation was 1.62 (0.54 - 2.27)$^{\circ}$. There was positive correlation between the deviation at the entrance and that at the apex (Pearson Correlation Coefficient = 0.904, P = .013). Conclusion: The coordinate synchronization 5-axis milling procedure has adequate accuracy for the production of the guided surgical template.
Journal of Korean Home Economics Education Association
/
v.32
no.2
/
pp.59-76
/
2020
The purpose of this study was to develop and evaluate the teaching/learning process plan of 'housing culture and practical space use' for home economics in middle school according to the problem based learning(PBL) model. The plan consisting of 4-lessons has been developed and implemented following the steps of ADDIE model. Various activity materials (4 scenarios, 6 individual activity sheets, 10 reading texts, and 5 working resources) and visual materials (4 sets of ppt and 4 moving pictures) as well as questionnaire were developed for the 4-session lessons. The plans were implemented to a single class of 21 junior students at H middle school in rural area, Kyeongnam, from 1st to 12th of April, 2019. Students highly enjoyed and were satisfied with the whole 4-lessons in aspects such as understanding of the contents, adequacy of materials and activities, and usefulness in one's own daily life. Additionally, they have more actively participated in the lessons than usual and even interested in learning more of such lessons. Students also reported that they highly accomplished the goal of each lesson as well as overall objectives. They showed interest in the major part of PBL lesson such as scenario and group activities. And they engaged themselves in drawing the share housing space plan with '5D planner' web program which they described as the best part of the lessons. The teaching/learning process plan developed in this study may be used as a theme of maker education, which is emerging these days. It can be concluded that the PBL teaching/learning process plans for 'housing values and practical space use' would contribute to improving students' attitude on living with others and ability to manage one's individual life.
3D imaging systems using 2D phased arrays have a large number of active channels, compelling to use a very expensive and bulky beamforming hardware, and suffer from low volume rate because, in principle, at least one ultrasound transmit-receive event is necessary to construct each scanline. A high speed 3D imaging method using a cross array proposed previously to solve the above limitations can implement fast scanning and dynamic focusing in the lateral direction but suffer from low resolution except at the fixed transmit focusing along the elevational direction. To overcome these limitations, we propose a new real-time volumetric imaging method using a cross array based on the synthetic aperture technique. In the proposed method, ultrasound wave is transmitted successively using each elements of an 1D transmit array transducer, one at a time, which is placed along the elevational direction and for each firing, the returning pulse echoes are received using all elements of an 1D receive array transducer placed along the lateral direction. On receive, by employing the conventional dynamic focusing and synthetic aperture method along lateral and elevational directions, respectively, ultrasound waves can be focused effectively at all imaging points. In addition, in the proposed method, a volume of interest consisting of any required number of slice images, can be constructed with the same number of transmit-receive steps as the total number of transmit array elements. Computer simulation results show that the proposed method can provide the same and greatly improved resolutions in the lateral and elevational directions, respectively, compared with the 3D imaging method using a cross array based on the conventional fixed focusing. In the accompanying paper, we will also propose a new real-time 3D imaging method using a cross array for improving transmit power and elevational spatial resolution, which uses linear wave fronts on transmit.
Blood supply rather than nerve supply implies pulp vitality. To evaluate pulp vitality clinically, electric pulp test and thermal test which are based on sensory nerve response have been used in addition to many auxiliary data such as past dental history, visual inspection, radiographic examination, percussion, palpation and transillumination test. However, reactivity of the nerves to the stimulation is not synonymous with normalcy. Therefore measurement of pulpal blood flow using a laser Doppler flowmeter became a new trial to test the pulp vitality. The purpose of the present study was to evaluate normal pulpal blood flow level of maxillary teeth in adult to provide a guideline in determining the vitality of dental pulp. Pulpal blood flow was measured in maxillary central and lateral incisors, canines, first and second premolars and first molars of seventy nine adults of 22 - 30 years old using a laser Doppler flowmeter (PeriFlux 4001, Perimed Co., Stockholm, Sweden, 780 nm infrared laser, 1mW). For directly-made splints, silicone rubber impressions were taken directly from the mouth. For indirectly-made splints, alginate impressions were taken from the mouth and stone cast were made. After making depressions on the buccal surfaces of the cast teeth to indicate the hole positions, second impressions with vinyl polysyloxane putty were taken from the cast. Holes for the laser probes were made at the putty impressions 4mm above the gingival level. Laser probe (PF416 dental probe, 1.5mm) was inserted in the prepared hole and the splint was set in the mouth. After 10 minutes of patient relaxing, pulpal blood flow was recorded for 5 minutes on each tooth. The recorded flow was saved in the computer and calculated with a software 'Perisoft' version 5.1. Pulpal blood flow was also recorded in six teeth of five individuals with no response to electric pulp test and cold test, with periapical radiolucency, or with history of root canal treatment to compare with nonvital teeth. The difference between the mean flow values of each group of teeth were analyzed using one-way ANOVA and Duncan's Multiple Range test. The results were as follows: 1. The average pulpal blood flow values of all the tested teeth of each location were between 9 - 16 Perfusion Unit. Pulpal blood flow value was highest in maxillary lateral incisors, followed by first premolars, second premolars, canines, central incisors, and then first molars (p<0.01). 2. In six anterior teeth, indirectly-made splint group showed higher pulpal blood flow values than directly-made splint group (p<0.01). In posterior teeth, however, there was no significant flow value difference between directly-made splint group and indirectly-made splint one (p>0.05). 3. Teeth with vital pulps showed higher signal values than teeth with nonvital pulps (p<0.01), and the flow photographs showed heartbeat-synchronous fluctuations and vasomotions, while those were absent in non vital tooth.
본 웹사이트에 게시된 이메일 주소가 전자우편 수집 프로그램이나
그 밖의 기술적 장치를 이용하여 무단으로 수집되는 것을 거부하며,
이를 위반시 정보통신망법에 의해 형사 처벌됨을 유념하시기 바랍니다.
[게시일 2004년 10월 1일]
이용약관
제 1 장 총칙
제 1 조 (목적)
이 이용약관은 KoreaScience 홈페이지(이하 “당 사이트”)에서 제공하는 인터넷 서비스(이하 '서비스')의 가입조건 및 이용에 관한 제반 사항과 기타 필요한 사항을 구체적으로 규정함을 목적으로 합니다.
제 2 조 (용어의 정의)
① "이용자"라 함은 당 사이트에 접속하여 이 약관에 따라 당 사이트가 제공하는 서비스를 받는 회원 및 비회원을
말합니다.
② "회원"이라 함은 서비스를 이용하기 위하여 당 사이트에 개인정보를 제공하여 아이디(ID)와 비밀번호를 부여
받은 자를 말합니다.
③ "회원 아이디(ID)"라 함은 회원의 식별 및 서비스 이용을 위하여 자신이 선정한 문자 및 숫자의 조합을
말합니다.
④ "비밀번호(패스워드)"라 함은 회원이 자신의 비밀보호를 위하여 선정한 문자 및 숫자의 조합을 말합니다.
제 3 조 (이용약관의 효력 및 변경)
① 이 약관은 당 사이트에 게시하거나 기타의 방법으로 회원에게 공지함으로써 효력이 발생합니다.
② 당 사이트는 이 약관을 개정할 경우에 적용일자 및 개정사유를 명시하여 현행 약관과 함께 당 사이트의
초기화면에 그 적용일자 7일 이전부터 적용일자 전일까지 공지합니다. 다만, 회원에게 불리하게 약관내용을
변경하는 경우에는 최소한 30일 이상의 사전 유예기간을 두고 공지합니다. 이 경우 당 사이트는 개정 전
내용과 개정 후 내용을 명확하게 비교하여 이용자가 알기 쉽도록 표시합니다.
제 4 조(약관 외 준칙)
① 이 약관은 당 사이트가 제공하는 서비스에 관한 이용안내와 함께 적용됩니다.
② 이 약관에 명시되지 아니한 사항은 관계법령의 규정이 적용됩니다.
제 2 장 이용계약의 체결
제 5 조 (이용계약의 성립 등)
① 이용계약은 이용고객이 당 사이트가 정한 약관에 「동의합니다」를 선택하고, 당 사이트가 정한
온라인신청양식을 작성하여 서비스 이용을 신청한 후, 당 사이트가 이를 승낙함으로써 성립합니다.
② 제1항의 승낙은 당 사이트가 제공하는 과학기술정보검색, 맞춤정보, 서지정보 등 다른 서비스의 이용승낙을
포함합니다.
제 6 조 (회원가입)
서비스를 이용하고자 하는 고객은 당 사이트에서 정한 회원가입양식에 개인정보를 기재하여 가입을 하여야 합니다.
제 7 조 (개인정보의 보호 및 사용)
당 사이트는 관계법령이 정하는 바에 따라 회원 등록정보를 포함한 회원의 개인정보를 보호하기 위해 노력합니다. 회원 개인정보의 보호 및 사용에 대해서는 관련법령 및 당 사이트의 개인정보 보호정책이 적용됩니다.
제 8 조 (이용 신청의 승낙과 제한)
① 당 사이트는 제6조의 규정에 의한 이용신청고객에 대하여 서비스 이용을 승낙합니다.
② 당 사이트는 아래사항에 해당하는 경우에 대해서 승낙하지 아니 합니다.
- 이용계약 신청서의 내용을 허위로 기재한 경우
- 기타 규정한 제반사항을 위반하며 신청하는 경우
제 9 조 (회원 ID 부여 및 변경 등)
① 당 사이트는 이용고객에 대하여 약관에 정하는 바에 따라 자신이 선정한 회원 ID를 부여합니다.
② 회원 ID는 원칙적으로 변경이 불가하며 부득이한 사유로 인하여 변경 하고자 하는 경우에는 해당 ID를
해지하고 재가입해야 합니다.
③ 기타 회원 개인정보 관리 및 변경 등에 관한 사항은 서비스별 안내에 정하는 바에 의합니다.
제 3 장 계약 당사자의 의무
제 10 조 (KISTI의 의무)
① 당 사이트는 이용고객이 희망한 서비스 제공 개시일에 특별한 사정이 없는 한 서비스를 이용할 수 있도록
하여야 합니다.
② 당 사이트는 개인정보 보호를 위해 보안시스템을 구축하며 개인정보 보호정책을 공시하고 준수합니다.
③ 당 사이트는 회원으로부터 제기되는 의견이나 불만이 정당하다고 객관적으로 인정될 경우에는 적절한 절차를
거쳐 즉시 처리하여야 합니다. 다만, 즉시 처리가 곤란한 경우는 회원에게 그 사유와 처리일정을 통보하여야
합니다.
제 11 조 (회원의 의무)
① 이용자는 회원가입 신청 또는 회원정보 변경 시 실명으로 모든 사항을 사실에 근거하여 작성하여야 하며,
허위 또는 타인의 정보를 등록할 경우 일체의 권리를 주장할 수 없습니다.
② 당 사이트가 관계법령 및 개인정보 보호정책에 의거하여 그 책임을 지는 경우를 제외하고 회원에게 부여된
ID의 비밀번호 관리소홀, 부정사용에 의하여 발생하는 모든 결과에 대한 책임은 회원에게 있습니다.
③ 회원은 당 사이트 및 제 3자의 지적 재산권을 침해해서는 안 됩니다.
제 4 장 서비스의 이용
제 12 조 (서비스 이용 시간)
① 서비스 이용은 당 사이트의 업무상 또는 기술상 특별한 지장이 없는 한 연중무휴, 1일 24시간 운영을
원칙으로 합니다. 단, 당 사이트는 시스템 정기점검, 증설 및 교체를 위해 당 사이트가 정한 날이나 시간에
서비스를 일시 중단할 수 있으며, 예정되어 있는 작업으로 인한 서비스 일시중단은 당 사이트 홈페이지를
통해 사전에 공지합니다.
② 당 사이트는 서비스를 특정범위로 분할하여 각 범위별로 이용가능시간을 별도로 지정할 수 있습니다. 다만
이 경우 그 내용을 공지합니다.
제 13 조 (홈페이지 저작권)
① NDSL에서 제공하는 모든 저작물의 저작권은 원저작자에게 있으며, KISTI는 복제/배포/전송권을 확보하고
있습니다.
② NDSL에서 제공하는 콘텐츠를 상업적 및 기타 영리목적으로 복제/배포/전송할 경우 사전에 KISTI의 허락을
받아야 합니다.
③ NDSL에서 제공하는 콘텐츠를 보도, 비평, 교육, 연구 등을 위하여 정당한 범위 안에서 공정한 관행에
합치되게 인용할 수 있습니다.
④ NDSL에서 제공하는 콘텐츠를 무단 복제, 전송, 배포 기타 저작권법에 위반되는 방법으로 이용할 경우
저작권법 제136조에 따라 5년 이하의 징역 또는 5천만 원 이하의 벌금에 처해질 수 있습니다.
제 14 조 (유료서비스)
① 당 사이트 및 협력기관이 정한 유료서비스(원문복사 등)는 별도로 정해진 바에 따르며, 변경사항은 시행 전에
당 사이트 홈페이지를 통하여 회원에게 공지합니다.
② 유료서비스를 이용하려는 회원은 정해진 요금체계에 따라 요금을 납부해야 합니다.
제 5 장 계약 해지 및 이용 제한
제 15 조 (계약 해지)
회원이 이용계약을 해지하고자 하는 때에는 [가입해지] 메뉴를 이용해 직접 해지해야 합니다.
제 16 조 (서비스 이용제한)
① 당 사이트는 회원이 서비스 이용내용에 있어서 본 약관 제 11조 내용을 위반하거나, 다음 각 호에 해당하는
경우 서비스 이용을 제한할 수 있습니다.
- 2년 이상 서비스를 이용한 적이 없는 경우
- 기타 정상적인 서비스 운영에 방해가 될 경우
② 상기 이용제한 규정에 따라 서비스를 이용하는 회원에게 서비스 이용에 대하여 별도 공지 없이 서비스 이용의
일시정지, 이용계약 해지 할 수 있습니다.
제 17 조 (전자우편주소 수집 금지)
회원은 전자우편주소 추출기 등을 이용하여 전자우편주소를 수집 또는 제3자에게 제공할 수 없습니다.
제 6 장 손해배상 및 기타사항
제 18 조 (손해배상)
당 사이트는 무료로 제공되는 서비스와 관련하여 회원에게 어떠한 손해가 발생하더라도 당 사이트가 고의 또는 과실로 인한 손해발생을 제외하고는 이에 대하여 책임을 부담하지 아니합니다.
제 19 조 (관할 법원)
서비스 이용으로 발생한 분쟁에 대해 소송이 제기되는 경우 민사 소송법상의 관할 법원에 제기합니다.
[부 칙]
1. (시행일) 이 약관은 2016년 9월 5일부터 적용되며, 종전 약관은 본 약관으로 대체되며, 개정된 약관의 적용일 이전 가입자도 개정된 약관의 적용을 받습니다.