• Title/Summary/Keyword: Block Based Information

Search Result 2,213, Processing Time 0.024 seconds

A Basic Study of Construction Procurement Management using Block Chain & Big Data Technology (블록체인과 빅데이터 기술을 이용한 건설 조달 관리 기초 연구)

  • Kim, Ki-Ho;Son, Seung-Hyun;Kim, Sun-Kuk
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2019.05a
    • /
    • pp.127-128
    • /
    • 2019
  • The cost of procurement in construction projects varies depending on the type of project, but the proportion of the cost component is very large. Therefore, efficient procurement system operation affects the success of the project. However, difficulties arise in procurement management due to problems such as availability of data due to limited information, inaccurate scheduling and integration of costs. Therefore, the purpose of this study is to develop a procurement management system to help efficient communication decision by combining Big Data which can analyze a lot of information and Block Chain technology which can secure information and record reliability to satisfy the above requirements. The results of this study are used to develop a system to develop academically improved procurement management system and practically to develop a system to secure business competitiveness and to facilitate rapid communication among project participants.

  • PDF

An error concealment method using projections onto the overcomplete basis (오버컴플릿 기저에 대한 사영을 이용한 오류 은닉 기법)

  • 장준호;김정권;이충웅
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.5
    • /
    • pp.1107-1115
    • /
    • 1997
  • In this paper, we propose an error concealment method to recovre damaged block-based image coding schemes. Channel errors during transmission of image data such as bit errors or cell loss result in damaged image blocks in the reconstructed images. To recover damaged blocks is to estimate them using the correctly received or undamaged neighborhood information. In the proposed method, an overcomplete basis for a large block containing a damaged block at its center is introduced and damaged blocks are recovered by sequentially projecting the known neighborhood information onto the overcomplete basis function. Computer simulations show that the proposed algorithm outperforms the conventional method in subjectie recovery qualities as well as objective ones.

  • PDF

Data Hiding in Halftone Images by XOR Block-Wise Operation with Difference Minimization

  • Yang, Ching-Nung;Ye, Guo-Cin;Kim, Cheon-Shik
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.2
    • /
    • pp.457-476
    • /
    • 2011
  • This paper presents an improved XOR-based Data Hiding Scheme (XDHS) to hide a halftone image in more than two halftone stego images. The hamming weight and hamming distance is a very important parameter affecting the quality of a halftone image. For this reason, we proposed a method that involves minimizing the hamming weights and hamming distances between the stego image and cover image in $2{\times}2$-pixel grids. Moreover, our XDHS adopts a block-wise operation to improve the quality of a halftone image and stego images. Furthermore, our scheme improves security by using a block-wise operation with A-patterns and B-patterns. Our XDHS method achieves a high quality with good security compared to the prior arts. An experiment verified the superiority of our XDHS compared with previous methods.

Research on the Security Level of µ2 against Impossible Differential cryptanalysis

  • Zhang, Kai;Lai, Xuejia;Guan, Jie;Hu, Bin
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.3
    • /
    • pp.972-985
    • /
    • 2022
  • In the year 2020, a new lightweight block cipher µ2 is proposed. It has both good software and hardware performance, and it is especially suitable for constrained resource environment. However, the security evaluation on µ2 against impossible differential cryptanalysis seems missing from the specification. To fill this gap, an impossible differential cryptanalysis on µ2 is proposed. In this paper, firstly, some cryptographic properties on µ2 are proposed. Then several longest 7-round impossible differential distinguishers are constructed. Finally, an impossible differential cryptanalysis on µ2 reduced to 10 rounds is proposed based on the constructed distinguishers. The time complexity for the attack is about 269.63 10-round µ2 encryptions, the data complexity is O(248), and the memory complexity is 263.57 Bytes. The reported result indicates that µ2 reduced to 10 rounds can't resist against impossible differential cryptanalysis.

Magnifying Block Diagonal Structure for Spectral Clustering (스펙트럼 군집화에서 블록 대각 형태의 유사도 행렬 구성)

  • Heo, Gyeong-Yong;Kim, Kwang-Baek;Woo, Young-Woon
    • Journal of Korea Multimedia Society
    • /
    • v.11 no.9
    • /
    • pp.1302-1309
    • /
    • 2008
  • Traditional clustering methods, like k-means or fuzzy clustering, are prototype-based methods which are applicable only to convex clusters. On the other hand, spectral clustering tries to find clusters only using local similarity information. Its ability to handle concave clusters has gained the popularity recent years together with support vector machine (SVM) which is a kernel-based classification method. However, as is in SVM, the kernel width plays an important role and has a great impact on the result. Several methods are proposed to decide it automatically, it is still determined based on heuristics. In this paper, we proposed an adaptive method deciding the kernel width based on distance histogram. The proposed method is motivated by the fact that the affinity matrix should be formed into a block diagonal matrix to generate the best result. We use the tradition Euclidean distance together with the random walk distance, which make it possible to form a more apparent block diagonal affinity matrix. Experimental results show that the proposed method generates more clear block structured affinity matrix than the existing one does.

  • PDF

Moving Object Extraction Based on Block Motion Vectors (블록 움직임벡터 기반의 움직임 객체 추출)

  • Kim Dong-Wook;Kim Ho-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.8
    • /
    • pp.1373-1379
    • /
    • 2006
  • Moving object extraction is one of key research topics for various video services. In this study, a new moving object extraction algorithm is introduced to extract objects using block motion vectors in video data. To do this, 1) a maximum a posteriori probability and Gibbs random field are used to obtain real block motion vectors,2) a 2-D histogram technique is used to determine a global motion, 3) additionally, a block segmentation is fellowed. In the computer simulation results, the proposed technique shows a good performance.

A Weighted Block-by-Block Decoding Algorithm for CPM-QC-LDPC Code Using Neural Network

  • Xu, Zuohong;Zhu, Jiang;Zhang, Zixuan;Cheng, Qian
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3749-3768
    • /
    • 2018
  • As one of the most potential types of low-density parity-check (LDPC) codes, CPM-QC-LDPC code has considerable advantages but there still exist some limitations in practical application, for example, the existing decoding algorithm has a low convergence rate and a high decoding complexity. According to the structural property of this code, we propose a new method based on a CPM-RID decoding algorithm that decodes block-by-block with weights, which are obtained by neural network training. From the simulation results, we can conclude that our proposed method not only improves the bit error rate and frame error rate performance but also increases the convergence rate, when compared with the original CPM-RID decoding algorithm and scaled MSA algorithm.

Optimal Block Matching Motion Estimation Using the Minimal Deviation of Motion Compensation Error Between Moving Regions (움직임 영역간 움직임 보상오차의 최소편차를 이용한 최적 블록정합 움직임 추정)

  • Jo, Yeong-Chang;Lee, Tae-Heung
    • The KIPS Transactions:PartB
    • /
    • v.8B no.5
    • /
    • pp.557-564
    • /
    • 2001
  • In general, several moving regions with different motions coexist in a block located on motion boundaries in the block-based motion estimation. In this case the motion compensation error(MCEs) are different with the moving regions. This is inclined to deteriorate the quality of motion compensated images because of the inaccurate motions estimated from the conventional mean absolute error(MAE) based matching function in which the matching error per pixel is accumulate throughout the block. In this paper, we divided a block into the regions according to their motions using the motion information of the spatio-temporally neighboring blocks and calculate the average MCF for each moving mentioned. From the simulation results, we showed the improved performance of the proposed method by comparing the results from other methods such as the full search method and the edge oriented block matching algorithm. Especially, we improved the quality of the motion compensated images of blocks on motion boundaries.

  • PDF

A Block-based Motion Detection Algorithm with Adaptive Thresholds for Digital Video Surveillance Systems (적응적으로 임계값을 결정하는 블럭 기반의 디지털 감시 시스템용 움직임 검출 알고리즘)

  • Yang, Yun-Seok;Lee, Dong-Ho
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.37 no.5
    • /
    • pp.31-41
    • /
    • 2000
  • This paper proposes a block-based motion detection algorithm for digital video surveillance system which adaptively decides the threshold according to the kinds of images We first compute the features of a block after dividing each Image into small sub-block regions, and analyze performance of the motion detection algorithm based on statistic features by using the proposed threshold-decision method. Motion vectors are used to analyze motion degree and adaptively determine the threshold The simulation results show the performances of motion detection algorithms according to sub-block size, statistic features, noise, and threshold.

  • PDF

Block Fragile Watermarking Based on LUT (LUT 기반의 블록 연성 워터마킹)

  • Joo Eun-Kyong;Kang Hyun-Ho;Park Ji-Hwan
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1294-1303
    • /
    • 2004
  • This paper proposes new block fragile watermarking for image authentication and integrity by using the existing pixel-based scheme and block-based scheme. The proposed scheme is performed as fellows. First, we choose LUT(Look Up Table) from each pixel of original image and information of the corresponding block. Next, we insert a watermark, modifying original image with values to compare binary original image with the watermark to be embedded. As a result, we provide the means to overcome some weakness of the existing scheme. Binary logo as watermark can be detected from watermarked image and altered location can also be detected by the unit of pixel or that of block in our scheme.

  • PDF