• Title/Summary/Keyword: Cat Map

Search Result 22, Processing Time 0.021 seconds

Use of GIS to Develop a Multivariate Habitat Model for the Leopard Cat (Prionailurus bengalensis) in Mountainous Region of Korea

  • Rho, Paik-Ho
    • Journal of Ecology and Environment
    • /
    • v.32 no.4
    • /
    • pp.229-236
    • /
    • 2009
  • A habitat model was developed to delineate potential habitat of the leopard cat (Prionailurus bengalensis) in a mountainous region of Kangwon Province, Korea. Between 1997 and 2005, 224 leopard cat presence sites were recorded in the province in the Nationwide Survey on Natural Environments. Fifty percent of the sites were used to develop a habitat model, and the remaining sites were used to test the model. Fourteen environmental variables related to topographic features, water resources, vegetation and human disturbance were quantified for 112 of the leopard cat presence sites and an equal number of randomly selected sites. Statistical analyses (e.g., t-tests, and Pearson correlation analysis) showed that elevation, ridges, plains, % water cover, distance to water source, vegetated area, deciduous forest, coniferous forest, and distance to paved road differed significantly (P < 0.01) between presence and random sites. Stepwise logistic regression was used to develop a habitat model. Landform type (e.g., ridges vs. plains) is the major topographic factor affecting leopard cat presence. The species also appears to prefer deciduous forests and areas far from paved roads. The habitat map derived from the model correctly classified 93.75% of data from an independent sample of leopard cat presence sites, and the map at a regional scale showed that the cat's habitats are highly fragmented. Protection and restoration of connectivity of critical habitats should be implemented to preserve the leopard cat in mountainous regions of Korea.

CAD/CAM/CAT Turmaround System for Precision Machining (정밀가공을 위한 CAD/CAM/CAT 일괄처리시스템)

  • 안중용;김승철;정성종
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 1993.10a
    • /
    • pp.417-422
    • /
    • 1993
  • In order to minimize turnaround of machining in FMS lines, CAD/CAM/CAT integrated system called MascCAM was developed. Developing enhanced CAM and inspection modules in the MascCAM environment, 2D came, 2 $^{1}$2/ D prismatic parts and 3D free-formed surfaces were able to be automatically designed, manufactured and inspected on the machine tools by using AutoCAM and Z-map. Introducing Z-map technique, the MascCAM was able to be interfaceed with and CAD system. Developed QPPGT module generates a quick and fool-proof inspection work to users. A vertical and a horizontal machining center equipped with FANUC OMC were used for experiments. Performance of the system was confirmed by a large amount of experiments.

  • PDF

1D FN-MLCA and 3D Chaotic Cat Map Based Color Image Encryption (1차원 FN-MLCA와 3차원 카오틱 캣 맵 기반의 컬러 이미지 암호화)

  • Choi, Un Sook
    • Journal of Korea Multimedia Society
    • /
    • v.24 no.3
    • /
    • pp.406-415
    • /
    • 2021
  • The worldwide spread of the Internet and the digital information revolution have resulted in a rapid increase in the use and transmission of multimedia information due to the rapid development of communication technologies. It is important to protect images in order to prevent problems such as piracy and illegal distribution. To solve this problem, I propose a new digital color image encryption algorithm in this paper. I design a new pseudo-random number generator based on 1D five-neighborhood maximum length cellular automata (FN-MLCA) to change the pixel values of the plain image into unpredictable values. And then I use a 3D chaotic cat map to effectively shuffle the positions of the image pixel. In this paper, I propose a method to construct a new MLCA by modeling 1D FN-MLCA. This result is an extension of 1D 3-neighborhood CA and shows that more 1D MLCAs can be synthesized. The safety of the proposed algorithm is verified through various statistical analyses.

A Study on Korean Related Identities of the OCLC WorldCat Identities Network (OCLC WorldCat Identities Network의 한국 관련 아이덴티티에 관한 연구)

  • Yoon, Cheong-Ok
    • Journal of Korean Library and Information Science Society
    • /
    • v.46 no.4
    • /
    • pp.451-470
    • /
    • 2015
  • The purpose of this study is to review the processing of Korean related personal identities included in the OCLC WorldCat Identities Network and propose how to improve its errors. With twelve samples of English and Korean personal and subject identities, their related identities and works were examined, and their bibliographic records were retrieved from WorldCat. In searching WorldCat, inconsistencies in default search queries and the processing of identities with a date or a fuller form of name were observed.

Image Encryption by C-MLCA and 3-dimensional Chaotic Cat Map using Laplace Expansions (C-MLCA와 Laplace 전개를 이용한 3차원 카오스 캣맵에 의한 영상 암호)

  • Cho, Sung-Jin;Kim, Han-Doo;Choi, Un-Sook;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.6
    • /
    • pp.1187-1196
    • /
    • 2019
  • Information security has become a major challenge with the advent of cloud and social networking sites. Conventional encryption algorithms might not be suitable for image encryption because of the large data size and high redundancy among the raw pixels of a digital image. In this paper, we generalize the encryption method for of color image proposed by Jeong et al. to color image encryption using parametric 3-dimensional chaotic cat map using Laplace expansion and C-MLCA. Through rigorous experiments, we demonstrate that the proposed new image encryption system provides high security and reliability.

Image Encryption using Shrinking Generator based on CA (CA기반의 수축생성기를 이용한 영상 암호)

  • Choi, Un-Sook;Cho, Sung-Jin;Kim, Han-Doo;Kang, Sung-Won
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.15 no.1
    • /
    • pp.179-184
    • /
    • 2020
  • Cellular automata (CA), which is known as a pseudo random number generator due to its excellent randomness, has various applications. Cho et al. designed a CA-based shrinking generator to generate a long period of nonlinear sequence. In addition, chaotic cat maps have been studied by many researchers as the complex nonlinear dynamics systems with sensitivity in initial conditions and unpredictable characteristics. In this paper, we propose a new image encryption method using nonlinear sequence generated by CA-based shrinking generator with maximum period and 3D chaotic cat map for high security.

THE PROXIMAL POINT ALGORITHM IN UNIFORMLY CONVEX METRIC SPACES

  • Choi, Byoung Jin;Ji, Un Cig
    • Communications of the Korean Mathematical Society
    • /
    • v.31 no.4
    • /
    • pp.845-855
    • /
    • 2016
  • We introduce the proximal point algorithm in a p-uniformly convex metric space. We first introduce the notion of p-resolvent map in a p-uniformly convex metric space as a generalization of the Moreau-Yosida resolvent in a CAT(0)-space, and then we secondly prove the convergence of the proximal point algorithm by the p-resolvent map in a p-uniformly convex metric space.

An Image Encryption Scheme Based on Concatenated Torus Automorphisms

  • Mao, Qian;Chang, Chin-Chen;Wu, Hsiao-Ling
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.6
    • /
    • pp.1492-1511
    • /
    • 2013
  • A novel, chaotic map that is based on concatenated torus automorphisms is proposed in this paper. As we know, cat map, which is based on torus automorphism, is highly chaotic and is often used to encrypt information. But cat map is periodic, which decreases the security of the cryptosystem. In this paper, we propose a novel chaotic map that concatenates several torus automorphisms. The concatenated mechanism provides stronger chaos and larger key space for the cryptosystem. It is proven that the period of the concatenated torus automorphisms is the total sum of each one's period. By this means, the period of the novel automorphism is increased extremely. Based on the novel, concatenated torus automorphisms, two application schemes in image encryption are proposed, i.e., 2D and 3D concatenated chaotic maps. In these schemes, both the scrambling matrices and the iteration numbers act as secret keys. Security analysis shows that the proposed, concatenated, chaotic maps have strong chaos and they are very sensitive to the secret keys. By means of concatenating several torus automorphisms, the key space of the proposed cryptosystem can be expanded to $2^{135}$. The diffusion function in the proposed scheme changes the gray values of the transferred pixels, which makes the periodicity of the concatenated torus automorphisms disappeared. Therefore, the proposed cryptosystem has high security and they can resist the brute-force attacks and the differential attacks efficiently. The diffusing speed of the proposed scheme is higher, and the computational complexity is lower, compared with the existing methods.

Policy Decision Making Through Wildlife Habitat Potential With Space Value Categorization (야생동물 서식지 잠재력과 공간가치분류를 통한 정책방향 설정)

  • Jang, Raeik;Lee, Myungwoo
    • Journal of the Korean Society of Environmental Restoration Technology
    • /
    • v.18 no.1
    • /
    • pp.1-12
    • /
    • 2015
  • Beginning of the human ecology in 1920s, the efforts for applying the environmental values to a policy have been embodied by the enactments of international agreement and relevant laws. The government has been struggling to adopt the environmental values for the policy by enacting the relevant laws and establishing the environmental value evaluation information (environmental conservation value assessment map, eco-natural map, biotope map). In spite of the efforts to apply the environmental value assessment information for the habitat potential of wildlife, the application is being challenged by the discrepancy in methods and criteria. Thus this study intends to measure the potential of wildlife habitat and apply it to the spatial value classification for the application plan of wildlife habitat potential in policy. Maxent was used for the habitat potential and the land types were classified depending on the surface and land use pattern of cadastral map. As a result, the policy matrix including conservation strategy(CS), restoration strategy(RS), practical use strategy(PS) and development strategy(DS) has been deduced as CS $13.05km^2$(2.38%), RS $1.64km^2$(0.30%), PS $162.42km^2$(29.57%) and DS $8.56km^2$(1.56%). CS was emerged mostly on forest valleys and farmlands, and RS was appeared in the road area near the conservation strategy areas. Boryung downtown and Daecheon Beach were the center of DS, while the forest and farmlands were presented as PS. It is significant that this study suggest the new approaching method by comparing the wildlife habitat potential with the land type. Since this study evaluated the environmental value by one species of leopard cat (Prionailurusbengalensis) with Maxent model, it is necessary to apply the habitat potential measuring method for various target species as further research.

A Encryption Technique of JPEG2000 Image Using 3-Dimensional Chaotic Cat Map (3차원 카오스 캣맵을 이용한 JPEG2000 영상의 암호화 기술)

  • Choi, Hyun-Jun;Kim, Soo-Min;Seo, Young-Ho;Kim, Dong-Wook
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.42 no.5 s.305
    • /
    • pp.173-180
    • /
    • 2005
  • In this paper, we proposed the image hiding method which decreases calculation amount by encrypt partial data using discrete wavelet transform(DWT) and linear scale quantization which were adopted as the main technique for frequency transform in JPEG2000 standard. Also we used the chaotic system and cat map which has smaller calculation amount than other encryption algorithms and then dramatically decreased calculation amount. This method operates encryption process between quantization and entropy coding for preserving compression ratio of images and uses the subband selection method. Also, suggested encryption method to JPEG2000 progressive transmission. The experiments have been performed with the Proposed methods implemented in software for about 500 images. Consequently, we are sure that the proposed is efficient image encryption methods to acquire the high encryption effect with small amount of encryption. It has been shown that there exits a relation of trade-off between the execution time and the effect of the encryption. It means that the proposed methods can be selectively used according to the application areas.