• Title/Summary/Keyword: Digital Recording

Search Result 324, Processing Time 0.033 seconds

Three-dimensional digital recording of the conservation treatment and form analysis of an iron ring pommel (철제 환두부 보존처리 과정의 3차원 디지털기록 및 형상변화 분석)

  • Choi, Hyoryeong;Hong, Seonghyuk;Jo, Younghoon;Cho, Namchul
    • Conservation Science in Museum
    • /
    • v.25
    • /
    • pp.85-94
    • /
    • 2021
  • Conservation treatment of metallic artifacts contaminated with corrosion and foreign substances requires changes in the shape, characteristics, weight and thickness of the artifacts. Thus far, recording the changes after conservation treatment has mainly been performed through visual observation and photography, which lacks any quantitative description of the changes. In this study, the processes of removing foreign substances, joining cracks, and restoring an affected area were recorded using 3D scanning and then quantitatively analyzed to identify changes in form due to conservation treatment. The volume change after the conservation process was calculated based on the results of the 3D scanning, and numerical data on the changes to the form was analyzed. It was revealed that the foreign or corroded substances removed after the conservation accounted for 18.1 cm3, which is approximately 52% of the total volume of the ring pommel, and those substances were removed from about 98% of the surface of the ring pommel. This study confirmed that 3D form analysis was useful for recording the processes of conservation treatment and analyzing the results. It is therefore believed that this methodology can be applicable to not only metal artifacts, but to cultural heritage items in a range of materials.

E-mail System Model based on Ethereum (이더리움 기반 이메일 시스템 모델)

  • Kim, Taekyung
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.4
    • /
    • pp.99-106
    • /
    • 2017
  • With the advent of virtual money such as bit coins, interest in the block chain is increasing. Block Chain is a technology that supports Distributed Ledger and is a versatile technology applicable to various fields. Currently, the block chain is conducting research for various applications such as virtual money, trade finance, marketplace, power market, image contents service, and IoT. The technologies that make up the block chain are smart contract, digital signature/hash function and consensus algorithm. And these technologies operate on P2P networks. In this paper, we have studied e-mail system based on the ethereum which is one of the block chain based technologies. Most legacy mail systems use SMTP and the POP3/IMAP protocol to send and receive e-mail, and e-mail use S/MIME to protect the e-mail. However, S/MIME is vulnerable to DDoS attacks because it is configured centrally. And it also does not provide non-repudiation of mail reception. To overcome these weaknesses, we proposed an e-mail system model based on ethereum. The proposed model is able to cope with DDoS attack and forgery prevention by using block chain based technology, and reliable recording and management among block chain participants are provided, so that it is possible to provide a non-repudiation function of e-mail transmission and reception.

A comparative study on the bible mobile applications' UI based on user's characteristics (이용 특성에 따른 성서 모바일 어플리케이션 UI 비교 연구)

  • Jung, Youngchan
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.11 no.1
    • /
    • pp.111-120
    • /
    • 2015
  • The christian communities have been maintained and spreaded based on the great foundation of the holy bible. The printing and publishing technology made the holy bible popular at the end of the middle age. Namely, because of this remarkable development, the Bible have been became the best seller for centuries. Since the smart phone users have been growing, the number of people use the Bible Application have been increased. In this circumstance, the interface becomes a crucial element in the Age of Digital Media. Thus, developers have to regard the user's convenient. The user's characteristic is the important point to develop applications. This study is focusing on a particular using of the Bible, and how the using characteristic affects on application's UI. For this study, five bible applications reflecting particular using characteristics are chosen and compared in terms of function of services and elements of UI. Form this comparison and analysis, this study deduces the pattern of UI considering particular using characteristics such as patterns of reading, recording, sharing, and searching the bible. This study would be useful data for publications formed into applications and setting the UI which reflected the using characteristics be better user-centered.

Implementation of MPEG-4 Codec for Real-time DVR System Based on PC (PC 기반 실시간 DVR 시스템을 위한 MPEG-4 코덱 구현)

  • Jang Kyung Hyun;Park Ki Tae;Kim Chan Gyu;Hong In Hwa;Kim Jin Kook;Yeo Hun Gu;Moon Young Shik
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2005.11b
    • /
    • pp.607-609
    • /
    • 2005
  • 본 논문에서는 실시간으로 다채널의 카메라에서 입력되는 영상을 동시에 압축 및 복원할 수 있는 PC 기반의 DVR (Digital Video Recording) 시스템을 위한 MPEG-4 방식의 코덱을 구현하고자 한다. 현재까지의 일반적인 압축 방식은 화상회의 용도의 H.263, VCD 화질의 MPEG-1, DVD급 화질인 MPEG-2가 널리 적용되고 있다. 하지만 이러한 방법들은 저장 데이터의 양이 커서 효율적인 저장이 어렵다. 따라서 본 논문에서는 이러한 문제점을 해결하면서 실시간적으로 다채널 영상 데이터 저장이 가능한 MPEG-4 압축 방식을 적용한 코덱을 제작한다.

  • PDF

Design and analysis of slider and suspension in 4${\times}$l near-field probe array

  • Hong Eo-Jin;Oh Woo-Seok;Jung Min-Su;Park No-Cheol;Yang Hyun-Seok;Park Young-Pil;Lee Sung-Q;Park Kang-Ho
    • 정보저장시스템학회:학술대회논문집
    • /
    • 2005.10a
    • /
    • pp.47-52
    • /
    • 2005
  • A lot of information storage devices have been introduced and developed for recently years. The trends of those devices are high capacity, compact size, low power consumption, reliability, and removability for data interchange with other device. As a satisfaction of these trends, near-field technique is in the spotlight as the next generation device. In order for a near-field recording to be successfully implemented in the storage device, a slider and suspension is introduced as actuating mechanism. The optical slider is designed considering near-filed optics. Suspension is not only supports slider performance, and tracking servo capacity but also meets the optical characteristics such as tilt aberration, and guarantee to satisfy shock performances for the mobility fir the actuator. In this study, the optical slider and the suspension for near-field probe array are designed and analyzed considering dynamic performance of head-gimbal assembly and shock simulation..

  • PDF

Implementation of Music Source Classification System by Embedding Information Code (정보코드 결합을 이용한 음원분류 시스템 구현)

  • Jo, Jae-Young;Kim, Yoon-Ho
    • Journal of Advanced Navigation Technology
    • /
    • v.10 no.3
    • /
    • pp.250-255
    • /
    • 2006
  • In digital multimedia society, we usually use the digital sound music ( Mp3, wav, etc.) system instead of analog music. In the middle of generating or recording and transmitting, if we embed the digital code which is useful to music information, we can easily select as well as classify the music title by using Mp3 player that embedded sound source classification system. In this paper, sound source classification system which could be classify and search a music informations by way of user friendly scheme is implemented. We performed some experiments to testify the validity of proposed scheme by using implemented system.

  • PDF

A Research on the Digital Restoration of the Analog by Removing Hiss Noise (Using X-NOISE Based on Hiss-Noise Reduction) (히스 노이즈제거를 통한 아날로그의 디지털 복원에 대한 연구 - X-NOISE를 활용한 히스 노이즈리덕션을 중심으로 -)

  • Byun, Jung Min;Doo, Ill Chul
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.10 no.4
    • /
    • pp.161-170
    • /
    • 2014
  • Analog cassette tapes are easily changed due to environmental factors. To digitize is the best way to preserve a sound source. The way to digitize is to deal with the original sound to be enhanced to a variety of sources by playing through the audio card after recording. In this process to occur, it's the most important to remove various noise and equalizing sound in a method for preserving. It's studied about how to remove noise by using one of softwares, Cubase 5. 5, to remove hiss noise, which happens changing analog tape into digitalization. A amount of hiss noise is reduced to use X-Noise software of Wave which uses in Cubase 5.0, one of PLUG-IN. The noise is removed changing value of threshold and reduction every 10 times in no change of origin sound. To keep regular condition, the experiment to remove the hiss noise is conducted based on sound meondle, which is one of sound Nonmaegi. The noise is removed easily when the value of threshold is getting high in spite of giving a little value of reduction. However, as it gives a amount of reduction high, the damage rate of the sound source gets high.

Optical Encryption of Binary Information using 2-step Phase-shifting Digital Holography (2-단계 위상 천이 디지털 홀로그래피를 이용한 이진 정보 광 암호화 기법)

  • Byun, Hyun-Joong;Gil, Sang-Keun
    • Korean Journal of Optics and Photonics
    • /
    • v.17 no.5
    • /
    • pp.401-411
    • /
    • 2006
  • We propose an optical encryption/decryption technique for a security system based on 2-step phase-shifting digital holography. Phase-shilling digital holography is used for recording phase and amplitude information on a CCD device. 2-step phase-shifting is implemented by moving the PZT mirror with phase step of 0 or ${\pi}/2$. The binary data and the key are expressed with random code and random phase patterns. The digital hologram is a Fourier transform hologram and is recorded on CCD with 256 gray level quantization. We remove the DC term of the digital hologram fur data reconstruction, which is essential to reconstruct the original binary input data/image. The error evaluation fer the decrypted binary data is analyzed. One of errors is a quantization error in detecting the hologram intensity on CCD, and the other is generated from decrypting the data with the incorrect key. The technique using 2-step phase-shifting holography is more efficient than a 4-step method because 2-step phase-shifting holography system uses less data than the 4-step method for data storage or transmission. The simulation shows that the proposed technique gives good results fur the optical encryption of binary information.

A case report of single crown restoration using an intraoral scanner for occlusal evaluation (단일 치관 수복 시 구강스캐너를 이용한 교합평가 활용 증례보고)

  • Song, Jun-Beom;Lee, Jong-Hyuk;Ha, Seung-Ryong;Choi, Yu-Sung;Choi, Sun-Young
    • The Journal of Korean Academy of Prosthodontics
    • /
    • v.59 no.3
    • /
    • pp.341-349
    • /
    • 2021
  • The evaluation of occlusion using digital methods is easier and simpler in terms of recording, comparison, analysis, and objectivity compared to existing methods such as articulating paper and occlusion foil. The purpose of this case report was utilizing the digital method for evaluating occlusion. The occlusion of patient requiring full veneer crown restoration was evaluated using an intraoral scanner (i500, Medit, Seoul, Korea) at every visit. The occlusion was also assessed using conventional articulating paper and a digital occlusal analysis system (Dental prescale II, GC corp., Tokyo, Japan) for comparison. Throughout the treatment process, the intraoral scanner and the conventional articulating paper method showed similar outcomes. The results suggest that the use of digital evaluation system is highly probable in the near future.

Still Image Identifier based over Low-frequency Area (저역주파수 영역 기반 정지영상 식별자)

  • Park, Je-Ho
    • Journal of Digital Contents Society
    • /
    • v.11 no.3
    • /
    • pp.393-398
    • /
    • 2010
  • Composite and compact devices equipped with the functionality of digital still image acquisition, such as cellular phones and MP3 players are widely available to common users. In addition, the application of digital still images is becoming common among security and digital recording devices. The amount of still images, that are maintained or shared in personal storage or massive storage provided by various web services, are rapidly increasing. These still images are bound with file names or identifiers that are provided arbitrarily by users or that are generated from device specific naming method. However, those identifiers are vulnerable for unexpected changing or eliminating so that it becomes a problem in still image search or management. In this paper, we propose a method for still image identifier generation that is created from the still image internal information.