• Title/Summary/Keyword: Digital techniques

Search Result 2,228, Processing Time 0.034 seconds

Integral Imaging and Digital Holography Techniques for Three-dimensional Sensing, Imaging and Display (Invited Paper) (3차원 입체영상 센싱, 이미징 및 디스플레이를 위한 집적영상 및 디지털 홀로그래피 기술)

  • Kim, Seung-Cheol;Shin, Dong-Hak;Kim, Eun-Soo
    • Korean Journal of Optics and Photonics
    • /
    • v.25 no.4
    • /
    • pp.169-192
    • /
    • 2014
  • In this paper, state-of-the-art digital holography and integral imaging have been introduced as practical three-dimensional imaging and display technology. Operational principles and recent research and development activities of these technologies have been discussed, as well as a vision of their future.

Development of Human Factors Evaluation System for Car Navigation System (자동차 항법장치의 인간공학 평가시스템 개발)

  • Cha, Doo-Won;Park, Peom
    • IE interfaces
    • /
    • v.12 no.2
    • /
    • pp.294-304
    • /
    • 1999
  • This paper describes the theoretical background and detailed structure of Navi-HEGS (Navigation system Human factors Evaluation and Guideline System) which has been developed for the human factors and HMI(Human-Machine Interface) researches for a CNS (Car Navigation System) and a digital map. Navi-HEGS is and integrated system that consists of a digital map UIMS(User Interface Management System), a CNS simulator, various evaluation tools, and a design guideline system. If Navi-HEGS is properly applied and utilized, it is possible to extract the substantial users requirements and preferences of a CNS and a digital map and then, these requirements can be simulated and evaluated with various human factors evaluation techniques. Applications of Navi-HEGS can improve the CNS usability, drivers safety and performance that directly affect the success of ITS(Intelligent Transport System). Also, results can be used as the basic data to establish the standards and design guidelines for the driver-centered CNS design.

  • PDF

A Study on the Power System Simulator Technologies for the Domestic Development (전력계통 시뮬레이터의 기술현황과 국내개발의 방법론 고찰)

  • Kim, J.H.;Lee, B.Y.;Shim, K.B.;Shin, J.R.;Lee, H.J.;Kwon, T.W.;Yoon, Y.B.;Lee, C.H.
    • Proceedings of the KIEE Conference
    • /
    • 1993.07a
    • /
    • pp.529-533
    • /
    • 1993
  • Recently, the analysis of power systems is transfering from analytical techniques to simulation because it is difficult to analyze accurately the phenomena occured in complicated and huge power systems. Digital computers are used popularly to analyze the phenomena of power systems. But real-time simulators were used due to the limitation of digital computer - real time analysis, non-linearity and so on - and rapid development of digital technologies. In this paper, we discuss the advanced foreign power system simulators and the conceptual designs for the KEPCO power system simulator have been drawn for the domestic development.

  • PDF

A Study on Quantitative Space Analysis Model - Focused on a Visual Analysis and Image Analysis by Digital Image Processing - (정량적 공간분석 모델에 관한 연구 - 시각 분석과 영상처리에 의한 이미지 분석 모델을 중심으로 -)

  • 이혁준;이종석
    • Korean Institute of Interior Design Journal
    • /
    • no.37
    • /
    • pp.136-143
    • /
    • 2003
  • Users' demands on the space are changing in variety. These demands include reasonable space and form, harmonious composition with surroundings and esthetic satisfaction that could be brought by personal tastes and preferences. In addition, models that are introduced from designing process and from various forms tend to lack objective decision making standard. Accordingly it is difficult to find a clear alternative plan and process. In an effort to solve these problems, the objects of this study are; to propose an analysis model of image and space by using image process techniques that are on study in the field of artificial intelligence based on acquisition of digital image and to verify the application possibilities of such analysis model, 'Isovist' on quantitative analysis. The model can be applied with variable analysis model, as digital image process and other analysis model such as 'Isovist' It is possible that further study can complement problems from this study.

On the Length of Hash-values for Digital Signature Schemes

  • Lim, Chae-Hoon;Lee, Pil-Joong-
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1994.11a
    • /
    • pp.29-31
    • /
    • 1994
  • In digital signature schemes derived from the zero-knowledge proof techniques, some authors often claims that the length of hash-values for their schemes could be as short as 64 or 72 bits for the security level of 2$^{-64}$ or 2$^{-72}$ . This letter shows that signature schemes with such short hash values cannot achieve the security levels as stated, due to the birthday attack by the signer.

  • PDF

Fast Detection of Forgery Image using Discrete Cosine Transform Four Step Search Algorithm

  • Shin, Yong-Dal;Cho, Yong-Suk
    • Journal of Korea Multimedia Society
    • /
    • v.22 no.5
    • /
    • pp.527-534
    • /
    • 2019
  • Recently, Photo editing softwares such as digital cameras, Paintshop Pro, and Photoshop digital can create counterfeit images easily. Various techniques for detection of tamper images or forgery images have been proposed in the literature. A form of digital forgery is copy-move image forgery. Copy-move is one of the forgeries and is used wherever you need to cover a part of the image to add or remove information. Copy-move image forgery refers to copying a specific area of an image itself and pasting it into another area of the same image. The purpose of copy-move image forgery detection is to detect the same or very similar region image within the original image. In this paper, we proposed fast detection of forgery image using four step search based on discrete cosine transform and a four step search algorithm using discrete cosine transform (FSSDCT). The computational complexity of our algorithm reduced 34.23 % than conventional DCT three step search algorithm (DCTTSS).

Conceptual Shift of Archival Management in Digital Environment (전자환경에서의 기록관리 개념에 관한 재검토)

  • Lee, Seung-eok
    • The Korean Journal of Archival Studies
    • /
    • no.6
    • /
    • pp.41-72
    • /
    • 2002
  • Electronic environment affects archival community to a great extent. It redefines virtually every stage of archival management form creation to current and semi-current use, to appraisal, and to preservation of records. Faced with the problems caused by ever increasing electronic records, the community is forced to reconsider traditional concepts, approaches, methodologies, even the basic paradigm embedded in archival theory and practice. The present paper discusses the need to reexamine principles and techniques of archival management in the light of digital environment. It also urges archives and archival institutions, the archival profession, or the archival community at large, to participate in this critical enterprise. Success in this endeavor will, eventually, pave the road toward creating, organizing, providing access to, preserving reliably and authentically electronic records and designing proper system for the societal collective memory in recorded digital information.

Using Grounded Theory Techniques for Reviewing Literature: Shadow Work in Digital Environment (문헌 고찰을 위한 근거이론방법의 활용: 디지털 환경에서의 그림자 노동 개념 도출)

  • Park, Sangcheol;Lee, Woong-Kyu
    • Knowledge Management Research
    • /
    • v.20 no.2
    • /
    • pp.183-195
    • /
    • 2019
  • The objective of this paper is to present how to use Grounded Theory Methodology for conducting a literature review that produces new insights and conceptualizations. In this paper, we have employed Wolfswinkel et al.(2013)'s method, which is called by Grounded Theory Literature-Review Method, for a rigorous literature review. We have utilized this method to capture the concept and insights of individuals' shadow wok in digital environments. By analyzing the relevant literature based on Wolfswinkel et al.'s guide, we have extracted 73 codes in the coding steps and finally showed 12 categories by incorporating similar concepts from those codes. Based on the categories, we end this paper by developing the academic definitions of shadow work in digital environments.

Adaptive Digital Predictive Peak Current Control Algorithm for Buck Converters

  • Zhang, Yu;Zhang, Yiming;Wang, Xuhong;Zhu, Wenhao
    • Journal of Power Electronics
    • /
    • v.19 no.3
    • /
    • pp.613-624
    • /
    • 2019
  • Digital current control techniques are an attractive option for DC-DC converters. In this paper, a digital predictive peak current control algorithm is presented for buck converters that allows the inductor current to track the reference current in two switching cycles. This control algorithm predicts the inductor current in a future period by sampling the input voltage, output voltage and inductor current of the current period, which overcomes the problem of hardware periodic delay. Under the premise of ensuring the stability of the system, the response speed is greatly improved. A real-time parameter identification method is also proposed to obtain the precision coefficient of the control algorithm when the inductance is changed. The combination of the two algorithms achieves adaptive tracking of the peak inductor current. The performance of the proposed algorithms is verified using simulations and experimental results. In addition, its performance is compared with that of a conventional proportional-integral (PI) algorithm.

CMTO: An Inquiry into the Activation for Real Estate Security Token of the Digital Asset Hour (CMTO: 디지털 자산 시대의 부동산 토큰 증권 활성화 방안 연구)

  • Jeongmin Lee;Minhyuk Lee
    • Journal of Information Technology Services
    • /
    • v.22 no.4
    • /
    • pp.81-95
    • /
    • 2023
  • The emergence of Security Token has revolutionized the way assets are traded, bringing efficiency, transparency, and accessibility to the market. However, the Real Estate Security Token market faces challenges, particularly in terms of liquidity. The CMTO(Collateralized Mortgage Token Obligation) model addresses this issue by introducing a novel approach that combines the benefits of NFT(Non-Fungible Token), STO(Security Token Offering), and CMO(Collateralized Mortgage Obligation) techniques to enhance liquidity and promote investment in Real Estate Security Token. The CMTO framework functions by allowing DABS token investors to leverage their tokens as collateral for loans. These token-collateralized loans are pooled together and form the basis for issuing Sequential CMO named CMTO. The CMTO represent a diversified portfolio of token-collateralized loans, providing investors with options based on their financial goals and risk preferences. By implementing CMTO, the Real Estate Security Token market can overcome liquidity challenges, attract a broader range of investors, and unlock the full potential of digital assets in the real estate industry.