• Title/Summary/Keyword: File Editing

Search Result 50, Processing Time 0.024 seconds

A Watermarking Scheme Based on k-means++ for Design Drawings (k-means++ 기반의 설계도면 워터마킹 기법)

  • Lee, Suk-Hwan;Kwon, Ki-Ryong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.5
    • /
    • pp.57-70
    • /
    • 2009
  • A CAD design drawing based on vector data that is very important art work in industrial fields has been considered to content that the copyright protection is urgently needed. This paper presents a watermarking scheme based on k-means++ for CAD design drawing. One CAD design drawing consists of several layers and each layer consists of various geometric objects such as LINE, POLYLINE, CIRCLE, ARC, 3DFACE and POLYGON. POLYLINE with LINE, 3DFACE and ARC that are fundamental objects make up the majority in CAD design drawing. Therefore, the proposed scheme selects the target object with high distribution among POLYLINE, 3DFACE and ARC objects in CAD design drawing and then selects layers that include the most target object. Then we cluster the target objects in the selected layers by using k-means++ and embed the watermark into the geometric distribution of each group. The geometric distribution is the normalized length distribution in POLYLINE object, the normalized area distribution in 3DFACE object and the angle distribution in ARC object. Experimental results verified that the proposed scheme has the robustness against file format converting, layer attack as well as various geometric editing provided in CAD editing tools.

Design and Implementation of Event Analysis/Arrange Function for Mobile Device Simulator (모바일 디바이스 시뮬레이터용 이벤트 분석 및 배열 기능의 설계 및 구현)

  • Lee, Young-Seok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.6
    • /
    • pp.1429-1434
    • /
    • 2010
  • Generally, the simulator for mobile device tests automatically an application software after instilling again the event, which is saved in log file according to an event generation sequence, into the application software of device. But, the simulator performance for mobile device can be different according to a extraction layer even if the events are same. And, the sequence of events extracted from an application is changeable in the environment that multiple applications are operated concurrently. Therefore, even though the same applications is executed to the same sequence, the generation sequence of events is revised in accordance with the state of mobile device system, and whether the errors occur according to circumstances or not. This kind of application software error is very difficult to perform a debugging operation. In this paper, the execution state of various applications is verifiable through the re-editing of events after analyzing the events which is generated in application, kernel, middleware layer, and the event arrange/editor is designed and implemented to understand efficiently the influence on application, kernel, and middleware layer for events.

Hand-held Multimedia Device Identification Based on Audio Source (음원을 이용한 멀티미디어 휴대용 단말장치 판별)

  • Lee, Myung Hwan;Jang, Tae Ung;Moon, Chang Bae;Kim, Byeong Man;Oh, Duk-Hwan
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.19 no.2
    • /
    • pp.73-83
    • /
    • 2014
  • Thanks to the development of diverse audio editing Technology, audio file can be easily revised. As a result, diverse social problems like forgery may be caused. Digital forensic technology is actively studied to solve these problems. In this paper, a hand-held device identification method, an area of digital forensic technology is proposed. It uses the noise features of devices caused by the design and the integrated circuit of each device but cannot be identified by the audience. Wiener filter is used to get the noise sounds of devices and their acoustic features are extracted via MIRtoolbox and then they are trained by multi-layer neural network. To evaluate the proposed method, we use 5-fold cross-validation for the recorded data collected from 6 mobile devices. The experiments show the performance 99.9%. We also perform some experiments to observe the noise features of mobile devices are still useful after the data are uploaded to UCC. The experiments show the performance of 99.8% for UCC data.

Comparison of the transformation methods for Flash Videos to Web Videos (플래시 비디오에서 웹비디오로의 변환기법 비교)

  • Lee, Hyun-Lee;Kim, Kyoung-Soo;Ceong, Hee-Taek
    • Journal of Digital Contents Society
    • /
    • v.11 no.4
    • /
    • pp.579-588
    • /
    • 2010
  • Generalization of the web, development of one-person media such as the blog and mini homepage, and integration of video digital devices have generalized multimedia video services on the web. However, flash videos, the previously used bit map-based multimedia videos, exhibit problems like the waterfall phenomenon, lag phenomenon, or non-synchronization of audios or videos. Thereupon, This study is conducted to suggest a converting technique to provide efficient web video service on the web by solving problems of bitmap-based flash video through file format-converting software and movie editing programs. And this paper also conducts experiments on five videos for 13 CODECs and analyzes converted results comparatively. The recommendable method considering the characteristics of each videos is to utilize MainConcept H.264 Video CODEC using SWF2Video pro. The result of this research can be used to produce web videos on the web more effectively.

Development of a Music Score Editor based on MusicXML (MusicXML 기반의 악보 편집기 개발)

  • Khan, Najeeb Ullah;Lee, Jung-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.2
    • /
    • pp.77-90
    • /
    • 2014
  • In the past composers used to make music with classical instruments such as piano, violin, guitar, flute, drums, and other well-known tools. With the advent of digital technology many software programs were developed which allow musicians to compose tunes using personal computers. Many file formats were introduced such as NIFF, SMDL and MIDI but none besides MIDI has been successful. Recently MusicXML has emerged as a de-facto standard for the computer representation of music. This paper presents a brief description of the structure of the MusicXML format and describes the development of a music score editor based on MusicXML. We implemented a MusicXML-based score editing software using C# language and a feasibility test showed the efficiency of our proposed method.

Accuracy of bite registration according to the buccal bite scan range of intra-oral scanner (구강 스캐너의 협측 교합 스캔 부위에 따른 교합 인기의 정확도)

  • Tae-sung Kwon;Dae-hyun Kim;Min-su Kim;Dong-jun Song;Joo-Hun Song
    • Journal of Dental Rehabilitation and Applied Science
    • /
    • v.40 no.3
    • /
    • pp.125-134
    • /
    • 2024
  • Purpose: The aim of this study was to determine which scan range would provide the most accurate bite registration when performing a bite scan after scanning an upper and lower arch using an intraoral scanner. Materials and Methods: The occlusal contact points were recorded using articulating paper for 30 adults, and the results of various ranges of buccal bite scan were compared based on this. Buccal bite scan of 5 ranges (1st premolar to 2nd premolar, 1st premolar to 1st molar, 1st premolar to 2nd molar, 2nd premolar to 1st molar, and canines to another side canine of the maxillary teeth) was performed, and then the buccal bite scan file was used in a CAD program to confirm the occlusal area in the scan file through data editing and alignment, leaving the buccal area of the teeth. Afterwards, the degree of agreement between the occlusal contact points obtained from the articulating paper and the occlusal area obtained from the scan file was compared, and statistical analysis was performed using the homoscedastic T-test (α = 0.05). Results: The alignment success and alignment failure rates among each group were 77.23% and 40.85% in canine to another side canine, 68.23% and 28.89% in bilateral first premolar to second premolar, 63.76% and 29.97% in bilateral first premolar to first molar, 61.31% and 32.04% in bilateral first premolar to second molar, 67.55% and 27.46% in second premolar to first molar. The results of the anterior scan of both canines showed higher alignment success and failure rates compared to the scan results of all maxillary posterior teeth. In the alignment success rate, statistical significance was not found depending on the scan range of the posterior teeth, but in comparing the results of the posterior teeth and both canines, statistical significance was observed except for the scan results of the second premolar to the first molar. There was no statistical significance in the alignment failure rate depending on the scan range of the posterior teeth, and statistical significance was observed in the results of the posterior teeth and both canines. Conclusion: When taking a buccal bite scan, in the case of scanning the anterior teeth, more occlusal area appear than when scanning the posterior teeth, and in the case of scanning the posterior teeth, there is no significant difference in the bite registration depending on the scan range.

A Study on Development of a GIS based Post-processing System of the EFDC Model for Supporting Water Quality Management (수질관리 지원을 위한 GIS기반의 EFDC 모델 후처리 시스템 개발 연구)

  • Lee, Geon Hwi;Kim, Kye Hyun;Park, Yong Gil;Lee, Sung Joo
    • Spatial Information Research
    • /
    • v.22 no.4
    • /
    • pp.39-47
    • /
    • 2014
  • The Yeongsan river estuary has a serious water quality problem due to the water stagnation and it is imperative to predict the changes of water quality for mitigating water pollution. EFDC(Environmental Fluid Dynamics Code) model was mainly utilized to predict the changes of water quality for the estuary. The EFDC modeling normally accompanies the large volume of modeling output. For checking the spatial distribution of the modeling results, post-processing for converting of the output is prerequisite and mainly post-processing program is EFDC_Explorer. However, EFDC_Explorer only shows the spatial distribution of the time series and this doesn't support overlay function with other thematic maps. This means the impossible to the connection analysis with a various GIS data and high dimensional analysis. Therefore, this study aims to develop a post-processing system of a EFDC output to use them as GIS layers. For achieving this purpose, a editing module for main input files, and a module for converting binary format into an ASCII format, and a module for converting it into a layer format to use in a GIS based environment, and a module for visualizing the reconfigured model result efficiently were developed. Using the developed system, result file is possible to automatically convert the GIS based layer and it is possible to utilize for water quality management.

Interactive Statistics Laboratory using R and Sage (R을 활용한 '대화형 통계학 입문 실습실' 개발과 활용)

  • Lee, Sang-Gu;Lee, Geung-Hee;Choi, Yong-Seok;Lee, Jae Hwa;Lee, Jenny Jyoung
    • Communications of Mathematical Education
    • /
    • v.29 no.4
    • /
    • pp.573-588
    • /
    • 2015
  • In this paper, we introduce development process and application of a simple and effective model of a statistics laboratory using open source software R, one of leading language and environment for statistical computing and graphics. This model consists of HTML files, including Sage cells, video lectures and enough internet resources. Users do not have to install statistical softwares to run their code. Clicking 'evaluate' button in the web page displays the result that is calculated through cloud-computing environment. Hence, with any type of mobile equipment and internet, learners can freely practice statistical concepts and theorems via various examples with sample R (or Sage) codes which were given, while instructors can easily design and modify it for his/her lectures, only gathering many existing resources and editing HTML file. This will be a resonable model of laboratory for studying statistics. This model with bunch of provided materials will reduce the time and effort needed for R-beginners to be acquainted with and understand R language and also stimulate beginners' interest in statistics. We introduce this interactive statistical laboratory as an useful model for beginners to learn basic statistical concepts and R.

Hybrid Detection Algorithm of Copy-Paste Image Forgery (Copy-Paste 영상 위조의 하이브리드 검출 알고리즘)

  • Choi, YongSoo;Atnafu, Ayalneh Dessalegn;Lee, DalHo
    • Journal of Digital Contents Society
    • /
    • v.16 no.3
    • /
    • pp.389-395
    • /
    • 2015
  • Digital image provides many conveniences at the internet environment recently. A great number of applications, like Digital Library, Stock Image, Personal Image and Important Information, require the use of digital image. However it has fatal defect which is easy to be modified because digital image is only electronic file. Numerous digital image forgeries have become a serious problem due to the sophistication and accessibility of image editing software. Copy-Move forgery is the simplest type of forgery that involves copying portion of an image and paste it on different location within the image. There are many approaches to detect Copy-Move forgery, but all of them have their own limitations. In this paper, visual and invisible feature based forgery detection techniques are tested and analyzed. The analysis shows that pros and cons of these two techniques compensate each other. Therefore, a hybrid of visual based and invisible feature based forgery detection that combine the merits of both techniques is proposed. The experimental results show that the proposed algorithm has enhanced performance compared to individual techniques. Moreover, it provides more information about the forgery, like identifying copy and duplicate regions.

A memory protection method for application programs on the Android operating system (안드로이드에서 어플리케이션의 메모리 보호를 위한 연구)

  • Kim, Dong-ryul;Moon, Jong-sub
    • Journal of Internet Computing and Services
    • /
    • v.17 no.6
    • /
    • pp.93-101
    • /
    • 2016
  • As the Android smart phones become more popular, applications that handle users' personal data such as IDs or passwords and those that handle data directly related to companies' income such as in-game items are also increasing. Despite the need for such information to be protected, it can be modified by malicious users or leaked by attackers on the Android. The reason that this happens is because debugging functions of the Linux, base of the Android, are abused. If an application uses debugging functions, it can access the virtual memory of other applications. To prevent such abuse, access controls should be reinforced. However, these functions have been incorporated into Android O.S from its Linux base in unmodified form. In this paper, based on an analysis of both existing memory access functions and the Android environment, we proposes a function that verifies thread group ID and then protects against illegal use to reinforce access control. We conducted experiments to verify that the proposed method effectively reinforces access control. To do that, we made a simple application and modified data of the experimental application by using well-established memory editing applications. Under the existing Android environment, the memory editor applications could modify our application's data, but, after incorporating our changes on the same Android Operating System, it could not.