• 제목/요약/키워드: INVISIBLE SYSTEM

검색결과 183건 처리시간 0.026초

TCA 분석 TOOL 개발과 농가비용 비교분석 (Development of TCA Method for Cost Analysis in Farmhouse)

  • 윤성이
    • 한국유기농업학회지
    • /
    • 제12권1호
    • /
    • pp.23-44
    • /
    • 2004
  • TCA(Total Cost Assessment) can be defined by a tool to evaluate actual profit about investment. Also, It can be used by method to make more reasonable decision-making in business. Enforcement of 'direct payment system' for environment friendship farmhouse of government is spreading recent times. But, it is true that it is no definite standard about appropriation of disbursement amount of money. TCA method can be utilized usefully for solution of these problem. Also, It will help to decide price grasping invisible cost and environment cost. Therefore, We tried that may can apply TCA theory in farmhouse class, and attempted economic performance estimation which use this. This study introduces TCA theory and developed applicable expense list in agriculture field. Also, We applied TCA theory to farmhouse. This theories referenced domestic and th6 foreign countries, connection literature. But, It handled part about invisible cost and social cost etc..

  • PDF

디지털 이미지 데이터의 저작권 보호를 위한 디지털 워터마킹 개발에 관한 연구 (A Study on the Development of Digital Watermarking for Copyright Protector of Original Image Data)

  • 조정석;유세근;김종원;최종욱
    • 한국지능정보시스템학회:학술대회논문집
    • /
    • 한국지능정보시스템학회 1999년도 춘계공동학술대회-지식경영과 지식공학
    • /
    • pp.519-523
    • /
    • 1999
  • 본 연구는 디지털 이미지 데이터에 대한 창작자의 저작권 보호 기술인 watermarking 기술을 연구하였다. 저작권 보호를 위한 정보를 invisible watermark로 삽입하였고, watermarking된 칼라 이미지를 데이터 압축, Filtering, cropping 등과 같은 여러 가지 외부 공격에 대한 내구성을 실험하였다. Invisible watermark를 삽입하기 위하여 변형된 주파수 변환기법을 이용하였으며, 기존의 PRN(pseudo random number)방법보다 가시성이 뛰어난 이미지 형태의 로고를 삽입하여 저작권에 대한 확증성을 제고하였다.

  • PDF

Invisible Messenger: A System to Whisper in a Person′s Ear Remotely by integrating Visual Tracking and Speaker Array

  • Mizoguchi, Hiroshi;Kanamori, Tomohiko;Okabe, Kosuke;Hiraoka, Kazuyuki;Tanaka, Masaru;Shigehara, Takaomi;Mishima, Taketoshi
    • 대한전자공학회:학술대회논문집
    • /
    • 대한전자공학회 2002년도 ITC-CSCC -3
    • /
    • pp.1897-1900
    • /
    • 2002
  • This paper proposes a novel computer-human interface, named invisible Messenger. It integrates face detection and tracking, and speaker array signal processing. By speaker array it is possible to form acoustic focus at the arbitrary location that is measured by the face tracking. Thus the proposed system can whisper in a person's ear as if an invisible virtual messenger were standing by the person. Not only speculative discussion, the authors have implemented a working prototype system based upon the proposed idea. This paper also describes about this prototype. In order to confirm effectiveness of the proposed idea, the authors conduct experiments using the implemented system. Experimental results demonstrate the effectivenss of the proposed idea.

  • PDF

티어심 파손 강도를 고려한 동승석 에어백 도어시스템의 최적 설계 (Optimal Design of Passenger Airbag Door System Considering the Tearseam Failure Strength)

  • 최환영;공병석;박동규
    • 자동차안전학회지
    • /
    • 제13권3호
    • /
    • pp.60-68
    • /
    • 2021
  • Invisible passenger airbag door system of hard panel types must be designed with a weakened area such that the side airbag will deploy through the instrument panel as like intended manner, with no flying debris at any required operating temperature. At the same time, there must be no cracking or sharp edges in the head impact test. If the advanced airbag with the big difference between high and low deployment pressure ranges are applied to hard panel types of invisible passenger airbag (IPAB) door system, it becomes more difficult to optimize the tearseam strength for satisfying deployment and head impact performance simultaneously. It was introduced the 'Operating Window' idea from quality engineering to design the hard panel types of IPAB door system applied to the advanced airbag for optimal deployment and head impact performance. Zigzab airbag folding and 'n' type PAB mounting bracket were selected.

디지털 동영상 어플리케이션의 향상된 보안성을 위한 비시각적인 워터마킹 (Invisible Watermarking for Improved Security of Digital Video Application)

  • 서정희;박흥복
    • 한국컴퓨터정보학회논문지
    • /
    • 제16권10호
    • /
    • pp.175-183
    • /
    • 2011
  • 디지털 비디오 워터마킹의 성능은 디지털 비디오에서 많은 정보를 은닉하는 방법에 대한 평가이다. 그러므로 디지털 컨텐츠에 대한 주파수 영역의 고화질의 동영상에 많은 비트의 데이터를 저장하는 방법이 요구되고 있다. 따라서 본 논문은 워터마크 요소 중 강인성과 비시각성 사이의 절충을 통해서 동영상의 프레임에 대해 휘도 성분을 추출한 후 웨이블릿 변환을 수행하여 LH와 HL 부대역에 워터마크를 내장하고 비시각적인 워터마크 기반의 강인한 워터마크를 통해 향상된 워터마크의 보안성을 위한 워터마크 시스템을 설계한다. 워터마크의 보안성에 대한 성능의 분석은 통계적인 방법을 사용하여 비시각적인 워터마킹에서의 다양한 공격에 대한 강인성을 평가한다. 실험 결과에 따르면 노이즈 추가, 손실 압축, Low-Pass 필터링과 같은 일반적인 신호 처리를 수행하여 워터마크 강인성과 비시 각성을 평가하였고, 다양한 공격에 대한 워터마크의 보안성을 검증할 수 있었다.

현대 건축공간에서 나타나는 비(非)가시적 힘의 형상화에 관한 연구 (A Study on figuration of invisible force in Contemporary Architecture-space)

  • 이형근;김개천
    • 한국실내디자인학회:학술대회논문집
    • /
    • 한국실내디자인학회 2007년도 춘계학술대회 논문집
    • /
    • pp.275-280
    • /
    • 2007
  • The modern society of the 21century is becoming a discussion as spaces appearing as ambiguous boundaries caused by complexed cultural phenomenon. As for the spacial factors we recognize, which appears as phenomenon in which is emphasizing the existing system of cognizance and thinking through drawing inviable parts of the effort within escaping the limits of gravity. This Merleau-Ponty and Gilles Deleuze refines it as theories called "Perception" and "Sense", and through the 'visible and invisible' of Merleau-Ponty and the 'Nonsense and paradox' of Gilles Deleuze, this study object is forming these inviable representations into space. Using the similarities of these two theories as a tool, we will analyze the examples of space with drawing the force that forms invisibility into embodiment, building a possibility of improvement in future spaces.

  • PDF

Evaluation of the characteristics of the reflection plate to measure defects in the invisible area using infrared thermography

  • Kim, Sang Chae;Park, Il Cheol;Kang, Chan Geun;Jung, Hyunchul;Chung, Woon Kwan;Kim, Kyeong Suk
    • Nuclear Engineering and Technology
    • /
    • 제52권4호
    • /
    • pp.856-862
    • /
    • 2020
  • Defect inspection system for industrial applications takes the important portion. Non-destructive inspection method has been significantly improved. Infrared thermography, as one of method for non-destructive inspection, can provide relatively precise data and quick inspection time. This study, it was performed to measure defect according to the measurement limit of the non-visible areas such as the back surface of the pipe using reflection plate using reflection plate based on Infrared thermography. The materials of the reflection plate were determined in consideration of the space limitation and the thermal characteristics, and defects were detected by the manufactured reflection plate. Detection of defect in non-visible area using the candidate materials for reflection plate was conducted.

적외선 레이저를 이용한 스크린 사격시스템 개발 (Development of Screen Shot System using Infrared Laser)

  • 강성준;김정훈;정성환
    • 한국산학기술학회논문지
    • /
    • 제13권3호
    • /
    • pp.1325-1329
    • /
    • 2012
  • 본 논문은 실내 사격 전용 총기의 개발, 고속의 레이저 인식 알고리즘 개발을 통하여 다양한 그래픽 컨텐츠와 연동할 수 있는 실내용 스크린 사격 시스템을 제안한다. 내구성이 강하며 공압 솔래노이드 밸브 제어와 비가시 레이저를 전용 총기에 적용하였으며, 비가시 레이저를 고속으로 인식하여 그래픽 엔진와 상호작용하는 방법을 개발하여 실내용 스크린 사격 시스템을 상용화 하고자 한다.

Hyperledger Blockchain Design for Sharing, Spreading, and Protecting National Cybersecurity Information

  • Park, Dea-woo;Lee, Sang-hyeon
    • Journal of information and communication convergence engineering
    • /
    • 제18권2호
    • /
    • pp.94-99
    • /
    • 2020
  • Real cyberterrors are invisible and difficult to identify. Even after a cyberattack, its origin and cause are difficult to determine. Cyberterrorism results in invisible cyberwars, and it is believed that World War IV will begin with a cyberwarfare. For national cybersecurity, information on cybersecurity must be collected, shared, and disseminated. In this study, we investigate a blockchain system designed based on the World Cybersecurity Agreement. National cybersecurity information is linked to the hyperledger blockchain system network through the National Cybersecurity Center. National cybersecurity information designs and uses a secure protocol for protection; further, it is collected, shared, and disseminated to treaty countries. National cybersecurity information is shared and spread by the hyperledger blockchain system, and it uses a cyberdefense system that responds to the cyberattacks and their origin. This paper serves as a policy and legislation guideline for forming a World Cybersecurity Agreement between countries.

이미지 워터마킹 기법에 관한 연구 (A Study on the Image Watermarking Method)

  • 이두성;김선형;김기석
    • 디지털산업정보학회논문지
    • /
    • 제5권4호
    • /
    • pp.161-168
    • /
    • 2009
  • There are many research for efficient, robust and invisible watermarking system that protects the digital contents like a image and animation according to growth of IT industry. First of all, frequency domain watermarking system like DWT(Descrete Wavelet Transform) is excellent because of minimum loss of original image and robustness of external attack. But, if we raise the insertion strength of watermark, then blazing of image occurs on existing DWT watermarking system and we should have a regular square image. In this study, we research the overflow check for preventing image from blazing and a robust and invisible watermarking algorithm. And we research a free-size DWT watermarking system using padding bytes, without a dependency of size.