• Title/Summary/Keyword: Key Tree

Search Result 417, Processing Time 0.022 seconds

Digital Hologram Watermarking using Quad-tree Fresnelet Transform (Quad-tree Fresnelet 변환을 이용한 디지털 홀로그램 워터마킹)

  • Seo, Young Ho;Koo, Ja Myung;Lee, Yoon Hyuk;Kim, Dong Wook
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.9 no.3
    • /
    • pp.79-89
    • /
    • 2013
  • This paper proposes a watermarking scheme to protect ownership of a digital hologram, an ultra-high value-added content. It performs pre-defined levels of quad-tree Fresnelet transforms. The relationship among the same-positional-blocks is extracted as the digital pre-watermark. For the relationship, we use properties of a digital hologram that a hologram pixel retains all the information of the object and that the same size of partial holograms reconstructs the same size of object but different in their view points. Also we mix a set of private data with the pre-watermark and the result is encrypted by a block cipher algorithm with a private key. Experimental results showed that the proposed scheme is very robust for the various malicious and non-malicious attacks. Also because it extracts the watermarking data instead of inserting, the watermarking process does not harm the original hologram data. So, it is expected to be used effectively for invisible and robust watermark for digital holograms.

Cryopreservation of Forest Tree Seeds: A Mini-Review

  • Gantait, Saikat;Kundu, Suprabuddha;Wani, Shabir Hussain;Das, Prakash Kanti
    • Journal of Forest and Environmental Science
    • /
    • v.32 no.3
    • /
    • pp.311-322
    • /
    • 2016
  • Since forest trees form the basis of forest ecosystem, their prolong subsistence is crucial for various flora and fauna. The foremost challenges to sustain the forest ecosystem comprise of the declining forest tree population accompanied with structural changes due to afforestation and exploitation of forest area, environment changes, pests, pollution, and introgressive hybridization. For ex situ conservation approach, in vitro techniques encompass basic role for conserving tree genetic resources, predominantly where natural propagules like recalcitrant seed might not be appropriate for long-term conservation. The practice includes restricted growth techniques, conventional micropropagation, production and storage of synthetic seeds, and cryopreservation. Even though these practices have been applied chiefly to herbaceous species, but recently, woody species were also focused upon. Key conceptions, challenges and techniques for forest tree seed conservation are discussed briefly in this review with special emphasis on some successful cryopreservation approaches for long-term storage.

A Study on the Classification of Variables Affecting Smartphone Addiction in Decision Tree Environment Using Python Program

  • Kim, Seung-Jae
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.68-80
    • /
    • 2022
  • Since the launch of AI, technology development to implement complete and sophisticated AI functions has continued. In efforts to develop technologies for complete automation, Machine Learning techniques and deep learning techniques are mainly used. These techniques deal with supervised learning, unsupervised learning, and reinforcement learning as internal technical elements, and use the Big-data Analysis method again to set the cornerstone for decision-making. In addition, established decision-making is being improved through subsequent repetition and renewal of decision-making standards. In other words, big data analysis, which enables data classification and recognition/recognition, is important enough to be called a key technical element of AI function. Therefore, big data analysis itself is important and requires sophisticated analysis. In this study, among various tools that can analyze big data, we will use a Python program to find out what variables can affect addiction according to smartphone use in a decision tree environment. We the Python program checks whether data classification by decision tree shows the same performance as other tools, and sees if it can give reliability to decision-making about the addictiveness of smartphone use. Through the results of this study, it can be seen that there is no problem in performing big data analysis using any of the various statistical tools such as Python and R when analyzing big data.

Complete Mitochondrial Genome of a Tongue Worm Armillifer agkistrodontis

  • Li, Jian;He, Fu-Nan;Zheng, Hong-Xiang;Zhang, Rui-Xiang;Ren, Yi-Jing;Hu, Wei
    • Parasites, Hosts and Diseases
    • /
    • v.54 no.6
    • /
    • pp.813-817
    • /
    • 2016
  • Armillifer agkistrodontis (Ichthyostraca: Pantastomida) is a parasitic pathogen, only reported in China, which can cause a zoonotic disease, pentastomiasis. A complete mitochondrial (mt) genome was 16,521 bp comprising 13 protein-coding genes (PCGs), 22 tRNA genes, 2 rRNA genes, and 1 non-coding region (NCR). A phylogenetic tree drawn with the concatenated amino acid sequences of the 6 conserved PCGs (atp6, cox1-3, and nad2) showed that A. agkistrodontis and Armillifer armillatus constituted a clade Pentastomida which was a sister group of the Branchiura. The complete mt genome sequence of A. agkistrodontis provides important genetic markers for both phylogenetic and epidemiological studies of pentastomids.

A Survey of Termitomyces (Lyophyllaceae, Agaricales), Including a New Species, from a Subtropical Forest in Xishuangbanna, China

  • Ye, Lei;Karunarathna, Samantha C.;Li, Huli;Xu, Jianchu;Hyde, Kevin D.;Mortimer, Peter E.
    • Mycobiology
    • /
    • v.47 no.4
    • /
    • pp.391-400
    • /
    • 2019
  • A survey of mushrooms was conducted in Xishuangbanna, Yunnan Province, China, in the rainy season (May to October) of 2012, 2013, and 2014, during which 16 specimens of Termitomyces were collected. Preliminary macro- and micro-characteristics, together with ITS sequence data, showed that four of the specimens belonged to a new species (Termitomyces fragilis), while the other 12 belonged to T. aurantiacus, T. eurrhizus, T. globules, T. microcarpus, and T. bulborhizus. In this paper, T. fragilis is introduced as a species new to science based on morphological characterization and phylogenetic analyses. Macro- and micro- morphological descriptions, color photographs and line drawings of the new species, and a phylogenetic tree to show the placement of the new species are provided. T. fragilis is then compared with other closely related taxa in the genus Termitomyces.

Two New Species of Placolecis (Lichenized Ascomycota) from China

  • Yin, An Cheng;Wang, Xin Yu;Liu, Dong;Zhang, Yan Yun;Yang, Mei Xia;Li, Li Juan;Wang, Li Song
    • Mycobiology
    • /
    • v.47 no.4
    • /
    • pp.401-407
    • /
    • 2019
  • Two new species of the lichen genus Placolecis are discovered in China, namely P. kunmingensis An. C. Yin & Li S. Wang and P. sublaevis An. C. Yin & Li S. Wang. The new combination P. loekoesiana (S.Y. Kondr., Farkas, J.J. Woo & Hur) An. C. Yin is proposed. Placolecis kunmingensis is characterized by having simple, spherical or ellipsoid, hyaline spores, and pear-shaped pycnidia; while P. sublaevis can be distinguished by its thallus forming larger aggregations with slightly flattened lobes at the thallus margin, and urn-shaped pycnidia. Descriptions, a phylogenetic tree and a key are provided for all the known Placolecis species in China.

An Authentication and Key Management Protocol for Secure Data Exchange in EPON MAC Layer (EPON MAC 계층의 안전한 데이터 전송을 위한 인증 및 키관리 프로토콜)

  • Kang, In-kon;Lee, Do-Hoon;Lee, Bong-Ju;Kim, Young-Chon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.28 no.1B
    • /
    • pp.1-10
    • /
    • 2003
  • An EPON which is going on standardization in IEEE 802.3ah, is tree topology consists of a OLT and multiple ONU using passive optical components, so this network is susceptible to variable security threats - eavesdropping, masquerading, denial of service and so on. In this paper, we design a security protocol supporting authentication and confidentiality services in MAC layer in order to prevent these security threats and to guarantee secure data exchange The designed security protocol introduce public-key based authentication and key management protocols for efficient key management, and choose Rijndael algorithm, which is recent standard of AES, to provide the confidentiality of EPON Proposed authentication and key management protocols perform authentication and public-key exchange at a time, and are secure protocols using derived common cipher key by exchanging public random number To implement the designed security protocol, we propose the procedures of authentication and public-key exchange, session key update, key recovery. This proposed protocol is verified using unknown session key, forward secrecy, unknown key-share, key-compromise impersonation.

Boosting WiscKey Key-Value Store Using NVDIMM-N (NVDIMM-N을 활용한 WiscKey 키-밸류 스토어 성능 향상)

  • Il Han Song;Bo hyun Lee;Sang Won Lee
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.12 no.3
    • /
    • pp.111-116
    • /
    • 2023
  • The WiscKey database, which optimizes overhead by compaction of the LSM tree-based Key-Value database, stores the value in a separate file, and stores only the key and value addresses in the database. Each time an fsync system call function is used to ensure data integrity in the process of storing values. In previously conducted studies, workload performance was reduced by up to 5.8 times as a result of performing the workload without calling the fsync system call function. However, it is difficult to ensure the data integrity of the database without using the fsync system call function. In this paper, to reduce the overhead of the fsync system call function while performing workloads on the WiscKey database, we use NVDIMM caching techniques to ensure data integrity while improving the performance of the WiscKey database.

Some Characteristics of the Performance in Comparison with Indexing techniques for File Organization (화일조직을 위한 인덱싱 기법의 성능 특성 비교)

  • Lee, Gu-Nam
    • Journal of The Korean Association of Information Education
    • /
    • v.1 no.1
    • /
    • pp.49-59
    • /
    • 1997
  • In this thesis, To provide the base of effective data access methods, performance of some indexing techniques used gent-Tally are compared. They are classified as primary key and multikey. For primary key method, made a comparative analysis on Static index. Dynamic index and Hashing. For multikey indexing method K-d tree, K-d-B tree, Inverted file and Grid file of which characteristics are compared. In many applications, multikey indexings are more requested, but are not supplied enough. So, to satisfy users' request - more fast, more exact and to be applied according to the trend of being huge database systems, it is requested more study about multikey data access methods.

  • PDF