• Title/Summary/Keyword: Paper like electronic paper

Search Result 655, Processing Time 0.028 seconds

Study of Frequency Response Characteristics in Microphone Used by Optical Sensor

  • Yeom, Keong-Tae;Kim, Kwan-Kyu;Kim, Yong-Kab
    • Transactions on Electrical and Electronic Materials
    • /
    • v.9 no.3
    • /
    • pp.128-133
    • /
    • 2008
  • In this paper, in order to analyze property of frequency response in microphone using optical sensor, acousto-optic sensor system has been implemented. The capacitance microphone and fiber-optic transmission path type fiber-optic microphone (FOM) have weaknesses in directivity, size, weight, and price. However suggested optical microphone can be constituted by cheap devices, so it has many benefits like small size, light weight, high directivity, etc. Head part of optical microphone which is suggested in this paper is movable back and forth by sound pressure with the attached reflection plate. Operating point has also been determined by measuring the response characteristics. The choosing the point, which has maximum linearity and sensitivity has changing the distance between optical head and vibrating plate. We measured the output of the O/E transformed signal of the optical microphone while frequency of sound signal is changed using sound measurement /analysis program, "Smaart Live" and "USBPre", which are based on PC, and compared the result from an existing capacitance microphone. The measured optical microphone showed almost similar output characteristics as those of the compared condenser microphone, and its bandwidth performance was about 4 kHz at up to 3 dB.

Block and Fuzzy Techniques Based Forensic Tool for Detection and Classification of Image Forgery

  • Hashmi, Mohammad Farukh;Keskar, Avinash G.
    • Journal of Electrical Engineering and Technology
    • /
    • v.10 no.4
    • /
    • pp.1886-1898
    • /
    • 2015
  • In today’s era of advanced technological developments, the threats to the authenticity and integrity of digital images, in a nutshell, the threats to the Image Forensics Research communities have also increased proportionately. This happened as even for the ‘non-expert’ forgers, the availability of image processing tools has become a cakewalk. This image forgery poses a great problem for judicial authorities in any context of trade and commerce. Block matching based image cloning detection system is widely researched over the last 2-3 decades but this was discouraged by higher computational complexity and more time requirement at the algorithm level. Thus, for reducing time need, various dimension reduction techniques have been employed. Since a single technique cannot cope up with all the transformations like addition of noise, blurring, intensity variation, etc. we employ multiple techniques to a single image. In this paper, we have used Fuzzy logic approach for decision making and getting a global response of all the techniques, since their individual outputs depend on various parameters. Experimental results have given enthusiastic elicitations as regards various transformations to the digital image. Hence this paper proposes Fuzzy based cloning detection and classification system. Experimental results have shown that our detection system achieves classification accuracy of 94.12%. Detection accuracy (DAR) while in case of 81×81 sized copied portion the maximum accuracy achieved is 99.17% as regards subjection to transformations like Blurring, Intensity Variation and Gaussian Noise Addition.

A Study on Real-time Data Acquisition System and Denoising for Energy Saving Device (에너지 절약 장치용 실시간 데이터 획득 시스템 구현과 잡음제거에 관한 연구)

  • Huh, Keol;Choi, Yong-Kil;Jeong, Won-Kyo;Hoang, Chan-Ku
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2004.05b
    • /
    • pp.47-53
    • /
    • 2004
  • The paper shows that the combination of the hardware, NI PCI 6110E board and the software, Fourier and continuous wavelet transform(CWT) can be used to implement for extracting the important features of the real-time signal. The results confirmed that CWT produces the fast computation enough for the application of the real-time signal processing except the negligible time delay. In denoising case, because of the lack of translation invariance of wavelet basis, traditional wavelet thresholding leads to pseudo-Gibbs phenomena in the vicinity of discontinuities of signal. In this paper, in order to reduce the pseudo-Gibbs phenomena, wavelet coefficients are threshold and reconstruction algorithm is implement through shift-invariant gibbs free denoising algorithm based on wavelet transform footprint. The proposed algorithm can potentially be extended to more general signals like piecewise smooth signals and represents an effective solution to problems like signal denoising.

  • PDF

Rotation Invariant Face Detection using Haar-like Feature Variation (Haar-like Feature 변형을 이용한 기울어진 얼굴 검출)

  • Kim, Seok-Ho;Kim, Jae-Min;Cho, Seoung-Won;Lee, Gi-Seong;Chung, Sun-Tae
    • Proceedings of the IEEK Conference
    • /
    • 2008.06a
    • /
    • pp.987-988
    • /
    • 2008
  • In this paper, we propose a rotation invariant face detection method using Haar-like feature variation. Previous approaches using rectangular features can be calculated very fast. But rectangular features is weak in rotated face. Rotated Haar-like features can get high accuracy, but the performance is slow because it can't use the integral image. Our method vary Haar-like features keeping rectangular. this method makes the performance a bit slow, but gives better accuracy.

  • PDF

High Performance CMOS Charge Pumps for Phase-locked Loop

  • Rahman, Labonnah Farzana;Ariffin, NurHazliza Bt;Reaz, Mamun Bin Ibne;Marufuzzaman, Mohammad
    • Transactions on Electrical and Electronic Materials
    • /
    • v.16 no.5
    • /
    • pp.241-249
    • /
    • 2015
  • Phase-locked-loops (PLL) have been employed in high-speed data transmission systems like wireless transceivers, disk read/write channels and high-speed interfaces. The majority of the researchers use a charge pump (CP) to obtain high performance from PLLs. This paper presents a review of various CMOS CP schemes that have been implemented for PLLs and the relationship between the CP parameters with PLL performance. The CP architecture is evaluated by its current matching, charge sharing, voltage output range, linearity and power consumption characteristics. This review shows that the CP has significant impact on the quality performance of CP PLLs.

A Study on the Establishment of Master Plan on the Operation of the Electronic Bill of Lading in Korea (한국에서의 전자선화증권 운용을 위한 종합계획수립에 관한 연구)

  • Choi, Seok-Beom;Shen, Reng-Guang
    • International Commerce and Information Review
    • /
    • v.6 no.1
    • /
    • pp.129-153
    • /
    • 2004
  • In order to succeed in e-Trade Project in Korea, the related parties endeavor to introduce the e-title registry model such as Bolero model(Title Registry Model) and TEDI model (Repository Service Provider Model). Prior to mentioning the Model of e-Title Registry, desirable Global e-Trade Platform is the platform connecting Global e-Trade Platforms in each country and Bolero's Core Messaging Platform and e-Title Registry must be established in each country. Each e-Title Registry must be connected with another registry. Like Korea, Recognized Electronic Document Repository must be established as proxy for preserving, attesting, carrying out sending and receiving electronic document to prevent from disputes between parties and to carry out notarizing electronic documents and related transaction. The purpose of this paper is to promote the introduction of e-Title Registry in the e-Trade and to streamline the procedures of the electronic bill of lading.

  • PDF

A Secure Network for Mobile Wireless Service

  • Peng, Kun
    • Journal of Information Processing Systems
    • /
    • v.9 no.2
    • /
    • pp.247-258
    • /
    • 2013
  • A new secure network communication technique that has been designed for mobile wireless services, is presented in this paper. Its network services are mobile, distributed, seamless, and secure. We focus on the security of the scheme and achieve anonymity and reliability by using cryptographic techniques like blind signature and the electronic coin. The question we address in this paper is, "What is the best way to protect the privacy and anonymity of users of mobile wireless networks, especially in practical applications like e-commerce?" The new scheme is a flexible solution that answers this question. It efficiently protects user's privacy and anonymity in mobile wireless networks and supports various applications. It is employed to implement a secure e-auction as an example, in order to show its advantages in practical network applications.

Strategic Model Design based on Core Competencies for Innovation in Engineering Education

  • Seung-Woo LEE;Sangwon LEE
    • International journal of advanced smart convergence
    • /
    • v.12 no.3
    • /
    • pp.141-148
    • /
    • 2023
  • As the direction of education in the fourth industry in the 21st century, convergence talent education that emphasizes the connection and convergence between core competency-based education and academia is emerging to foster creative talent. The purpose of this paper is to present the criteria for evaluating the competency of learning outcomes in order to develop a strategic model for innovation in engineering teaching-learning. In this paper, as a study to establish the direction of implementation of convergence talent education, a creative innovation teaching method support system was established to improve the quality of convergence talent education. Firstly, a plan to develop a teaching-learning model based on computing thinking. Secondly, it presented the development of a teaching-learning model based on linkage and convergence learning. Thirdly, we would like to present educational appropriateness and ease based on convergence learning in connection with curriculum improvement strategies based on computing thinking skills. Finally, we would like to present a strategic model development plan for innovation in engineering teaching-learning that applies the convergence talent education program.

A Study on the Bandwidth Enhancement of a Microstrip Surface Wave Antenna With a Monopole Like Pattern (모노폴 방사패턴을 가지는 마이크로스트립 표면파 안테나의 대역폭개선에 관한 연구)

  • Jang, Jae-Sam;Jung, Young-Ho;Lee, Ho-Sang;Jo, Dong-Ki;Park, Seong-Bae;Kim, Cheol-Bok;Lee, Mun-Soo
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.45 no.12
    • /
    • pp.139-145
    • /
    • 2008
  • In this paper, a microstrip surface wave antenna(SWA) with a frequency selective surface structure(FSS) is designed and measured. A microstrip SWA has many advantages such as low profile, low weight, easy fabrication, and compatibility with monolithic microwave integrated circuits(MMIC). In addition, it has demonstrated monopole like beam patterns. The microstrip SWA consists of two parts : a center-fed modified microstrip patch to excite surface wave, and a periodic patches to support the propagation of the surface waves. To obtain wide bandwidth, the ring type parasitic element is inserted and the circular patch is selected for the unit element in FSS structure. Experimental results show that the microstrip SWA has monopole like beam patterns at 5.9GHz. Impedance bandwidth and gain is 12% and 5.6dBi.

An Implementation of YK2 Cipher System for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호시스템의 구현)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.1
    • /
    • pp.17-33
    • /
    • 2001
  • EC(Electronic Commerce) which is done on the virtual space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet, Therefore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher system. YK2(Young Ku King) cipher system proposed in this paper is good solution for the EC security and it overcome the limit of current block cipher system using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is designed for the increase of time complexity by adapting more complex design for key scheduling algorithm regarded as one of important element effected to encryption.

  • PDF