• Title/Summary/Keyword: Primitive

Search Result 1,240, Processing Time 0.023 seconds

Study on the Implementation of Primitive Visual Cortex Model in Retina Using Gabor Wavelet (가버 웨이블릿을 이용한 원시 시각 피질 모델 구현에 관한 연구)

  • Lee, Youngseok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.13 no.6
    • /
    • pp.477-482
    • /
    • 2020
  • The human visual cortex has the characteristic that reacts sensitively to stimuli with special directional or temporal frequency changes while it is insensitive to selective stimuli of spatial phases. In this paper we implemented the model of complex cell using an image estimation iterative algorithm by Gabor wavelet transform. The performance of implemented model evaluated the consistency between the physiological experimental results in related papers. The implemented model is limited in the complete model of the receptive field in the retina where simple cells and complex cells are distributed together. But the implemented model express the reaction of the complex cells from the point of view of the detection of corners and edges.

A Study on the Structural System of Space Configuration in Architectural Plane - Focusing on the Coalesce scheme development for part-whole Process - (건축 평면에서 공간 형상의 구조 체계에 관한 연구 - 부분이 전체를 이루는 합체 도식 개발을 중심으로 -)

  • Piao, Shun-Mei;Yoon, Chae-Shin
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.34 no.9
    • /
    • pp.9-20
    • /
    • 2018
  • There are many large and small spaces in the interior of the building, and these spaces are arranged and connected to form a systematic spatial structure. A structure is a collection of several parts to form a whole. In other words, the spatial structure in architecture can be seen as a whole organized and organized as individual unit spaces are gathered together. Therefore, in order to understand the spatial structure, we first need to define the unit spaces that form part, how they are interconnected and arranged, and then understand how and how these unit spaces are organized to form a whole. The main purpose of this study is to study the structural system of space based on the shape information of space on architectural plane. This means interpreting the process and method of how the unit spaces defined as a certain shape on the architectural plane are organized step by step, integrated into a higher level, and eventually integrated into one whole. In this paper, the shape and layout of the unit space are identified in the architectural plan, the connection relation is defined, and expressed in the network form. And suggests a new methodology for interpreting the organizational process in which the following spaces are integrated as a whole. This new methodology is based on human perceptual characteristics. When people recognize an object, they recognize the object partly and completely. We want to explain the relationship between parts of space and the whole according to their characteristics.

A Study on BIM Implementation Process Model through Importing Vertex Coordinate Data for Customized Curtain Wall Panel - Focusing on importing Vertex Coordinate data to Revit from Rhino - (맞춤형 커튼월 패널의 꼭짓점 좌표데이터 전이를 통한 BIM 형태 구축 프로세스 모델 연구 - 라이노에서 레빗으로의 좌표데이터 전이를 중심으로 -)

  • Ko, Sung Hak
    • Journal of the Architectural Institute of Korea Planning & Design
    • /
    • v.35 no.11
    • /
    • pp.69-78
    • /
    • 2019
  • The purpose of this study is to propose a modeling methodology through the exchange of coordinate data of a three-dimensional custom curtain wall panel between Rhino and Revit, and to examine the validity of the model implemented in the drawing. Although the modeling means and method are different, a fundamental principle is that all three-dimensional modeling begins by defining the position of the points, the most primitive element of geometry, in the XYZ coordinate space. For the BIM modeling methodology proposal based on this geometry basic concept, the functions and characteristics associated with the points of Rhino and Revit programs are identified, and then BIM implementation process model is organized and systemized through the setting of the interoperability process algorithm. The BIM implementation process model proposed in this study is (1) Modeling and panelizing surface into individual panels using Rhino and Grasshopper; (2) Extraction of vertex coordinate data from individual panels and create CSV file; (3) Curtain wall modeling through Adaptive Component Family in Revit and (4) Automatic creation of Revit curtain wall panels through API. The proposed process model is expected to help reduce design errors and improve component and construction quality by automatically converting general elements into architectural meaningful information, automating a set of processes that build them into BIM data, and enabling consistent and integrated design management.

Interpretation of Primitive Worship of Maogusi Dance of Xiangxi Tujia Nationality (상서(湘西) 토가족(土家族) 마고사(毛古斯) 무용 원시숭배(原始崇拜)의 해석)

  • Zhu, Yi
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.22 no.3
    • /
    • pp.381-389
    • /
    • 2021
  • Maogusi dance is an ancient ritual dance of the Tujia, a Chinese ethnic minority living in the remote region of the western Hunan Province of China. With characters, dialogues, simple story plots and unique performance procedures, it expresses ancient people's devout worship of nature, totems, ancestors, and reproduction in the uncivilized age. With the advancement of human civilization and the opening to the outside world, many dances of the ethnic minority gradually have faded out, while the Maogusi dance is still popular among the Tujia people and its spiritual symbols have been passed on through the generations. It is recognized by experts in dance and drama circles as the original source of Chinese dance and drama. From the perspectives of philosophy, religion, anthropology and folklore, this paper tries to remove the mysterious veil covering the Maogusi dance of the Tujia to explain how its ancient spiritual symbols have survived and why the original ecological consciousness has been preserved. These aims would help in understanding the deep connotation of this ancient Chinese art with its long history and profound culture.

Recovery-Key Attacks against TMN-family Framework for Mobile Wireless Networks

  • Phuc, Tran Song Dat;Shin, Yong-Hyeon;Lee, Changhoon
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.15 no.6
    • /
    • pp.2148-2167
    • /
    • 2021
  • The proliferation of the Internet of Things (IoT) technologies and applications, especially the rapid rise in the use of mobile devices, from individuals to organizations, has led to the fundamental role of secure wireless networks in all aspects of services that presented with many opportunities and challenges. To ensure the CIA (confidentiality, integrity and accessibility) security model of the networks security and high efficiency of performance results in various resource-constrained applications and environments of the IoT platform, DDO-(data-driven operation) based constructions have been introduced as a primitive design that meet the demand of high speed encryption systems. Among of them, the TMN-family ciphers which were proposed by Tuan P.M., Do Thi B., etc., in 2016, are entirely suitable approaches for various communication applications of wireless mobile networks (WMNs) and advanced wireless sensor networks (WSNs) with high flexibility, applicability and mobility shown in two different algorithm selections, TMN64 and TMN128. The two ciphers provide strong security against known cryptanalysis, such as linear attacks and differential attacks. In this study, we demonstrate new probability results on the security of the two TMN construction versions - TMN64 and TMN128, by proposing efficient related-key recovery attacks. The high probability characteristics (DCs) are constructed under the related-key differential properties on a full number of function rounds of TMN64 and TMN128, as 10-rounds and 12-rounds, respectively. Hence, the amplified boomerang attacks can be applied to break these two ciphers with appropriate complexity of data and time consumptions. The work is expected to be extended and improved with the latest BCT technique for better cryptanalytic results in further research.

The Task of the Translator: Walter Benjamin and Cultural Translation (번역자의 책무-발터 벤야민과 문화번역)

  • Yoon, Joewon
    • Journal of English Language & Literature
    • /
    • v.57 no.2
    • /
    • pp.217-235
    • /
    • 2011
  • On recognizing the significance of Walter Benjamin's "The Task of a Translator" in recent discourses of postcolonial cultural translation, this essay examines the creative postcolonialist appropriations of Benjamin's theory of translation and their political implications. In an effort to dismantle the imperialist political hierarchy between the West and the non-West, modernity and its "primitive" others, which has been the operative premise of the traditional translation studies and anthropology, newly emergent discourses of cultural translation actively adopts Benjamin's notion of translation that does not prioritize the original text's claim on authenticity. Benjamin theorizes each text-translation as well as the original-as an incomplete representation of the pure language. Eschewing formalistic views propounded by deconstructionist critics like Paul de Man, who tend to regard Benjamin's notion of the untranslatable purely in terms of the failure inherent in the language system per se, such postcolonialist critics as Tejaswini Niranjana, Rey Chow, and Homi Bhabha, each in his/her unique way, recuperate the significatory potential of historicity embedded in Benjamin's text. Their further appropriation of the concept of the "untranslatable" depends on a radically political turn that, instead of focusing on the failure of translation, salvages historical as well as cultural potentiality that lies between disparate cultural entities, signifying differences, or disjunctures, that do not easily render themselves to existing systems of representation. It may therefore be concluded that postcolonial discourses on cultural translation of Niranhana, Chow, and Bhabha, inspired by Benjamin, each translate the latter's theory into highly politicized understandings of translation, and this leads to an extensive rethinking of the act of translation itself to include all forms of cultural exchange and communicative activities between cultures. The disjunctures between these discourses and Benjamin's text, in that sense, enable them to form a sort of theoretical constellation, which aspires to an impossible yet necessary utopian ideal of critical thinking.

A Study on the Security analysis and Applications of Standard Key agreement protocols based on Elliptic curve cryptosystem (타원 곡선에 기반한 표준 키 분배 프로토콜의 안전성 분석 및 응용 분야에 관한 연구)

  • 오수현;이승우;심경아;양형규;원동호
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.3
    • /
    • pp.103-118
    • /
    • 2002
  • To provide the privacy of transmitted message over network the use of cryptographic system is increasing gradually. Because the security and reliability of the cryptographic system is totally rely on the key, the key management is the most important part of the cryptographic system. Although there are a lot of security products providing encryption, the security of the key exchange protocols used in the product are not mostly proved yet. Therefore, we have to study properties and operation of key agreement protocols based on elliptic curve in ANSI X9.63. furthermore, we analyze the security of their protocols under passive and active attacker models and propose the most suitable application field taking the feature of the protocols into account.

Anonymous Qualification Verifying Method on Web Environment (웹 환경에서 익명성을 제공하는 자격증명 방법)

  • Lee, Yun-Kyung;Hwang, Jung-Yeon;Chung, Byung-Ho;Kim, Jeong-Nyeo
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.21 no.5
    • /
    • pp.181-195
    • /
    • 2011
  • There's a controversy about an invasion of privacy which includes a leakage of private information and linking of user's behavior on internet. Although many solutions for this problem are proposed, we think anonymous authentication, authorization, and payment mechanism is the best solution for this problem. In this paper, we propose an effective anonymity-based method that achieves not only authentication but also authorization. Our proposed method uses anonymous qualification certificate and group signature method as an underlying primitive, and combines anonymous authentication and qualification information. An eligible user is legitimately issued a group member key pair through key issuing process and issued some qualification certificates anonymously, and then, he can take the safe and convenience web service which supplies anonymous authentication and authorization. The qualification certificate can be expanded according to application environment and it can be used as payment token.

Classes in Object-Oriented Modeling (UML): Further Understanding and Abstraction

  • Al-Fedaghi, Sabah
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.5
    • /
    • pp.139-150
    • /
    • 2021
  • Object orientation has become the predominant paradigm for conceptual modeling (e.g., UML), where the notions of class and object form the primitive building blocks of thought. Classes act as templates for objects that have attributes and methods (actions). The modeled systems are not even necessarily software systems: They can be human and artificial systems of many different kinds (e.g., teaching and learning systems). The UML class diagram is described as a central component of model-driven software development. It is the most common diagram in object-oriented models and used to model the static design view of a system. Objects both carry data and execute actions. According to some authorities in modeling, a certain degree of difficulty exists in understanding the semantics of these notions in UML class diagrams. Some researchers claim class diagrams have limited use for conceptual analysis and that they are best used for logical design. Performing conceptual analysis should not concern the ways facts are grouped into structures. Whether a fact will end up in the design as an attribute is not a conceptual issue. UML leads to drilling down into physical design details (e.g., private/public attributes, encapsulated operations, and navigating direction of an association). This paper is a venture to further the understanding of object-orientated concepts as exemplified in UML with the aim of developing a broad comprehension of conceptual modeling fundamentals. Thinging machine (TM) modeling is a new modeling language employed in such an undertaking. TM modeling interlaces structure (components) and actionality where actions infiltrate the attributes as much as the classes. Although space limitations affect some aspects of the class diagram, the concluding assessment of this study reveals the class description is a kind of shorthand for a richer sematic TM construct.

Disorders of Secondary Neurulation : Mainly Focused on Pathoembryogenesis

  • Yang, Jeyul;Lee, Ji Yeoun;Kim, Kyung Hyun;Wang, Kyu-Chang
    • Journal of Korean Neurosurgical Society
    • /
    • v.64 no.3
    • /
    • pp.386-405
    • /
    • 2021
  • Recent advancements in basic research on the process of secondary neurulation and increased clinical experience with caudal spinal anomalies with associated abnormalities in the surrounding and distal structures shed light on further understanding of the pathoembryogenesis of the lesions and led to the new classification of these dysraphic entities. We summarized the changing concepts of lesions developed from the disordered secondary neurulation shown during the last decade. In addition, we suggested our new pathoembryogenetic explanations for a few entities based on the literature and the data from our previous animal research. Disordered secondary neurulation at each phase of development may cause corresponding lesions, such as failed junction with the primary neural tube (junctional neural tube defect and segmental spinal dysgenesis), dysgenesis or duplication of the caudal cell mass associated with disturbed activity of caudal mesenchymal tissue (caudal agenesis and caudal duplication syndrome), failed ingression of the primitive streak to the caudal cell mass (myelomeningocele), focal limited dorsal neuro-cutaneous nondisjunction (limited dorsal myeloschisis and congenital dermal sinus), neuro-mesenchymal adhesion (lumbosacral lipomatous malformation), and regression failure spectrum of the medullary cord (thickened filum and filar cyst, low-lying conus, retained medullary cord, terminal myelocele and terminal myelocystocele). It seems that almost every anomalous entity of the primary neural tube may occur in the area of secondary neurulation. Furthermore, the close association with the activity of caudal mesenchymal tissue in secondary neurulation involves a wider range of surrounding structures than in primary neurulation. Although the majority of the data are from animals, not from humans and many theories are still conjectural, these changing concepts of normal and disordered secondary neurulation will provoke further advancements in our management strategies as well as in the pathoembryogenetic understanding of anomalous lesions in this area.