• Title/Summary/Keyword: TRACE code

Search Result 127, Processing Time 0.042 seconds

Multimedia Fingerprinting in DCT Block (DCT 블록의 멀티미디어 핑거프린팅)

  • Rhee, Kang-Hyeon
    • Journal of IKEEE
    • /
    • v.15 no.3
    • /
    • pp.241-247
    • /
    • 2011
  • In this paper, it was implemented an algorithm of multimedia fingerprinting in DCT block. For the improvement of the limits of DRM’s ability, the proposed algorithm could be decided a responsibility boundary to judge a traitor who falsified the content according to perform separately a watermarking of content provider and a fingerprinting of content user. At the test image size($128{\times}128$) and block size($8{\times}8$) of the content provider, the measured PSNR is Inf~46.6dB with watermarking strength ${\Theta}=0.5{\sim}1.2$, and at a number of users and user's code length are n=7,15,31,63 and l=7,15,31,64 each, the measured PSNR is Inf~46.1 with fingerprinting code length l=7,15,31,63. Finally, a traitor tracing of the falsified content is approached to a trace ratio 1 which is extended to n-1.

Real-time Detection Technique of the Target in a Berth for Automatic Ship Berthing (선박 자동접안을 위한 정박지 목표물의 실시간 검출법)

  • Choi, Yong-Woon;;Kim, Young-Bok;Lee, Kwon-Soon
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.12 no.5
    • /
    • pp.431-437
    • /
    • 2006
  • In this paper vector code correlation(VCC) method and an algorithm to promote the image-processing performance in building an effective measurement system using cameras are described far automatically berthing and controlling the ship equipped with side-thrusters. In order to realize automatic ship berthing, it is indispensable that the berthing assistant system on the ship should continuously trace a target in the berth to measure the distance to the target and the ship attitude, such that we can make the ship move to the specified location. The considered system is made up of 4 apparatuses compounded from a CCD camera, a camera direction controller, a popular PC with a built-in image processing board and a signal conversion unit connected to parallel port of the PC. The object of this paper is to reduce the image-processing time so that the berthing system is able to ensure the safety schedule against risks during approaching to the berth. It could be achieved by composing the vector code image to utilize the gradient of an approximated plane found with the brightness of pixels forming a certain region in an image and verifying the effectiveness on a commonly used PC. From experimental results, it is clear that the proposed method can be applied to the measurement system for automatic ship berthing and has the image-processing time of fourfold as compared with the typical template matching method.

A Design of Parameterized Viterbi Decoder for Multi-standard Applications (다중 표준용 파라미터화된 비터비 복호기 IP 설계)

  • Park, Sang-Deok;Jeon, Heung-Woo;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1056-1063
    • /
    • 2008
  • This paper describes an efficient design of a multi-standard Viterbi decoder that supports multiple constraint lengths and code rates. The Viterbi decoder is parameterized for the code rates 1/2, 1/3 and constraint lengths 7,9, thus it has four operation nodes. In order to achieve low hardware complexity and low power, an efficient architecture based on hardware sharing techniques is devised. Also, the optimization of ACCS (Accumulate-Subtract) circuit for the one-point trace-back algorithm reduces its area by about 35% compared to the full parallel ACCS circuit. The parameterized Viterbi decoder core has 79,818 gates and 25,600 bits memory, and the estimated throughput is about 105 Mbps at 70 MHz clock frequency. Also, the simulation results for BER (Bit Error Rate) performance show that the Viterbi decoder has BER of $10^{-4}$ at $E_b/N_o$ of 3.6 dB when it operates with code rate 1/3 and constraints 7.

Application Restart Time Reduction Using Code Page Caching (코드 페이지 캐싱을 이용한 프로그램 재기동 시간 단축)

  • Ko, Seung-Cheol;Choi, Jung-Sik;Kim, Seong-Gun;Han, Hwan-Soo
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2012.06a
    • /
    • pp.51-53
    • /
    • 2012
  • 스마트폰과 같은 가상 메모리 환경의 임베디드 시스템은 메인 메모리의 제약과 다양한 응용프로그램들이 동시에 수행되어지기 때문에, 스왑 인/아웃(swap in/out)이 빈번히 일어난다. 스왑 비용은 메인 메모리에서 데이터를 사용하는 것보다 많은 시간이 걸려 이를 줄이기 위해 고속스왑장치를 사용한다. 이 때 기존 페이징에서 고려되지 않았던 코드 페이지를 스왑대상에 포함한다면, 빈번히 재시작이 일어나는 프로그램의 재기동 시간을 단축할 수 있을 것이다. 본 논문에서는 고속스왑장치를 사용하여 스왑비용을 낮추고, 자주 사용하는 코드를 동적으로 확인하여 코드페이지를 스왑대상에 포함시키는 방법을 제시한다. 이 기법의 효과를 확인하기 위해 멀티미디어 프로그램의 재기동 동작 시, 메모리 접근 정보를 트레이스(trace)하여 보조기억장치의 읽기 시간 감소를 확인하였다.

A Study on the Transformation of CAD Data Using the Image Data Processing (화상처리를 이용한 CAD 데이터의 생성에 관한 연구)

  • Koo, Bon-Kwon;Roh, Woo-Joon
    • Journal of the Korean Society of Manufacturing Technology Engineers
    • /
    • v.7 no.6
    • /
    • pp.72-79
    • /
    • 1998
  • In this paper, image processing algorithm is studied to enhance the preciseness of the geometry while converting captured images to CAD data. A program is developed as a result. The code, in the image processing, utilizes outline trace, point data smoothing algorithm. It is capable of automatically generating design data by converting input image data to the CAD data. The output can be made in DXF, IGES formats. The current research can be utilized as a base data for the development of factory automation or flexible manufacturing system which adopt image processing based automatic inspection and measuring system.

  • PDF

Development of a Quality Assurance Safety Assessment Database for Near Surface Radioactive Waste Disposal

  • Park J.W.;Kim C.L.;Park J.B.;Lee E.Y.;Lee Y.M.;Kang C.H.;Zhou W.;Kozak M.W.
    • Nuclear Engineering and Technology
    • /
    • v.35 no.6
    • /
    • pp.556-565
    • /
    • 2003
  • A quality assurance safety assessment database, called QUARK (QUality Assurance Program for Radioactive Waste Management in Korea), has been developed to manage both analysis information and parameter database for safety assessment of low- and intermediate-level radioactive waste (LILW) disposal facility in Korea. QUARK is such a tool that serves QA purposes for managing safety assessment information properly and securely. In QUARK, the information is organized and linked to maximize the integrity of information and traceability. QUARK provides guidance to conduct safety assessment analysis, from scenario generation to result analysis, and provides a window to inspect and trace previous safety assessment analysis and parameter values. QUARK also provides default database for safety assessment staff who construct input data files using SAGE(Safety Assessment Groundwater Evaluation), a safety assessment computer code.

Tracing Metallicity in the Scenario of High Velocity Clouds (HVCs) Colliding with our Milky Way

  • Sung, Kwang Hyun;Kwak, Kyujin
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.39 no.2
    • /
    • pp.77.2-77.2
    • /
    • 2014
  • Questions of how our Milky Way evolves through the interaction with its environment have been constantly raised. One particularly interesting question is how the metallicity would change as our Milky Way goes through collision with HVCs. Because of the possibility of HVCs providing fuel for star formation in the Galactic disk, we simulate the collision between HVCs and the Galactic disk. More specifically, we trace how the Galactic metallicity changes throughout the process of HVCs colliding with our Milky Way based upon a specific scenario that HVCs are primordial gas left-overs from an ancient galaxy formation. Such mixing between metal-rich gas (disk) and metal-poor HVC can be traced by running numerical simulations with the FLASH code due to its capability of tracking down the abundance change of a specific element such as carbon at each time step of the hydrodynamic evolution. As for now, we give how this mixing depends on model parameters that we choose such as collision speed, initial metallicities, temperature and so on.

  • PDF

Design and Implementation of Laboratory Information System based on RFID (RFID를 기반으로 한 실험실 정보 시스템의 설계 및 구현)

  • Song, Sang-Ha;Jang, Seung-Jin;Kim, Hyo-Min;Yoon, Young-Ro
    • Proceedings of the KIEE Conference
    • /
    • 2007.10a
    • /
    • pp.489-490
    • /
    • 2007
  • This paper is intended to trace and management of a medical specimen and its report in a hospital. To avoid missing and decaying specimen and to establish of order in the circulation of specimen, at the moment sampling, RFID tags for each are on examiner. And then, specimen is monitored easily, quickly and, correctly. We developed implementation LIS system has better CQI (Continuos Quality Improvement) using RFID and XML, ADO.net, ASP.net, C# 2.0. RFID technology replaces to an existing the bar-code system. Also for more convenience, we used a PDA-RFID module. The LIS system consists of main sorrel, SQL 2005, event display and analysis web page developed using asp.net 2.0 and sharing specimen data information using XML technology.

  • PDF

A Thread Monitoring System for Java (Java 언어를 위한 쓰레드 모니터링 시스템)

  • Moon Se-Won;Chang Byeong-Mo
    • The KIPS Transactions:PartA
    • /
    • v.13A no.3 s.100
    • /
    • pp.205-210
    • /
    • 2006
  • To assist developing robust multithreaded software, we develop a thread monitoring system for multithreaded Java programs, which can trace or monitor running threads and synchronization. We design a monitoring system which has options to select interesting threads and synchronizations. Using this tool, programmers can monitor only interesting threads and synchronization in more details by selecting options. It also provides profile information after execution, which summarizes behavior of running threads and synchronizations during execution. We implement the system based on code inlining, and presents some experimental results.

A Study on Attacker trace techniques applying 2-MAC authentication packet in Distribution Network (분산 네트워크 환경에서 2-MAC 인증 패킷을 이용한 공격자 추적기법)

  • 서대희;이임영
    • Proceedings of the Korea Multimedia Society Conference
    • /
    • 2003.05b
    • /
    • pp.326-329
    • /
    • 2003
  • 최근 인터넷을 대상으로 한 사이버 공격의 공격 경향은 분산 환경에서 다수 공격자의 대규모 분산 서비스 거부 공격(DoS)의 출현 및 해외 해커들의 국내 전산망을 우회 루트로 활용한 사례의 증가 등 고도화된 불법 행위가 점차 범죄의 강력한 수단으로 이용되는 추세에 있다. 본 논문은 기존 네트워크에서 해당 네트워크의 침입자의 트래픽 차단 방법의 취약점을 보완하여 2-MAC 인증 패킷을 이용한 효율적인 공격자 추적기법을 제안하였다. 제안된 방식은 기존 시스템에서의 NIC(Network Interface Card)의 물리적 주소인 MAC(Media Access Control)과 메시지 인증코드(MAC: Message Authentication Code)를 이용한 방식을 제안하였다.

  • PDF