• Title/Summary/Keyword: concealment

Search Result 345, Processing Time 0.03 seconds

The Research of Visual and Aesthetic Values of an Asian Ethnic Look (아시안 에스닉 룩의 조형성과 미적가치에 판한 연구)

  • Kwon Ha-Jin;Kim Min-Ja
    • Journal of the Korean Society of Costume
    • /
    • v.56 no.6 s.105
    • /
    • pp.114-131
    • /
    • 2006
  • An Asian Ethnic Look is based on its own values of traditional costumes and the fashion accessories that are influenced by its own genre within their own culture. In this thesis, it contemplates the study of visual values and the traditional influences of the Modern Western Designers and Asian Designers' definitions and the considerations of an Ethnic look in the countries like Middle East, India, Korea, China and Japan. The standard procedure to understand their Visual and Aesthetic values is acknowledgement of body. From that foundation, an Asian Ethnic Look and its Visual and Aesthetic Values were researched through out the Middle East Asian Look, Indian Look, Korean Look, Chinese Look and Japanese Look which effective after 1990's. The studies are further researched to the comparisons and interpretations of the Western Designers and the Asian Designers, and the definitions of an Asian Ethnic Look and its Visual and Aesthetic Values in between those. According to each country's religious attitudes, a beauty of concealment and a beauty of negative space appeal which emphasize an ethics on humanity and non-materialistic attitudes. It takes meanings of a phenomenon of nature's worship, Yin-Yang five elements of principles, oneness of body-mind and oneness of universe-mankind. Following the studies of Visual and Aesthetic Values of an Asian Ethnic Look, in 1990's Western Designers' interpretations were prominent use of the Asian Traditional Motif3. However, the interpretations of the Asian Designers were based on their own traditional ethics and they minimized decorative elements but enhanced naturalism, feminism, calm and sober designs compare to the past. The Asian Designers' interpretations of their visual values were based on their Asian mentality, beauty and its straightforward genuine perspective and respects of their own culture.

Non-Intrusive Speech Quality Estimation of G.729 Codec using a Packet Loss Effect Model (G.729 코덱의 패킷 손실 영향 모델을 이용한 비 침입적 음질 예측 기법)

  • Lee, Min-Ki;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.32 no.2
    • /
    • pp.157-166
    • /
    • 2013
  • This paper proposes a non-intrusive speech quality estimation method considering the effects of packet loss to perceptual quality. Packet loss is a major reason of quality degradation in a packet based speech communications network, whose effects are different according to the input speech characteristics or the performance of the embedded packet loss concealment (PLC) algorithm. For the quality estimation system that involves packet loss effects, we first observe the packet loss of G.729 codec which is one of narrowband codec in VoIP system. In order to quantify the lost packet affects, we design a classification algorithm only using speech parameters of G.729 decoder. Then, the degradation values of each class are iteratively selected that maximizes the correlation with the degradation PESQ-LQ scores, and total quality degradation is modeled by the weighted sum. From analyzing the correlation measures, we obtained correlation values of 0.8950 for the intrusive model and 0.8911 for the non-intrusive method.

Conversational Quality Measurement System for Mobile VoIP Speech Communication (모바일 VoIP 음성통신을 위한 대화음질 측정 시스템)

  • Cho, Jae-Man;Kim, Hyoung-Gook
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.10 no.4
    • /
    • pp.71-77
    • /
    • 2011
  • In this paper, we propose a conversational quality measurement (CQM) system for providing the objective QoS of high quality mobile VoIP voice telecommunication. For measuring the conversational quality, the VoIP telecommunication system is implemented in two smart phones connected with VoIP. The VoIP telecommunication system consists of echo cancellation, noise reduction, speech encoding/decoding, packet generation with RTP (Real-Time Protocol), jitter buffer control and POS (Play-out Schedule) with LC (loss Concealment). The CQM system is connected to a microphone and a speaker of each smart phone. The voice signal of each speaker is recorded and used to measure CE (Conversational Efficiency), CS (Conversational Symmetry), PESQ (Perceptual Evaluation of Speech Quality) and CE-CS-PESQ correlation. We prove the CQM system by measuring CE, CS and PESQ under various SNR, delay and loss due to IP network environment.

Performance Improvement for Increased Communication Speed in Anonymous Network using GeoIP (GeoIP를 이용한 익명 네트워크에서 통신 속도 향상을 위한 성능 개선)

  • Park, Kwang-Cheol;Lim, Young-Hwan;Lim, Jong-In;Park, Won-Hyung
    • The Journal of Society for e-Business Studies
    • /
    • v.16 no.4
    • /
    • pp.75-85
    • /
    • 2011
  • Although progress in information technology has made our life prosperous. But it accompanied a number of adverse effects in various aspects. Especially, internet according to the increasing requirements for privacy and security, IP concealment network technologies to ensure the anonymity are constantly being developed. IP concealment network technologies is aiding the user to bypass the blocked sites can be used to access for information gathering, and they could be used for a malicious hacker to hide his attacks. However, due to complex routing path, local communication bandwidth sangyiham, and internode encryption there are also disadvantages that communication speed is significantly less. In this paper, the research for improving the performance of anonymous networks is to proceed by the communication speed measurement that using GeoIP the particular country with high-bandwidth is Specified or path length is limited.

Error Concealment Method considering Distance and Direction of Motion Vectors in H.264 (움직임벡터의 거리와 방향성을 고려한 H.264 에러 은닉 방법)

  • Son, Nam-Rye;Lee, Guee-Sang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.1C
    • /
    • pp.37-47
    • /
    • 2009
  • When H.264 encoded video streams are transmitted over wireless network, packet loss is unavoidable. Responding on this environment, we propose methods to recover missed motion vector in the decoder: At first, A candidate vector set for missing macroblock is estimated from high correlation coefficient of neighboring motion vectors and missing block vectors the algorithm clusters candidate vectors through distances amongst motion vectors of neighboring blocks. Then the optimal candidate vector is determined by the median value of the clustered motion vector set. In next stage, from the candidate vector set, the final candidate vector of missing block is determined it has minimum distortion value considering directions of neighboring pixels' boundary. Test results showed that the proposed algorithm decreases the candidate motion vectors $23{\sim}61%$ and reduces $3{\sim}4sec$ on average processing(decoding) time comparing the existing H.264 codec. The PSNR, in terms of visual quality is similar to existing methods.

Error-Resilience Enhancement based on Polyphase Down Sampling for the H.264 Video Coding Technology (에러 강인성 향상을 위한 다상 다운 샘플링 적용 H.264 동영상 부호화 기술)

  • Jung, Eun Ku;Jia, Jie;Kim, Hae Kwang;Choi, Hae Chul;Kim, Jae Gon
    • Journal of Broadcast Engineering
    • /
    • v.10 no.3
    • /
    • pp.340-347
    • /
    • 2005
  • This paper presents a polyphase down sampling based multiple description coding applied to H.264 video coding standard. For a given macroblock, a residual macroblock is calculated by motion estimation, and before applying DCT, quantization and entrophy coding of the H.264 coding process, the polyphase down sampling is applied to the residual macroblock to code in four separate descriptions. Experiments were performed for all the 9 test sequences of JVT SVC standardization in various packet loss patterns. Experimental results show that the proposed one gives 0.5 to 5 dB enhancement over an error-concealment based on the slice group map technolgoy.

The Study on Improvement of Thermal Stress Breakage in Infrared Transmissive Glass for Aircraft Searchlight (항공기용 탐조등 적외선 투과 유리의 열응력 파손 현상 개선 연구)

  • Seo, Young-Jin;Jeong, Sang-Gyu
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.19 no.11
    • /
    • pp.332-337
    • /
    • 2018
  • Aircraft searchlights are used in search or rescue missions when performing night missions, and provide infrared light to keep operations in concealment. During aircraft operation, the infrared ray transmission filter glass for generating infrared rays can break, resulting in problems such as loss of concealment ability and maintenance. In this paper, we describe the procedure for testing the operating conditions of the searchlight when the defect occurs and finding the cause of the defect. We also summarize various methods to improve the cause and process of making the improved filter prototype. In addition, we also describe the results of verifying the performance requirements of the searchlight. As a result of the test and verification, the damage of the filter was improved and the improved filter was applied to the aircraft.

Analysis of anti-forensic trends and research on countermeasuresucation (안티 포렌식 동향 분석 및 대응 방안 연구)

  • Han Hyundong;Cho Young Jun;Cho Jae Yeon;Kim Se On;Han Wan Seop;Choi Yong Jun;Lee Jeong Hun;Kim Min Su
    • Convergence Security Journal
    • /
    • v.23 no.1
    • /
    • pp.97-107
    • /
    • 2023
  • With the popularization of digital devices in the era of the 4th industrial revolution and the increase in cyber crimes targeting them, the importance of securing digital data evidence is emerging. However, the difficulty in securing digital data evidence is due to the use of anti-forensic techniques that increase analysis time or make it impossible, such as manipulation, deletion, and obfuscation of digital data. Such anti-forensic is defined as a series of actions to damage and block evidence in terms of digital forensics, and is classified into data destruction, data encryption, data concealment, and data tampering as anti-forensic techniques. Therefore, in this study, anti-forensic techniques are categorized into data concealment and deletion (obfuscation and encryption), investigate and analyze recent research trends, and suggest future anti-forensic research directions.

The Performance Improvement of G.729 PLC in Situation of Consecutive Frame Loss (연속적인 프레임 손실 상황에서의 G.729 PLC 성능개선)

  • Hong, Seong-Hoon;Kim, Jin-Woo;Bae, Myung-Jin
    • The Journal of the Acoustical Society of Korea
    • /
    • v.29 no.1
    • /
    • pp.34-40
    • /
    • 2010
  • As internet spread widely, various service which use the internet have been provided. One of the service is a internet phone. Its usage is increasing by the advantage of cost. But it has a falling off in quality of speech. because it use packet switching method while existing telephone use circuit switching method. Although vocoder use PLC (Packet Loss Concealment) algorithm, it has a weakness of continuous packet loss. In this paper, we propose methods to improve a lowering in quality of speech under continuous loss of packet by using PLC algorithm used in advanced G.729 and G.711. The proposed methods are LP (Linear Prediction) parameter interpolation, excitation signal reconstruction and excitation signal gain reconstruction. As a result, the proposed method shows superior performance about 11%.

iVisher: Real-Time Detection of Caller ID Spoofing

  • Song, Jaeseung;Kim, Hyoungshick;Gkelias, Athanasios
    • ETRI Journal
    • /
    • v.36 no.5
    • /
    • pp.865-875
    • /
    • 2014
  • Voice phishing (vishing) uses social engineering, based on people's trust in telephone services, to trick people into divulging financial data or transferring money to a scammer. In a vishing attack, a scammer often modifies the telephone number that appears on the victim's phone to mislead the victim into believing that the phone call is coming from a trusted source, since people typically judge a caller's legitimacy by the displayed phone number. We propose a system named iVisher for detecting a concealed incoming number (that is, caller ID) in Session Initiation Protocol-based Voice-over-Internet Protocol initiated phone calls. Our results demonstrate that iVisher is capable of detecting a concealed caller ID without significantly impacting upon the overall call setup time.