• Title/Summary/Keyword: encoding efficiency

Search Result 356, Processing Time 0.028 seconds

Complexation of Adiponectin-encoding Plasmid DNA with Rosiglitazone-loaded Cationic Liposomes

  • Davaa, Enkhzaya;Jeong, Ui-Hyeon;Shin, Baek-Ki;Choi, Soon-Gil;Myung, Chang-Seon;Park, Jeong-Sook
    • Journal of Pharmaceutical Investigation
    • /
    • v.40 no.6
    • /
    • pp.357-362
    • /
    • 2010
  • To enhance therapeutic effects of insulin-sensitizing adipokine, ADN gene and potent agonists, rosiglitazone for the $PPAR{\gamma}$, cationic liposomes as non-viral vectors were formulated. The particle size and zeta potential of drug loaded and unloaded cationic liposomes were investigated. The complex formation between cationic liposomes and negatively charged plasmid DNA was confirmed and the protection from DNase was observed. In vitro transfection was investigated in HepG2, HeLa, and HEK293 cells by mRNA expression of ADN. Encapsulation efficacy of rosiglitazone-loaded liposomes was determined by UV detection. Particle sizes of cationic liposomes were in the range of 110-170 nm and those of rosiglitazone-loaded cationic liposomes were in the range of 130-180 nm, respectively. Gel retardation of complexes indicated that the complex was formed at weight ratios of cationic lipid to plasmid DNA higher than 20:1. Both complexes protected plasmid DNA from DNase either drug free or drug loading. Encapsulation efficiency of rosiglitazone-loaded emulsion was increased by drug dose. The mRNA expression levels of ADN were dose-dependently increased in cells transfected with plasmid DNA. Therefore, cationic liposomes could be potential co-delivery system for drug and gene.

The Efficiency of Deer Antler Herbal Acupuncture on Modulation and Prevention of IL-1 Mediated Activation in Rat Chondrocytes at a Receptor Level

  • Kim, Woo-Young;Lee, Seung-Deok;Kim, Kyung-Ho;Baek, Seung-Tae;Kim, Kap-Sung
    • Journal of Acupuncture Research
    • /
    • v.23 no.2
    • /
    • pp.113-123
    • /
    • 2006
  • Objectives : Deer antler Herbal-Acupuncture (DHA) solution represents one of the most commonly used medicine to treat rheumatoid arthritis. But, mechanisms of its antiarthritic activities are still poorly understood. Identification of common DHA aqua-acupuncture capable of affording protection or modulating the onset and severity of arthritis may have important human health implications. Results : We determined if DHA could prevent the binding of $IL-1{\beta}$ to its cellular receptors. DHA addition to rat chondrocytes treated with $IL-1{\beta}$ or with reactive oxygen species(ROS) prevents the activation of proteoglycan synthesis. After treatment with $IL-1{\beta}$, DHA increased the expression of mRNA encoding the type II $IL-1{\beta}$ receptor. These results emphasize the potential role of two regulating proteins of the $IL-1{\beta}$ signaling pathway that could account for the beneficial effect of DHA in osteRArthritis. The present study also identifies a novel mechanism of DHA-mediated anti-inflammatory activity. Conclusion : It is shown that DHA inhibits both $IL-1{\beta}-$ and $TNF-{\alpha}-induced$ NO production in normal human articular chondrocytes. The observed suppression of IL-1-induced NO production is associated with inhibition of inducible NO synthase(iNOS) mRNA and protein expression. In addition, DHA also suppresses the production of IL-1-induced cyclooxygenase-2 and IL-6. The constitutively expressed cyclooxygenase-1, however, was not affected by the sugar. These results demonstrate that DHA expresses a unique range of activities and identifies a novel mechanism for the inhibition of inflammatory processes.

  • PDF

Digital Watermarking Algorithm for Copyright Protection of JPEG Image (JPEG 영상의 저작권 보호를 위한 Digital Watermarking 알고리즘)

  • Park, Eun-Suk;Woo, Jong-Won;Lee, Seok-Hee;Heo, Yoon-Seok;Cho, Ki-Hyung
    • The Transactions of the Korea Information Processing Society
    • /
    • v.7 no.1
    • /
    • pp.296-305
    • /
    • 2000
  • In this paper, we propose the method of embedding the encrypted digital watermark in quantization coefficient when we encode the image data in the process of JPEC. The proposed method is as following. After a DCT coefficient of each block is quantized, we arrange the quantization coefficient as on dimension with a zigzag scan and replace each block. By applying even-odd feature of frequency of the encrypted watermark to a quantization coefficient of some fixed domain of replaced each block and embedding it, we obtain the compressed image data by encoding after placing it in the order prior to replacement. The advantages of the proposed method here are as follows: We can embed many information keeping a secret as much as possible by using the algorithm of block replacement. We can control the amount of embedding of each use, as we embed the encrypted information by selecting some fixed domain of a quantization coefficient, we can fix the embedding data regardless of the image and the value of quantization. We verified the results by experiments and analyzed the efficiency of them in comparison with the former study.

  • PDF

A Fast MB Mode Selection Algorithm in the H.264 Standard (H.264에서의 고속 매크로블록 모드 선택 알고리듬)

  • Kim Donghyung;Jeong Jechang
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.1C
    • /
    • pp.61-72
    • /
    • 2005
  • For the improvement of coding efficiency, the H.264 standard uses new coding tools such as VBS, 1/4-pel accurate ME, multiple references, intra prediction, loop filter, etc. Using these coding tools, H.264 has achieved significant improvements from rate-distortion point of view compared to existing standards. However, the encoder complexity is greatly increased due to these coding tools. We focus on the complexity reduction method of MB mode selection. Among all modes which can be selected, $8{\times}8$ and intra $4{\times}4$ mode have higher complexity than the others. So we propose the methods for reduction of the $8{\times}8$ and intra $4{\times}4$ mode complexity by using information of other modes with relatively low complexity. Simulation results show that the proposed methods save up to $54.6{\%}$ of total encoding time while keeping the average decrease about 0.012dB in PSNR.

An efficient algorithm for motion estimation in H.264 (H.264를 위한 효율적인 움직임 벡터 추정 알고리즘)

  • Jeong In Cheol;Han Jong Ki
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.12C
    • /
    • pp.1669-1676
    • /
    • 2004
  • In H.264, 7 modes {16${\times}$16, 16${\times}$8, 8${\times}$16, 8${\times}$8, 8${\times}$4, 4${\times}$8, 4${\times}$4) are used to enhance the coding efficiency. The motion vector estimation with 7 modes may require huge computing time. In this paper, to speed up the motion vector estimation procedure while the high image quality remains, we propose a motion vector refinement scheme using the temporary motion vector generated with little computation. The proposed estimation process consists of three phases: Mode decision for a 16${\times}$16 macroblock, Composing a temporary motion vector, Refinement of the temporary motion vector. We demonstrate the effectiveness of the proposed method by computer simulation. In the results, the encoding time consumed by the proposed scheme has been reduced significantly while the encoded video quality remains unchanged.

A Robust Digital Watermarking based on Virtual Optics (가상 광학에 기반한 강인한 디지털 워터마킹)

  • Lee, Geum-Boon;Cho, Beom-Joon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.5
    • /
    • pp.1073-1080
    • /
    • 2011
  • In this paper, we propose a novel digital watermarking method by virtual optics which secures multimedia information such as images, videos and sounds. To secure the multimedia data, we use Fresnel transform which describes the diffraction phenomena of the waves. Also, this method attaches the random phase function to Fresnel transform so that original image and watermark image would be gaussian random vectors. The complex numbers of watermark by Fresnel transform are separated the real part and the imaginary part. The former is embedded in original image as a encoding key imperceptibly and the latter is used for detecting the watermark as a decoding key. This method for digital watermarking ensures that watermark can be successfully registered and extracted from the watermarked image. Further, it provides the robustness to signal processing operation and geometric distortion and proves the strong resilience against cropping attack. The performance evaluation of the experiment is carried out with PSNR, and the numerical simulation results show the efficiency of the proposed method.

An Effective Control of Network Traffic using RTCP for Transmitting Video Streaming Data (비디오 스트리밍 데이타 전송시 RTCP를 이용한 효율적인 네트워크 트래픽 제어)

  • Park, Dae-Hoon;Hur, Hye-Sun;Hong, Youn-Sik
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.8 no.3
    • /
    • pp.328-335
    • /
    • 2002
  • When we want to transfer video streaming data through computer networks, we will have to be allocated a larger bandwidth compared to a general application. In general, it causes a serious network overload inevitably due to the limited bandwidth. In this paper, in order to resolve the problem, we haute taken a method for transmitting video streaming data using RTP and RTCP. With RR(Receiver Report) packet in RTCP we will test it to check whether the traffic in a network has occurred or not. If it happened, we haute tried to reduce the overall network traffic by dynamically changing the quantization factor of the Motion JPEG that is one of the encoding styles in JMF. When the ratio of the average of transmission for each session to the average of overall transmission is greater than 7%, we should adjust the amount of data to be transmitted for each session to reach the session mean values. The experimental results show that the proposed method taken here reduces the overload effectively and therefore improves the efficiency for transmitting video streaming data.

Study on DPSAM Turbo TCM in Time-Selective Fading Channels (시간 선택적 페이딩 채널 환경에서 DPSAM Turbo TCM에 관한 연구)

  • Kim, Jeong-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.107-113
    • /
    • 2013
  • Mobile mobility and data reliability should be guaranteed as well as amounts of data services are essential in the era of smart media. In order to improve the reliability of high-speed data, strong channel coding and modulation techniques are required. In this paper, the structure of Turbo TCM decoder, applying high-order modulation techniques and the DPSAM method which improves performances in time-selective fading channels in the case of burst errors are suggested through the optimal decoding method and iteration decoding so as to improve bandwidth efficiency in Turbo Codes with excellent encoding gain. The proposed method in comparison with the existing method is that 3dB is superior in case that BER is $10^{-2}$ and the number of iterations is 3. In addition, the function is improved at approximately 6dB in case that BER is $10^{-3}$ and the number of iterations is 7. The proposed method requires additional bandwidth; however, the bandwidth loss can be overcome through Turbo TCM technology on the additional bit rate from the bandwidth loss.

Optical encryption system using random divided image and joint transform correlator (무작위 분할 영상과 결합변환 광 상관기를 이용한 암호화 시스템)

  • 최상규;서동환;신창목;김수중;배장근
    • Korean Journal of Optics and Photonics
    • /
    • v.14 no.6
    • /
    • pp.636-642
    • /
    • 2003
  • We proposed the optical system using two divided halftone images to hide the original image and a joint transform correlator. The encryption procedure is performed by the Fourier transform of the product of each divided image by visual cryptography and the same random image which is generated by computer processing. As a result, we can obtain two Fourier divided images which are used as the encrypted image and the decrypting key, respectively. In the decryption procedure, both the encrypted image and the decrypting key are located on the joint input plane. Then the original image is reconstructed on a CCD camera which is located in the output plane. An autocorrelation term of joint transform correlator contributes to decrypt the original image. To demonstrate the efficiency of the proposed system, computer simulations and noise analysis are performed. The result show that the proposed system is a very useful optical certification system.

Supporting ROI transmission of 3D Point Cloud Data based on 3D Manifesto (3차원 Manifesto 기반 3D Point Cloud Data의 ROI 전송 지원 방안)

  • Im, Jiehon;Kim, Junsik;Rhyu, Sungryeul;Kim, Hoejung;Kim, Sang IL;Kim, Kyuheon
    • Journal of the Semiconductor & Display Technology
    • /
    • v.17 no.4
    • /
    • pp.21-26
    • /
    • 2018
  • Recently, the emergence of 3D cameras, 3D scanners and various cameras including Lidar is expected to be applied to applications such as AR, VR, and autonomous mobile vehicles that deal with 3D data. In Particular, the 3D point cloud data consisting of tens to hundreds of thousands of 3D points is rapidly increased in capacity compared with 2D data, Efficient encoding / decoding technology for smooth service within a limited bandwidth, and efficient service provision technology for differentiating the area of interest and the surrounding area are needed. In this paper, we propose a new quality parameter considering characteristics of 3D point cloud instead of quality change based on assumed video codec in MPEG V-PCC used in 3D point cloud compression, 3D Grid division method and representation for selectively transmitting 3D point clouds according to user's area of interest, and propose a new 3D Manifesto. By using the proposed technique, it is possible to generate more bitrate images, and it is confirmed that the efficiency of network, decoder, and renderer can be increased while selectively transmitting as needed.