• Title/Summary/Keyword: full-information

Search Result 3,672, Processing Time 0.028 seconds

Subjective Evaluation of Ultra-high Definition (UHD) Videos

  • Rahim, Tariq;Shin, Soo Young
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2464-2479
    • /
    • 2020
  • This paper presents a detailed subjective quality assessment for the ultra-high definition (UHD) videos having frame rates of 30fps and 60 fps. The subjective assessment is based on the ITU-R BT-500 recommendations, where double stimulus continuous quality scale (DSCQS-type II) test is performed for the evaluation of the perceived quality of the user's in terms of differential mean opinion score (DMOS). Encoding of the UHD videos by opting encoders i.e. H.264/AVC, H.265/HEVC, and VP9 at five different quantization parameter (QP) levels is done to investigate the perceived user's quality of experience (QoE) given as DMOS. Moreover, the encoding efficiency as the encoding time for each encoder and qualitative performance by employing full-reference (FR) quality metrics are presented in this work.

영한자동번역에서의 두단계 영어 전산문법

  • 최승권
    • Language and Information
    • /
    • v.4 no.1
    • /
    • pp.97-109
    • /
    • 2000
  • Application systems of natural language processing such as machine translation system must deal with actual texts including the full range of linguistic phenomena. But it seems to be impossible that the existing grammar covers completely such actual texts because they include disruptive factors such as long sentences, unexpected sentence patterns and erroneous input to obstruct well-formed analysis of a sentence. In order to solve analysis failure due to the disruptive factors or incorrect selection of correct parse tree among forest parse trees, this paper proposes two-level computational grammar which consists of a constraint-based grammar and an error-tolerant grammar. The constraint-based computational grammar is the grammar that gives us the well-formed analysis of English texts. The error-tolerant computational grammar is the grammar that reconstructs a comprehensible whole sentence structure with partially successful parse trees within failed parsing results.

  • PDF

Data Hiding in NTFS Timestamps for Anti-Forensics

  • Cho, Gyu-Sang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.3
    • /
    • pp.31-40
    • /
    • 2016
  • In this paper, we propose a new anti-forensic method for hiding data in the timestamp of a file in the Windows NTFS filesystem. The main idea of the proposed method is to utilize the 16 least significant bits of the 64 bits in the timestamps. The 64-bit timestamp format represents a number of 100-nanosecond intervals, which are small enough to appear in less than a second, and are not commonly displayed with full precision in the Windows Explorer window or the file browsers of forensic tools. This allows them to be manipulated for other purposes. Every file has $STANDARD_INFORMATION and $FILE_NAME attributes, and each attribute has four timestamps respectively, so we can use 16 bytes to hide data. Without any changes in an original timestamp of "year-month-day hour:min:sec" format, we intentionally put manipulated data into the 16 least significant bits, making the existence of the hidden data in the timestamps difficult to uncover or detect. We demonstrated the applicability and feasibility of the proposed method with a test case.

Data Supply Voltage Reduction Scheme for Low-Power AMOLED Displays

  • Nam, Hyoungsik;Jeong, Hoon
    • ETRI Journal
    • /
    • v.34 no.5
    • /
    • pp.727-733
    • /
    • 2012
  • This paper demonstrates a new driving scheme that allows reducing the supply voltage of data drivers for low-power active matrix organic light-emitting diode (AMOLED) displays. The proposed technique drives down the data voltage range by 50%, which subsequently diminishes in the peak power consumption of data drivers at the full white pattern by 75%. Because the gate voltage of a driving thin film transistor covers the same range as a conventional driving scheme by means of a level-shifting scheme, the low-data supply scheme achieves the equivalent dynamic range of OLED currents. The average power consumption of data drivers is reduced by 60% over 24 test images, and power consumption is kept below 25%.

High-Robust Relaxation Oscillator with Frequency Synthesis Feature for FM-UWB Transmitters

  • Zhou, Bo;Wang, Jingchao
    • JSTS:Journal of Semiconductor Technology and Science
    • /
    • v.15 no.2
    • /
    • pp.202-207
    • /
    • 2015
  • A CMOS relaxation oscillator, with high robustness over process, voltage and temperature (PVT) variations, is designed in $0.18{\mu}m$ CMOS. The proposed oscillator, consisting of full-differential charge-discharge timing circuit and switched-capacitor based voltage-to-current conversion, could be expanded to a simple open-loop frequency synthesizer (FS) with output frequency digitally tuned. Experimental results show that the proposed oscillator conducts subcarrier generation for frequency-modulated ultra-wideband (FM-UWB) transmitters with triangular amplitude distortion less than 1%, and achieves frequency deviation less than 8% under PVT and phase noise of -112 dBc/Hz at 1 MHz offset frequency. Under oscillation frequency of 10.5 MHz, the presented design has the relative FS error less than 2% for subcarrier generation and the power dissipation of 0.6 mW from a 1.8 V supply.

Cryptoanalysis of the Full version Randomized Addition-Subtraction Chains (완전한 형태의 랜덤한 덧셈-뺄셈 체인의 암호분석)

  • 한동국;장남수;정석원;박영호;김창한
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 2003.07a
    • /
    • pp.307-311
    • /
    • 2003
  • Okeya-Sakurai는[12]에서 단순한 형태의 랜덤한 덧셈-뺄셈 체인의 대응방법[14]은 SPA공격에 취약함을 보였다. 그러나 그들의 분석 방법은 복잡한 형태[14]에는 적용되지 않는다. 본 논문에서는 Okeya-Sakurai의 공격 알고리듬에 두 가지 잠재된 문제가 있음을 보인다. 또한[12,15]와는 다른 강하고 견고한 새로운 공격 알고리듬을 제안한다. 본 논문에서 제안하는 공격 알고리듬을 사용하면 복잡한 형태의 랜덤한 덧셈-뺄셈 체인[14]또한 완벽하게 분석된다. 본 논문의 결과를 표준에서 제안된 163비트로 실험한 결과 단순한 형태에서는 20개의 AD수열로 대략 94%의 확률로 공격이 성공하며 30개의 AD수열로는 대략 99%의 확률로 공격이 성공한다. 또한, 복잡한 형태에서는 40개의 AD수열로 94%의 확률로 70개의 AD수열로는 99%로의 확률로 공격이 성공한다.

  • PDF

Combustion Pressure Monitoring System for Engine Control; By Simultaneous and Continuous Measuring of All Cylinders

  • Mihara, Y.;Maruyama, Y.;Okada, Y.;Kido, H.;Nishida, O.;Fujita, H.;Ito, M.
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.28 no.2
    • /
    • pp.269-276
    • /
    • 2004
  • A marine diesel engine should realize optimal efficiency operation while reducing NOx. Fuel injection systems by electronic control can become effective means for that. Although it would be able to get more precise engine control compared to the mechanical injection system, it needs some accurate and instant information in order to bring its ability into full play while sailing on the sea. Very important information of them is shaft torque and continuous combustion pressure of all cylinders. The system presented in this report can deliver those data.

The Study on Service Model through the Case Study of Internet Bank (인터넷 뱅킹의 사례연구를 통한 서비스모델 구현에 관한 연구)

  • Park, Chong-Don
    • International Commerce and Information Review
    • /
    • v.7 no.1
    • /
    • pp.75-94
    • /
    • 2005
  • With most major full service banks having launched transactional Internet banking, attention is shifting to the realities of managing the Internet channel as a profitable component of an overall delivery strategy. In addition to examining Case Study and Internet Bank Model. Services of Internet Banking available through the Internet are as follows. 1. credit card loans, personal loans. 2. high-yield financial products. 3. insurance products. 4. securities products. 5. Case study of Foreign Internet Banking(ING, BNP, HSNC, City Bank). The study reviewed fields, including financial services, customer service, Website formation and design, convenience of use and system safety, Internet Banking Model, and many related areas. Internet Banking earned high marks in most fields. This study review focuses on the following: Understanding and meeting consumer expectations for us ability, site performance and functionality. Integrating the Internet channel into overall marketing, product delivery and customer service strategies. Strategies to increase customer satisfaction with Internet Banking and to attract new Internet bankers. therefore this study review activity model concretion of Internet Banking Model and Case Study.

  • PDF

The Trade Effect of Korea-EU FTA on the Fishery Sector (한국-EU 자유무역협정의 수산부문 무역효과 추정)

  • Kim, Nam-Doo;Hwang, Sang-In
    • International Commerce and Information Review
    • /
    • v.12 no.4
    • /
    • pp.49-65
    • /
    • 2010
  • We have analyzed the trade effect of Korea-EU FTA on the Korean fishery sector, after reviewing the trade pattern and the tariff barriers of fishery sector between Korea-EU. For the trade effects, we have categorized into three cases: 1) the complete tariff elimination of all items, 2) the half tariff reduction on top ten valued items, with complete tariff elimination of other items, and 3) the complete tariff elimination, except unbinding top three valued items. The effect of the complete tariff elimination of all items implies the effect of the full achievement of FTA. For other two cases, these effects imply the effects of the transitional phenomenon of FTA since the complete tariff elimination happens gradually over more than ten years. For the complete elimination of tariff, we found that imports are increased by 1.1 billion dollars which is 12.9% increase in average imports during years 2006-2009. Also, exports are increased by 1.3 billion dollars which is 14.5% increase in average exports during same years.

  • PDF

The critical review for root understanding of law philosophy ([법철학]의 근본이해를 위한 비평적 서평)

  • 이천효
    • Journal of Korean Library and Information Science Society
    • /
    • v.23
    • /
    • pp.471-503
    • /
    • 1995
  • Originally [descriptive review] is widely used by general reader. In contrast with this, [critical review] is generally used by librarian and researcher. Like this, book review is divided into descriptive review and critical review. Besides, the present writer su n.0, pposes to make additions to [interpretative review]. In this study, the present writer tries to realize full-scale review concerning [The Root Problem of Law Philosophy/Kim, Pyong-Kyu] by critical review and interpretative review. Together, the contents on which the critical review of law philosophy is based on were investigated as follows: (1) The law and metaphor (2) The Oriental law and natural law (3) The golden rule in the Orient (4) The ideology and justice of Confucianism (5) The justice in Confucian thought (6) The essay on justice of the West and the Orient (7) The significance of the Oriental morality (8) The relation of morality, ceremony and law (9) The essay on conscience (10) The essay on conscience of the Orient and the West

  • PDF