• Title/Summary/Keyword: host-based

Search Result 1,640, Processing Time 0.035 seconds

Robust ROI Watermarking Scheme Based on Visual Cryptography: Application on Mammograms

  • Benyoussef, Meryem;Mabtoul, Samira;El Marraki, Mohamed;Aboutajdine, Driss
    • Journal of Information Processing Systems
    • /
    • v.11 no.4
    • /
    • pp.495-508
    • /
    • 2015
  • In this paper, a novel robust medical images watermarking scheme is proposed. In traditional methods, the added watermark may alter the host medical image in an irreversible manner and may mask subtle details. Consequently, we propose a method for medical image copyright protection that may remedy this problem by embedding the watermark without modifying the original host image. The proposed method is based on the visual cryptography concept and the dominant blocks of wavelet coefficients. The logic in using the blocks dominants map is that local features, such as contours or edges, are unique to each image. The experimental results show that the proposed method can withstand several image processing attacks such as cropping, filtering, compression, etc.

A study on the characteristics of the OLEDs using Ir complex for the blue phosphorescence (Ir complexes를 이용한 인광 발광 소자의 전기 광학적 특성 관한 연구)

  • Kim, So-Young;Kim, Jun-Ho;Seo, Ji-Hyun;Kim, Young-Kwan
    • Proceedings of the Korean Institute of Electrical and Electronic Material Engineers Conference
    • /
    • 2005.07a
    • /
    • pp.510-511
    • /
    • 2005
  • Several iridium based complexes were investigated as blue phosphorescent dopants. They are achieved about 100 % quantum efficiencies due to utilization of both singlet and triplet excitons in the radiative processes. We have fabricated phosphorescent OLED with 8 % Ir$(ppz)_3$ as a triplet emissive dopnat in diverse host materials. In this study, the CBP obtained the luminance efficiency of 0.20 cd/A adapts to the host material. Furthermore, we synthesize metalorganic phosphor complexs based on Ir heavy metal with different ligands as to $Ir(ppz)_2acac$, $(Im)_2Ir(acac)$, $(Im-R)_2Ir(acac)$.

  • PDF

ORB-SLAM based SLAM Framework for the Spatial Recognition using Android Oriented Tethered Type AR Glasses (안드로이드 기반 테더드 타입 AR 글래스의 공간 인식을 위한 ORB-SLAM 기반 SLAM프레임워크 설계)

  • Do-hoon Kim;Joongjin Kook
    • Journal of the Semiconductor & Display Technology
    • /
    • v.22 no.1
    • /
    • pp.6-10
    • /
    • 2023
  • In this paper, we proposed a software framework structure to apply ORB-SLAM, the most representative of SLAM algorithms, so that map creation and location estimation technology can be applied through tethered AR glasses. Since tethered AR glasses perform only the role of an input/output device, the processing of camera and sensor data and the generation of images to be displayed through the optical display module must be performed through the host. At this time, an Android-based mobile device is adopted as the host. Therefore, the major libraries required for the implementation of AR contents for AR glasses were hierarchically organized, and spatial recognition and location estimation functions using SLAM were verified.

  • PDF

The Effect of Milk Protein on the Biological and Rheological Properties of Probiotic Capsules

  • Kil, Bum Ju;Yoon, Sung Jin;Yun, Cheol-Heui;Huh, Chul-Sung
    • Journal of Microbiology and Biotechnology
    • /
    • v.30 no.12
    • /
    • pp.1870-1875
    • /
    • 2020
  • Probiotics are often infused into functional foods or encapsulated in a supplement form to maintain a healthy balance between the gut microbiota and their host. Because there are milk-based functional foods such as yogurt and cheese on the market, it has been suggested that milk-based probiotics could be incorporated into skim milk proteins in a liquid capsule. Skim milk is mainly composed of casein and whey protein, which create a strong natural barrier and can be used to encapsulate probiotics. In this study, we compared the encapsulated probiotics prepared with milk-based concentrated cell mixtures using commercial probiotics. Probiotic capsules were emulsified with skim milk proteins using vegetable oil to form a double coating layer. The product was heat-stable when tested using a rheometer. The survival rate of the milk-based probiotic cells in the lower gastric environment with bile was significantly higher than commercial probiotics. Thus, milk-encapsulated probiotics exhibited greater efficacy in the host than other types of probiotics, suggesting that the former could be more viable with a longer shelf life under harsh conditions than other form of probiotics. Our findings suggested that, compared with other types of probiotics, milk-based probiotics may be a better choice for producers and consumers.

A Study of Formalized Presentation of Worm based on time-based Behavioral sequences (시간적인 행동 패턴을 고려한 웜의 정형 표현 기법 연구)

  • Lee Min-Soo;Shon Tae-Shik;Cho Sang-Hyun;Kim Dong-Soo;Seo Jung-Taek;Sohn Ki-Wook;Moon Jong-Sub
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.3
    • /
    • pp.53-64
    • /
    • 2006
  • Worm analysis report currently produced by anti-virus companies closely resemble those of virus report and do not properly characterize the specific attributes of worms. In this paper, we propose formalized presentation method based on time-based behavioral sequences to more accurately characterize worms. we define a format based on the behavior and communication patterns that occur between an infected host and a target host. we also propose a method for presently worm analysis data with that format. We also compare our framework with analysis data provided by Symantec.

A Hierarchical Server Structure for Parallel Location Information Search of Mobile Hosts (이동 호스트의 병렬적 위치 정보 탐색을 위한 서버의 계층 구조)

  • Jeong, Gwang-Sik;Yu, Heon-Chang;Hwang, Jong-Seon
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.28 no.1_2
    • /
    • pp.80-89
    • /
    • 2001
  • The development in the mobile computing systems have arisen new and previously unforeseen problems, such as problems in information management of mobile host, disconnection of mobile host and low bandwidths of wireless communications. Especially, location information management strategy of mobile host results in an increased overhead in mobile computing systems. Due to the mobility of the mobiles host, the changes in the mobile host's address depends on the mobile host's location, and is maintained by mapping physical address on virtual address, Since previously suggested several strategies for mapping method between physical address and virtual address did not tackle the increase of mobile host and distribution of location information, it was not able to support the scalability in mobile computing systems. Thus, to distribute the location inrormation, we propose an advanced n-depth LiST (Location information Search Tree) and the parallel location search and update strategy based on the advanced n-depth LiST. The advanced n-depth LiST is logically a hierarchical structure that clusters the location information server by ring structure and reduces the location information search and update cost by parallel seatch and updated method. The experiment shows that even though the distance of two MHs that communicate with each other is large, due to the strnctural distribution of location information, advanced n-depth LiST results in good performance. Moreover, despite the reduction in the location information search cost, there was no increase in the location information update cost.

  • PDF

TRGB Distances to Type Ia Supernova Host Galaxies in the Leo I Group and the Hubble Constant

  • Jang, In Sung;Lee, Myung Gyoon
    • The Bulletin of The Korean Astronomical Society
    • /
    • v.38 no.2
    • /
    • pp.45.1-45.1
    • /
    • 2013
  • Type Ia supernovae (SNe Ia) are a powerful tool to investigate the expansion history of the universe, because their peak luminosity is as bright as a galaxy and is known as an excellent standard candle. Since the discovery of the acceleration of the universe based on the observations of SNe Ia, higher than ever accuracy of their peak luminosity is needed to investigate various problems in cosmology. We started a project to improve the accuracy of the calibration of the peak luminosity of SNe Ia by measuring accurate distances to nearby resolved galaxies that host SNe Ia. We derive accurate distances to the SN Ia host galaxies using the method to measure the luminosity of the tip of the red giant branch (TRGB). In this study we present the results for M66 and M96 in the Leo I Group which are nearby spiral galaxies hosting SN 1989B and SN 1998bu, respectively. We obtain VI photometry of resolved stars in these galaxies from F555W and F814W images in the Hubble Space Telescope archive. We derive the distances to these galaxies from the luminosity of the TRGB. With these results we derive absolute maximum magnitudes of two SNe (SN 1989B in M66 and SN 1998bu in M96). We derive a value of the Hubble constant from the optical magnitudes of these SNe Ia and SN 2011fe in M101 based on our TRGB analysis. This value is similar to the values derived from recent estimates from WMAP9 and Planck results, but smaller than other recent determinations based on Cepheid calibration for SNe Ia luminosity.

  • PDF

An Efficient Agent Framework for Host-based Vulnerability Assessment System in Virtualization Environment (가상화 환경에서 호스트 기반 취약점 분석 시스템을 위한 효율적인 에이전트 프레임워크)

  • Yang, Jin-Seok;Chung, Tai-Myoung
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.3 no.1
    • /
    • pp.23-30
    • /
    • 2014
  • In this paper, we propose an efficient agent framework for host-based vulnerability assessment system by analyzing the operational concept of traditional vulnerability assessment framework and proposed vulnerability assessment agent framework in virtualization environment. A proposed agent framework have concept by using the features of virtualization technology, it copy and execute checking agent in targeted virtual machines. In order to embody a propose agent framework, we design function block of checking agent and describe a vulnerability checking scenario of proposed agent framework. Also we develop pilot system for vulnerability checking scenario. We improve the shortcomings of the traditional vulnerability assessment system, such as unnecessary system load of the agent, inefficiency due to duplication agent installation. Moreover, the proposed agent framework is maximizing the scalability of the system because there is no agent installation when adding a targeted system.

Design and Implementation of IEC 61162-4 based TLI Protocol for e-Navigation on Ship (선박의 통합정보처리를 위한 IEC 61162-4 기반 TLI 프로토콜 설계 및 구현)

  • Jang, Kil-Woong;Lee, Jang-Se;Park, Hyu-Chan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.14 no.2
    • /
    • pp.351-359
    • /
    • 2010
  • In this paper, we propose a transmission algorithm of the TLI protocol of the IEC 61162-4 standard to perform the e-Navigation on ship, and we design and implement the TLI protocol according to the proposed algorithm. The implemented protocol is a TCP/IP based protocol, and is a network protocol with the MAU and LNA components proposed in the IEC 61162-4 standard. In addition, it makes a data transmission over the network architecture based on client/server network model. In the implemented protocol, there are a communication between the MAU and the LNA in one host, and also a communication between the LNA and the LNA in each other hosts. In order to provide a variety of service in a host, every client host has a LNA and multiple MAUs. According to the standard specification and the proposed transmission algorithm, we designed and implemented the TLI protocol using object-oriented mechanism. We carried out the experiment under a simple network model similar to real ship environment, and confirmed that it successfully transmits and receives data between the hosts.

A Study ou Iuternet Traffic Coutrol: Blockiug of harmful information based on IP spoofing (인터넷 트래픽 제어에 관한 연구: IP 주소 위조 기법을 사용한 유해 정보 차단 시스템)

  • Paek Seon-uck
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.5 no.5
    • /
    • pp.447-453
    • /
    • 2004
  • In this paper, we propose a new system to block harmful Internet information based on IP spoofing. The proposed system is located on a organization's internal network and monitors all outgoing traffic and lets all this traffic go outside. Once the proposed system detects a host's access to a harmful site, it sends the host a pseudo RST packet that pretends to be the response from the harmful site, and prevents the connection between the host and the harmful site. The proposed software system is installed on only a server, and need not be installed on user hosts at all. Thus we can maintain and upgrade the blocking system easily. The performance evaluation of the proposed system shows that it effectively blocks the access to the harmful sites. Since the proposed system is based on IP spoofing, it can be used badly as a hacking tool. Finally we propose some methods to eliminate this possibility.

  • PDF