• Title/Summary/Keyword: next-generation method

Search Result 1,099, Processing Time 0.034 seconds

Realistic and Fast Depth-of-Field Rendering in Direct Volume Rendering (직접 볼륨 렌더링에서 사실적인 고속 피사계 심도 렌더링)

  • Kang, Jiseon;Lee, Jeongjin;Shin, Yeong-Gil;Kim, Bohyoung
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.15 no.5
    • /
    • pp.75-83
    • /
    • 2019
  • Direct volume rendering is a widely used method for visualizing three-dimensional volume data such as medical images. This paper proposes a method for applying depth-of-field effects to volume ray-casting to enable more realistic depth-of-filed rendering in direct volume rendering. The proposed method exploits a camera model based on the human perceptual model and can obtain realistic images with a limited number of rays using jittered lens sampling. It also enables interactive exploration of volume data by on-the-fly calculating depth-of-field in the GPU pipeline without preprocessing. In the experiment with various data including medical images, we demonstrated that depth-of-field images with better depth perception were generated 2.6 to 4 times faster than the conventional method.

SIP-based Session Management Architecture between Gateways and Servers on Mobius IoT Platform (모비우스 IoT 플랫폼에서 게이트웨이와 서버간 SIP 기반 세션 관리 구조)

  • Kim, Daesoon;Min, Kyoungwook;Roh, Byeong-hee
    • The Journal of Korean Institute of Next Generation Computing
    • /
    • v.13 no.4
    • /
    • pp.90-99
    • /
    • 2017
  • The service structure of the Mobius IoT platform, which has been developed on the basis of the oneM2M standard, connects servers and gateways directly to exchange data using HTTP or MQTT. Such structure may cause problems not to operate IoT services safely. In this paper, we propose an effective structure to manage sessions between gateways (or devices) and server using SIP safely and stably. In addition, we provide the way to implement the proposed method on Mobius IoT platform. To verify the operation of the proposed method, we actually implement the proposed method on Mobius IoT platform, and construct a testbed for a typical IoT application service environment with SIP servers. The results of the experiment show that the proposed method works normally, and it can contribute to the stable operation of IoT services.

Text Steganography Based on Ci-poetry Generation Using Markov Chain Model

  • Luo, Yubo;Huang, Yongfeng;Li, Fufang;Chang, Chinchen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.9
    • /
    • pp.4568-4584
    • /
    • 2016
  • Steganography based on text generation has become a hot research topic in recent years. However, current text-generation methods which generate texts of normal style have either semantic or syntactic flaws. Note that texts of special genre, such as poem, have much simpler language model, less grammar rules, and lower demand for naturalness. Motivated by this observation, in this paper, we propose a text steganography that utilizes Markov chain model to generate Ci-poetry, a classic Chinese poem style. Since all Ci poems have fixed tone patterns, the generation process is to select proper words based on a chosen tone pattern. Markov chain model can obtain a state transfer matrix which simulates the language model of Ci-poetry by learning from a given corpus. To begin with an initial word, we can hide secret message when we use the state transfer matrix to choose a next word, and iterating until the end of the whole Ci poem. Extensive experiments are conducted and both machine and human evaluation results show that our method can generate Ci-poetry with higher naturalness than former researches and achieve competitive embedding rate.

Multi-Stage Generation Allocation Game Considering Ramp-rate Constraints (경쟁적 전력시장에서 발전기 증감발률을 고려한 다중시간 발전량 배분 게임)

  • Park, Yong-Gi;Park, Jong-Bae;Roh, Jae-Hyung;Kim, Hyeong-Jung;Shin, Jung-Rin
    • The Transactions of The Korean Institute of Electrical Engineers
    • /
    • v.60 no.3
    • /
    • pp.509-516
    • /
    • 2011
  • This paper studies a novel method to find the profit-maximizing Nash Equilibriums in allocating generation quantities with consideration of ramp-rates under competitive market environment. Each GenCo in a market participates in a game to maximize its profit through competitions and play a game with bidding strategies. In order to find the Nash equilibriums it is necessary to search the feasible combinations of GenCos' strategies which satisfy every participant's profit and no one wants various constraints. During the procedure to find Nash equilibriums, the payoff matrix can be simplified as eliminating the dominated strategies. in each time interval. Because of the ramp-rate, generator's physically or technically limits to increase or decrease outputs in its range, it can restrict the number of bidding strategies of each generator at the next stage. So in this paper, we found the Nash Equilibriums for multi-stage generation allocation game considering the ramp-rate limits of generators. In the case studies, we analyzed the generation allocation game for a 12-hour multi-stage and compared it with the results of dynamic economic dispatch. Both of the two cases were considered generator's ramp-rate effects.

Flexible USIM Authentication System for Next Generation Mobile Radio Communication Systems (차세대 이동통신 시스템에서 유동적 USIM 카드를 이용한 인증 시스템)

  • Choi, Dong-Wook;Hwang, Jae-Young;Chung, Yeon-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.15 no.11
    • /
    • pp.2340-2346
    • /
    • 2011
  • This paper presents a user-friendly authentication system using a flexible USIM. In the proposed method and its system, the flexible USIM utilizes personalized data such as Mobile Directory Number(MDN) and social security number as the key to user authentication. The authentication method proposed in this paper permits limited times of use and/or limited duration of use. A simple simulation model shows that the proposed algorithm works well and shows high compatibility with existing authentication methods. In addition, an alternative or more advanced authentication system can be developed with the proposed flexible USIM card. It is seen that this simple alternative method will eventually be able to make wireless communication networks more easily accessible for subscribers, irrespective of user environments.

Development of an efficient genotyping-by-sequencing (GBS) library construction method for genomic analysis of grapevine

  • Jang, Hyun A;Oh, Sang-Keun
    • Korean Journal of Agricultural Science
    • /
    • v.44 no.4
    • /
    • pp.495-503
    • /
    • 2017
  • Genotyping-by-sequencing (GBS) is an outstanding technology for genotyping and single nucleotide polymorphism (SNP) discovery compared to next generation sequencing (NGS) because it can save time when analyzing large-scale samples and carries a low cost per sample. Recently, studies using GBS have been conducted on major crops and, to a greater extent, on fruit crops. However, many researchers have some problems due to low GBS efficiency resulting from low quality GBS libraries. To overcome this limitation, we developed an efficient GBS library construction method that regulates important conditions such as restriction enzymes (RE) digestion and a PCR procedure for grapevine. For RE digestion, DNA samples are digested with ApeKI (3.6U) at $75^{\circ}C$ for 5 hours and adapters are ligated to the ends of gDNA products. To produce suitable PCR fragments for sequencing, we modified the PCR amplification conditions; temperature cycling consisted of $72^{\circ}C$ (5 min), $98^{\circ}C$ (30 s), followed by 16 cycles of $98^{\circ}C$ (30 s), $65^{\circ}C$ (30 s), $72^{\circ}C$ (20 s) with a final extension step. As a result, we had obtained optimal library construct sizes (200 to 400 bp) for GBS analysis. Furthermore, it not only increased the mapping efficiency by approximately 10.17% compared to the previous method, but also produced mapped reads which were distributed equally on the19 chromosomes in the grape genome. Therefore, we suggest that this system can be used for various fruit crops and is expected to increase the efficiency of various genomic analysis performed.

Study on Priority Selection of Export Strategic Core Technologies for IT Fusion Next Generation Agricultural Machines (IT융합 차세대 농기계 수출전략형 핵심기술 우선순위 선정에 관한 연구)

  • Chang, Dong-Il;Cho, Byoung-Kwan;Lee, Hoon-Soo;Chung, Sun-Ok;Park, Seung-Jae;Kim, Chul-Soo;Lee, Young-Hee
    • Journal of Biosystems Engineering
    • /
    • v.36 no.6
    • /
    • pp.491-499
    • /
    • 2011
  • The objective of this study was to develop the export strategic core technologies for IT fusion next generation agricultural machines by the analysis of comprehensive and cooperative systems of industries, universities, and institutes. In order to achieve the objective of this study, an expert panel was formed and operated. The first survey was conducted by the Delphi method. For this the export strategic core technologies were surveyed and analyzed using the questionnaire. Based on the results of the first survey, the second survey was conducted. The questionnaire used for the second survey was designed by results of the first survey. The results of the second survey was analyzed by AHP method. The third survey was conducted based on the second one, and the final results were analyzed and the export strategic core technologies were developed through the expert meeting. The study results showed six export strategic core technologies as the followings : 1) environment-friendly engine technology for high performance 2) high performance/high efficiency power transmission system technology 3) development of measurement system technology for safety of agricultural products 4) field application of sensor networks 5) large size combine development technology for high performance 6) quality evaluation technology for agricultural products.

A Study on the Methods of Decocting and Taking Prescriptions in SANGHANRON ("상한론(傷寒論)"에 수록된 탕제(湯劑)의 전탕법(煎湯法)에 관한 연구)

  • Kim Young-Kyun;Cho Su-In
    • Herbal Formula Science
    • /
    • v.8 no.1
    • /
    • pp.11-37
    • /
    • 2000
  • This is a study on the methods of decocting prescriptions in SANGHANRON (傷寒論), and after this, numbers of results have been obtained. SANGHANRON was written by Chang-Ki (張機) in the 2nd century, so it reflexes the usage of prescriptions of previous age indirectly. And gave affects on the methods of decocting prescriptions to the oriental medicine doctors of next generation.Berore Han-DYnasty(漢代), there were not so many publications connected with Oriental Medicine. Besides, some books couldn't hand down to next generation due to the gap of time and space. As time goes by, letters in medical books changed little by little, so contents connected with decocting methods changed too. The effects of decoction and herb tea can be changed by the flexibility of methods of decocting medicines, so we have to decide what kinds of decocting methods should be taken and adapted to patients by the most effective way.In SANGHANRON, there are many kiny kinds of boiling methods, so DHAMG-Ki selected the most appropriate method considering deree and position of disease and condition of patient. But nowadays, due to inconvenient procedure of boiling and taking medicines, some methos are not in common in clinical medicin. So this study was started to look back upon the changes of decocting prescriptions and gave deffort to find out the propriety of variation of boiling prescriptions.The common method of decocting prescriptions in SANGHANRON is boiling down all the herbs at the same time. Except the commom method, there are some kinds of other methods - boiling down twice the prescription, boiling down some special herbs earlier of later than other herbs, complicated or special boiling methods of extract, etc. These kinds of decoting methods simplified as time pass by, but this expected therapeutic value. So we have to distinguish the methods -though complicated and troublesome- in clinical medicine to make perfection more perfect in treating patients, and further studies have to be followed to prove the propriety of these complicated methods.

  • PDF

Water Contact Angles of Graphene Transferred by Wet and Dry Transfer Methods (전사 방법에 따른 그래핀의 물 접촉각 변화)

  • Yoon, Min-Ah;Kim, Chan;Jung, Hyun-June;Kim, Jae-Hyun;Kim, Kwang-Seop
    • Tribology and Lubricants
    • /
    • v.34 no.2
    • /
    • pp.60-66
    • /
    • 2018
  • Graphene is a monolayer of carbon atoms (approximately 0.34 nm), arranged in a honeycomb network. It has been hailed as a next-generation flexible and transparent material because it has high electrical and thermal conductivities, excellent mechanical properties, as well as flexible and transparent properties. The wettability of graphene alters its adhesion or surface energy, and it is therefore an important parameter influencing its application in the fabrication of next-generation flexible and transparent electronics. Studies on the wettability of graphene are numerous and various opinions exist. However, almost all of these studies use the wet transfer method to transfer the graphene. In this study, therefore, we investigated the effect of wet and dry transfer methods on water contact angles of graphene on a substrate. The contact angles of substrates vary depending on the type of substrate. It was found that after graphene is transferred to the substrate, regardless of transfer method, the graphene/substrate contact angle increases to a value. The contact angle of graphene transferred using the dry transfer method is higher than the contact angle of graphene transferred using wet transfer methods. The wet transferred graphene is affected by the poly(methyl methacrylate) (PMMA) residue and the polar surface of substrate. The dry transferred graphene is influenced by the conformal contact between graphene and substrate.

A Building Method of High Availability Protection Architecture in Next Generation Network (NGN) Information Security System (차세대통신망(NGN) Infrastructure에서의 정보보호시스템 고가용성 차단구조 설계)

  • Noh, Si-Choon;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.8 no.4
    • /
    • pp.483-489
    • /
    • 2007
  • The high availability of information security system shall be primarily studied in relation to the Next Generation Network(NGN) Information Security infrastructure, because it is very important to maintain availability at each moment as a variety of intrusions occur continuously. The high availability of the security system can be realized with the topology and configuration properly defined to fully utilize the recovery function of the security system in the thoroughly planned optimized method. The active-active high availability on the NGN information security infrastructure system in is assured by letting the failover mechanism operate upon the entire structure through the structural design and the implementation of functions. The proposed method reduces the system overload rating due to trouble packets and improves the status of connection by SNMP polling trap and the ICMP transport factor by ping packet.

  • PDF