• 제목/요약/키워드: optimal embedding

검색결과 88건 처리시간 0.028초

위상최적설계를 통한 가공의치의 해석 (Analysis of Partial Denture through Topology Optimization Design)

  • 이정익;고병갑
    • 한국CDE학회논문집
    • /
    • 제11권5호
    • /
    • pp.351-358
    • /
    • 2006
  • Recently, the development of new structural model in fixed partial denture system is required to be started from the conceptual design with low cost, high performance and quality. In this point, a FEM based design of partial denture is used to investigate stress distribution on the durable shape. In this paper, the structural performances of partial dentures were analyzed under three biting forces. The periodontal embedding model is introduced on behalf of the detailed supporting tissue, which is composed of dentin, cortical bone, cancellous bone and periodontal ligament. Using topology optimization, the optimal reinforcement layout of connector was obtained and the detail shape in the fixed partial denture was designed.

A Block-Based Adaptive Data Hiding Approach Using Pixel Value Difference and LSB Substitution to Secure E-Governance Documents

  • Halder, Tanmoy;Karforma, Sunil;Mandal, Rupali
    • Journal of Information Processing Systems
    • /
    • 제15권2호
    • /
    • pp.261-270
    • /
    • 2019
  • In order to protect secret digital documents against vulnerabilities while communicating, steganography algorithms are applied. It protects a digital file from unauthorized access by hiding the entire content. Pixel-value-difference being a method from spatial domain steganography utilizes the difference gap between neighbor pixels to fulfill the same. The proposed approach is a block-wise embedding process where blocks of variable size are chosen from the cover image, therefore, a stream of secret digital contents is hidden. Least significant bit (LSB) substitution method is applied as an adaptive mechanism and optimal pixel adjustment process (OPAP) is used to minimize the error rate. The proposed application succeeds to maintain good hiding capacity and better signal-to-noise ratio when compared against other existing methods. Any means of digital communication specially e-Governance applications could be highly benefited from this approach.

Extra-tidal stars around globular clusters NGC 5024 and NGC 5053 and their chemical abundances

  • Chun, Sang-Hyun;Lee, Jae-Joon
    • 천문학회보
    • /
    • 제43권2호
    • /
    • pp.40.2-40.2
    • /
    • 2018
  • NGC 5024 and NGC 5053 are among the most metal-poor globular clusters in the Milky Way. Both globular clusters are considered to be accreted from dwarf galaxies (like Sagittarius dwarf galaxy or Magellanic clouds), and common stellar envelope and tidal tails between globular clusters are also detected. We present a search for extra-tidal cluster member candidates around these globular clusters from APOGEE survey data. Using 20 chemical elements (e.g., Fe, C, Mg, Al) and radial velocities, t-distributed stochastic neighbour embedding (t-SNE), which identifies an optimal mapping of a high-dimensional space into fewer dimensions, was explored, and we find that globular cluster stars are well separated from the field stars in 2-dimensional map from t-SNE. We also find that some stars selected in t-SNE map are placed outside of the tidal radius of the clusters. The proper motion of stars outside tidal radius is also comparable to that of globular clusters, which suggest that these stars are tidally decoupled from the globular clusters. We manually measure chemical abundances for the clusters and extra-tidal stars, and discuss the association of extra-tidal stars with the clusters.

  • PDF

Hardware-Software Implementation of MPEG-4 Video Codec

  • Kim, Seong-Min;Park, Ju-Hyun;Park, Seong-Mo;Koo, Bon-Tae;Shin, Kyoung-Seon;Suh, Ki-Bum;Kim, Ig-Kyun;Eum, Nak-Woong;Kim, Kyung-Soo
    • ETRI Journal
    • /
    • 제25권6호
    • /
    • pp.489-502
    • /
    • 2003
  • This paper presents an MPEG-4 video codec, called MoVa, for video coding applications that adopts 3G-324M. We designed MoVa to be optimal by embedding a cost-effective ARM7TDMI core and partitioning it into hardwired blocks and firmware blocks to provide a reasonable tradeoff between computational requirements, power consumption, and programmability. Typical hardwired blocks are motion estimation and motion compensation, discrete cosine transform and quantization, and variable length coding and decoding, while intra refresh, rate control, error resilience, error concealment, etc. are implemented by software. MoVa has a pipeline structure and its operation is performed in four stages at encoding and in three stages at decoding. It meets the requirements of MPEG-4 SP@L2 and can perform either 30 frames/s (fps) of QCIF or SQCIF, or 7.5 fps (in codec mode) to 15 fps (in encode/decode mode) of CIF at a maximum clock rate of 27 MHz for 128 kbps or 144 kbps. MoVa can be applied to many video systems requiring a high bit rate and various video formats, such as videophone, videoconferencing, surveillance, news, and entertainment.

  • PDF

A reversible data hiding scheme in JPEG bitstreams using DCT coefficients truncation

  • Zhang, Mingming;Zhou, Quan;Hu, Yanlang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제14권1호
    • /
    • pp.404-421
    • /
    • 2020
  • A reversible data hiding scheme in JPEG compressed bitstreams is proposed, which could avoid decoding failure and file expansion by means of removing of bitstreams corresponding to high frequency coefficients and embedding of secret data in file header as comment part. We decode original JPEG images to quantified 8×8 DCT blocks, and search for a high frequency as an optimal termination point, beyond which the coefficients are set to zero. These blocks are separated into two parts so that termination point in the latter part is slightly smaller to make the whole blocks available in substitution. Then spare space is reserved to insert secret data after comment marker so that data extraction is independent of recovery in receiver. Marked images can be displayed normally such that it is difficult to distinguish deviation by human eyes. Termination point is adaptive for variation in secret size. A secret size below 500 bits produces a negligible distortion and a PSNR of approximately 50 dB, while PSNR is also mostly larger than 30 dB for a secret size up to 25000 bits. The experimental results show that the proposed technique exhibits significant advantages in computational complexity and preservation of file size for small hiding capacity, compared to previous methods.

변환영역에서의 퍼지추론을 적용한 워터마킹 (Incorporating Fuzzy Inference into Watermarking in the Transform Domain)

  • 김윤호
    • 한국항행학회논문지
    • /
    • 제10권4호
    • /
    • pp.364-370
    • /
    • 2006
  • 본 논문에서는 변환 영역기반의 워터마킹 기법의 개선을 위하여 퍼지추론 기법을 접목함으로써 워터마크가 삽입될 최적의 부 대역을 결정하는 방법을 제안하였다. DCT 변환 후, 각 부대역의 시각특성 요소인 텍스처 등급 및 대비도 함수의 최대 변화율을 구한 후, 최대변화율을 이용하여 퍼지추론을 위한 소속 함수를 생성하였다. 추론결과로 선택된 블록에 워터마크를 삽입한 후, 비가시성과 강인성을 평가 하였다. 외부공격으로는 JPEG 압축과 필터링, 절단 등을 고려하였고, 또한 AWGN 채널환경에서의 OFDM/QPSK 시스템을 이용하여 영상의 PSNR 및 상관관계를 구하여 제안한 워터마킹 알고리즘의 타당성 평가실험을 수행 하였다.

  • PDF

An Interactive Approach Based on Genetic Algorithm Using Ridden Population and Simplified Genotype for Avatar Synthesis

  • Lee, Ja-Yong;Lee, Jang-Hee;Kang, Hoon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • 제2권3호
    • /
    • pp.167-173
    • /
    • 2002
  • In this paper, we propose an interactive genetic algorithm (IGA) to implement an automated 2D avatar synthesis. The IGA technique is capable of expressing user's personality in the avatar synthesis by using the user's response as a candidate for the fitness value. Our suggested IGA method is applied to creating avatars automatically. Unlike the previous works, we introduce the concepts of 'hidden population', as well as 'primitive avatar' and 'simplified genotype', which are used to overcome the shortcomings of IGA such as human fatigue or reliability, and reasonable rates of convergence with a less number of iterations. The procedure of designing avatar models consists of two steps. The first step is to detect the facial feature points and the second step is to create the subjectively optimal avatars with diversity by embedding user's preference, intuition, emotion, psychological aspects, or a more general term, KANSEI. Finally, the combined processes result in human-friendly avatars in terms of both genetic optimality and interactive GUI with reliability.

어트랙터 사분면법을 이용한 비철금속의 초정밀 절삭특성 평가에 관한 연구 (The Study on Ultra-Precision Cutting Characteristics Evaluation of Non-Ferrous Metals Using Attractor Quadrant Method)

  • 고준빈;김건희;윤인식
    • 한국정밀공학회지
    • /
    • 제20권6호
    • /
    • pp.20-26
    • /
    • 2003
  • This study proposes the construction of attractor quadrant method for high-precision cutting characteristics evaluation of non-ferrous metals. Also this paper aims to find the optimal cutting conditions of diamond turning machine by measuring surface form and roughness to perform the cutting experiment of non-ferrous metals, which are aluminum, with diamond tool. As well, according to change cutting conditions such as feed rate, using diamond turning machine to Perform cutting Processing, by measuring cutting force and surface roughness and according to cutting conditions the aluminum about cutting properties. Trajectory changes in the attractor indicated a substantial difference in fractal characteristics and attractor quadrant characteristics. In quantitative quadrant feature extraction, 1,309 point in the case of A17075 (one quadrant) and 1,406 point (one quadrant) in the case of brass were proposed on the basis of attractor reconstruction. Proposed attractor quadrant method can be used for high-precision cutting characteristics evaluation of non-ferrous metals.

Optimization-based Image Watermarking Algorithm Using a Maximum-Likelihood Decoding Scheme in the Complex Wavelet Domain

  • Liu, Jinhua;Rao, Yunbo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • 제13권1호
    • /
    • pp.452-472
    • /
    • 2019
  • Most existing wavelet-based multiplicative watermarking methods are affected by geometric attacks to a certain extent. A serious limitation of wavelet-based multiplicative watermarking is its sensitivity to rotation, scaling, and translation. In this study, we propose an image watermarking method by using dual-tree complex wavelet transform with a multi-objective optimization approach. We embed the watermark information into an image region with a high entropy value via a multiplicative strategy. The major contribution of this work is that the trade-off between imperceptibility and robustness is simply solved by using the multi-objective optimization approach, which applies the watermark error probability and an image quality metric to establish a multi-objective optimization function. In this manner, the optimal embedding factor obtained by solving the multi-objective function effectively controls watermark strength. For watermark decoding, we adopt a maximum likelihood decision criterion. Finally, we evaluate the performance of the proposed method by conducting simulations on benchmark test images. Experiment results demonstrate the imperceptibility of the proposed method and its robustness against various attacks, including additive white Gaussian noise, JPEG compression, scaling, rotation, and combined attacks.

Flexible operation and maintenance optimization of aging cyber-physical energy systems by deep reinforcement learning

  • Zhaojun Hao;Francesco Di Maio;Enrico Zio
    • Nuclear Engineering and Technology
    • /
    • 제56권4호
    • /
    • pp.1472-1479
    • /
    • 2024
  • Cyber-Physical Energy Systems (CPESs) integrate cyber and hardware components to ensure a reliable and safe physical power production and supply. Renewable Energy Sources (RESs) add uncertainty to energy demand that can be dealt with flexible operation (e.g., load-following) of CPES; at the same time, scenarios that could result in severe consequences due to both component stochastic failures and aging of the cyber system of CPES (commonly overlooked) must be accounted for Operation & Maintenance (O&M) planning. In this paper, we make use of Deep Reinforcement Learning (DRL) to search for the optimal O&M strategy that, not only considers the actual system hardware components health conditions and their Remaining Useful Life (RUL), but also the possible accident scenarios caused by the failures and the aging of the hardware and the cyber components, respectively. The novelty of the work lies in embedding the cyber aging model into the CPES model of production planning and failure process; this model is used to help the RL agent, trained with Proximal Policy Optimization (PPO) and Imitation Learning (IL), finding the proper rejuvenation timing for the cyber system accounting for the uncertainty of the cyber system aging process. An application is provided, with regards to the Advanced Lead-cooled Fast Reactor European Demonstrator (ALFRED).