• Title/Summary/Keyword: seed paper

Search Result 507, Processing Time 0.026 seconds

High Resolution Satellite Image Segmentation Algorithm Development Using Seed-based region growing (시드 기반 영역확장기법을 이용한 고해상도 위성영상 분할기법 개발)

  • Byun, Young-Gi;Kim, Yong-Il
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.28 no.4
    • /
    • pp.421-430
    • /
    • 2010
  • Image segmentation technique is becoming increasingly important in the field of remote sensing image analysis in areas such as object oriented image classification to extract object regions of interest within images. This paper presents a new method for image segmentation in High Resolution Remote Sensing Image based on Improved Seeded Region Growing (ISRG) and Region merging. Firstly, multi-spectral edge detection was done using an entropy operator in pan-sharpened QuickBird imagery. Then, the initial seeds were automatically selected from the obtained multi-spectral edge map. After automatic selection of significant seeds, an initial segmentation was achieved by applying ISRG to consider spectral and edge information. Finally the region merging process, integrating region texture and spectral information, was carried out to get the final segmentation result. The accuracy assesment was done using the unsupervised objective evaluation method for evaluating the effectiveness of the proposed method. Experimental results demonstrated that the proposed method has good potential for application in the segmentation of high resolution satellite images.

Water Region Segmentation Method using Graph Algorithm (그래프 알고리즘을 이용한 강물 영역 분할 방법)

  • Park, Sang-Hyun
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.13 no.4
    • /
    • pp.787-794
    • /
    • 2018
  • The various natural disasters such as floods and localized heavy rains are increasing due to the global warming. If a natural disaster can be detected and analyzed in advance and more effectively, it can prevent enormous damage of natural disasters. Recent development in visual sensor technologies has encouraged various studies on monitoring environments including rivers. In this paper, we propose a method to detect water regions from river images which can be exploited for river surveillance systems using video sensor networks. In the proposed method, we first segment a river image finely using the minimum spanning tree algorithm. Then, the seed regions for the river region and the background region are set by using the preliminary information, and each seed region is expanded by merging similar regions to segment the water region from the image. Experimental results show that the proposed method separates the water region from a river image easier and accurately.

Flexible Crypto System for IoT and Cloud Service (IoT와 클라우드 서비스를 위한 유연한 암호화 시스템)

  • Kim, SeokWoo
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.9 no.1
    • /
    • pp.15-23
    • /
    • 2016
  • As various IoT devices appear recently, Cloud Services such as DropBox, Amazon S3, Microsoft Azure Storage, etc are widely use for data sharing across the devices. Although, cryptographic algorithms like AES is prevalently used for data security, there is no mechanisms to allow selectively and flexibly use wider spectrum of lightweight cryptographic algorithms such as LEA, SEED, ARIA. With this, IoT devices with lower computation power and limited battery life will suffer from overly expensive workload and cryptographic operations are slower than what is enough. In this paper, we designed and implemented a CloudGate that allows client programs of those cloud services to flexibly select a cryptographic algorithms depending on the required security level. By selectively using LEA lightweight algorithms, we could achieve the cryptographic operations could be maximum 1.8 faster and more efficient than using AES.

Flow Analysis for Optimal Design of Small Gear Pump (소형 기어펌프 최적화 설계를 위한 유동해석)

  • Lee, Suk-Young;Kim, Seung-Chul
    • Journal of Energy Engineering
    • /
    • v.24 no.1
    • /
    • pp.88-96
    • /
    • 2015
  • Gear pump has a simple structure high reliability, easy operation and maintenance, widely used as a source of hydraulic system of hydraulic. In general, the gear pump was designed using variety of variables, the variables through the analysis of the mass flow rate and efficiency. In this paper, three-dimensional flow of the gear pump, in order to produce the optimal design of product, analysis was performed by using commercial software ANSYS v15.0 CFX. And then, combination of design parameters selected by ANSYS was carried out to confirm the simulation result. The efficiency and mass flow rate of the gear pump were studied by varying its rotational speed and the clearance between the gear tip and the housing. In the simulation results, as the rotational speed were increased, the average mass flow rate and efficiency increased. Furthermore, as the clearance between the gear tip and the housing was increased, the average mass flow rate and efficiency decreased.

A Low-Delay MAC(LD-MAC) protocol in Multi-Hop Wireless Sensor Networks (멀티 홉 무선 센서 네트워크에서 저 지연을 지원하는 MAC 프로토콜)

  • Jeon, Jun-Heon;Kim, Seong-Cheol
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.2
    • /
    • pp.452-458
    • /
    • 2014
  • In Wireless Sensor Networks the Medium access control (MAC) protocol has many challenges to solve such as reducing energy consumption, supporting QoS(quality of service) fairness, and reducing delivery delay. This paper proposed a low-delay supporting MAC protocol in multi-hop Wireless Sensor Networks. The proposed protocol uses the RB(rapid beacon) frame for reducing delivery delay. The RB frame is a modified IEEE 802.15.4 beacon frame. For sender adaptive-wakeup, the RB frame includes a seed number for determining of a receiver wakeup time. And for next hop receiver adaptive-wakeup, the RB frame includes the length of remaining data packet information. Results showed that our LD-MAC protocol outperformed other protocol in terms of data packet delivery delay.

Effects of Static Magnetic Fields on Early Seed Germination and Radish Sprouts Growth (정적 자기장이 무순(radish sprouts)의 초기 발아와 성장에 미치는 영향)

  • Lee, Young-Jin;Lim, Ji-Hun;Park, Dong-Kook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.1
    • /
    • pp.242-247
    • /
    • 2013
  • In order to prepare for weakening of the productivity of agriculture due to serious climate change, the researches on promoting the growth of plant are required. Although the method of using magnetic field for improving the growth of plant was introduced, the effective method of imposing the field on the plant have yet to be studied thoroughly in the literatures. In this paper, we investigated the effects of static magnetic field on the growth and the early seed germination of radish sprouts according to the strength, direction of excitation and the expose time of the magnetic field, and present the effective method of imposing magnetic fields. From the measurements, it was found that the radish sprouts exposed in the field shows a rapid germination of about 3~4 days than those which had no field, and in order to the effective growth, the strength of the magnetic field should be properly selected, and the excitation direction of magnetic field has little effect on the radish sprouts growth.

Application of a Selective Emitter Structure for Ni/Cu Plating Metallization Crystalline Silicon Solar Cells (Selective Emitter 구조를 적용한 Ni/Cu Plating 전극 결정질 실리콘 태양전지)

  • Kim, Min-Jeong;Lee, Jae-Doo;Lee, Soo-Hong
    • Journal of the Korean Institute of Electrical and Electronic Material Engineers
    • /
    • v.23 no.7
    • /
    • pp.575-579
    • /
    • 2010
  • The technologies of Ni/Cu plating contact is attributed to the reduced series resistance caused by a better contact conductivity of Ni with Si and the subsequent electroplating of Cu on Ni. The ability to pattern narrower grid lines for reduced light shading was combined with the lower resistance of a metal silicide contact and an improved conductivity of the plated deposit. This improves the FF (fill factor) as the series resistance is reduced. This is very much requried in the case of low concentrator solar cells in which the series resistance is one of the important and dominant parameter that affect the cell performance. A Selective emitter structure with highly dopeds regions underneath the metal contacts, is widely known to be one of the most promising high-efficiency solution in solar cell processing In this paper the formation of a selective emitter, and the nickel silicide seed layer at the front side metallization of silicon cells is considered. After generating the nickel seed layer the contacts were thickened by Cu LIP (light induced plating) and by the formation of a plated Ni/Cu two step metallization on front contacts. In fabricating a Ni/Cu plating metallization cell with a selective emitter structure it has been shown that the cell efficiency can be increased by at least 0.2%.

A Study on primitive polynomial in stream cipher (스트림암호에서 원시다항식에 대한 고찰)

  • Yang, Jeong-mo
    • Convergence Security Journal
    • /
    • v.18 no.4
    • /
    • pp.27-33
    • /
    • 2018
  • Stream cipher is an one-time-pad type encryption algorithm that encrypt plaintext using simple operation such as XOR with random stream of bits (or characters) as symmetric key and its security depends on the randomness of used stream. Therefore we can design more secure stream cipher algorithm by using mathematical analysis of the stream such as period, linear complexity, non-linearity, correlation-immunity, etc. The key stream in stream cipher is generated in linear feedback shift register(LFSR) having characteristic polynomial. The primitive polynomial is the characteristic polynomial which has the best security property. It is used widely not only in stream cipher but also in SEED, a block cipher using 8-degree primitive polynomial, and in Chor-Rivest(CR) cipher, a public-key cryptosystem using 24-degree primitive polynomial. In this paper we present the concept and various properties of primitive polynomials in Galois field and prove the theorem finding the number of irreducible polynomials and primitive polynomials over $F_p$ when p is larger than 2. This kind of research can be the foundation of finding primitive polynomials of higher security and developing new cipher algorithms using them.

  • PDF

Automated Building Fuzzing Environment Using Test Framework (테스트 프레임워크를 활용한 라이브러리 퍼징 환경 구축 자동화)

  • Ryu, Minsoo;Kim, Dong Young;Jeon Sanghoonn;Kim, Huy Kang
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.4
    • /
    • pp.587-604
    • /
    • 2021
  • Because the library cannot be run independently and used by many applications, it is important to detect vulnerabilities in the library. Fuzzing, which is a dynamic analysis, is used to discover vulnerabilities for the library. Although this fuzzing technique shows excellent results in terms of code coverage and unique crash counts, it is difficult to apply its effects to library fuzzing. In particular, a fuzzing executable and a seed corpus are needed that execute the library code by calling a specific function sequence and passing the input of the fuzzer to reproduce the various states of the library. Generating the fuzzing environment such as fuzzing executable and a seed corpus is challenging because it requires both understanding about the library and fuzzing knowledge. We propose a novel method to improve the ease of library fuzzing and enhance code coverage and crash detection performance by using a test framework. The systems's performance in this paper was applied to nine open-source libraries and was verified through comparison with previous studies.

Development of Side Channel Attack Analysis Tool on Smart Card (사이드 채널 공격에 대한 스마트카드 안전성의 실험적 분석)

  • Han Dong-Ho;Park Jea-Hoon;Ha Jae-Cheol;Lee Sung-Jae;Moon Sang-Jae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.16 no.4
    • /
    • pp.59-68
    • /
    • 2006
  • Although the cryptographic algorithms in IC chip such as smart card are secure against mathematical analysis attack, they are susceptible to side channel attacks in real implementation. In this paper, we analyze the security of smart card using a developed experimental tool which can perform power analysis attacks and fault insertion attacks. As a result, raw smart card implemented SEED and ARIA without any countermeasure is vulnerable against differential power analysis(DPA) attack. However, in fault attack about voltage and clock on RSA with CRT, the card is secure due to its physical countermeasures.