• Title/Summary/Keyword: transformed pattern

Search Result 319, Processing Time 0.026 seconds

Deformation Invariant Optical Correlator Using Photorefractive Medium (광굴절 매질을 이용한 공간계 불변 광상관기에 관한 연구)

  • Kim, Ran-Sook;Ihm, Jong-Tae;Son, Hyon;Park, Han-Kyu
    • Journal of the Korean Institute of Telematics and Electronics
    • /
    • v.26 no.6
    • /
    • pp.97-101
    • /
    • 1989
  • Scale and rotation invariant polar-logarithmic coordinate transformation is used to achieve deformation invariant pattern recognition. The coordinate transformation is produce by a computer generated hologram (CGH). The mask fabricated by a photo (UV light) pattern generator for the 1nr-$theta$ coordinate transformation is made of the CGH whose transmission function is derived by the use of Lee's method. The optically produced coordinate transformed function is derived by the use of Lee's method. The optically produced coordinate transmission input pattern is interfaced on real-time holography. Variations of autocorrelation for scaled and rotated input patterns are suggested experimentally using implemented optical correlator.

  • PDF

A Robust Pattern Digital Watermarking Method using Wavelet Transform (웨이브릿 기반의 강인한 패턴 디지털 워터마킹 방법)

  • 이경훈;김용훈;이태홍
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.1
    • /
    • pp.98-105
    • /
    • 2004
  • In this paper, we proposed a watermarking algorithm for embedding visually recognizable pattern into the middle-frequency part:; of image. Binary image as watermark is embedded in the LH2, HL2 and HH2 band of wavelet transformed domain for copyright protection of image data. To evaluate robustness of the proposed method, we applied some basic algorithm of image processing such as scaling, filtering, cropping, histogram equalizing and lossy compression(JPEG, gif). As a result of experiment, the proposed method has the good image quality and the high perceptibility of watermark. It was demonstrated by experiments that the proposed algorithm can provide an excellent protection under various attacks.

  • PDF

Development of Fashion Culture Goods Designs Motivated by Ume Flowers (매화꽃을 모티브로 한 패션 문화 상품 디자인 개발)

  • Kim, Sun-Young
    • The Research Journal of the Costume Culture
    • /
    • v.17 no.6
    • /
    • pp.972-980
    • /
    • 2009
  • This study was aimed to develop ume flower image into a competitive fashion culture product image by reinterpreting the image in modern terms, manufacturing patterns and applying them to various items. In terms of method, ume flower petal was used as a motive and developed into a pattern, using Adobe Illustrator 10, a computer design program. Based on the symbolic image and realist form of ume flower, three new basic motives of new figurative image were set using form omission, simplification, overlapping, repetition and graphic elements. Each motive developed transformed patterns through the change, transformation, combination of colors. The repetitive unit of each motive set expressed geometrical patterns and combination of flower patterns using pattern repetition and $45^{\circ}$ repetition technique in combination with the check arrangement using quadrangle, and set the direction of design that would fit for each item of fashion culture products. Also, consistency and practicality were sought in the goods planning composition of each item by applying motive pattern results to the fashion culture goods, such as neckties, scarves, T-shirts that can be consumed in everyday life. It seems that more creative culture goods including ume flowers will be developed by seeing our own cultural elements as well as flower patterns like ume flower with modern trends.

  • PDF

A Privacy-preserving and Energy-efficient Offloading Algorithm based on Lyapunov Optimization

  • Chen, Lu;Tang, Hongbo;Zhao, Yu;You, Wei;Wang, Kai
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.8
    • /
    • pp.2490-2506
    • /
    • 2022
  • In Mobile Edge Computing (MEC), attackers can speculate and mine sensitive user information by eavesdropping wireless channel status and offloading usage pattern, leading to user privacy leakage. To solve this problem, this paper proposes a Privacy-preserving and Energy-efficient Offloading Algorithm (PEOA) based on Lyapunov optimization. In this method, a continuous Markov process offloading model with a buffer queue strategy is built first. Then the amount of privacy of offloading usage pattern in wireless channel is defined. Finally, by introducing the Lyapunov optimization, the problem of minimum average energy consumption in continuous state transition process with privacy constraints in the infinite time domain is transformed into the minimum value problem of each timeslot, which reduces the complexity of algorithms and helps obtain the optimal solution while maintaining low energy consumption. The experimental results show that, compared with other methods, PEOA can maintain the amount of privacy accumulation in the system near zero, while sustaining low average energy consumption costs. This makes it difficult for attackers to infer sensitive user information through offloading usage patterns, thus effectively protecting user privacy and safety.

A Study on Transformation of iOS GUI Design in the view of Affordance (iOS GUI 디자인의 변화에 대한 어포던스 관점의 고찰)

  • Yang, Yun;Kim, Hyung Woo
    • Smart Media Journal
    • /
    • v.5 no.4
    • /
    • pp.96-102
    • /
    • 2016
  • The purpose of this study is to investigate the transformation of affordance in iOS GUI design and the relationship of affordances. We figured out variety kinds of Affordance concepts and choosed six Affordances(Visceral, Behavioral, Reflective, Explicit, Metaphorical, Pattern Affordance) Based on the previous studies. The result of investigating the transformation of iOS GUI design which based on the viewpoint of these 6 Affordance we have chosen is as follows. Firstly, the Visceral Affordance of iOS GUI design has already sufficiently become to the Reflective Affordance. So we can ignore or ellipsis the Visceral Affordance and the addition of specific Explicit Affordance can be possible. Secondly, due to the use experience of iOS, Behavioral Affordance and Pattern Affordance have already become to a kind of Reflective Affordance. Through this evolution, new kind of Pattern Affordance is formed. At the mean time, it also applied the basic field of Metaphorical Affordance. Thirdly, investigating the Flat Design of iOS based on the viewpoint of Affordance, we have figured out that Visceral Affordance has been reduced. So that the constrains of visual performance has also been reduced. This is the reason that there are more space remained in screen layout design, the color has become more natural and more Explicit Affordance has been provided, ect. Futhermore, in this thesis we have also figured out that there are some interactions and relationships between each Affordance. With the development of iOS, some Affordances have transformed to other Affordances. With the accumulation of use experience, Visceral Affordance has transformed to Reflective Affordance based on the field of Metaphorical Affordance. With the disappearance or reduction of Visceral Affordance, iOS provide Explicit Affordance instead. As a result of this kind of process, a new Pattern Affordance has been formed.

Growth Pattern and Content of Tropane Alkaloids of Metabolic Engineered Scopolia parviflora Hairy Root Lines

  • Kang, Young-Min;Min, Ji-Yun;Kim, Won-Jung;Kim, Yong-Duck;Lee, Byung-Hynn;Choi, Myung-Suk
    • Korean Journal of Medicinal Crop Science
    • /
    • v.12 no.2
    • /
    • pp.123-128
    • /
    • 2004
  • Hyoscyamine and scopolamine are two most common tropane alkaloids found in the Solanaceae. The pEB expression vector carrying Nspmt gene was transformed to Agrobacterium rhizogenes. The growth of transgenic hairy roots were approximately to 80% of the wild type root. Transgenic hairy roots are less developed on only their branch roots than those of the wild type root. The extracts from Nspmt transgenic hairy root lines, 3 and 5 contained between 3.52 and 4.23 mg/g dry weight as hyoscyamine and did between 5.23 to 6.40 mg/g dry weight as scopolamine. These results showed that the overexpression of the pmt gene enhanced tropane alkaloids production of S. parviflora transformed roots and this improvement affected both hyoscyamine and scopolamine production.

Comparison of the Cell Surface Barrier and Enzymatic Modification System in Brevibacterium flavum and B. Lactofermentum

  • Jang Ki-Hyo;Britz Margaret L.
    • Biotechnology and Bioprocess Engineering:BBE
    • /
    • v.10 no.3
    • /
    • pp.225-229
    • /
    • 2005
  • To investigate impediments to plasmid transformation in Brevibacterium flavum BF4 and B. lactofermentum BL1, cell surface barriers were determined by measuring growth inhibition whilst enzymatic barriers were determined by comparing DNA methylation properties. B. lactofermentum was more sensitive to growth inhibition by glycine than B. flavum. Release of cellular proteins during sonication was more rapid for B. lactofermentum than for B. flavum. Plasmid DNA (pCSL 17) isolated from B. flavum transformed recipient $McrBC^+$ strains of Escherichia coli with lower efficiency than $McrBC^-$. McrBC digestion of this DNA confirmed that B. flavum contain methylated cytidines in the target sequence of McrBc sequences but B. lactofermentum contained a different methylation pattern. DNA derived from the B. lactofermentum transformed recipient $EcoKR^+$ strains of E. coli with lower efficiency than $EcoKR^-$, indicating the presence of methylated adenosines in the target sequence of EcoK sequences. The present data describe the differences in the physical and enzymatic barriers between two species of corynebacteria and also provide some insight into the successful foreign gene expression in corynebacteria.

Design and Fabrication of Microstrip slot Antenna for using ISM (ISM용 마이크로스트립 슬롯 안테나 설계 및 제작)

  • Park, Seong-Il;Ko, Young-Hyuk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.06a
    • /
    • pp.580-583
    • /
    • 2007
  • In this paper, we proposed a slot antenna for dual band ISM that was transformed from a slot antenna structure. Proposed antenna was designed and fabricated that transformed feed line was changed existing slot antenna feed line to appear resonances at dual band. Bandwidth of the designed and fabricated slot antenna for ISM dual band is 8.23%, 4.8% at the resonated frequency at 2.45 GHz, 5 GHz. And we observed the resonant frequency and bandwidth according to change of feed line and slot length. Also, the measured radiation pattern characteristic of fabricated antenna is compared and analyzed E-plane and H-plane at 2.45 GHz, 5GHz.

  • PDF

Design of data mining IDS for transformed intrusion pattern (변형 침입 패턴을 위한 데이터 마이닝 침입 탐지 시스템 설계)

  • 김용호;정종근;이윤배;김판구;염순자
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2001.10a
    • /
    • pp.479-482
    • /
    • 2001
  • IDS has been studied mainly in the field of the detection decision and collecting of audit data. The detection decision should decide whether successive behaviors are intrusions or not, the collecting of audit data needs ability that collects precisely data for intrusion decision. Artificial methods such as rule based system and neural network are recently introduced in order to solve this problem. However, these methods have simple host structures and defects that can't detect transformed intrusion patterns. So, we propose the method using data mining that can retrieve and estimate the patterns and retrieval of user's behavior in the distributed different hosts.

  • PDF

A Vertex-Detecting of Hanguel Patterns Using Nested Contour Shape (중첩윤곽 형상에 의한 한글패턴의 정점검출)

  • Koh, Chan;Lee, Dai-Young
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.15 no.2
    • /
    • pp.112-123
    • /
    • 1990
  • This paper presents a vertex-detecting of Hanguel patterns using nested contour shape. Inputed binary character patterns are transformed by distance transformation method and make a new file of transferred data by analysis of charactersitcs. A new vertex-detecting algorithm for recognizing Hanguel patterns using the two data files is proposed. This algorithm is able to reduce the projecting parts of Hanguel pattern, separate the connecting parts between different strokes, set the code number by transformed value of coorked features. It makes the output of results in order to apply the Hanguel recognition.

  • PDF