2016 (80)
2015 (71)
2014 (86)
2013 (123)
2012 (121)
2011 (116)
2010 (65)
2009 (68)
2008 (12)
3D Particle Position Measurement via the Defocusing Concept
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.1-10
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
This paper presents a 3D particle position measurement method based on the defocusing concept introduced by A.Pentland with a single camera. Different from the existing approaches, the blur circle is used to identify the blur extent for various defocused particles, and the depth-blur relation is formulated by the modified A.Pentland mathematical formula. And, an eight-step algorithm based on Circular Hough Transform and Quadrant Radius Histogram was given to calculate the 3D particle position. Experiments on real defocused particle images have demonstrated the feasibility of the proposed method for 3D particle position recovery, and the minimum Mean Absolute Error of depth is about 0.18 mm.
An Effective TCM-KNN Scheme for High-Speed Network Anomaly Detection
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.11-16
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Network anomaly detection has been a hot topic in the past years. However, high false alarm rate, difficulties in obtaining exact clean data for the modeling of normal patterns and the deterioration of detection rate because of “unclean” training set always make it not as good as we expect. Therefore, we propose a novel data mining method for network anomaly detection in this paper. Experimental results on the well-known KDD Cup 1999 dataset demonstrate it can effectively detect anomalies with high true positives, low false positives as well as with high confidence than the state-of-the-art anomaly detection methods. Furthermore, even provided with not purely “clean” data (unclean data), the proposed method is still robust and effective.
Another Element for Security Improvement Approach in Web Development Application
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.17-26
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
In high-speed and extremely complex environment Web enabled, information Security. In Security Improvement Approach (SIA) understanding security This paper presents basic organizational elements that need to be identified, defined and addressed before examining a Web Engineering Development process for security. These elements are derived from empirical evidence based on a Web survey and supporting literature. This paper contribute Web Engineering specific elements that need to be acknowledged and resolved before examining a Web Engineering process from a security perspective and the elements can also be used in the assessment of a current application development process prior to an SIA.
Determining the Causal Model Role of ICT in Improving Food Availability of Iranian Rural Households
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.27-40
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Access to desirable, sufficient, safe and nutritious food is one of the basic components of the development and health of a society. Information and communications technologies (ICTs) represent an important strategy that can be used in attaining food security. The main purpose of this research, performed in 2006-2007, was to identify the effectiveness of ICTs in improving the food availability of rural Iranian households. A descriptive methodology was applied in this research, through questionnaires. The results showed that, according to the experts’ point of view, the situation of food security in rural Iranian households was medium, but that ICTs could play an important role in improving the situation. The results of stepwise regressions showed that increasing food production, transferring of new methods and technologies, improving interactions and communications, providing information about cultivation and harvest, facilitators and content of old technologies were determined to account for 71% of the variance of the food availability of rural Iranian households. Moreover, the path analysis technique demonstrated that the improvement of interactions and communications had the greatest influence on determining the casual model of improving the food availability of rural Iranian households (β = 0.992).
Ultrasound Imaging and Image Segmentation in the area of Ultrasound : A Review
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.41-60
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Segmentation remains a necessary step in medical imaging to obtain qualitative measurements such as the location of objects of interest as well as for quantitative measurements such as area, volume or the analysis of dynamic behavior of anatomical structures over time. Among these images, ultrasound images play a crucial role, because they can be produced at video-rate and therefore allow a dynamic analysis of moving structures. Moreover, the acquisition of these images is non-invasive, cheap, and does not require ionizing radiations compared to other medical imaging techniques. On the other hand, the automatic segmentation of anatomical structures in ultrasound imagery is a real challenge due to acoustic interferences (speckle noise) and artifacts which are inherent in these images. Here we discuss the ultrasound image segmentation methods, in a broad sense, focusing on techniques developed for medical. First, we present basic methods of image segmentation and forming of ultrasound images. After that we discuss the basics on ultrasound image segmentation. Second section explains the ultrasonic image segmentation methods based on clinical applications. On the other hand Third section explains the ultrasound image segmentation based on particular methodology.
An Improved Invisible Watermarking Technique for Image Authentication
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.61-74
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Digital Watermarking is a technique which embeds a watermark signal into the host image in order to authenticate it. In our previous work [1], a binary watermark pattern was constructed from the information content of the image by selecting the minimum value from every block of size 2x2, and was disordered with the help of Arnold Transform but which was not showing a fine robustness against compression and rotation operation. As a solution to this issue, an innovative watermarking scheme is proposed. According to this, the low frequency subband of wavelet domain and the rescaled version of original image are utilized in the watermark construction process. A scrambled version of watermark is obtained with the help of Arnold Transform. The operation of embedding and extraction of watermark is done in high frequency domain of Discrete Wavelet Transform since small modifications in this domain are not perceived by human eyes. This watermarking scheme deals with the extraction of the watermark information in the absence of original image, hence the blind scheme was obtained. Peak Signal to Noise Ratio (PSNR) and Similarity Ratio (SR) are computed to measure image quality. In addition, the competency of the proposed method is verified under common image processing operations and a comparative study is made against the previous technique.
Fabrication of Photodetectors using Transparent Carbon Nanotube Films
보안공학연구지원센터(IJAST) International Journal of Advanced Science and Technology vol.24 2010.11 pp.75-82
※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.
Carbon nanotubes are promising nanoscale materials for novel electrical, mechanical, chemical, and biological device and sensors based on its outstanding properties. Single walled carbon nanotubes can be either semiconducting or metallic material depending on its structures. However, controlling the structure is quite challenging with current technologies. For the network formation of the single walled carbon nanotubes, single walled carbon nanotube films, the properties of individual single walled carbon nanotubes are ensemble averaged and show uniform physical and electrical properties. Also it is transparent, flexible, and conductive. Therefore, it has attracted great research attentions and as a result, several applications of the single walled carbon nanotube films have been demonstrated. In this study, the metal-semiconductor-metal photodetector using the single walled carbon nanotube films are fabricated. The fabrication methods from the network synthesis to the photodetector device fabrication are demonstrated. The fabrication methods are vacuum filtration for the synthesis of single walled carbon nanotube films and typical semiconductor fabrication techniques for the fabrication of metal-semiconductor-metal photodetector device. Also the photoelectrical properties of the fabricated photodetector are discussed.
0개의 논문이 장바구니에 담겼습니다.
선택하신 파일을 압축중입니다.
잠시만 기다려 주십시오.