http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
OVERSHOOT를 제거한 개선된 큐빅 스플라인 보간법에 관한 연구
김성현,김진만,조상현,주동현,김두영 東亞大學校附設情報技術硏究所 2005 情報技術硏究所論文誌 Vol.12 No.2
This study presents the improvement of cubic spline interpolation without overshoot. The o-riginal cubic spline interpolation has overshoots between two data. They are noises in still image zoom because of getting out of the pixel value. But the improvement of cubic spline in-terpolation removes them and proffers better quality still image than other interpolations.
생체 인식 정보 검출을 위한 Watershed 기반 Texture 병합에 관한 연구
김진만,김성현,조상현,김태형,김두영 東亞大學校附設情報技術硏究所 2005 情報技術硏究所論文誌 Vol.12 No.2
this paper presents the method that extracts by using watershed algorithm the area which is available for the feature factor in the iris. The inputted image is preprocessed and transferred to the texture block pattern by Polar Coordinate System Transformation. In this paper, the iris feature area is extracted from the image of Texture Block Pattern using Watershed Algorithm. The extracted area is indexed by average value and size of the feature area. After the position information of the feature area is rearranged by Polar Coordinate System Inverse-Transformation. In result, the proposed method showed that is possible to extract the definite iris feature.
SPHIT 알고리즘의 개선을 통한 JPEG2000 정지영상 부호화에서의 압축효율 개선
조상현,김성현,김진만,주동현,김두영 東亞大學校附設 情報技術硏究所 2004 情報技術硏究所論文誌 Vol.12 No.1
With the increasing use of multimedia technologies, image compression requires higher performance as well as new functionality. Specially, in the specific area of still image encoding, a new standard, JPEG2000 was developed. This paper proposed SPHIT Algorithm that uses a method to optimized selection of threshold from feature of wavelet transform coefficients and to removes sign bit in LL area on JPEG2000. Experimental results show the proposed algorithm achieves more improved bit rate.
HPLC-ICP/MS 와 ICP/MS를 이용한 FAPAS 07187 쌀의 총비소, 무기비소, 카드뮴 측정
노현명 ( Hyun Myung Noh ),김지영 ( Ji Young Kim ),김원일 ( Won Il Kim ),( Anitha Kunhikrishnan ),김민지 ( Min Ji Kim12 ),김경진 ( Gyeong Jin Kim ),박기문 ( Ki Moon Park ),류지혁 ( Ji Hyock Yoo ),김두호 ( Doo Ho Kim ),이영자 ( Y 한국환경농학회 2013 한국환경농학회 학술대회집 Vol.2013 No.-
Metal (loid)s such as environmental contaminants affect food safety. Metal (loid)s exist trace extremely in agriculture products. Therefore it is important to analyze accurately about trace these metals. High resolution techniques and quality controls are needed to analyze these materials. In order to achieve quality results, standardized methods and techniques are required. So ISO(International Organization for Standardization) of laboratory proficiency testing is determination of laboratory testing performance by means of inter-laboratory comparison. The values have been derived as a consensus of a number of laboratories using a variety of methods. Proficiency tests were applied to analyze the metal(loid)s [inorganic arsenic (As), total As and cadmium (Cd)] in powdered rice FAPAS 07187 (Food Analysis Performance Assessment Scheme; February-April 2013). The rice powder sample was extracted with 1% HNO3 for inorganic As for microwave-assisted extraction using water at 95℃ for 90 min and their analysis by HPLC/ICPMS. Also, HNO3 for total As and Cd using microwave-assisted extraction using at 200℃ for 50 mins and analysis by ICP/MS. Validation check was performed for accuracy using CRM (NMIJ CRM 7503-a) for inorganic As, and CRM (IRMM-Rice CRM) for total arsenic and cadmium. The result were satisfactory. FAPAS 07187 the z-scores of inorganic As, total As and Cd in powdered rice were-1.8,-0.9 and 0.2(lzl<2, respectively).
Linux 시스템에서의 ELF 파일 변형 바이러스의 분석 및 대처방안 연구
김두현,김판구 조선대학교 전자정보통신연구소 2001 電子情報通信硏究所論文誌 Vol.4 No.1
As network and Internet is spreading nowadays, Linux has become the most popular operating system in the world. Linux has been launched on the Desktop PC, Server and PDA. More Linux is popular and popular. threat from virus writers is increasing day by day. That is, it becomes a new battle field to virus writer, and they are testing malicious program, for example virus, trojan horse, worm etc. So we needs of new warriors in Linux battle field. In this paper, we propose a synthesized methods for protecting ELF viruses and repair virus infected file. This system diagnose all executable files and a daemon monitor suspicious execution. Our proposed system consists of two parts. One is diagnosis module and another is protection module. Diagnosis module finds viruses using pattern matching and protection module are monitoring in two ways, network daemon and integrity checker.
침수된 전기설비의 누전으로 인한 수중에서의 감전특성에 관한 연구
김두현,강동규 한국산업안전학회 2002 한국안전학회지 Vol.17 No.3
A study on the characteristics of electric shock in fresh water due to the leakage of submerged electric facility is conducted by using a reduced scale model at a scale of 1:10 in laboratory. Electric potential as a function of distance from leakage source, type of the leakage source, magnitude of the source voltage, submerged depth and diameter of a copper rod electrode is measured. On the basis of safety standard, separation for guarantee of safety is determined by the measured potential. Also supposing that body resistance is 500[Ω], the human reaction was estimated by calculation body current for some shock duration. Thus, in this paper the hazard of the electric shock is assessed by introducing representative safety factors, body voltage and body current due to leakage source.
김두현 韓國體育大學校 2000 論文集 Vol.23 No.-
This paper aims to infer the terror with electronic weapons and the counterplan against it. Security counterplans are a matter of its concern as well. This paper comprises five chapters. In Chapter Ⅰ, the purpose of the paper is set, and the scope, and the method of research is defined. ChapterⅡ deals with the defintion and the classification of the terror with electronic weapons. Chapter Ⅲ is allocated for explaining the general view and the development of electonic weapons. The counterplan against the terror with electonic weapons is suggested in Chapter Ⅳ, followed by the concluding remarks in Chapter Ⅴ. For an effective operation of security systems, it seems necessary for security measures organizations to regulate electonic weapons plan, protective force, electronic weapons operations and so forth.
웨이블릿 변환과 확산코드를 이용한 워터마킹에 관한 연구
김현환,김두영 동아대학교 정보기술연구소 2001 情報通信硏究所論文誌 Vol.8 No.2
In this paper we presented a technique for embedding the secrete information of creator into the video to protect the copyright of digital contents. The embedding algorithms transform the image to be made watermarking to 3-level wavelet transform and decide the embedding position of watermarking by extracting code and then embed the watermark to the position through combine prepared watermark with watermark weights. The extracting algorithms transform original image and watermarked image t 3-level wavelet conversation and calculate differential value with each frequency band and then extract embedding watermark through the spread codes that have same value when it embed. The experimental results showed that the proposed watermarking algorithm was superior in quality to other similar watermarking algorithm and was robust to various attacks such as the JPEG lossy compression, the LSB masking, the brightness, the filtering etc.
가축전염병을 이용한 사회안전위협에 대한 대비방안 : 구제역을 중심으로
김두현 한국체육대학교 2001 韓國體育大學校 敎養敎育論文集 Vol.- No.6
This research is based on the protection of the social safty with the preventive measures against food/mouth disease which has been drawn an attention of the public.It also has been known as an epidemic with rapid transmission an severe contemination to hurt the health through major foods.In this work, some fruitful suggestions have been made to prevent and to minimize the harms the disease: 1) we should pay attention to the prior preventive measures by detecting the modes and the causes of the contemination rute route; 2) there should be a step to inoculate the cattles to provide non-conteminated fresh meats for foods : and 3) a health official should be alert to prevent the rapid transmission to the public by breaking the infected route of it.
김동현,서수덕,양두영 濟州大學校 工科大學 産業技術硏究所 1997 尖端技術硏究所論文集 Vol.8 No.2
In this paper, we present a polarizer that consists of three step rotary detents which can selectively convert linear polarization into circular polarization and vice versa. For the design of the polarizer, the transmission line theory is applied to design the waveguide mode transducer for the modes to be smoothly converted between rectangular and circular waveguide. A dielectric plate is inserted in circular waveguide for the conversion of a polarized wave with the angle of an inserted dielectric plate. Also, we simulated to obtain the optimum values of the transmission and the reflection coefficient characteristics at input and output port.