http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.
변환된 중국어를 복사하여 사용하시면 됩니다.
Correlations Between Fasciology and Yin Yang Doctrine
Hui Tao,Mei-chun Yu,Hui-ying Yang,Rong-mei Qu,Chun Yang,Xin Zhou,Yu Bai,Jing-peng Wu,Jun Wang,Ou Sha,Lin Yuan 사단법인약침학회 2011 Journal of Acupuncture & Meridian Studies Vol.4 No.2
The aim of this study is to explore the correlations between fasciology and yin yang doctrine. Professor Yuan developed fasciology by three-dimensional reconstruction of connective tissue (fascia) in the trunk and limbs of the human body and tracing back to tissue origins in light of biological evolution and developmental biology. Fasciology states that the human body can be divided into two systems: the supporting-storing system and the functional system. This article elaborates on the roles of the two systems and their mutual relationship. The two systems are used to analyze the yin,the yang, and their relationship. The two systems are promoted but also restricted in different contexts. The supporting-storing system is formed by undifferentiated connective tissue and provides undifferentiated cells and nutrients for differentiated cells of the functional system. Thus, the supporting-storing system could be classified as quiet, similar to yin. The functional system continuously maintains the various functional activities of the human body. Thus, the functional system could be classified as active, similar to yang. In interpreting the yin yang doctrine from the point of view of fasciology, yin can be compared with the supporting-storing system and yang can be compared with the functional system.
Secure Biometric Hashing by Random Fusion of Global and Local Features
Ou, Yang,Rhee, Kyung-Hyune Korea Multimedia Society 2010 멀티미디어학회논문지 Vol.13 No.6
In this paper, we present a secure biometric hashing scheme for face recognition by random fusion of global and local features. The Fourier-Mellin transform and Radon transform are adopted respectively to form specialized representation of global and local features, due to their invariance to geometric operations. The final biometric hash is securely generated by random weighting sum of both feature sets. A fourfold key is involved in our algorithm to ensure the security and privacy of biometric templates. The proposed biometric hash can be revocable and replaced by using a new key. Moreover, the attacker cannot obtain any information about the original biometric template without knowing the secret key. The experimental results confirm that our scheme has a satisfactory accuracy performance in terms of EER.
( Ou Yang Qi ),( Pu Wang ),( Jin Huang ),( Jin Bo Cai ),( Jun Yao He ) 한국미생물 · 생명공학회 2013 Journal of microbiology and biotechnology Vol.23 No.3
(R)-[3,5-Bis(trifluoromethyl)phenyl] ethanol is a key chiral intermediate for the synthesis of aprepitant. In this paper, an efficient synthetic process for (R)-[3,5- bis(trifluoromethyl)phenyl] ethanol was developed via the asymmetric reduction of 3,5-bis(trifluoromethyl) acetophenone, catalyzed by Leifsonia xyli CCTCC M 2010241 cells using isopropanol as the co-substrate for cofactor recycling. Firstly, the substrate and product solubility and cell membrane permeability of biocatalysts were evaluated with different co-substrate additions into the reaction system, in which isopropanol manifested as the best hydrogen donor of coupled NADH regeneration during the bioreduction of 3,5-bis(trifluoromethyl) acetophenone. Subsequently, the optimization of parameters for the bioreduction were undertaken to improve the effectiveness of the process. The determined efficient reaction system contained 200mM of 3,5-bis(trifluoromethyl) acetophenone, 20% (v/v) of isopropanol, and 300 g/l of wet cells. The bioreduction was executed at 30oC and 200 rpm for 30 h, and 91.8% of product yield with 99.9% of enantiometric excess (e.e.) was obtained. The established bioreduction reaction system could tolerate higher substrate concentrations of 3,5- bis(trifluoromethyl) acetophenone, and afforded a satisfactory yield and excellent product e.e. for the desired (R)-chiral alcohol, thus providing an alternative to the chemical synthesis of (R)-[3,5-bis(trifluoromethyl)phenyl] ethanol.
An Enhanced Perceptual Image Hashing Scheme based on Clustering
Yang Ou,Chul Sur,Kyung Hyune Rhee 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1
In this paper, we propose a perceptual image hashing scheme by using image histogram and K-means clustering algorithm. Our work is motivated by previous histogram-based image hashing scheme which achieves a good robustness to perceptually insignificant attack but the image structure is lost during hash generation. We employ the K-means algorithm to cluster the image into two or more segments, and calculate the histogram in each segment, separately. The clustering algorithm can capture local image information and make our scheme be more fragile to perceptual significant attacks. The experimental results confirm that our proposed scheme not only preserves the robustness of original one, but also enhances the fragility to malicious attacks.
Developments and Research Trends of Perceptual Image Hashing
Yang Ou,Kyung Hyune Rhee 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.2
The perceptual image hashing has been emerged recently for content-based image authentication. In this paper, a comprehensive survey of the existing image hashing approaches is given. We firstly provide a general framework of image hashing, and then present different categories for the classification of image hashing schemes. We systematically describe, discuss, evaluate, and compare the various techniques, especially with respect to their robustness and discrimination, concerning their security, and regarding the research trends in the future.
Partial Encryption of ROI in JPEG2000 Codestream
Yang Ou,Hye-Rhan Lee,Kyung-Hyune Rhee 한국멀티미디어학회 2006 한국멀티미디어학회 학술발표논문집 Vol.2006 No.2
In this paper, we propose a bitstream compliant encryption scheme for ROI in JPEG2000. An AES block cipher in CFB mode is used to encrypt the ROI data in JPEG2000 bitstream. The encryption process does not need to insert superfluous JPEG2000 markers in the protected codestream because it encrypts each ROI packet body independently. The proposed scheme shows that encrypting the ROI data in lower resolution levels or earlier quality layers can provide a high level of confidentiality.
Yang ou,Li yueping 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.5
This paper introduces a novel method for the quality evaluation of resistance spot welds. The evaluation is based on computer vision methods, which allow nondestructive on-line real-time processing. The input of the system is the image of a weld imprint on a metal band which covers the electrodes against wear and soiling. In order to find the position of the resistance spot welds, we describe an image registration method based on geometric pattern matching for alignment system in metal parts. Further we extract features describing the shape of localized objects in segmented images .Using these shape descriptors (geometric feature) we classify the defects by Artificial Neural Network.
A study of Region of Interest coding in JPEG2000
( Yang Ou ),( Ki-jun Kang ),( Bu-kwon Lee ) 한국정보처리학회 2006 한국정보처리학회 학술대회논문집 Vol.13 No.1
One of the most significant characteristics of JPEG2000, the emerging still image standards, is the Region of Interest (ROI) coding. Until now, there have been many proposed ROI methods. However, all of these methods can not be applied completely in applications. In this paper, the ROI coding mechanisms in JPEG2000 is first outlined and the diversity of ROI coding methods is discussed in detail. Then a comparative selection about using a proper ROI method according to ROI applications’ requirements is proposed. Finally the experimental results show that there are also several parameters that control the effectiveness of ROI coding, such as the codeblock size, ROI size, wavelet filter type, the number of wavelet decomposition levels, and ROI importance score.