RISS 학술연구정보서비스

검색
다국어 입력

http://chineseinput.net/에서 pinyin(병음)방식으로 중국어를 변환할 수 있습니다.

변환된 중국어를 복사하여 사용하시면 됩니다.

예시)
  • 中文 을 입력하시려면 zhongwen을 입력하시고 space를누르시면됩니다.
  • 北京 을 입력하시려면 beijing을 입력하시고 space를 누르시면 됩니다.
닫기
    인기검색어 순위 펼치기

    RISS 인기검색어

      검색결과 좁혀 보기

      선택해제
      • 좁혀본 항목 보기순서

        • 원문유무
        • 원문제공처
          펼치기
        • 등재정보
          펼치기
        • 학술지명
          펼치기
        • 주제분류
          펼치기
        • 발행연도
          펼치기
        • 작성언어

      오늘 본 자료

      • 오늘 본 자료가 없습니다.
      더보기
      • 무료
      • 기관 내 무료
      • 유료
      • KCI등재후보

        Correlations Between Fasciology and Yin Yang Doctrine

        Hui Tao,Mei-chun Yu,Hui-ying Yang,Rong-mei Qu,Chun Yang,Xin Zhou,Yu Bai,Jing-peng Wu,Jun Wang,Ou Sha,Lin Yuan 사단법인약침학회 2011 Journal of Acupuncture & Meridian Studies Vol.4 No.2

        The aim of this study is to explore the correlations between fasciology and yin yang doctrine. Professor Yuan developed fasciology by three-dimensional reconstruction of connective tissue (fascia) in the trunk and limbs of the human body and tracing back to tissue origins in light of biological evolution and developmental biology. Fasciology states that the human body can be divided into two systems: the supporting-storing system and the functional system. This article elaborates on the roles of the two systems and their mutual relationship. The two systems are used to analyze the yin,the yang, and their relationship. The two systems are promoted but also restricted in different contexts. The supporting-storing system is formed by undifferentiated connective tissue and provides undifferentiated cells and nutrients for differentiated cells of the functional system. Thus, the supporting-storing system could be classified as quiet, similar to yin. The functional system continuously maintains the various functional activities of the human body. Thus, the functional system could be classified as active, similar to yang. In interpreting the yin yang doctrine from the point of view of fasciology, yin can be compared with the supporting-storing system and yang can be compared with the functional system.

      • KCI등재
      • Developments and Research Trends of Perceptual Image Hashing

        Yang Ou,Kyung Hyune Rhee 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.2

        The perceptual image hashing has been emerged recently for content-based image authentication. In this paper, a comprehensive survey of the existing image hashing approaches is given. We firstly provide a general framework of image hashing, and then present different categories for the classification of image hashing schemes. We systematically describe, discuss, evaluate, and compare the various techniques, especially with respect to their robustness and discrimination, concerning their security, and regarding the research trends in the future.

      • An Enhanced Perceptual Image Hashing Scheme based on Clustering

        Yang Ou,Chul Sur,Kyung Hyune Rhee 한국멀티미디어학회 2009 한국멀티미디어학회 학술발표논문집 Vol.2009 No.1

        In this paper, we propose a perceptual image hashing scheme by using image histogram and K-means clustering algorithm. Our work is motivated by previous histogram-based image hashing scheme which achieves a good robustness to perceptually insignificant attack but the image structure is lost during hash generation. We employ the K-means algorithm to cluster the image into two or more segments, and calculate the histogram in each segment, separately. The clustering algorithm can capture local image information and make our scheme be more fragile to perceptual significant attacks. The experimental results confirm that our proposed scheme not only preserves the robustness of original one, but also enhances the fragility to malicious attacks.

      • KCI등재

        Error Concealment Based on Multiple Representation for Wireless Transmission of JPEG2000 Image

        Yang Ou,Won-Young Lee(이원영),Taeuk Yang(양태욱),Sung Taek Chee(지성택),Kyung Hyune Rhee(이경현) 한국통신학회 2008 韓國通信學會論文誌 Vol.33 No.1C

        The transmission of multimedia information over error-prone channels such as wireless networks has become an important area of research. In this paper, we propose two Error Concealment (EC) schemes for wireless transmission of JPEG2000 image. The Multiple Representation (MR) is employed as the preprocessing in our schemes, whereas the main error concealing operation is applied in wavelet domain at receiver side. The compressed code-stream of several subsampled versions of original image is transmitted over a single channel with random bit errors. In the decoder side, the correctly reconstructed wavelet coefficients are utilized to recover the corrupted coefficients in other sub-images. The recovery is carried out by proposed basic (MREC-BS) or enhanced (MREC-ES) methods, both of which can be simply implemented. Moreover, there is no iterative processing during error concealing, which results a big time saving. Also, the simulation results confirm the effectiveness and efficiency of our proposed schemes.

      • Quality Evaluation and Automatic Classification in Resistance Spot Welding by Analyzing the Weld Image on Metal Bands by Computer Vision

        Yang ou,Li yueping 보안공학연구지원센터 2015 International Journal of Signal Processing, Image Vol.8 No.5

        This paper introduces a novel method for the quality evaluation of resistance spot welds. The evaluation is based on computer vision methods, which allow nondestructive on-line real-time processing. The input of the system is the image of a weld imprint on a metal band which covers the electrodes against wear and soiling. In order to find the position of the resistance spot welds, we describe an image registration method based on geometric pattern matching for alignment system in metal parts. Further we extract features describing the shape of localized objects in segmented images .Using these shape descriptors (geometric feature) we classify the defects by Artificial Neural Network.

      • Partial Encryption of ROI in JPEG2000 Codestream

        Yang Ou,Hye-Rhan Lee,Kyung-Hyune Rhee 한국멀티미디어학회 2006 한국멀티미디어학회 학술발표논문집 Vol.2006 No.2

        In this paper, we propose a bitstream compliant encryption scheme for ROI in JPEG2000. An AES block cipher in CFB mode is used to encrypt the ROI data in JPEG2000 bitstream. The encryption process does not need to insert superfluous JPEG2000 markers in the protected codestream because it encrypts each ROI packet body independently. The proposed scheme shows that encrypting the ROI data in lower resolution levels or earlier quality layers can provide a high level of confidentiality.

      • KCI등재

        문학 : 한 무제와 중국희극

        ( Ou Yang Zhen Ren ) 퇴계학부산연구원 2013 퇴계학논총 Vol.21 No.-

        이 글은 인간의 본질이라는 시각에서 또 희극예술의 기본적 특징의 시각에서 출발하여 희극예술과 체계적인 비교를 전제 하에 한(漢) 무제 (武帝) 시대에 대해 철학적으로 발굴하고 정리하였다. 어떻게 한 무제 시대에는 각 방면에서 모두 특출한 번영과 성대한 상황이 전개되었는지 체계적으로 논증하고, 그에 반해 희극이 생성되는 토양에는 극히 빈곤한 여건이 되었던 다섯 가지의 원인을 분석하였다. 이 글은 정치적으로 자유를 얻지 못하고 학술적으로는 홀로 피어오른 꽃이 놓여 있는 것처럼 독립된 개체의지가 없어 의지와 의지 간의 충돌에 따라 완전히 없어지고, 의지와 의지의 충돌이 일으킨 모순의 결과의 과정과 발전도 의의를 완전히 상실하게 되었음을 지적하였다. 이는 바로 한 무제 시대에 중국 희극이 왜 출현할 수 없었는지의 근본 원인이다. Focusing on the essence that makes one a real person, this paper excavates and clears up the time of Emperor Wu of Han in philosophy view, in the perspective of the basic characters of dramatic arts, and on the premise of the comparision with dramatic arts. It demonstrates systematically five reasons of why the ground for engendering drama is so infertile, compared with the prosperous and magnificent condition in all the other aspects. It points out that there is no independent individual will on a land, where there is no liberty in politics and autocracy in acdemic, in consequence of which, the conflicts among different wills disappear, and the process and the development of the contradiction caused by the conflicts finally lose all their significance. This is the time of Emperor Wu of Han, which explains the fundamental cause of why there is no appearance of Chinese drama during that time.

      • KCI등재

        Efficient Enantioselective Synthesis of (R)-[3, 5-Bis (trifluoromethyl) phenyl] Ethanol by Leifsonia xyli CCTCC M 2010241 Using Isopropanol as Co-Substrate

        ( Ou Yang Qi ),( Pu Wang ),( Jin Huang ),( Jin Bo Cai ),( Jun Yao He ) 한국미생물 · 생명공학회 2013 Journal of microbiology and biotechnology Vol.23 No.3

        (R)-[3,5-Bis(trifluoromethyl)phenyl] ethanol is a key chiral intermediate for the synthesis of aprepitant. In this paper, an efficient synthetic process for (R)-[3,5- bis(trifluoromethyl)phenyl] ethanol was developed via the asymmetric reduction of 3,5-bis(trifluoromethyl) acetophenone, catalyzed by Leifsonia xyli CCTCC M 2010241 cells using isopropanol as the co-substrate for cofactor recycling. Firstly, the substrate and product solubility and cell membrane permeability of biocatalysts were evaluated with different co-substrate additions into the reaction system, in which isopropanol manifested as the best hydrogen donor of coupled NADH regeneration during the bioreduction of 3,5-bis(trifluoromethyl) acetophenone. Subsequently, the optimization of parameters for the bioreduction were undertaken to improve the effectiveness of the process. The determined efficient reaction system contained 200mM of 3,5-bis(trifluoromethyl) acetophenone, 20% (v/v) of isopropanol, and 300 g/l of wet cells. The bioreduction was executed at 30oC and 200 rpm for 30 h, and 91.8% of product yield with 99.9% of enantiometric excess (e.e.) was obtained. The established bioreduction reaction system could tolerate higher substrate concentrations of 3,5- bis(trifluoromethyl) acetophenone, and afforded a satisfactory yield and excellent product e.e. for the desired (R)-chiral alcohol, thus providing an alternative to the chemical synthesis of (R)-[3,5-bis(trifluoromethyl)phenyl] ethanol.

      • KCI등재

        Secure Biometric Hashing by Random Fusion of Global and Local Features

        Ou, Yang,Rhee, Kyung-Hyune Korea Multimedia Society 2010 멀티미디어학회논문지 Vol.13 No.6

        In this paper, we present a secure biometric hashing scheme for face recognition by random fusion of global and local features. The Fourier-Mellin transform and Radon transform are adopted respectively to form specialized representation of global and local features, due to their invariance to geometric operations. The final biometric hash is securely generated by random weighting sum of both feature sets. A fourfold key is involved in our algorithm to ensure the security and privacy of biometric templates. The proposed biometric hash can be revocable and replaced by using a new key. Moreover, the attacker cannot obtain any information about the original biometric template without knowing the secret key. The experimental results confirm that our scheme has a satisfactory accuracy performance in terms of EER.

      연관 검색어 추천

      이 검색어로 많이 본 자료

      활용도 높은 자료

      해외이동버튼