• Title/Summary/Keyword: 시스템 설계와 구현

Search Result 11,851, Processing Time 0.043 seconds

Context Script Language and Language Processor for Context-Awareness in Ubiquitous Computing (유비쿼터스 컴퓨팅에서 상황인식을 위한 컨텍스트 스크립트 언어 및 언어 처리기)

  • Shim Choon-Bo;Kim Young-Ki;Chang Jae-Woo;Kim Jeong-Ki
    • The KIPS Transactions:PartA
    • /
    • v.11A no.7 s.91
    • /
    • pp.537-546
    • /
    • 2004
  • In order to develop an application software for context-awareness techniques, we should program both all decisions on variable con-text-awareness and appropriate process with some program languages. These cause a loss of software production and unlimited repetition of program code. In this paper, we implement a context script language and language processor which can simplify a series of involved process acquired for context-awareness and describe them clearly. In addition, it can represent a definitions of context as standard syntax as well as accomplish them automatically. The proposed context script language provides functionality which can not only define efficiently a given context but also describe a variety of context with general purpose. Aiso, for the usefulness of the language processor, we build an application system which can provide music play service based on context-awareness.

The Design and Implementation of a Content-based Image Retrieval System using the Texture Pattern and Slope Components of Contour Points (턱스쳐패턴과 윤곽점 기울기 성분을 이용한 내용기반 화상 검색시스템의 설계및 구현)

  • Choe, Hyeon-Seop;Kim, Cheol-Won;Kim, Seong-Dong;Choe, Gi-Ho
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.1
    • /
    • pp.54-66
    • /
    • 1997
  • Efficient retrieval of image data is an important research issue in multimedia database. This paper proposes a new approach to a content-based image retrieval which allows queries to be composed of the local texture patterns and the slope components of contour points. The texture patterns extracted from the source image using the graylevel co-occurrence matrix and the slope components of contour points extracted from the binary image are converted into a internal feature representation of reduced dimensionality which preserves the perceptual similarity and those features can be used in creating efficient indexing structures for a content-based image retrieval. Experimental results of the image retrievalare presented to illustrate the usefulness of this approach that demonstrates the precision 82%, the recall 87% and the average rang 3.3 in content-based image data retrieval.

  • PDF

Implementation of Phase-Error Compensation Algorithm in Terrestrial Digital TV Modulator (지상파 디지털 TV 방송용 송신기에서 변조기의 위상오차 보상에 관한 알고리듬 구현)

  • Oh, Inn-Yeal;Yang, Kyung-Seok;Lee, Chul;Mok, Ha-Kyun;Oh, Seong-Hwan
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.6B
    • /
    • pp.1156-1164
    • /
    • 1999
  • In this paper, we have studied the 8 YSB (8 Vestigial Side Band) method which is decided as the standard of modulators for next generation digital TV System. In developing digital TV System, one of the difficult problems is how digital signal can be transmitted to the receiver without any phase distortion. But, phase error is liable to occur by imperfect design, circumstance variation and device degradation. These characteristics result in distortion of 1,0 signal of modulator and interference in adjacent channels. In particular, the interference in modulator of a high power amplifier result in serious problems in adjacent channels. Here we analyzed problems of phase error which are occurred when 8 levels digital signals are modulated to If signal. And we suggested phase error compensation algorithm and discussed the results for adaptation of the algorithm

  • PDF

A Novel of Solar Heat Collection Device Prototype using Parabolic based on Solar Light Tracking (태양광 추적기반의 파라볼릭을 이용한 태양열 집열장치 프로토타입에 관한 연구)

  • Jung, Se-Hoon;Sim, Chun-Bo;Park, Sung-Kyun;Kim, Jong-Ho
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.11 no.4
    • /
    • pp.411-420
    • /
    • 2016
  • Efforts have continued in recent years to research and develop new alternative energy sources to replace coal and oil. These days interest is exploding in new pollution-free renewable energy due to the rising prices of finite energy sources. In the field of solar energy, one of new renewable energy that has been actively researched and commercialized, research efforts have been focused on solar light energy, whose efficiency has, however, reached a saturation point already. Thus, this paper proposed a solar tracking-type parabolic heat collection device to utilize solar thermal energy rather than solar light energy. The proposed device was designed in a parabolic form to collect solar heat effectively. The investigator made its prototype by incorporating a five-axis censor-based solar tracking technology in it to sense changes to the location of the sun according to the seasons and periods. In addition, an administrator interface was designed and implemented for the efficient management of heat collection device.

DDoS Attack Response Framework using Mobile Code (DDoS 공격 대응 프레임워크 설계 및 구현)

  • Lee, Young-seok
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.3 no.3
    • /
    • pp.31-38
    • /
    • 2010
  • It has become more difficult to correspond an cyber attack quickly as patterns of attack become various and complex. However, current security mechanisms just have passive defense functionalities. In this paper, we propose new network security architecture to respond various cyber attacks rapidly and to chase and isolate the attackers through cooperation between security zones. The proposed architecture makes it possible to deal effectively with cyber attacks such as IP spoofing or DDoS(Distributed Denial of Service), by using active packet technology including a mobile code on active network. Also, it is designed to have more active correspondent than that of existing mechanisms. We implemented these mechanisms in Linux routers and experimented on a testbed to verify realization possibility of attacker response framework using mobile code. The experimentation results are analyzed.

  • PDF

Dynamic Threads Stack Management Scheme for Sensor Operating Systems under Space-Constrained (공간 제약하의 센서 운영체제를 위한 동적 쓰레드 스택관리 기법)

  • Yi, Sang-Ho;Cho, Yoo-Kun;Hong, Ji-Man
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.34 no.11
    • /
    • pp.572-580
    • /
    • 2007
  • Wireless sensor networks are sensing, computing and communication infrastructures that allow us to monitor, instrument, observe, and respond to phenomena in the harsh environment. Generally, the wireless sensor networks are composed of many deployed sensor nodes that were designed to be very cost-efficient in terms of production cost. For example, UC Berkeley's MICA motes have only 8-bit CPU, 4KB RAM, and 128KB FLASH memory space. Therefore, sensor operating systems that run on the sensor nodes should be able to operate efficiently in terms of the resource management. In this paper, we present a dynamic threads stack management scheme for space-constrained and multi-threaded sensor operating systems. In this scheme, the necessary stack space of each function is measured on compile-time. Then, the information is used to dynamically allocate and release each function's stack space on run-time. It was implemented in Nano-Qplus sensor operating system. Our experimental results show that the proposed scheme outperforms the existing fixed-size stack allocation mechanism.

Efficient Attribute Based Digital Signature that Minimizes Operations on Secure Hardware (보안 하드웨어 연산 최소화를 통한 효율적인 속성 기반 전자서명 구현)

  • Yoon, Jungjoon;Lee, Jeonghyuk;Kim, Jihye;Oh, Hyunok
    • Journal of KIISE
    • /
    • v.44 no.4
    • /
    • pp.344-351
    • /
    • 2017
  • An attribute based signature system is a cryptographic system where users produce signatures based on some predicate of attributes, using keys issued by one or more attribute authorities. If a private key is leaked during signature generation, the signature can be forged. Therefore, signing operation computations should be performed using secure hardware, which is called tamper resistant hardware in this paper. However, since tamper resistant hardware does not provide high performance, it cannot perform many operations requiring attribute based signatures in a short time frame. This paper proposes a new attribute based signature system using high performance general hardware and low performance tamper resistant hardware. The proposed signature scheme consists of two signature schemes within a existing attribute based signature scheme and a digital signature scheme. In the proposed scheme, although the attribute based signature is performed in insecure environments, the digital signature scheme using tamper resistant hardware guarantees the security of the signature scheme. The proposed scheme improves the performance by 11 times compared to the traditional attribute based signature scheme on a system using only tamper resistant hardware.

A Study on the Channel Converting and Monitoring of the Remote Control Transceiver (원격제어 송수신기의 채널변환과 모니터용 모듈의 구현)

  • 조학현;최조천;김기문
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.3 no.2
    • /
    • pp.347-354
    • /
    • 1999
  • Generally, transceiver is operated to the remote control for the purpose of breading the traffic zone which is established on a mountain peak, island and building top using private line. Therefor, the remote control system of public radio station have been the very important role that is decision the quality relate to the quickness, accuracy, safety of communication on old type transceiver of SSB, VHF etc. In the case of using the only 1 private line which is exchanged voice signal with data signal had mixed or interrupted for up/down of channel, PTT control and monitoring of transmission channel and power. The up/down of channel and PTT control is according to the ASK and the data of monitoring is transfered to the FSK modulation, additional algorithm is studied on the serial protocol and traffic sequence using the MCS-51 processor in the simplex communication methode.

  • PDF

Smartphone User Authentication Algorithm based on Mutual Cooperation in Mobile Environment (모바일 환경에서 상호 협력 기반 스마트폰 사용자 인증 알고리즘)

  • Jeong, Pil-Seong;Cho, Yang-Hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.7
    • /
    • pp.1393-1400
    • /
    • 2017
  • As the number of smartphone users increases, vulnerability to privacy protection is increasing. This is because personal information is stored on various servers connected to the Internet and the user is authenticated using the same ID and password. Authentication methods such as OTP, FIDO, and PIN codes have been introduced to solve traditional authentication methods, but their use is limited for authentication that requires sharing with other users. In this paper, we propose the authentication method that is needed for the management of shared information such as hospitals and corporations. The proposed algorithm is an algorithm that can authenticate users in the same place in real time using smart phone IMEI, QR code, BLE, push message. We propose an authentication algorithm that can perform user authentication through mutual cooperation using a smart phone and can cancel realtime authentication. And we designed and implemented a mutual authentication system using proposed algorithm.

800MHz Band Dual-fed ICS Repeater Antenna with High Isolation (800MHz 대역 고격리 이중급전 ICS 중계기 안테나)

  • Ko, Jin-Hyun;Kim, Gun-Kyun;Rhee, Seung-Yeop;Lee, Jong-Ig
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.5
    • /
    • pp.867-873
    • /
    • 2016
  • Even if ICS(Interference Cancellation System) repeater is used in wireless communication system, it has the disadvantage that it must have enough distance between Donor and Service antenna to be isolated. In this paper, new ICS repeater integrated antenna with high insolation characteristics is designed. The proposed antenna is fabricated for 800MHz and measured. Bandwidth and gain are optimized by changing the stub lengths near main patch and power divider, and also by changing the size of parasitic patch. The fabricated antenna has a return loss less than -13 dB, a gain over 3 dBi, and an isolation between the donor and the server antennas less than -56 dB from 824~894 MHz for CDMA mobile communication. Therefore, the proposed antenna structure can be applied to eliminate the shadow area and to expand the coverage area for any other wireless communication bands.