• Title/Summary/Keyword: 연산 효율

Search Result 2,622, Processing Time 0.03 seconds

An Adaptive Smoothing for Moire Region using Analysis of Halftone Patterns Interference in Color Inverse Halftoning (칼라 역 해프토닝에서 해프톤 패턴 간섭 분석에 의한 모아레 영역의 적응적 평활화 방법)

  • 한영미;김종민;김민환
    • Journal of Korea Multimedia Society
    • /
    • v.5 no.3
    • /
    • pp.263-271
    • /
    • 2002
  • In this paper, we propose a new smoothing method for removing moire patterns using analysis of halftone patterns interference. The proposed method can determine a strength of moire patterns by using gray values of pixels and the size of smoothing mask for moire region is adjusted adaptively according to the strength of moire patterns. Therefore it can remove moire patterns effectively and preserve meaningful high frequencies well, such as edges and textures. The proposed method only refer to predefined lookup table to determine the strength of moire patterns, so it is more efficient than a previous work based on FFT of subblock. It could be applied to field of various multimedia applications that deal with color prints.

  • PDF

A Study on AC Servo System for FA using High-performance DSP (고성능 DSP기반의 FA 용 AC서보 시스템에 관한 연구)

  • 최치영;홍선기;김수길
    • Journal of the Korean Institute of Illuminating and Electrical Installation Engineers
    • /
    • v.18 no.1
    • /
    • pp.67-72
    • /
    • 2004
  • AC servo system has been implemented to FA system and also depends on its quality. Recently with the development of power switching device and DSP which has peripheral devices to control AC servo system, the servo technology has met a new development opportunity. A DSP based AC servo system with a 3-phase PMSM is proposed. The newly produced DSP TMX320F2812-version C which has the performance of fast speed, 150MIPS, and rich peripheral interface is used. Also space vector pulse width modulation (SVPWM) and the digital PI control are implemented to the servo system

A Two-Factor User Authorization Method and Its Implementation using TOTP and Password (TOTP와 패스워드를 이용한 Two-Factor 사용자 인증 방식 및 구현)

  • Jae, Ju-Hwan;Yoo, Seung-Lok;Lim, Hak-Chang;Bae, Dong-Hwan;Lee, Yun-Ho;Yang, Hyung-Gyu
    • Review of KIISC
    • /
    • v.20 no.6
    • /
    • pp.7-16
    • /
    • 2010
  • 인터넷 및 통신 기술의 발전은 사용자로 하여금 금융, 방송, 게임 등의 온라인 서비스 제공에 대한 시간 및 공간적 제한을 없애 주였지만, 다른 한편으로는 해커 등의 악의적 사용자로 인한 피해 가능성도 높이고 있다. 이를 해결하기 위한 다양한 보안 기법 가운데 하나가 OTP를 이용한 사용자 인증 방법이다. OTP는 재사용하지 않는 패스워드로서 기존 패스워드 인증 방식이 갖는 취약점을 해결할 수 있는 방식이다. 하지만 OTP 생성 단말의 도난이나 서버 해킹으로 인한 패스워드 추측공격 또는 Stolen verifier 공격 등에 취약할 수 있다. 본 논문에서는 위와 같은 문제점을 해결하기 위해서 두 가지 인증 정보 즉, 시간 기반 OTP 생성방식인 TOTP 및 패스워드를 이용하는 새로운 Two-Factor 인증 프로토콜인 POTP(Password embedded OTP)를 제안한다. 제안한 방식은 재전송 공격에 안전하며, 공격자가 OTP 생성용 디바이스를 획득하더라도 패스워드를 유추할 수 없고 서버의 인증 정보 데이터베이스를 획득하더라도 정상적인 사용자로 위장할 수 함께, 서버에서 인증 정보 보관시 연산 속도가 빠른 해쉬 함수를 이용할 수 있어 보다 효율적이다.

Fault Injection Attack on Lightweight Block Cipher CHAM (경량 암호 알고리듬 CHAM에 대한 오류 주입 공격)

  • Kwon, Hongpil;Ha, Jaecheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.28 no.5
    • /
    • pp.1071-1078
    • /
    • 2018
  • Recently, a family of lightweight block ciphers CHAM that has effective performance on resource-constrained devices is proposed. The CHAM uses a stateless-on-the-fly key schedule method which can reduce the key storage areas. Furthermore, the core design of CHAM is based on ARX(Addition, Rotation and XOR) operations which can enhance the computational performance. Nevertheless, we point out that the CHAM algorithm may be vulnerable to the fault injection attack which can reveal 4 round keys and derive the secret key from them. As a simulation result, the proposed fault injection attack can extract the secret key of CHAM-128/128 block cipher using about 24 correct-faulty cipher text pairs.

A Study on the Moving Object Tracking Algorithm of Static Camera and Active Camera in Environment (고정카메라 및 능동카메라 환경에서 이동물체 추적 알고리즘에 관한 연구)

  • 남기환;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.344-352
    • /
    • 2003
  • An effective algorithm for implementation of which detects moving object from image sequences. predicts the direction of it. and drives the camera in real time is proposed. In static camera, for robust motion detection from a dynamic background scene, the proposed algorithm performs statistical modeling of moving objects and background, and trains the statistical modeling of moving objects and background, and trains the statistical feature of background with the initial parts of sequence which have no moving objects. Active camera moving objects are segmented by following procedure, an improved order adaptive lattice structured linear predictor is used. The proposed algorithm shows robust object tracking results in the environment of static or active camera. It can be used for the unmanned surveillance system, traffic monitoring system, and autonomous vehicle.

A New Space Vector Random PWM Scheme for Inverter Fed Drive Systems (인버터 구동 시스템을 위한 새로운 공간벡터 Random PWM기법)

  • 나석환;정영국;임영철
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.6 no.6
    • /
    • pp.525-537
    • /
    • 2001
  • In this paper a new space vector RPPWM(Random Position PWM) is proposed. In the propsed RPPWM each of three phase pulses is located randomly in each switching interval. Based on the Space vector modulation technique the duty ratio of the pulses is calculated Along with the randomization of the PWM pulses. we can obtain the effects of spread spectra of votlage, current as in the case of randomly changed switching frequency, To verify the validity of the proposed RPPWM simulation study was tried using Matlab/Simulink The main model described in Simulink block diagrams includes the space vector modulation block pulse position randomization block inverter block 3 phase induction motor block and so on By the simulation study, the harmonics of the output voltage and the current of inverter are predicted in different PWM methods- SVPWM, LLPWM proposed RPPWM.

  • PDF

A back tracing in dynamic programming for efficient the stereo matching (효율적인 스테레오 정합을 위한 동적계획법의 역 추적 방법)

  • Park, Jang-Ho;Choi, Hyun-Jun;Seo, Young-Ho;Kim, Dong-Wook
    • Proceedings of the Korean Society of Broadcast Engineers Conference
    • /
    • 2009.11a
    • /
    • pp.363-366
    • /
    • 2009
  • 변이영상은 두 스테레오 영상의 시차에 의해 발생하는 각 화소의 변위를 수록한 영상이다. 이 영상은 깊이영상을 생성하여 시점 간 가상영상을 생성하는데 사용된다. 따라서 변이영상은 다시점 비디오 서비스와 직접적인 연관이 있다. 본 논문에서는 유일성(uniqueness)제약과 순차성(ordering) 제약을 사용하여 기준영상과 참조영상 사이의 관계를 이용하여 생성한 변이 공간 영상(DSI : disparity space image)으로부터 비용 행렬을 계산하여 최적의 변이 경로를 찾아가는 다이내믹 프로그래밍을 분석 하였다. 다이내믹 프로그래밍은 정밀한 변이 맵을 얻을 수 있고, 다른 방식들에 비해 연산 속도가 빠르다는 장점을 가지고 있지만, 영상의 화소값의 변화가 없는 영역에서 이전의 경로를 계속 유지하려는 성질에 때문에 발생 하는 오류확산과 가려진 (occluded) 영역에 의한 오차로 인해 정확한 경로를 찾을 수 없는 경우가 빈번히 발생 하여 에러율이 높아지는 단점을 가지고 있다. 이러한 이론을 토대로 기존의 기법들에 비하여 정확도가 우수한 기법들을 제안하였다. 개선된 역 추적 과정을 이용하여 기존의 다이내믹 프로그래밍 기반의 스테레오 정합 기법들보다 우수성이 뛰어난 결과들을 나타내었다.

  • PDF

Thermomechanical Contact Analysis by Subdomain/Interface Finite Element Method (유한요소 부영역 결합법을 이용한 열기계학적 접촉 해석)

  • Shin, Eui-Sup;Jin, Ji-Man
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.33 no.11
    • /
    • pp.7-14
    • /
    • 2005
  • A subdomain-interface finite element method is suggested to solve a class of fully- coupled thermomechanical problems with contact boundaries. The penalty method is used for connecting subdomains that satisfy interface compatibility conditions. As a result, effective stiffness matrices are always positive definite, and computational efficiency can be improved to a considerable degree. Moreover, any complex-shaped domain can be divided into independently modeled subdomains without considering the conformity of meshes on interfaces. Using a computer code based on the present method, these advantageous features are shown through a set of numerical studies.

Efficient Drone Detection method using a Radio-Frequency (RF를 이용한 효과적인 드론 탐지 기법)

  • Choi, Hong-Rak;Jeong, Won-Ho;Kim, Kyung-Seok
    • Journal of Satellite, Information and Communications
    • /
    • v.12 no.4
    • /
    • pp.26-33
    • /
    • 2017
  • A drone performs a mission through remote control or automatic control, which uses wireless communications technology. Recently the increasing use of drones, the drone signal RF detection is necessary. In this paper, we propose an efficient dron RF detection method through simulations considering Wi-Fi, Bluetooth and dedicated protocol dron communication method in ISM(Industry Science Medical) band.. After configuring an environment where a common terminal and a drone signal are mixed, a general terminal and a drone signal are distinguished from each other by using a RF characteristic according to a dron movement. The proposed drone RF detection method is the WRMD(Windowed RSSI Moving Detection) operation and the Doppler frequency identification method. The simulation environments consist to mixed for two signals and four signals. We analysis the performance to proposed drone RF detection technique thorough detection rate.

An Efficient Motion Vector Estimation For Improving Picture Quality Of Frame Skipping Based Video Transcoding (프레임제거 기반의 비디오 트랜스코딩에서의 화질 개선을 위한 효율적인 움직임 벡터 산출 방법)

  • Park Yong-Dae;Roh Byeong-hee
    • Journal of Internet Computing and Services
    • /
    • v.6 no.4
    • /
    • pp.103-114
    • /
    • 2005
  • In this paper, we propose a new trnascoding method for improving picture's visual quality when frames are skipped. the proposed method utilizes the relationships of motion vectors between successive frames, and 4 motion vectors a macroblock are considered in transcoding. Since the proposed method does not require any decoding process of encoded bit stream, the computational complexity for estimating motion vectors can be eliminated. Experimental results illustrated that as transcoded frames are getting far from I pictures and as the degree of motions in video sequences are getting higher, the picture quality by using our proposed method shows better performances than existing schemes.

  • PDF