• Title/Summary/Keyword: 연산 효율

Search Result 2,610, Processing Time 0.029 seconds

Time Disjoint Paths (TDP) - RWA on Scheduled Lightpath Demands in Optical Transport Networks (광 전달망에서 계획 연결 요구의 시간적 비공유 경로를 이용한 RWA)

  • Ahn Hyun Gi;Lee Tae-Jin;Chung Min Young;Choo Hyunseung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11A
    • /
    • pp.979-986
    • /
    • 2005
  • In optical networks, traffic demands often demonstrate periodic nature for which time-overlapping property can be utilized in routing and wavelength assignment (RWA). A RWA problem for scheduled lightpath demands (SLDs) has been solved by combinatorial optimal solution (COS) and graph coloring, or heuristic sequential RWA (sRWA). Such methods are very complex and incurs large computational overhead. In this paper, we propose an efficient RWA algorithm to utilize the time disjoint property as well as space disjoint property through fast grouping of SLDs. The computer simulation shows that our proposed algorithm indeed achieves up to $54\%$ faster computation with similar number of wavelengths than the existing heuristic sRWA algorithm.

A Novel Image Encryption using Complemented MLCA based on NBCA and 2D CAT (NBCA 에 기초한 여원 MLCA와 2D CAT를 이용한 새로운 영상 암호화)

  • Kim, Ha-Kyung;Nam, Tae-Hee;Cho, Sung-Jin;Kim, Seok-Tae
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.36 no.6C
    • /
    • pp.361-367
    • /
    • 2011
  • In this paper, we propose encryption method to using complemented MLCA(Maximum Length Cellular Automata) based on NBCA(Null Boundary CA) and 2D CAT (Two-Dimensional Cellular Automata Transform) for efficient image encryption. The encryption method is processed in the following order. First, a transition matrix T is created using the Wolfram Rule matrix. Then, the transition matrix T is multiplied to the original image that is intended to be encrypted, which transfers the pixel values of the original image. Furthermore, the converted original image goes through a XOR operation with complemented vector F to convert into a complemented MLCA applied image. Then, the gateway value is set and 2D CAT basis function is created. Also, the 2D CAT is encrypted by multiplying the created basis function to the complemented MLCA applied image. Lastly, the stability analysis verifies that proposed method holds a high encryption quality status.

A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems (단계적 키 변환을 이용한 RFID 상호 인증 프로토콜)

  • Chung, Kyung-Ho;Kim, Kyoung-Youl;Oh, Se-Jin;Lee, Jae-Kang;Park, Yong-Soo;Ahn, Kwang-Seon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.3B
    • /
    • pp.462-473
    • /
    • 2010
  • The RFID system has the security problem of location tracking and user privacy. In order to solve this problem, the cryptographic access method using hash function is difficult to in real applications. Because there is a limit of computing and storage capacity of Tag, but the safety is proved. The lightweight authentication methods like HB and LMAP guarantee the high efficiency, but the safety is not enough to use. In this paper, we use the AES for RFID Authentication, and solve the problem of using fixed key with key change step by step. The symmetric keys of the tag and server are changed by the random number generated by tag, reader and server successively. This could prevent the key exposure. As a result, the output of the tag and reader always changes. These key changes could make it possible to prevent eavesdropping, replay attack, location tracking and spoofing.

An Efficient Receive Diversity Combining Technique for SC-FDMA-based Cooperative Relays (SC-FDMA 기반 상호협력 릴레이를 위한 효율적인 수신 다이버시티 결합 기법)

  • Woo, Kyung-Soo;Kim, Yeong-Jun;Yoo, Hyun-Il;Cho, Yong-Soo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.4A
    • /
    • pp.307-314
    • /
    • 2010
  • In this paper, a receive diversity combining technique is proposed for single-carrier frequency division multiple access (SC-FDMA)-based cooperative relay systems when discrete Fourier transform (DFT) spreading sizes for mobile station (MS) and relay station (RS) are different. The proposed technique is composed of a DFT spreading size adjustment block, a phase rotation compensation block, a channel phase compensation block, and a receive diversity combining block. The proposed technique is robust to multipath channels and can be operated with a relatively small computational complexity because receive diversity combining is performed with scalar operations in the frequency-domain. It is shown by computer simulation that the proposed receive diversity combining techniques achieve a performance gain over the conventional maximal ratio combining (MRC) techniques for SC-FDMA-based cooperative relay systems.

A Bi-directional Coding using Time Reversal Mirror in Relay Systems (중계기 기반 시스템에서의 시역전 방법을 적용한 양방향 부호화)

  • Kwon, Yang-Soo;Yoo, Jae-Ho;Kim, Hyeon-Su;Chung, Jae-Hak
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.33 no.12A
    • /
    • pp.1156-1164
    • /
    • 2008
  • In this paper, we propose a bi-directional coding method (BTC) using time reversal mirror for effective data exchange between mobile stations and basestations. In conventional relay systems, while one node transmits data, other nodes should keep silent to avoid interference. Thus, to interchange data between basestations and mobile stations, it needs four stages. However, using the proposed BTC method, a relay station transmits a probe source before data transmission, and using this information, mobile stations and basestations transmit data to the relay station simultaneously. Therefore, since it exchanges data in only two steps, the system achieves improved system capacity. In addition, owing to no need for complex calculation, the relay system can be implemented with low complexity. The simulation results demonstrate that the proposed method achieves enhanced system capacity.

A study on the eye Location for Video-Conferencing Interface (화상 회의 인터페이스를 위한 눈 위치 검출에 관한 연구)

  • Jung, Jo-Nam;Gang, Jang-Mook;Bang, Kee-Chun
    • Journal of Digital Contents Society
    • /
    • v.7 no.1
    • /
    • pp.67-74
    • /
    • 2006
  • In current video-conferencing systems. user's face movements are restricted by fixed camera, therefore it is inconvenient to users. To solve this problem, tracking of face movements is needed. Tracking using whole face needs much computing time and whole face is difficult to define as an one feature. Thus, using several feature points in face is more desirable to track face movements efficiently. This paper addresses an effective eye location algorithm which is essential process of automatic human face tracking system for natural video-conferencing. The location of eye is very important information for face tracking, as eye has most clear and simplest attribute in face. The proposed algorithm is applied to candidate face regions from the face region extraction. It is not sensitive to lighting conditions and has no restriction on face size and face with glasses. The proposed algorithm shows very encouraging results from experiments on video-conferencing environments.

  • PDF

An Adaptive Decoding Algorithm Using the Differences Between Level Radii for MIMO Systems (다중 송수신 안테나 시스템에서 단계별 반경의 차이를 이용한 적응 복호화 알고리즘)

  • Kim, Sang-Hyun;Park, So-Ryoung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.7C
    • /
    • pp.618-627
    • /
    • 2010
  • In this paper, we propose an adaptive K-best algorithm in which the number K of candidates is changed according to the differences of level radii. We also compare the bit error performance and complexity of the proposed algorithm with those of several conventional K-best algorithms, where the complexity is defined as the total number of candidates of which partial Euclidean distances have to be calculated. The proposed algorithm adaptively decides K at each level by eliminating the symbols, whose differences of radii are larger than a threshold, from the set of candidates, and the maximum or average value of differences can be adopted as the threshold. The proposed decoding algorithm shows the better bit error performance and the lower complexity than a conventional K-best decoding algorithm with a constant K, and also has a similar bit error performance and the lower complexity than other adaptive K-best algorithms.

Effective Nonlinear Filters with Visual Perception Characteristics for Extracting Sketch Features (인간시각 인식특성을 지닌 효율적 비선형 스케치 특징추출 필터)

  • Cho, Sung-Mok;Cho, Ok-Lae
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.139-145
    • /
    • 2006
  • Feature extraction technique in digital images has many applications such as robot vision, medical diagnostic system, and motion video transmission, etc. There are several methods for extracting features in digital images for example nonlinear gradient, nonlinear laplacian, and entropy convolutional filter. However, conventional convolutional filters are usually not efficient to extract features in an image because image feature formation in eyes is more sensitive to dark regions than to bright regions. A few nonlinear filters using difference between arithmetic mean and harmonic mean in a window for extracting sketch features are described in this paper They have some advantages, for example simple computation, dependence on local intensities and less sensitive to small intensity changes in very dark regions. Experimental results demonstrate more successful features extraction than other conventional filters over a wide variety of intensity variations.

  • PDF

Design and Implementation of Spatial Association Rule Discovery System for Spatial Data Analysis (공간 데이터 분석을 위한 공간 연관 규칙 탐사 시스템의 설계 및 구현)

  • Ahn, Chan-Min;Lee, Yun-Seok;Park, Sang-Ho;Lee, Ju-Hong
    • Journal of the Korea Society of Computer and Information
    • /
    • v.11 no.1 s.39
    • /
    • pp.27-34
    • /
    • 2006
  • Recently, the study about the technology which effectively manage spatial information is actively conducted. For the effective knowledge inquiry, various extended data mining methods are applied in spatial data mining. However, former spatial association rule system appears the problem that does not reflect various non-spatial property along the inquiries because it searches the rule from the calculation among predicates. To resolve the problem, present study suggests the system that extends the inquiries using in spatial database, searches the association rule among non-spatial object property after setting the data based on space information. Especially, the model which is applicable to geographical information system is embodied. Embodied system with this method enables to search more useful spatial association rule in real life since it shows high migration property with extended spatial database and considers spatial property and various non-spatial property.

  • PDF

Algorithm for Topological Relationship On an Indeterminate Spatiotemporal Object (불확실한 시공간 객체에 관한 위상 관계 알고리즘)

  • Ji, Jeong-Hui;Kim, Dae-Jung;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.10D no.6
    • /
    • pp.873-884
    • /
    • 2003
  • So far, significant achievements have been studied on the development of models for spatial and spatiotemporal objects with indeterminate boundaries which are found in many applications for geographic analysis and image understanding. Therefore, in this paper we propose the spatiotemporal data model which is applicable for spatial and spatiotemporal objects with uncertainty. Based on this model, we defined topological relationships among the indeterminate spatiotemporal objects and designed the algorithm for the operations. For compatibility with existing spatial models, the proposed model has been designed by extending the spatiotemporal object model which is based on the open GIS specification. We defined indeterminate spatial objects, such as the objects whose position and the shape change discretely over time, and the objects whose shape changes continuously as well as the position. We defined topological relationships among these objects using the extended 9-IM. The proposed model can be efficiently applied to the management systems of natural resource data, westher information, geographic information. and so on.