• Title/Summary/Keyword: Information input algorithm

Search Result 2,444, Processing Time 0.034 seconds

Efficient Construction of Euclidean Steiner Minimum Tree Using Combination of Delaunay Triangulation and Minimum Spanning Tree (들로네 삼각망과 최소신장트리를 결합한 효율적인 유클리드 스타이너 최소트리 생성)

  • Kim, Inbum
    • Journal of the Korea Society of Computer and Information
    • /
    • v.19 no.1
    • /
    • pp.57-64
    • /
    • 2014
  • As Steiner minimum tree building belongs to NP-Complete problem domain, heuristics for the problem ask for immense amount execution time and computations in numerous inputs. In this paper, we propose an efficient mechanism of euclidean Steiner minimum tree construction for numerous inputs using combination of Delaunay triangulation and Prim's minimum spanning tree algorithm. Trees built by proposed mechanism are compared respectively with the Prim's minimum spanning tree and minimums spanning tree based Steiner minimum tree. For 30,000 input nodes, Steiner minimum tree by proposed mechanism shows about 2.1% tree length less and 138.2% execution time more than minimum spanning tree, and does about 0.013% tree length less and 18.9% execution time less than minimum spanning tree based Steiner minimum tree in experimental results. Therefore the proposed mechanism can work moderately well to many useful applications where execution time is not critical but reduction of tree length is a key factor.

Performance Analysis of Group Scheduling for Core Nodes in Optical Burst Switching Networks (광 버스트 스위칭 네트워크의 코어 노드를 위한 그룹 스케줄링 성능 분석)

  • 신종덕;이재명;김형석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.29 no.8B
    • /
    • pp.721-729
    • /
    • 2004
  • In this paper, we applied a group scheduling algorithm to core nodes in an optical burst switching (OBS) network and measured its performance by simulation. For the case of core nodes with multi-channel input/output ports, performance of the group scheduling has been compared to that of the immediate scheduling. Since the group scheduling has a characteristic of scheduling a group of bursts simultaneously in a time window using information collected from corresponding burst header packets arrived earlier to a core node, simulation results show that the group scheduling outperforms the immediate scheduling in terms of both burst loss probability and channel utilization and the difference gets larger as the load increases. Another node configuration in which wavelength converters are equipped at the output ports has also been considered. In this case, even though both performance metrics of the group scheduling are almost the same as those of the immediate scheduling in the offered load range between 0.1 and 0.9, the group scheduling has lower wavelength conversion rate than the immediate scheduling by at least a factor of seven. This fact leads us to the conclusion that the group scheduling makes it possible to implement more economical OBS core nodes.

Semi-fragile Watermarking Scheme for H.264/AVC Video Content Authentication Based on Manifold Feature

  • Ling, Chen;Ur-Rehman, Obaid;Zhang, Wenjun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4568-4587
    • /
    • 2014
  • Authentication of videos and images based on the content is becoming an important problem in information security. Unfortunately, previous studies lack the consideration of Kerckhoffs's principle in order to achieve this (i.e., a cryptosystem should be secure even if everything about the system, except the key, is public knowledge). In this paper, a solution to the problem of finding a relationship between a frame's index and its content is proposed based on the creative utilization of a robust manifold feature. The proposed solution is based on a novel semi-fragile watermarking scheme for H.264/AVC video content authentication. At first, the input I-frame is partitioned for feature extraction and watermark embedding. This is followed by the temporal feature extraction using the Isometric Mapping algorithm. The frame index is included in the feature to produce the temporal watermark. In order to improve security, the spatial watermark will be encrypted together with the temporal watermark. Finally, the resultant watermark is embedded into the Discrete Cosine Transform coefficients in the diagonal positions. At the receiver side, after watermark extraction and decryption, temporal tampering is detected through a mismatch between the frame index extracted from the temporal watermark and the observed frame index. Next, the feature is regenerate through temporal feature regeneration, and compared with the extracted feature. It is judged through the comparison whether the extracted temporal watermark is similar to that of the original watermarked video. Additionally, for spatial authentication, the tampered areas are located via the comparison between extracted and regenerated spatial features. Experimental results show that the proposed method is sensitive to intentional malicious attacks and modifications, whereas it is robust to legitimate manipulations, such as certain level of lossy compression, channel noise, Gaussian filtering and brightness adjustment. Through a comparison between the extracted frame index and the current frame index, the temporal tempering is identified. With the proposed scheme, a solution to the Kerckhoffs's principle problem is specified.

Detection of View Reversal in a Stereo Video (스테레오 동영상에서의 좌우 영상 바뀜 검출 기법)

  • Son, Ji Deok;Song, Byung Cheol
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.5
    • /
    • pp.191-198
    • /
    • 2013
  • This paper proposes detection of view reversal in a stereo video using depth map and motion vector information. We obtain a depth map by using a stereo matching and divide the input image into foreground and background. Next, we obtain a motion vector field by using a motion estimation. In general, an occluded region is in background when foreground goes toward the adjacent background or the background goes toward the adjacent foreground. But, we will face with the change of foreground and background because their depths also change when view reversal occurs. Therefore, we can detect the view reversal in stereo videos by using the observation that the foreground goes toward the adjacent background or the background goes toward the adjacent foreground. The experimental results show that the proposed algorithm achieves good detection rate when the background region is sufficiently occluded by the moving foreground.

An Area-efficient Design of SHA-256 Hash Processor for IoT Security (IoT 보안을 위한 SHA-256 해시 프로세서의 면적 효율적인 설계)

  • Lee, Sang-Hyun;Shin, Kyung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.1
    • /
    • pp.109-116
    • /
    • 2018
  • This paper describes an area-efficient design of SHA-256 hash function that is widely used in various security protocols including digital signature, authentication code, key generation. The SHA-256 hash processor includes a padder block for padding and parsing input message, so that it can operate without software for preprocessing. Round function was designed with a 16-bit data-path that processed 64 round computations in 128 clock cycles, resulting in an optimized area per throughput (APT) performance as well as small area implementation. The SHA-256 hash processor was verified by FPGA implementation using Virtex5 device, and it was estimated that the throughput was 337 Mbps at maximum clock frequency of 116 MHz. The synthesis for ASIC implementation using a $0.18-{\mu}m$ CMOS cell library shows that it has 13,251 gate equivalents (GEs) and it can operate up to 200 MHz clock frequency.

Transmit Antenna Selection for Spatial Multiplexing with Per Antenna Rate Control and Successive Interference Cancellation (순차적인 간섭제거를 사용하는 공간 다중화 전송 MIMO 시스템의 전송 안테나 선택 방법에 관한 연구)

  • Mun Cheol;Jung Chang-Kyoo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6C
    • /
    • pp.560-569
    • /
    • 2005
  • This paper proposes an algorithm for transmit antenna selection in a multi-input multi-output(MIMO) spatial multiplexing system with per antenna rate control(PARC) and an ordered successive interference cancellation (OSIC) receiver. The active antenna subset is determined at the receiver and conveyed to the transmitter using feedback information on transmission rate per antenna. We propose a serial decision procedure consisting of a successive process that tests whether antenna selection gain exists when the antenna with the lowest pre-processing signal to interference and noise ratio(SINR) is discarded at each stage. Furthermore, we show that 'reverse detection ordering', whereby the signal with the lowest SINR is decoded at each stage of successive decoding, widens the disparities among fractions of the whole capacity allocated to each individual antenna and thus maximizes a gain of antenna selection. Numerical results show that the proposed reverse detection ordering based serial antenna selection approaches the closed-loop MIMO capacity and that it induces a negligible capacity loss compared with the heuristic selection strategy even with considerably reduced complexity.

Localization Estimation Using Artificial Intelligence Technique in Wireless Sensor Networks (WSN기반의 인공지능기술을 이용한 위치 추정기술)

  • Kumar, Shiu;Jeon, Seong Min;Lee, Seong Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39C no.9
    • /
    • pp.820-827
    • /
    • 2014
  • One of the basic problems in Wireless Sensor Networks (WSNs) is the localization of the sensor nodes based on the known location of numerous anchor nodes. WSNs generally consist of a large number of sensor nodes and recording the location of each sensor nodes becomes a difficult task. On the other hand, based on the application environment, the nodes may be subject to mobility and their location changes with time. Therefore, a scheme that will autonomously estimate or calculate the position of the sensor nodes is desirable. This paper presents an intelligent localization scheme, which is an artificial neural network (ANN) based localization scheme used to estimate the position of the unknown nodes. In the proposed method, three anchors nodes are used. The mobile or deployed sensor nodes request a beacon from the anchor nodes and utilizes the received signal strength indicator (RSSI) of the beacons received. The RSSI values vary depending on the distance between the mobile and the anchor nodes. The three RSSI values are used as the input to the ANN in order to estimate the location of the sensor nodes. A feed-forward artificial neural network with back propagation method for training has been employed. An average Euclidian distance error of 0.70 m has been achieved using a ANN having 3 inputs, two hidden layers, and two outputs (x and y coordinates of the position).

A Study on Efficient Design of PUF-Based RFID Authentication Protocol (PUF 기반 RFID 인증 프로토콜의 효율적 설계에 관한 연구)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.987-999
    • /
    • 2014
  • A PUF is embedded and implemented into a tag or a device, and outputs a noise y with an input of x, based on its own unique physical characteristics. Although x is used multiple times as inputs of PUF, the PUF outputs slightly different noises, ($y_1,{\cdots}y_n$), and also the PUF has tamper-resistance property, hence it has been widely used in cryptographic protocol. In this paper, we study how to design a PUF-based RFID authentication protocol in a secure and an efficient way. Compared with recent schemes, the proposed scheme guarantees both authentication and privacy of backword/forward under the compromise of long-term secrets stored in tag. And also, the most cost and time-consumming procedure, key recovery algorithm used with PUF, has been desgined in the side of RFID reader, not in the tag, and, consequently, gives possibility to minimize costs for implementation and running time.

Coordinates Transformation and Correction Techniques of the Distorted Omni-directional Image (왜곡된 전 방향 영상에서의 좌표 변환 및 보정)

  • Cha, Sun-Hee;Park, Young-Min;Cha, Eui-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • v.9 no.1
    • /
    • pp.816-819
    • /
    • 2005
  • This paper proposes a coordinate correction technique using the transformation of 3D parabolic coordinate function and BP(Back Propagation) neural network in order to solve space distortion problem caused by using catadioptric camera. Although Catadioptric camera can obtain omni-directional image at all directions of 360 degrees, it makes an image distorted because of an external form of lens itself. Accordingly, To obtain transformed ideal distance coordinate information from distorted image on 3 dimensional space, we use coordinate transformation function that uses coordinates of a focus at mirror in the shape of parabolic plane and another one which projected into the shape of parabolic from input image. An error of this course is modified by BP neural network algorithm.

  • PDF

Robust Hand-Region Detecting Based On The Structure (환경 변화에 강인한 구조 기반 손 영역 탐지)

  • Lim, Kyoung-Jin;Jeon, Mi-Yeon;Hong, Rok-Ki;Seo, Seong-Won;Shin, Mi-Hae;Kim, Eui-Jeong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2010.05a
    • /
    • pp.389-392
    • /
    • 2010
  • In this paper, it presents to detect location using structural information of hand from the input color images on Webcam and to recognize hand gestures. In this system, based on the skin color, the image changes a binary number and labels. Within each labeled area, we can find the Maximum Inscribed Circle using Voronoi Diagram. This circle can find the center of hand. And the circle extracts hand region from analyzing the ellipse elements to relate Maximum Inscribed Circle. We use the Maximum Inscribed Circle and the ellipse elements as characteristic of hand gesture recognition. In various environments, we cannot recognize the object that have similar colors like the background colors. But the proposed algorithm has the advantage that can be effectively eliminated about it.

  • PDF