• Title/Summary/Keyword: Internet Uses

Search Result 1,491, Processing Time 0.023 seconds

NPFAM: Non-Proliferation Fuzzy ARTMAP for Image Classification in Content Based Image Retrieval

  • Anitha, K;Chilambuchelvan, A
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.7
    • /
    • pp.2683-2702
    • /
    • 2015
  • A Content-based Image Retrieval (CBIR) system employs visual features rather than manual annotation of images. The selection of optimal features used in classification of images plays a key role in its performance. Category proliferation problem has a huge impact on performance of systems using Fuzzy Artmap (FAM) classifier. The proposed CBIR system uses a modified version of FAM called Non-Proliferation Fuzzy Artmap (NPFAM). This is developed by introducing significant changes in the learning process and the modified algorithm is evaluated by extensive experiments. Results have proved that NPFAM classifier generates a more compact rule set and performs better than FAM classifier. Accordingly, the CBIR system with NPFAM classifier yields good retrieval.

Complex-Channel Blind Equalization Using Cross-Correntropy (상호 코렌트로피를 이용한 복소 채널 블라인드 등화)

  • Kim, Nam-Yong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.5
    • /
    • pp.19-26
    • /
    • 2010
  • The criterionmaximizing cross-correntropy (MCC) of two different random variables has yielded superior performance comparing to mean squared error criterion. In this paper we present a complex-valued blind equalizer algorithm for QAM and complex channel environments based on cross-correntropy criterion which uses, as two variables, equalizer output PDF and Parzen PDF estimate of a self-generated symbol set. Simulation results show significantly enhanced performance of symbol-point concentration with no phase rotation in complex-channel communication.

Image Watermarking Scheme Based on Scale-Invariant Feature Transform

  • Lyu, Wan-Li;Chang, Chin-Chen;Nguyen, Thai-Son;Lin, Chia-Chen
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.10
    • /
    • pp.3591-3606
    • /
    • 2014
  • In this paper, a robust watermarking scheme is proposed that uses the scale-invariant feature transform (SIFT) algorithm in the discrete wavelet transform (DWT) domain. First, the SIFT feature areas are extracted from the original image. Then, one level DWT is applied on the selected SIFT feature areas. The watermark is embedded by modifying the fractional portion of the horizontal or vertical, high-frequency DWT coefficients. In the watermark extracting phase, the embedded watermark can be directly extracted from the watermarked image without requiring the original cover image. The experimental results showed that the proposed scheme obtains the robustness to both signal processing and geometric attacks. Also, the proposed scheme is superior to some previous schemes in terms of watermark robustness and the visual quality of the watermarked image.

Intention to Use of Personal Cloud Services: Focusing on the Security Factors (보안요인을 중심으로 한 개인용 클라우드 서비스 사용의도)

  • Lee, Jae Seok;Kim, Kyoung-jae
    • Knowledge Management Research
    • /
    • v.18 no.4
    • /
    • pp.237-260
    • /
    • 2017
  • Recently, with the proliferation of smart phones and mobile devices and the increase in the speed of mobile Internet, IT services are increasingly used in smart phones and mobile devices in a different way from the past. That is, a cloud service that downloads and uses data stored in the server in real time is expanding, and as a result, the security due to the continuous Internet connection of the user becomes a problem. In this study, we analyzed the relationship between factors affecting the continuous use of personal cloud service by using technology acceptance model. In addition to the technology acceptance model, confidentiality, privacy, accessibility, innovation, and self-efficacy were extracted from the existing research with emphasis on the characteristics of the cloud service and security factors. Moreover, the difference of intention to use among genders was verified through structural equation modeling with survey data from 262 personal cloud service users.

A Study on Characteristics of Flux-offset-type Fault Current limiter according to Initial fault current

  • Jung, Byungik;Hwang, Junwon;Choi, Hyosang
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.117-122
    • /
    • 2015
  • Our research team proposed a flux-offset type fault current limiter as a new limiter. The flux-offset type fault current limiter uses a fault current limit technology based on the flux offset principle of the primary and secondary windings of a transformer. Stable fault current limit characteristics were achieved through a preliminary study. However, it was discovered that the initial fault current was not limited. Therefore, in this paper, a high-speed interrupter and a superconducting element were separately applied to the secondary winding of the flux-offset type fault current limiter and the operating characteristics were comparatively analyzed. In the experiment, when the superconducting element was applied to the secondary winding of the transformer, the initial fault current was limited while the limitation in the operation time was further shortened.

Implementation of real time VJing responding to user's motion

  • Jung, Haehyun;Kim, Hyunggi
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.7 no.2
    • /
    • pp.41-50
    • /
    • 2015
  • As various media have developed in modern society, frequency of use of interactive media has increased which makes interactive function that uses and handles projection mapping and LED screen in set design of broadcasting, concert, play, musical and EDM(Electronic dance music) in real time possible. Development of various media led today's viewers to have higher cultural desire and the need of various interactive performance contents to receive more attention.[1]. This thesis implemented real time VJing that responds to user's motion based on existing H/W by utilizing real time interactive elements.

An Improved Cancelable Fingerprint Template Encryption System Research

  • Wang, Feng;Han, Bo;Niu, Lei;Wang, Ya
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.2237-2253
    • /
    • 2017
  • For the existing security problem based on Fuzzy Vault algorithm, we propose a cancelable fingerprint template encryption scheme in this paper. The main idea is to firstly construct an irreversible transformation function, and then apply the function to transform the original template and template information is stored after conversion. Experimental results show it effectively prevents the attack from fingerprint template data and improves security of the system by using minutiae descriptor to encrypt abscissa of the vault. The experiment uses public FVC2004 fingerprint database to test, result shows that although the recognition rate of the proposed algorithm is slightly lower than the original program, but the improved algorithm security and complexity are better, and therefore the proposed algorithm is feasible in general.

Web Server Application in The Operation of Chip Mounter (Chip Mounter 운영에서 Web Server 활용)

  • 임선종;김선호
    • Proceedings of the Korean Society of Precision Engineering Conference
    • /
    • 2003.06a
    • /
    • pp.172-175
    • /
    • 2003
  • The enterprise find a solution to the problems such as a reduction of manufacturing period, accurate analysis for customer demand, improvement for customer service and rise of manufacture accomplishment. Internet is a good solution to such problems. Internet offers WWW(World Wide Web), remote control, file transfer and e-mail service. Among the services, WWW takes large portion because of convenient GUI, easy information search and unlimited information registration. Remote Monitoring Server(RMS) system that uses network service is constructed for chip mounter. Hardware base consists of RMS, chip mounter and C/S(Customer Service) server. Software includes DBMS and various modules in server home page. This provide product number, bad product number, trouble code, content and countermeasure in real-time information module, user information in setup module, detailed error information in fault diagnosis module, fault history in fault history module and customer information in customer service management module.

  • PDF

A Novel Cryptosystem Based on Steganography and Automata Technique for Searchable Encryption

  • Truong, Nguyen Huy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.5
    • /
    • pp.2258-2274
    • /
    • 2020
  • In this paper we first propose a new cryptosystem based on our data hiding scheme (2,9,8) introduced in 2019 with high security, where encrypting and hiding are done at once, the ciphertext does not depend on the input image size as existing hybrid techniques of cryptography and steganography. We then exploit our automata approach presented in 2019 to design two algorithms for exact and approximate pattern matching on secret data encrypted by our cryptosystem. Theoretical analyses remark that these algorithms both have O(n) time complexity in the worst case, where for the approximate algorithm, we assume that it uses ⌈(1-ε)m)⌉ processors, where ε, m and n are the error of our string similarity measure and lengths of the pattern and secret data, respectively. In searchable encryption, our cryptosystem is used by users and our pattern matching algorithms are performed by cloud providers.

Stereo Vision Based Balancing System Results

  • Tserendondog, Tengis;Amar, Batmunkh;Ragchaa, Byambajav
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.8 no.1
    • /
    • pp.1-6
    • /
    • 2016
  • Keeping a system in stable state is one of the important issues of control theory. The main goal of our basic research is stability of unmanned aerial vehicle (quadrotor). This type of system uses a variety of sensors to stabilize. In control theory and automatic control system to stabilize any system it is need to apply feedback control based on information from sensors. Our aim is to provide balance based on the 3D spatial information in real time. We used PID control method for stabilization of a seesaw balancing system and the article presents our experimental results. This paper presents the possibility of balancing of seesaw system based on feedback information from stereo vision system only.