• Title/Summary/Keyword: Internet Uses

Search Result 1,491, Processing Time 0.02 seconds

A Self-adjusting CN(Car Navigation) Algorithm on Digital Map using Traffic and Directional Information (디지탈 맵에서의 동적환경 적응형 차량 항법 알고리즘)

  • 이종헌;김영민;이상준
    • Journal of Internet Computing and Services
    • /
    • v.3 no.6
    • /
    • pp.35-41
    • /
    • 2002
  • The Car Navigation System(CNS) requires lots of memory and calculating time because it works on the large and complex digital map. And the traffic circumstances vary time by time, so the traffic informations should be processed if we want to get mere realistic result. This paper proposes an effective path searching algorithm which uses less memories and calculating time by applying directional information between the starting place and destination place and by using realtime traffic informations.

  • PDF

Entropy-based Spectrum Sensing for Cognitive Radio Networks in the Presence of an Unauthorized Signal

  • So, Jaewoo
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.1
    • /
    • pp.20-33
    • /
    • 2015
  • Spectrum sensing is a key component of cognitive radio. The prediction of the primary user status in a low signal-to-noise ratio is an important factor in spectrum sensing. However, because of noise uncertainty, secondary users have difficulty distinguishing between the primary signal and an unauthorized signal when an unauthorized user exists in a cognitive radio network. To resolve the sensitivity to the noise uncertainty problem, we propose an entropy-based spectrum sensing scheme to detect the primary signal accurately in the presence of an unauthorized signal. The proposed spectrum sensing uses the conditional entropy between the primary signal and the unauthorized signal. The ability to detect the primary signal is thus robust against noise uncertainty, which leads to superior sensing performance in a low signal-to-noise ratio. Simulation results show that the proposed spectrum sensing scheme outperforms the conventional entropy-based spectrum sensing schemes in terms of the primary user detection probability.

A Composite LMMSE Channel Estimator for Spectrum-Efficient OFDM Transmit Diversity

  • Seo, Jeong-Wook;Jeon, Won-Gi;Paik, Jong-Ho;Jo, Min-Ho;Kim, Dong-Ku
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.4
    • /
    • pp.209-221
    • /
    • 2008
  • In this paper, we propose a subcarrier allocation method and a composite linear minimum mean square error (LMMSE) channel estimator to increase spectrum efficiency in orthogonal frequency division multiplexing (OFDM) transmit diversity. The pilot symbols for OFDM transmit (Alamouti) diversity are exclusively allocated in two OFDM symbols in different antennas, which causes serious degradation of spectrum efficiency. To reduce the number of pilot symbols, our subcarrier allocation method uses repetition-coded data symbols, and the proposed channel estimator maintains good bit error rate (BER) performance.

Hierarchical Age Estimation based on Dynamic Grouping and OHRank

  • Zhang, Li;Wang, Xianmei;Liang, Yuyu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.7
    • /
    • pp.2480-2495
    • /
    • 2014
  • This paper describes a hierarchical method for image-based age estimation that combines age group classification and age value estimation. The proposed method uses a coarse-to-fine strategy with different appearance features to describe facial shape and texture. Considering the damage to continuity between neighboring groups caused by fixed divisions during age group classification, a dynamic grouping technique is employed to allow non-fixed groups. Based on the given group, an ordinal hyperplane ranking (OHRank) model is employed to transform age estimation into a series of binary enquiry problems that can take advantage of the intrinsic correlation and ordinal information of age. A set of experiments on FG-NET are presented and the results demonstrate the validity of our solution.

Text-based Image Indexing and Retrieval using Formal Concept Analysis

  • Ahmad, Imran Shafiq
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.2 no.3
    • /
    • pp.150-170
    • /
    • 2008
  • In recent years, main focus of research on image retrieval techniques is on content-based image retrieval. Text-based image retrieval schemes, on the other hand, provide semantic support and efficient retrieval of matching images. In this paper, based on Formal Concept Analysis (FCA), we propose a new image indexing and retrieval technique. The proposed scheme uses keywords and textual annotations and provides semantic support with fast retrieval of images. Retrieval efficiency in this scheme is independent of the number of images in the database and depends only on the number of attributes. This scheme provides dynamic support for addition of new images in the database and can be adopted to find images with any number of matching attributes.

Robust Biometric-based Anonymous User Authenticated Key Agreement Scheme for Telecare Medicine Information Systems

  • Jung, Jaewook;Moon, Jongho;Won, Dongho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.7
    • /
    • pp.3720-3746
    • /
    • 2017
  • At present, numerous hospitals and medical institutes have implemented Telecare Medicine Information Systems (TMIS) with authentication protocols to enable secure, efficient electronic transactions for e-medicine. Numerous studies have investigated the use of authentication protocols to construct efficient, robust health care services, and recently, Liu et al. presented an authenticated key agreement mechanism for TMIS. They argued that their mechanism can prevent various types of attacks and preserve a secure environment. However, we discovered that Liu et al.'s mechanism presents some vulnerabilities. First, their mechanism uses an improper identification process for user biometrics; second, the mechanism is not guaranteed to protect against server spoofing attacks; third, there is no session key verification process in the authentication process. As such, we describe how the above-mentioned attacks operate and suggest an upgraded security mechanism for TMIS. We analyze the security and performance of our method to show that it improves security relative to comparable schemes and also operates in an efficient manner.

Development of a Web-based Dynamic Simulation System for Multibody Systems (웹기반 범용 다물체 동역학 시뮬레이션 시스템 개발)

  • 한형석;이재경
    • Journal of the Korean Society for Precision Engineering
    • /
    • v.20 no.8
    • /
    • pp.194-204
    • /
    • 2003
  • A Web-based dynamic simulation system, called O-DYN, for multibody dynamic systems is developed. All the interfaces of the system are accessible via Web browsers, such as Netscape or Explorer. The system uses a block-diagram type O-DYN/Modeler developed in JAVA Applet as a preprocessor. The O-DYN postprocessor composed of O-DYN/Plotter and O-DYN/Animator is developed in JAVA Applet. The O-DYN/Solver for predicting the dynamic behavior is run on the server. Anyone who wants to simulate the dynamics of multibody systems or share results data can access the analysis system over the Internet regardless of their OS, platform, or location.

Implementation of a Portable Identification System using Iris Recognition Techniques (홍채인식을 이용한 정보보안을 위한 휴대용 신분인식기 개발)

  • Joo, Sang-Hyun;Yang, Woo-Suk
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.5
    • /
    • pp.107-112
    • /
    • 2011
  • In this paper, we introduce the implementation of the security system using iris recognition. This system acquires images with infrared camera and extracts the 2D code from a infrared image which uses scale-space filtering and concavity. We examine the system by (i) extract 2D code and (ii) compare the code that stored on the server (iii) measure FAR and FRR using pattern matching. Experiment results show that the proposed method is very suitable.

Design and Implementation of LonWorks/IP Router for Network-based Control (네트워크 기반 제어를 위한 Lonworks/IP 라우터의 설계 및 구현)

  • Hyun, Jin-Waok;Choi, Gi-Sang;Choi, Gi-Heung
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.409-412
    • /
    • 2007
  • Demand for the technology for access to device control network in industry and for access to building automation system via internet is on the increase. In such technology integration of a device control network with a data network such as internet and organizing wide-ranging DCS(distributed control system) is needed, and it can be realized in the framework of VDN(virtual device network). Specifications for device control network and data network are quite different because of the differences in application. So a router that translates the communication protocol between device control network and data network, and efficiently transmits information to destination is needed for implementation of the VDN(virtual device network). This paper proposes the concept of NCS(networked control system) based on VDN(virtual device network) and suggests the routing algorithm that uses embedded system.

  • PDF

Remote Navigation System for Mobile Robot (이동 로봇의 원격 주행 시스템)

  • Kim, Jong-Seon;Yu, Yeong-Seon;Kim, Sung-Ho;Joo, Young-Hoon
    • Proceedings of the KIEE Conference
    • /
    • 2007.04a
    • /
    • pp.325-327
    • /
    • 2007
  • In this paper, we implement the internet- based remote control system for intelligent robot. For remote control of the robot, it uses the socket communication of the TCP/IP. It consists of- the user interface and the robot control interface. Robot control interface transmits the navigation and environmental informations of the robot into the user interface. In order to transmit the large environmental images, a JPEG compression algorithm is used. User interface displays the navigation status of the robot and transmits the navigation order into the robot control interface. Also, we propose the design method of the fuzzy controller using navigation data acquired by expert's knowledge or experience. To do this, we use virus-evolutionary genetic algorithm(VEGA). Finally, we have shown the proposed system can be operated through the real world experimentations.

  • PDF