• Title/Summary/Keyword: Internet-based checking

Search Result 79, Processing Time 0.02 seconds

Design and Development of Network for Housing Estate Security System

  • Nachin, Awacharin;Mitatha, Somsak;Dejhan, Kobchai;Kirdpipat, Patchanon;Miyanaga, Yoshikazu
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.1480-1484
    • /
    • 2003
  • This paper presents the design and development of network for housing estate security system. The system can cover up to 961 houses which can be up to 1,200 meters long transfer rate of 9,600 bps. This system uses checking and warning the abnormal situation. More over this system has ability to control switch on/off the electrical equipment in the house via AC line control system. The system consists of 4 parts. The first part is a security system of each house using MCS-51 microcontroller as a central processing unit scan 32 sensors and control 8 appliances and send alarm. The MCS-51 microcontroller received control signal via telephone used DTMF circuit. The second part is distributed two levels master/slave network implementing after RS-485 serial communication standard. The protocol its base on the OSI (Open Systems Interconnection) 7 layers protocol model design focus on speed, reliability and security of data that is transferred. The network security using encrypt by DES algorithm, message sequence, time stamp checking and authentication system when user to access and when connect new device to this system. Flow control in system is Poll/Select and Stop-and-Wait method. The third part is central server that using microcomputer which its main function are storing event data into database and can check history event. The final part is internet system which users can access their own homes via the Internet. This web service is based on a combination of SOAP, HTTP and TCP/IP protocols. Messages are exchanged using XML format [6]. In order to save the number of IP address, the system uses 1 IP address for the whole village in which all homes and appliance in this village are addressed using internal identification numbers. This proposed system gives the data transfer accuracy over 99.8% and maximum polling time is 1,120 ms.

  • PDF

Implementation of Mobile Robot Platform Based on Attitude Reference System for Pan-tilt Camera Control (팬틸트 카메라 제어를 위한 자세측정 장치 기반 이동로봇플랫폼 구현)

  • Park, Se-Jun
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.16 no.2
    • /
    • pp.201-206
    • /
    • 2016
  • Aircraft have a cross axis of the three each other for maintenance of aircraft position. It is called roll axis, pitch axis and yaw axis. Attitude reference system is a sensor for detecting a change of the three axis. In this paper, mobile robot platform install part of Pan-tilt and HMD attitude reference system, because of we use control camera. The acceleration sensor is very weak a lot of noise to vibration, also problem with data from process of mapping to the data problems to arise. However to solve this problem, we removed the average filter and Cosine Interpolation for Pan-tilt. Using capacity evaluation for outdoor environment for we are proposing. Mobile robot has HMD and equipped Pan-tilt. We control mobile robot camera. In this experiment result is little bit delay happening, however Pan-tilt camera is relatively stable control checking. Also, we will checking any terrain and slopes is no problem for mobile robot driving skills.

Road Slide Detection Algorithm Using CCD Camera (CCD 카메라를 이용한 도로 붕괴 사태 검출 알고리즘)

  • Kwon, Young-Man;Shin, Se-Yeon;Park, Young-Jin;Kim, Eun-Soo
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.2
    • /
    • pp.181-187
    • /
    • 2011
  • In this paper, we proposed the vision-based efficient algorithm for road slide detection like as destruction of road cut slope. The proposed algorithm defines the image region as non surveillance and surveillance which is further divided by road, boundary and non road region. After that, it find the moving block, remember the history of movement using the TTL(Time To Live) table, determine the road slide by checking the existence of moving blocks from non road region to road region together. We confirmed the proposed algorithm detected the road slide effectively through experiments.

Game-type Recognition Rehabilitation System based on Augmented Reality through Object Understanding (증강현실 기반의 물체 인식을 통한 게임형 인지 재활 시스템)

  • Lim, Myung-Jea;Jung, Hee-Woong;Lee, Ki-Young
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.11 no.3
    • /
    • pp.93-98
    • /
    • 2011
  • In this paper, we propose a game type cognitive rehabilitation system using marker-based augmented reality system for intelligence development of user. Existing cognitive rehabilitation with the help of others, or a keyboard or mouse operation required to relieve the discomfort, the marker card only control it led and is advanced the method which it applied. As a result, obtained through the camera calibration for image processing, and a Augmented Reality as well as mark detection. In this paper we presented a complete rotation of the model after checking through the whole form, through a combination of multiple markers by completing the interactive objects proceed with the rehabilitation process in a manner required by the target of interest to human rehabilitation and treatment.

New Finger-vein Recognition Method Based on Image Quality Assessment

  • Nguyen, Dat Tien;Park, Young Ho;Shin, Kwang Yong;Park, Kang Ryoung
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.7 no.2
    • /
    • pp.347-365
    • /
    • 2013
  • The performance of finger-vein recognition methods is limited by camera optical defocusing, the light-scattering effect of skin, and individual variations in the skin depth, density, and thickness of vascular patterns. Consequently, all of these factors may affect the image quality, but few studies have conducted quality assessments of finger-vein images. Therefore, we developed a new finger-vein recognition method based on image quality assessment. This research is novel compared with previous methods in four respects. First, the vertical cross-sectional profiles are extracted to detect the approximate positions of vein regions in a given finger-vein image. Second, the accurate positions of the vein regions are detected by checking the depth of the vein's profile using various depth thresholds. Third, the quality of the finger-vein image is measured by using the number of detected vein points in relation to the depth thresholds, which allows individual variations of vein density to be considered for quality assessment. Fourth, by assessing the quality of input finger-vein images, inferior-quality images are not used for recognition, thereby enhancing the accuracy of finger-vein recognition. Experiments confirmed that the performance of finger-vein recognition systems that incorporated the proposed quality assessment method was superior to that of previous methods.

A Secure Medical Information Management System for Wireless Body Area Networks

  • Liu, Xiyao;Zhu, Yuesheng;Ge, Yu;Wu, Dajun;Zou, Beiji
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.1
    • /
    • pp.221-237
    • /
    • 2016
  • The wireless body area networks (WBANs) consist of wearable computing devices and can support various healthcare-related applications. There exist two crucial issues when WBANs are utilized for healthcare applications. One is the protection of the sensitive biometric data transmitted over the insecure wireless channels. The other is the design of effective medical management mechanisms. In this paper, a secure medical information management system is proposed and implemented on a TinyOS-based WBAN test bed to simultaneously address these two issues. In this system, the electronic medical record (EMR) is bound to the biometric data with a novel fragile zero-watermarking scheme based on the modified visual secret sharing (MVSS). In this manner, the EMR can be utilized not only for medical management but also for data integrity checking. Additionally, both the biometric data and the EMR are encrypted, and the EMR is further protected by the MVSS. Our analysis and experimental results demonstrate that the proposed system not only protects the confidentialities of both the biometric data and the EMR but also offers reliable patient information authentication, explicit healthcare operation verification and undeniable doctor liability identification for WBANs.

Self-Adaptive Termination Check of Min-Sum Algorithm for LDPC Decoders Using the First Two Minima

  • Cho, Keol;Chung, Ki-Seok
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.4
    • /
    • pp.1987-2001
    • /
    • 2017
  • Low-density parity-check (LDPC) codes have attracted a great attention because of their excellent error correction capability with reasonably low decoding complexity. Among decoding algorithms for LDPC codes, the min-sum (MS) algorithm and its modified versions have been widely adopted due to their high efficiency in hardware implementation. In this paper, a self-adaptive MS algorithm using the difference of the first two minima is proposed for faster decoding speed and lower power consumption. Finding the first two minima is an important operation when MS-based LDPC decoders are implemented in hardware, and the found minima are often compressed using the difference of the two values to reduce interconnection complexity and memory usage. It is found that, when these difference values are bounded, decoding is not successfully terminated. Thus, the proposed method dynamically decides whether the termination-checking step will be carried out based on the difference in the two found minima. The simulation results show that the decoding speed is improved by 7%, and the power consumption is reduced by 16.34% by skipping unnecessary steps in the unsuccessful iteration without any loss in error correction performance. In addition, the synthesis results show that the hardware overhead for the proposed method is negligible.

Enhancing the Session Security of Zen Cart based on HMAC-SHA256

  • Lin, Lihui;Chen, Kaizhi;Zhong, Shangping
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.1
    • /
    • pp.466-483
    • /
    • 2017
  • Zen Cart is an open-source online store management system. It is used all over the world because of its stability and safety. Today, Zen Cart's session security mechanism is mainly used to verify user agents and check IP addresses. However, the security in verifying the user agent is lower and checking the IP address can affect the user's experience. This paper, which is based on the idea of session protection as proposed by Ben Adida, takes advantage of the HTML5's sessionStorage property to store the shared keys that are used in HMAC-SHA256 encryption. Moreover, the request path, current timestamp, and parameter are encrypted by using HMAC-SHA256 in the client. The client then submits the result to the web server as per request. Finally, the web server recalculates the HMAC-SHA256 value to validate the request by comparing it with the submitted value. In this way, the Zen Cart's open-source system is reinforced. Owing to the security and integrity of the HMAC-SHA256 algorithm, it can effectively protect the session security. Analysis and experimental results show that this mechanism can effectively protect the session security of Zen Cart without affecting the original performance.

A High-Quality Image Authentication Scheme for AMBTC-compressed Images

  • Lin, Chia-Chen;Huang, Yuehong;Tai, Wei-Liang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4588-4603
    • /
    • 2014
  • In this paper, we present a high-quality image authentication scheme based on absolute moment block truncation coding. In the proposed scheme, we use the parity of the bitmap (BM) to generate the authentication code for each compressed image block. Data hiding is used to authenticate whether the content has been altered or not. For image authentication, we embed the authentication code to quantization levels of each image block compressed by absolute moment block truncation coding (AMBTC) which will be altered when the host image is manipulated. The embedding position is generated by a pseudo-random number generator for security concerned. Besides, to improve the detection ability we use a hierarchical structure to ensure the accuracy of tamper localization. A watermarked image can be precisely inspected whether it has been tampered intentionally or incautiously by checking the extracted watermark. Experimental results demonstrated that the proposed scheme achieved high-quality embedded images and good detection accuracy, with stable performance and high expansibility. Performance comparisons with other block-based data hiding schemes are provided to demonstrate the superiority of the proposed scheme.

Reduced-Pipelined Duty Cycle MAC Protocol (RP-MAC) for Wireless Sensor Network

  • Nguyen, Ngoc Minh;Kim, Myung Kyun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.5
    • /
    • pp.2433-2452
    • /
    • 2017
  • Recently, the pipeline-forwarding has been proposed as a new technique to resolve the end-to-end latency problem of the duty-cycle MAC protocols in Wireless Sensor Networks (WSNs). Some protocols based on this technique such as PMAC and PRI-MAC have shown an improvement not only in terms of reducing end-to-end latency but also in terms of reducing power consumption. In these protocols, however, the sensor nodes still waste a significant amount of energy for unnecessary idle listening during contention period of upstream nodes to check the channel activity. This paper proposes a new pipeline-forwarding duty-cycle MAC protocol, named RP-MAC (Reduced Pipelined duty-cycle MAC), which tries to reduce the waste of energy. By taking advantage of ACK mechanism and shortening the handshaking procedure, RP-MAC minimizes the time for checking the channel and therefore reduces the energy consumption due to unnecessary idle listening. When comparing RP-MAC with the existing solution PRI-MAC and RMAC, our QualNet-based simulation results show a significant improvement in term of energy consumption.