• Title/Summary/Keyword: Mobile Communication system

Search Result 3,106, Processing Time 0.025 seconds

Object Segmentation/Detection through learned Background Model and Segmented Object Tracking Method using Particle Filter (배경 모델 학습을 통한 객체 분할/검출 및 파티클 필터를 이용한 분할된 객체의 움직임 추적 방법)

  • Lim, Su-chang;Kim, Do-yeon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1537-1545
    • /
    • 2016
  • In real time video sequence, object segmentation and tracking method are actively applied in various application tasks, such as surveillance system, mobile robots, augmented reality. This paper propose a robust object tracking method. The background models are constructed by learning the initial part of each video sequences. After that, the moving objects are detected via object segmentation by using background subtraction method. The region of detected objects are continuously tracked by using the HSV color histogram with particle filter. The proposed segmentation method is superior to average background model in term of moving object detection. In addition, the proposed tracking method provide a continuous tracking result even in the case that multiple objects are existed with similar color, and severe occlusion are occurred with multiple objects. The experiment results provided with 85.9 % of average object overlapping rate and 96.3% of average object tracking rate using two video sequences.

Extraction of Forensic Evidence and Hacking Attacks about IP-PBX (IP-PBX에 대한 해킹공격과 포렌식 증거 추출)

  • Park, Dea-Woo
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.197-200
    • /
    • 2013
  • Internet phone, communication cost and easy-to-use low-cost compared to the PSTN is a mobile phone of a conventional, and use of the Internet phone is spreading. Construction as part of the broadband convergence network(BCN), Internet service provider(KT, SKT, LG) has converted to Internet phone telephone network to all government agencies. In addition, members of the public also have an Internet phone service that you are using. In this paper, we analyze the hacking attack on IP-PBX in the IETF SIP-based that are used in Internet telephony, to the study. The test bed is constructed in the same way as the Internet telephone system to perform studies carried hacking attacks on IP-PBX, analyze the results and to extract evidence forensics. When used in crime by hacking the Internet telephone, we propose a method which can be used as evidence in forensic having legal effect.

  • PDF

Analysis of NCS Curriculum for Computer Science Major in the 4th Industrial Revolution (4차 산업혁명 시대의 컴퓨터과학 전공자를 위한 NCS 교육과정 분석)

  • Jung, Deok-gil
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.6
    • /
    • pp.855-860
    • /
    • 2018
  • The IT technologies applying to IoT(Internet of Things), Big Data, and AI(Artificial Intelligence) are needed in the era of 4th industrial revolution. So, the IT convergence courses of computer science major which will be required in the companies in order to prepare the crises of 4th industry revolution are necessary. And, one approach to cope with this problem is the training of IT convergence man power based on NCS(National Competency Standard) education. In this paper, we propose and analyze the NCS education courses for computer science major in order to teach the students who are needed in the Korean domestic companies preparing the 4th industrial revolution. The skills and applications of Chatbot, Blockchain, and CPS(Cyber Physical System) for the post mobile and post Internet technologies are included in the proposed courses.

Performance of cellular CDMA system for voice/data integrated service (음성/데이타 집적서비스를 위한 CDMA 셀룰러 시스템의 성능 연구)

  • 강군화;조동호
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.19 no.9
    • /
    • pp.1748-1758
    • /
    • 1994
  • Recently, the demand of mobile communication is rapidly increasing. Also, not only the voice service but also the nonvoice services such as data, FAX, and image service are required. Therefore, in this paper, the voice/data intergraed service methods that will be utilized as a basic core technology of the PCS systems are proposed and their performances are analyzed and compared by computer simulation. According to the simulation results, it could be seen that the performance of voice/data integrated PR-CDMA method is better than that of voice/data integrated broadband CDMA method using a dedicated terminal or a voice/data integrated terminal. The reason is that the voice/data integrated PR-CDMA method can overcome the weak points of CDMA protocol, such as a limitation of the fixed CDMA logical channel number and a falling-off in channel utilization, by using PRMA protocol as a multiple access method that the terminals to which a CDMA logical channel is assigned compete.

  • PDF

Mobility Management of M2M Devices with Grouping in the LTE System (LTE 시스템에서 그룹 기반 M2M 단말 이동성 관리)

  • Roh, Hee-Tae;Lee, Jang-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.37B no.12
    • /
    • pp.1119-1127
    • /
    • 2012
  • The one of features of M2M communications, which are recently attracted attention as a future business of mobile communications, is that there is a large number of devices compared with traditional communication services. Hence, the control signal that are generated by the M2M devices may cause a significant congestion in the network and in order to solve this problem, a standardization is progressing for reducing the redundant signaling by managing M2M devices as a group in 3GPP standardization. In this paper, we propose a method of group based mobility management by managing M2M devices that have the same mobility as a group. In the proposed method, M2M devices that have the same mobility are grouped by the Mobility Management Entity (MME) and the MME elects a group header among the M2M devices in the group. Then, the group header performs the Tracking Area Update (TAU) on behalf of the group members to reduce the signaling overhead of mobility management. With the proposed method, we can achieve 80% decrease of the signaling overhead of mobility management compared with the case where each M2M device individually performs its TAU procedure.

Low-complexity Joint Transmit/Receive Antenna Selection Algorithm for Multi-Antenna Systems (다중 안테나 시스템을 위한 낮은 복잡도의 송/수신안테나 선택 알고리즘)

  • Son, Jun-Ho;Kang, Chung-G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.10A
    • /
    • pp.943-951
    • /
    • 2006
  • Multi-input-multi-output (MIMO) systems are considered to improve the capacity and reliability of next generation mobile communication. However, the multiple RF chains associated with multiple antennas are costly in terms of size, power and hardware. Antenna selection is a low-cost low-complexity alternative to capture many of the advantages of MIMO systems. We proposed new joint Tx/Rx antenna selection algorithm with low complexity. The proposed algorithm is a method selects $L_R{\times}L_T$ channel matrix out of $L_R{\times}L_T$ entire channel gain matrix where $L_R{\times}L_T$ matrix selects alternate Tx antenna with Rx antenna which have the largest channel gain to maximize Frobenius norm. The feature of this algorithm is very low complexity compare with Exhaustive search which have optimum capacity. In case of $4{\times}4$ antennas selection out of $8{\times}8$ antennas, the capacity decreases $0.5{\sim}2dB$ but the complexity also decreases about 1/10,000 than optimum exhaustive search.

Improving Computational Thinking Abilities Through the Teaching of Mathematics with Sage ('컴퓨팅 사고력(Computational thinking)' 향상과 Sage 도구를 이용한 수학교육)

  • Park, Kyung-Eun;Lee, Sang-Gu
    • Communications of Mathematical Education
    • /
    • v.29 no.1
    • /
    • pp.19-33
    • /
    • 2015
  • Recently in major industrial areas, there has been a rapidly increasing demand for 'Computational Thinking', which is integrated with a computer's ability to think as a human world. Developed countries in the last 20 years naturally have been improving students' computational thinking as a way to solve math problems with CAS in the areas of mathematical reasoning, problem solving and communication. Also, textbooks reflected in the 2009 curriculum contain the applications of various CAS tools and focus on the improvement of 'Computational Thinking'. In this paper, we analyze the cases of mathematics education based on 'Computational Thinking' and discuss the mathematical content that uses the CAS tools including Sage for improving 'Computational Thinking'. Also, we show examples of programs based on 'Computational Thinking' for teaching Calculus in university.

New Proxy Blind Signcryption Scheme for Secure Multiple Digital Messages Transmission Based on Elliptic Curve Cryptography

  • Su, Pin-Chang;Tsai, Chien-Hua
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.11
    • /
    • pp.5537-5555
    • /
    • 2017
  • Having the characteristics of unlinkability, anonymity, and unforgeability, blind signatures are widely used for privacy-related applications such as electronic cash, electronic voting and electronic auction systems where to maintain the anonymity of the participants. Among these applications, the blinded message is needed for a certain purpose by which users delegate signing operation and communicate with each other in a trusted manner. This application leads to the need of proxy blind signature schemes. Proxy blind signature is an important type of cryptographic primitive to realize the properties of both blind signature and proxy signature. Over the past years, many proxy blind signature algorithms have been adopted to fulfill such task based on the discrete logarithm problem (DLP) and the elliptic curve discrete log problem (ECDLP), and most of the existing studies mainly aim to provide effective models to satisfy the security requirements concerning a single blinded message. Unlike many previous works, the proposed scheme applies the signcryption paradigm to the proxy blind signature technology for handling multiple blinded messages at a time based on elliptic curve cryptography (ECC). This innovative method thus has a higher level of security to achieve the security goals of both blind signature and proxy signature. Moreover, the evaluation results show that this proposed protocol is more efficient, consuming low communication overhead while increasing the volume of digital messages compared to the performance from other solutions. Due to these features, this design is able to be implemented in small low-power intelligent devices and very suitable and easily adoptable for e-system applications in pervasive mobile computing environment.

QoS-Oriented User Association in HetNet with a Backhaul Constraint (백홀 용량이 제한된 이기종 네트워크에서 QoS를 고려한 셀 선택 기법)

  • Yang, Chan S.;Kang, Chung G.
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.10
    • /
    • pp.654-663
    • /
    • 2014
  • Heterogeneous network (HetNet) with the various types of cells, e.g., with the different cell size and transmit power, has been introduced to improve the cell coverage and areal capacity in cellular mobile communication system. In this paper, we consider a practical situation in which all cells share the same wireless resource while some of them have a limited backhaul capacity. More specifically, we formularize a cell association problem that utilizes the minimum wireless resource while satisfying the quality of service (QoS) of all users in terms of their transmission time constraint, and propose a distributed algorithm to find the optimal solution. In the event of bottleneck at the backhaul link in some small cells, the proposed algorithm off-loads some users to the adjacent cell with the less congested backhaul capacity. Finally, we verify that the proposed algorithm supports the more numbers of users to satisfy the specified level of QoS than the conventional user association scheme under the limited access and backhaul capacities.

Simple Miniaturization Method of a Microstrip Patch Antenna (마이크로스트립 패치 안테나의 효율적 소형화 기법)

  • 이병제;이호준;강기조;김남영;이종철;김종환
    • The Journal of Korean Institute of Electromagnetic Engineering and Science
    • /
    • v.11 no.6
    • /
    • pp.920-928
    • /
    • 2000
  • In this paper, using newly proposed size reduction technique, the aperture coupled microstrip patch antenna for a repeater system in a mobile communication cellular band (824~849 MHz) is developed with a wide bandwidth, small size, light weight, and low cost. The resonant frequency of microstrip antennas is related to the electric field distribution of the radiating patch. The field strength of $TM_{01}$ mode of a rectangular patch antenna is strongest at each of the extremities of the radiating patch, but negligible at center. Therefore, the size of a patch antenna can be effectively minimized by inserting the narrow rectangular dielectric into just under the edges of the resonant Patch. This Paper also proposes the bandwidth improvement technique by using under-coupling technique with a tuning stub. The VSWR is less than 1.5 : 1 for the whole cellular band. The simulation tool was HFSS, Agilent Technologies, Inc.

  • PDF