• Title/Summary/Keyword: Self-initialization

Search Result 16, Processing Time 0.023 seconds

Certificate Issuing using Proxy Signature and Threshold Signature in Self-initialized Ad Hoc Network (자기 초기화하는 Ad Hoc 네트워크에서의 대리 서명과 임계 서명 기법을 이용한 인증서 발급 기법)

  • Kang, Jeon-Il;Choi, Young-Geun;Kim, Koon-Soon;Nyang, Dae-Hun
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.3
    • /
    • pp.55-67
    • /
    • 2007
  • In ad hoc network, especially in the environment which the system authority only exists at the beginning of the network, it is very important problem how to issue the certificates in self-initialized public key scheme that a node generates its certificate with public and private key pair and is signed that by the system authority. In order to solve this problem, early works present some suggestions; remove the system authority itself and use certificate chain, or make nodes as system authorities for other nodes' certificates. In this paper, we suggest another solution, which can solve many problem still in those suggestions, using proxy signature and threshold signature, and prove its performance using simulation and analyse its security strength in many aspects.

Deformable Model using Hierarchical Resampling and Non-self-intersecting Motion (계층적 리샘플링 및 자기교차방지 운동성을 이용한 변형 모델)

  • 박주영
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.29 no.11
    • /
    • pp.589-600
    • /
    • 2002
  • Deformable models offer an attractive approach for extracting three-dimensional boundary structures from volumetric images. However, conventional deformable models have three major limitations - sensitive to initial condition, difficult to represent complex boundaries with severe object concavities and protrusions, and self-intersective between model elements. This paper proposes a deformable model that is effective to extract geometrically complex boundary surfaces by improving away the limitations of conventional deformable models. First, the proposed deformable model resamples its elements hierarchically based on volume image pyramid. The hierarchical resampling overcomes sensitivity to initialization by extracting the boundaries of objects in a multiscale scheme and enhances geometric flexibility to be well adapted to complex image features by refining and regularizing the size of model elements based on voxel size. Second, the physics-based formulation of our model integrates conventional internal and external forces, as well as a non-self-intersecting force. The non-self-intersecting force effectively prevents collision or crossing over between non-neighboring model elements by pushing each other apart if they are closer than a limited distance. We show that the proposed model successively extracts the complex boundaries including severe concavities and protrusions, neither depending on initial position nor causing self-intersection, through the experiments on several computer-generated volume images and brain MR volume images.

A proposal of binary sequence generator, Threshold Clock-Controlled LM-128 (클럭 조절 방식의 임계 클럭 조절형 LM-128 이진 수열 발생기 제안)

  • Jo, Jung-bok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.5
    • /
    • pp.1104-1109
    • /
    • 2015
  • Due to the rapid growth in digital contents, it is important for us to design a high speed and secure encryption algorithm which is able to comply with the existing and future needs. This paper proposes an alternative approach for self-decimated LM-128 summation sequence generator, which will generate a higher throughput if compared to the conventional generator. We design and implement a threshold clock-controlled LM-128 and prove that it has a lower clock cycle and hence giving a higher key stream generation speed. The proposed threshold clock-control LM-128 generator consists of 256 bits inner state with 128 bits secret key and initialization vector. The cipher achieves a security level of 128 bits to be adapted to the digital contents security with high definition and high quality.

Real-time Human Pose Estimation using RGB-D images and Deep Learning

  • Rim, Beanbonyka;Sung, Nak-Jun;Ma, Jun;Choi, Yoo-Joo;Hong, Min
    • Journal of Internet Computing and Services
    • /
    • v.21 no.3
    • /
    • pp.113-121
    • /
    • 2020
  • Human Pose Estimation (HPE) which localizes the human body joints becomes a high potential for high-level applications in the field of computer vision. The main challenges of HPE in real-time are occlusion, illumination change and diversity of pose appearance. The single RGB image is fed into HPE framework in order to reduce the computation cost by using depth-independent device such as a common camera, webcam, or phone cam. However, HPE based on the single RGB is not able to solve the above challenges due to inherent characteristics of color or texture. On the other hand, depth information which is fed into HPE framework and detects the human body parts in 3D coordinates can be usefully used to solve the above challenges. However, the depth information-based HPE requires the depth-dependent device which has space constraint and is cost consuming. Especially, the result of depth information-based HPE is less reliable due to the requirement of pose initialization and less stabilization of frame tracking. Therefore, this paper proposes a new method of HPE which is robust in estimating self-occlusion. There are many human parts which can be occluded by other body parts. However, this paper focuses only on head self-occlusion. The new method is a combination of the RGB image-based HPE framework and the depth information-based HPE framework. We evaluated the performance of the proposed method by COCO Object Keypoint Similarity library. By taking an advantage of RGB image-based HPE method and depth information-based HPE method, our HPE method based on RGB-D achieved the mAP of 0.903 and mAR of 0.938. It proved that our method outperforms the RGB-based HPE and the depth-based HPE.

A Modified Decision-Directed LMS Algorithm (수정된 DD LMS 알고리즘)

  • Oh, Kil Nam
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.7
    • /
    • pp.3-8
    • /
    • 2016
  • We propose a modified form of the decision-directed least mean square (DD LMS) algorithm that is widely used in the optimization of self-adaptive equalizers, and show the modified version greatly improves the initial convergence properties of the conventional algorithm. Existing DD LMS regards the difference between a equalizer output and a quantization value for it as an error, and achieves an optimization of the equalizer based on minimizing the mean squared error cost function for the equalizer coefficients. This error generating method is useful for binary signal or a single-level signals, however, in the case of multi-level signals, it is not effective in the initialization of the equalizer. The modified DD LMS solves this problem by modifying the error generation. We verified the usefulness and performance of the modified DD LMS through experiments with multi-level signals under distortions due to intersymbol interference and additive noise.

Probabilistic Neighbor Discovery Algorithm in Wireless Ad Hoc Networks (무선 애드혹 네트워크에서의 확률적 이웃 탐색 기법)

  • Song, Taewon;Park, Hyunhee;Pack, Sangheon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39B no.9
    • /
    • pp.561-569
    • /
    • 2014
  • In wireless ad hoc networks, neighbor discovery is essential in the network initialization and the design of routing, topology control, and medium access control algorithms. Therefore, efficient neighbor discovery algorithms should be devised for self-organization in wireless ad hoc networks. In this paper, we propose a probabilistic neighbor discovery (PND) algorithm, which aims at reducing the neighbor discovery time by adjusting the transmission probability of advertisement messages through the multiplicative-increase/multiplicative-decrease (MIMD) policy. To further improve PND, we consider the collision detection (CD) capability in which a device can distinguish between successful reception and collision of advertisement messages. Simulation results show that the transmission probabilities of PND and PND with CD converge on the optimal value quickly although the number of devices is unknown. As a result, PND and PND with CD can reduce the neighbor discovery time by 15.6% to 57.0% compared with the ALOHA-like neighbor discovery algorithm.