• Title/Summary/Keyword: communication networks

Search Result 5,470, Processing Time 0.034 seconds

Recognition of Passports using Enhanced Neural Networks and Photo Authentication (개선된 신경망과 사진 인증을 이용한 여권 인식)

  • Kim Kwang-Baek;Park Hyun-Jung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.5
    • /
    • pp.983-989
    • /
    • 2006
  • Current emigration and immigration control inspects passports by the naked eye, registers them by manual input, and compares them with items of database. In this paper, we propose the method to recognize information codes of passports. The proposed passport recognition method extracts character-rows of information codes by applying sobel operator, horizontal smearing, and contour tracking algorithm. The extracted letter-row regions is binarized. After a CDM mask is applied to them in order to recover the individual codes, the individual codes are extracted by applying vertical smearing. The recognizing of individual codes is performed by the RBF network whose hidden layer is applied by ART 2 algorithm and whose learning between the hidden layer and the output layer is applied by a generalized delta learning method. After a photo region is extracted from the reference of the starting point of the extracted character-rows of information codes, that region is verified by the information of luminance, edge, and hue. The verified photo region is certified by the classified features by the ART 2 algorithm. The comparing experiment with real passport images confirmed the good performance of the proposed method.

Design of Reed-Solomon Decoder for High Speed Data Networks

  • Park, Young-Shig;Park, Heyk-Hwan
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.8 no.1
    • /
    • pp.170-178
    • /
    • 2004
  • In this work a high speed 8-error correcting Reed-Solomon decoder is designed using the modified Euclid algorithm. Decoding algorithm of Reed-Solomon codes consists of four steps, those are, compute syndromes, find error-location polynomials, decide error-locations, and determine error values. The decoding speed is increased and the latency is reduced by using the parallel architecture in the syndrome generator and a faster clock speed in the modified Euclid algorithm block. In addition. the error locator polynomial in Chien search block is separated into even and odd terms to increase the overall speed of the decoder. All the functionalities of the decoder are verified first through C++ programs. Verilog is used for hardware description, and then the decoder is synthesized with a $.25{\mu}m$ CMOS TML library. The functionalities of the chip is also verified through test vectors. The clock speed of the chip is 250MHz, and the maximum data rate is 1Gbps.

Indoor Precise Positioning Technology for Vehicles Using Floor Marks (플로어 마크를 이용한 차량용 실내 정밀 측위 기술)

  • Park, Ji-hoon;Lee, Jaesung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.19 no.10
    • /
    • pp.2321-2330
    • /
    • 2015
  • A variety of studies for indoor positioning are now being in progress due to the limit of GPS that becomes obsolete in the room. However, most of them are based on private wireless networks and the situation is difficult to commercialize them since they are expensive in terms of installation and maintenance costs, non-real-time, and not accurate. This paper applies the mark recognition algorithm used in existing augmented reality applications to the indoor vehicle positioning application. It installs floor marks on the ground, performs the perspective transformation on it and decodes the internal data of the mark and, as a result, it obtains an absolute coordinate. Through the geometric analysis, it obtains current position (relative coordinates) of a vehicle away from the mark and the heading direction of the vehicle. The experiment results show that when installing the marks every 5 meter, an error under about 30 cm occurred. In addition, it is also shown that the mark recognition rate is 43.2% of 20 frames per second at the vehicle speed of 20km/h. Thus, it is thought that this idea is commercially valuable.

A Design of a Personnel Control System Using UHF-RFID in Shipping (UHF 대역 RFID를 이용한 선박내 인원관리 시스템 설계)

  • Cha, Jin-Man;Kim, Myeung-Hwan;Park, Yeoun-Sik;Seong, Gil-Yeong;Lee, Sang-Uk
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.10a
    • /
    • pp.832-835
    • /
    • 2008
  • An information-oriented basis in today's society has been changing fast, and the desire for connectivity has caused an exponential growth in wireless communication and sensor network. Sensor networks using RFID, in particular, have led this trend due to the increasing exchange of data in Ubiquitous such as the home RF, access control system, U-Healthcare, and Logistics information Systems. Also, the RFID when it applies a technique, is able to raise the stability of shipping as controling the mobile course and an entrance and exit of the crews an well as previously preventing an accident from shipping. In this paper, we designed and implemented personnel control system using UHF-RFID in vessels which shows through host PC reading and writing tag.

  • PDF

A Study on Network Mobility Support for Uniquitous Communication Environment (유비쿼터스 통신 환경을 위한 네트워크 이동성 지원 방안에 관한 연구)

  • Lee, Ho-Seon;Kim, Seong-Chul;Cho, Yong-Bum;Cho, Sung-Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.589-592
    • /
    • 2007
  • Ubiquitous environment means the environment in which users can access the Internet at anytime and anywhere. Network mobility support is needed for seamless Internet service in ubiquitous environment. When users try to access the Internet in public transportation such as bus, train, airplane, to support network mobility by composing several sub-networks is more efficient than to support host mobility. IETF established 'Network Mobility(NEMO)' working group to research and develop network mobility technology. In this paper, we investigate the concept of network mobility, trends of research in NEMO and developed technology on the basis of 'Network Mobility Basic Support Protocol' standardized by IETF.

  • PDF

Ad-hoc Security Authentication Technique based on Verifier (검증자 기반 Ad-hoc 보안 인증기법)

  • Lee, Cheol-Seung;Hong, Seong-Pyo;Lee, Ho-Young;Lee, Joon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2007.10a
    • /
    • pp.713-716
    • /
    • 2007
  • This paper suggests One-time Password key exchange authentication technique for a strong authentication based on Ad-hoc Networks and through identify wireless environment security vulnerabilities, analyzes current authentication techniques. The suggested authentication technique consists of 3 steps: Routing, Registration, and Running. The Routing step sets a safe route using AODV protocol. The Registration and Running step apply the One-time password S/key and the DH-EKE based on the password, for source node authentication. In setting the Session key for safe packet transmission and data encryption, the suggested authentication technique encrypts message as H(pwd) verifiers, performs key exchange and utilizes One time password for the password possession verification and the efficiency enhancement. EKE sets end to end session key using the DH-EKE in which it expounds the identifier to hash function with the modula exponent. A safe session key exchange is possible through encryption of the H(pwd) verifier.

  • PDF

A Design of KDPC(Key Distributed Protocol based on Cluster) using ECDH Algorithm on USN Environment (USN 환경에서 ECDH 알고리즘을 이용한 KDPC(Key Distribution Protocol based on Cluster) 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2013.05a
    • /
    • pp.856-858
    • /
    • 2013
  • The data which is sensed on USN(Ubiquitous Sensor Network) environment is concerned with personal privacy and the secret information of business, but it has more vulnerable characteristics, in contrast to common networks. In other words, USN has the vulnerabilities which is easily exposed to the attacks such as the eavesdropping of sensor information, the distribution of abnormal packets, the reuse of message, an forgery attack, and denial of service attacks. Therefore, the key is necessarily required for secure communication between sensor nodes. This paper proposes a KDPC(Key Distribution Protocol based on Cluster) using ECDH algorithm by considering the characteristics of sensor network. As a result, the KDPC can provide the safe USN environment by detecting the forgery data and preventing the exposure of sensing data.

  • PDF

Multi-Domain Security Management Framework and Its Performance Evaluation for Protecting BcN Infrastructure (BcN 인프라 보호를 위한 다중 도메인 보안 관리 프레임워크와 성능평가)

  • Jang Jung-Sook;Jeon Yong-Hee;Jang Jong-Soo
    • The KIPS Transactions:PartC
    • /
    • v.12C no.6 s.102
    • /
    • pp.817-826
    • /
    • 2005
  • BcN(Broadband convergence Network) is being developed in order to support a variety of network applications, with enhanced capabilities of QoS(Quality of Service) provisioning and security, and IPv6. In a high-speed network environment such as BcN, it if more likely for the network resources to be exposed to various intrusion activities. The propagation speed of intrusion is alto expected to be much faster than in the existing Internet In this paper, we present a multi-domain security management framework which my be used for a global intrusion detection at multiple domains of BcN and describe its characteristics. For the performance evaluation, we first present test results for the security node and compare with other products. Then we design and Implement an OPNET simulator for the proposed framework, and present some simulation results. In the simulation model, we focus on the performance of alert information in the security overlay network.

A Design and Implementation of a P2P Streaming System with Considering Network Efficiency (망 효율성을 고려한 P2P 스트리밍 시스템 설계 및 구현)

  • Hong, Seung-Gil;Park, Seung-Chul
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.17 no.3
    • /
    • pp.567-574
    • /
    • 2013
  • Recently, many researches on P2P overlay network-based multimedia streaming services have been actively performed because of their high scalability and cost-efficiency advantages. However, P2P overlay networks also have the shortcoming of generating higher traffic owing to their unicast-based one-to-many multimedia deliveries. In order to reduce the traffic generated by the P2P streaming overlay network, we propose an ISP and locality-based parent node discovery method and check its feasibility through an implementation of a prototype streaming system. The measurement of RTTs and hop counts for random nodes having different ISPs and localities shows the proposed method to be able to shorten about 32% RTTs and about 17% Hop counts.

Automatic Node Configuration Protocol for Small Sized Mobile Ad-Hoc Networks (소규모 이동 애드혹 네트워크에서의 자동 노드 설정 프로토콜)

  • Lee Hyewon K.;Mun Youngsong
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.1
    • /
    • pp.100-109
    • /
    • 2005
  • A Mobile Ad-Hoc Network (MANET) supports a multi-hop wireless network without any prepared base station (BS). The MANET is capable of building a mobile network automatically without any help from DHCP servers for address allocation or routers to forward or route messages. Many routing protocols have been proposed for the MANET, but these specify the most optimized or shortest path from a source to a destination, and they assume that nodes are pre-configured before communication. To make up for this, address allocation algorithms, such as MANETConf [1] and prophet address allocation algorithm [2], have been proposed. Especially, MANETConf proposes address allocation algorithm with duplication address check. In this paper, we present a dynamic node configuration protocol based on 2-tierd hierarchical network architecture for mobile ad-hoc network, modified from [1]. Especially, it reduces the number of broadcast message exchange between nodes when a new node somes into a network, which lessens network overhead, remarkably. This protocol is based on two-tired structure, and it ensures address allocation with simple duplication address defection mechanism.