• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.027 seconds

Implementation of Key Generation Algorithm for User Authentication and Encryption (사용자 인증과 암호화를 위한 키 생성 알고리즘 구현)

  • Woo, Chan-Il;Jeon, Se-Gil
    • Journal of Advanced Navigation Technology
    • /
    • v.11 no.1
    • /
    • pp.93-98
    • /
    • 2007
  • The importance of information security is increasing by the rapid development of the communication network. So, cryptosystems are used to solve these problems and securities of cryptosystems are dependent on keys. In this paper, we propose a key generation method which is based on cryptographically secure MD5 hash function. The basic structure of the MD5 hash function features is a repetitive structure which is processed in a block unit of 512 bits from inputs of limited length and generates a fixed output of 128 bits. The security of proposed method is based on the hash function and the proposed method can be also utilized for authentication algorithm or data encryption algorithm.

  • PDF

Real-time Slant Face detection using improvement AdaBoost algorithm (개선한 아다부스트 알고리즘을 이용한 기울어진 얼굴 실시간 검출)

  • Na, Jong-Won
    • Journal of Advanced Navigation Technology
    • /
    • v.12 no.3
    • /
    • pp.280-285
    • /
    • 2008
  • The traditional face detection method is to use difference picture method are used to detect movement. However, most do not consider this mathematical approach using real-time or real-time implementation of the algorithm is complicated, not easy. This paper, the first to detect real-time facial image is converted YCbCr and RGB video input. Next, you convert the difference between video images of two adjacent to obtain and then to conduct Glassfire Labeling. Labeling value compared to the threshold behavior Area recognizes and converts video extracts. Actions to convert video to conduct face detection, and detection of facial characteristics required for the extraction and use of AdaBoost algorithm.

  • PDF

A Study on the Moving Object Tracking Algorithm of Static Camera and Active Camera in Environment (고정카메라 및 능동카메라 환경에서 이동물체 추적 알고리즘에 관한 연구)

  • 남기환;배철수
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.7 no.2
    • /
    • pp.344-352
    • /
    • 2003
  • An effective algorithm for implementation of which detects moving object from image sequences. predicts the direction of it. and drives the camera in real time is proposed. In static camera, for robust motion detection from a dynamic background scene, the proposed algorithm performs statistical modeling of moving objects and background, and trains the statistical modeling of moving objects and background, and trains the statistical feature of background with the initial parts of sequence which have no moving objects. Active camera moving objects are segmented by following procedure, an improved order adaptive lattice structured linear predictor is used. The proposed algorithm shows robust object tracking results in the environment of static or active camera. It can be used for the unmanned surveillance system, traffic monitoring system, and autonomous vehicle.

A Study on the Optimization Design of Check Valve for Marine Use (선박용 체크밸브의 최적설계에 관한 연구)

  • Lee, Choon-Tae
    • Journal of Power System Engineering
    • /
    • v.21 no.6
    • /
    • pp.56-61
    • /
    • 2017
  • The check valves are mechanical valves that permit fluids to flow in only one direction, preventing flow from reversing. It is classified as one way directional valves. There are various types of check valves that used in a marine application. A lift type check valve uses the disc to open and close the passage of fluid. The disc lift up from seat as pressure below the disc increases, while drop in pressure on the inlet side or a build up of pressure on the outlet side causes the valve to close. An important concept in check valves is the cracking pressure which is the minimum upstream pressure at which the valve will operate. On the other hand, optimization is a process of finding the best set of parameters to reach a goal while not violating certain constraints. The AMESim software provides NLPQL(Nonlinear Programming by Quadratic Lagrangian) and genetic algorithm(GA) for optimization. NLPQL is the implementation of a SQP(sequential quadratic programming) algorithm. SQP is a standard method, based on the use of a gradient of objective functions and constraints to solve a non-linear optimization problem. A characteristic of the NLPQL is that it stops as soon as it finds a local minimum. Thus, the simulation results may be highly dependent on the starting point which user give to the algorithm. In this paper, we carried out optimization design of the check valve with NLPQL algorithm.

Bi-directional Fuzzy Matching Algorithm (양방향 퍼지 매칭 알고리즘: 취업정보 적용)

  • Kim, Hyoung-Rae;Jeong, In-Soo
    • Journal of Internet Computing and Services
    • /
    • v.12 no.3
    • /
    • pp.69-76
    • /
    • 2011
  • Matching customers becomes the key function in on-line mediate services. There are two matching methods: one-directional matching that requires requests from one side(e,g., information searching), bi-directional matching that considers requests from both sides. Previous bi-directional matching has difficulties of getting the interests explicitly and service collapse problems when the opposite side do not put responding interests. This paper attempts to automate the inputs of interests for bi-directional matching by calculating the interests with fuzzy matching algorithm for optimization. The results of the proposed Bi-directional Fuzzy Matching(BDFM) algorithm told that the job placement accuracy of employment information matching results is over 95%. And, BDFM gives statically significant positive effect for motivating the employment activities when analyzed the effect after completing the implementation.

Single-Channel Non-Causal Speech Enhancement to Suppress Reverberation and Background Noise

  • Song, Myung-Suk;Kang, Hong-Goo
    • The Journal of the Acoustical Society of Korea
    • /
    • v.31 no.8
    • /
    • pp.487-506
    • /
    • 2012
  • This paper proposes a speech enhancement algorithm to improve the speech intelligibility by suppressing both reverberation and background noise. The algorithm adopts a non-causal single-channel minimum variance distortionless response (MVDR) filter to exploit an additional information that is included in the noisy-reverberant signals in subsequent frames. The noisy-reverberant signals are decomposed into the parts of the desired signal and the interference that is not correlated to the desired signal. Then, the filter equation is derived based on the MVDR criterion to minimize the residual interference without bringing speech distortion. The estimation of the correlation parameter, which plays an important role to determine the overall performance of the system, is mathematically derived based on the general statistical reverberation model. Furthermore, the practical implementation methods to estimate sub-parameters required to estimate the correlation parameter are developed. The efficiency of the proposed enhancement algorithm is verified by performance evaluation. From the results, the proposed algorithm achieves significant performance improvement in all studied conditions and shows the superiority especially for the severely noisy and strongly reverberant environment.

Design and Implementation of Location Detection System of Wireless Access Point (무선 Access Point위치 탐지시스템의 설계 및 구현)

  • Ku, Yong-Ki;Hong, Jin-Keun;Han, Kun-Hui;Kim, Ki-Hong
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.9 no.4
    • /
    • pp.1012-1017
    • /
    • 2008
  • Recently, the use of wireless fan is increased by the development of wireless communication and convenience. Moreover, it makes an issue of security threat and vulnerability of wireless tan. Therefore, the IEEE established new standard such as 802.11i in 802.11 to supplement security vulnerability of wireless tan. But the security threat that does not solve, still remains. In this paper, we proposed that the location detection algorithm, that is used Kalman-Filter, Lateration and RSSI, and the mechanism that detects security status of AP and unauthorized AP by using beacon-frame of AP in building. Finally, we confirmed performance of proposed algorithm is good in comparison of established algorithm.

A Conflict Detection Method Based on Constraint Satisfaction in Collaborative Design

  • Yang, Kangkang;Wu, Shijing;Zhao, Wenqiang;Zhou, Lu
    • Journal of Computing Science and Engineering
    • /
    • v.9 no.2
    • /
    • pp.98-107
    • /
    • 2015
  • Hierarchical constraints and constraint satisfaction were analyzed in order to solve the problem of conflict detection in collaborative design. The constraints were divided into two sets: one set consisted of known constraints and the other of unknown constraints. The constraints of the two sets were detected with corresponding methods. The set of the known constraints was detected using an interval propagation algorithm, a back propagation (BP) neural network was proposed to detect the set with the unknown constraints. An immune algorithm (IA) was utilized to optimize the weights and the thresholds of the BP neural network, and the steps were designed for the optimization process. The results of the simulation indicated that the BP neural network that was optimized by IA has a better performance in terms of convergent speed and global searching ability than a genetic algorithm. The constraints were described using the eXtensible Markup Language (XML) for computers to be able to automatically recognize and establish the constraint network. The implementation of the conflict detection system was designed based on constraint satisfaction. A wind planetary gear train is taken as an example of collaborative design with a conflict detection system.

A Study on a Variable P box Generation Using a DES Key Expansion (DES 키 확장을 이용한 가변 P box 생성에 관한 연구)

  • Lee, Jun
    • The KIPS Transactions:PartC
    • /
    • v.18C no.5
    • /
    • pp.287-292
    • /
    • 2011
  • Using an expanded DES key, we suggest a block cipher algorithm to generate and to use a variable P box. We also present an efficient way for the implementation of variable P box at each round. Using counter examples on Differential Cryptanalysis(DC) and Linear Cryptanalysis(LC), we show that the suggested algorithm is strong enough to overcome those attacks. Compared with the real key bits of triple DES(3DES), the new algorithm is much safer in the points of the exhaustive attack. The results of computer simulations show that the new algorithm is almost 3 times faster than 3DES regarding the cipher process time.

Implementation of Artificial Hippocampus Algorithm Using Weight Modulator (가중치 모듈레이터를 이용한 인공 해마 알고리즘 구현)

  • Chu, Jung-Ho;Kang, Dae-Seong
    • Journal of Institute of Control, Robotics and Systems
    • /
    • v.13 no.5
    • /
    • pp.393-398
    • /
    • 2007
  • In this paper, we propose the development of Artificial Hippocampus Algorithm(AHA) which remodels a principle of brain of hippocampus. Hippocampus takes charge auto-associative memory and controlling functions of long-term or short-term memory strengthening. We organize auto-associative memory based 4 steps system (EC, DG CA3, and CA1) and improve speed of teaming by addition of modulator to long-term memory teaming. In hippocampus system, according to the 3 steps order, information applies statistical deviation on Dentate Gyrus region and is labeled to responsive pattern by adjustment of a good impression. In CA3 region, pattern is reorganized by auto-associative memory. In CA1 region, convergence of connection weight which is used long-term memory is learned fast a by neural network which is applied modulator. To measure performance of Artificial Hippocampus Algorithm, PCA(Principal Component Analysis) and LDA(Linear Discriminants Analysis) are applied to face images which are classified by pose, expression and picture quality. Next, we calculate feature vectors and learn by AHA. Finally, we confirm cognitive rate. The results of experiments, we can compare a proposed method of other methods, and we can confirm that the proposed method is superior to the existing method.