• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.029 seconds

Implementation of Acceleration Sensor-based Human activity and Fall Classification Algorithm (가속도 센서기반의 인체활동 및 낙상 분류를 위한 알고리즘 구현)

  • Hyun Park;Jun-Mo Park;Yeon-Chul, Ha
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.23 no.2
    • /
    • pp.76-83
    • /
    • 2022
  • With the recent development of IT technology, research and interest in various biosignal measuring devices is increasing. As an aging society is in full swing, research on the elderly population using IT-related technologies is continuously developing. This study is about the development of life pattern detection and fall detection algorithm, which is one of the medical service areas for the elderly, who are rapidly developing as they enter a super-aged society. This study consisted of a system using a 3-axis accelerometer and an electrocardiogram sensor, collected data, and then analyzed the data. It was confirmed that behavioral patterns could be classified from the actual research results. In order to evaluate the usefulness of the human activity monitoring system implemented in this study, experiments were performed under various conditions, such as changes in posture and walking speed, and signal magnitude range and signal vector magnitude parameters reflecting the acceleration of gravity of the human body and the degree of human activity. was extracted. And the possibility of discrimination according to the condition of the subject was examined by these parameter values.

AutoML Machine Learning-Based for Detecting Qshing Attacks Malicious URL Classification Technology Research and Service Implementation (큐싱 공격 탐지를 위한 AutoML 머신러닝 기반 악성 URL 분류 기술 연구 및 서비스 구현)

  • Dong-Young Kim;Gi-Seong Hwang
    • Smart Media Journal
    • /
    • v.13 no.6
    • /
    • pp.9-15
    • /
    • 2024
  • In recent trends, there has been an increase in 'Qshing' attacks, a hybrid form of phishing that exploits fake QR (Quick Response) codes impersonating government agencies to steal personal and financial information. Particularly, this attack method is characterized by its stealthiness, as victims can be redirected to phishing pages or led to download malicious software simply by scanning a QR code, making it difficult for them to realize they have been targeted. In this paper, we have developed a classification technique utilizing machine learning algorithms to identify the maliciousness of URLs embedded in QR codes, and we have explored ways to integrate this with existing QR code readers. To this end, we constructed a dataset from 128,587 malicious URLs and 428,102 benign URLs, extracting 35 different features such as protocol and parameters, and used AutoML to identify the optimal algorithm and hyperparameters, achieving an accuracy of approximately 87.37%. Following this, we designed the integration of the trained classification model with existing QR code readers to implement a service capable of countering Qshing attacks. In conclusion, our findings confirm that deriving an optimized algorithm for classifying malicious URLs in QR codes and integrating it with existing QR code readers presents a viable solution to combat Qshing attacks.

Implementation of a real-time public transportation monitoring system (실시간 대중교통 모니터링 시스템 구현)

  • Eun-seo Oh;So-ryeong Gwon;Joung-min Oh;Bo Peng;Tae-kook Kim
    • Journal of Internet of Things and Convergence
    • /
    • v.10 no.4
    • /
    • pp.9-19
    • /
    • 2024
  • In this paper, a real-time public transportation monitoring system is proposed. The proposed system was implemented by developing a public transportation app and utilizing optical sensors, pressure sensors, and an object detection algorithm. Additionally, a bus model was created to verify the system's functionality. The proposed real-time public transportation monitoring system has three key features. First, the app can monitor congestion levels within public transportation by detecting seat occupancy and the total number of passengers based on changes in optical and pressure sensor readings. Second, to prevent errors in the optical sensor that can occur when multiple passengers board or disembark simultaneously, we explored the possibility of using the YOLO object detection algorithm to verify the number of passengers through CCTV footage. Third, convenience is enhanced by displaying occupied seats in different colors on a separate screen. The system also allows users to check their current location, available public transportation options, and remaining time until arrival. Therefore, the proposed system is expected to offer greater convenience to public transportation users.

An Efficient Hardware-Software Co-Implementation of an H.263 Video Codec (하드웨어 소프트웨어 통합 설계에 의한 H.263 동영상 코덱 구현)

  • 장성규;김성득;이재헌;정의철;최건영;김종대;나종범
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.4B
    • /
    • pp.771-782
    • /
    • 2000
  • In this paper, an H.263 video codec is implemented by adopting the concept of hardware and software co-design. Each module of the codec is investigated to find which approach between hardware and software is better to achieve real-time processing speed as well as flexibility. The hardware portion includes motion-related engines, such as motion estimation and compensation, and a memory control part. The remaining portion of theH.263 video codec is implemented in software using a RISC processor. This paper also introduces efficient design methods for hardware and software modules. In hardware, an area-efficient architecture for the motion estimator of a multi-resolution block matching algorithm using multiple candidates and spatial correlation in motion vector fields (MRMCS), is suggested to reduce the chip size. Software optimization techniques are also explored by using the statistics of transformed coefficients and the minimum sum of absolute difference (SAD)obtained from the motion estimator.

  • PDF

Cost-Effective Traffic Grooming in WDM Ring Networks : Uniform-Traffic Case (WDM 링 네트워크의 비용 절감을 위한 트래픽 통합 기법 : 유니폼 트래픽 경우)

  • 조원홍;장민석
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.25 no.8A
    • /
    • pp.1247-1253
    • /
    • 2000
  • To fully utilize the capabilities of a SONET/ADM network, traffic grooming is needed to multiplex a number of lower-rate traffic streams into a higher-rate stream, and vice versa. Although the capacity of a SONET ring network can be upgraded by operating it over multiple wavelengths, the corresponding network design may be costly if it employs a large number of ADMs. A cost-effective design attempts to minimize the total number of ADMs used in the network while carrying the offered traffic. We introduce and evaluate the performance characteristics of a new traffic-grooming approach for WDM ring networks, called multihop. The multihop implementation places an ADM at each node based on the requested traffic in the traffic-demand matrix then, it tries to groom the wavelengths which can be groomed. We select one of the nodes to be the "hub" node which has an ADM for each wavelength. The hub node, therefore, can "bridge" traffic between all of the wavelengths. The algorithm is specified and illustrated by a simple example. Our results demonstrate that it is beneficial to use a single-hop approach, but for a large grooming ratio and node number, we advocate the use of the multihop approach.e multihop approach.

  • PDF

A Study of Implementation for Home Networking Security System (홈 네트워크를 위한 보안 시스템 구현에 관한 연구)

  • Seol, Jeong-Hwan;Kim, In-Kyum;Lee, Ki-Young
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2008.05a
    • /
    • pp.616-619
    • /
    • 2008
  • In this paper, we design and implement the authentication system for home network service and applied it to actual sensor nodes. We achieved authentication key, encryption and decryption applied RC5 encryption algorithm of SNEP. In addition, we used pair-wise key pre-distribution for prevention of authentication sniffing in wireless sensor network. The experiment environment consists of a base station receiving data and sensor nodes sending data. Each sensor nodes sends both the data and encrypted authentication key to the base station. As a simulation environment, we assumed some what-if scenarios of security menaces in home network service. And we slightly altered the TOS_Msg construction of TinyOS. The experiences had shown that the malfunction doesn't happen in communication among other groups. And we confirmed in tests that the system is secure when a sensor having malicious propose is added.

  • PDF

Implementation of Super High-speed Permanent Magnet Synchronous Machine Drive (영구 자석 동기 전동기의 초고속 운전에 관한 연구)

  • Kim, Myoung-Ho;Yim, Jung-Sik;Sul, Seung-Ki;Lim, Sung-Il
    • The Transactions of the Korean Institute of Power Electronics
    • /
    • v.13 no.5
    • /
    • pp.329-335
    • /
    • 2008
  • Recently, super high-speed motor drives have been available due to the development of power electronics technology And they are used in various fields of industry because of their advantages. This paper describes the control algorithm for a permanent magnet synchronous motor(PMSM) drive at the speed of 118,000r/min using DSP and IGBT inverter. Hall sensors are implemented to measure the rotor position and speed, and a speed observer is used to reduce the performance deterioration caused by the low resolution of hall sensors. To enhance the output power capacity in the high-speed operating region, a flux weakening controller which also can work as an anti-wind up controller is used. Computer simulations and experiments are peformed to validate the proposed method.

Feature-based Image Analysis for Object Recognition on Satellite Photograph (인공위성 영상의 객체인식을 위한 영상 특징 분석)

  • Lee, Seok-Jun;Jung, Soon-Ki
    • Journal of the HCI Society of Korea
    • /
    • v.2 no.2
    • /
    • pp.35-43
    • /
    • 2007
  • This paper presents a system for image matching and recognition based on image feature detection and description techniques from artificial satellite photographs. We propose some kind of parameters from the varied environmental elements happen by image handling process. The essential point of this experiment is analyzes that affects match rate and recognition accuracy when to change of state of each parameter. The proposed system is basically inspired by Lowe's SIFT(Scale-Invariant Transform Feature) algorithm. The descriptors extracted from local affine invariant regions are saved into database, which are defined by k-means performed on the 128-dimensional descriptor vectors on an artificial satellite photographs from Google earth. And then, a label is attached to each cluster of the feature database and acts as guidance for an appeared building's information in the scene from camera. This experiment shows the various parameters and compares the affected results by changing parameters for the process of image matching and recognition. Finally, the implementation and the experimental results for several requests are shown.

  • PDF

Configuration of PID tuning simulator for evaluation of marine engineer's ability (기관사의 해기능력 평가용 PID 제어 튜닝 시뮬레이터의 구성)

  • Choi, Soon-Man
    • Journal of Advanced Marine Engineering and Technology
    • /
    • v.33 no.8
    • /
    • pp.1268-1274
    • /
    • 2009
  • Various evaluation systems using simulators have been adopted widely for the purpose of training and examination, including marine engineering education area. This paper suggests a PC based evaluation scoring system for simulators where the operation ability of machineries and background knowledges of trainees or examinees are able to be assessed relatively. The scores are based on the 100 point resulted from their responses for a given evaluation scenario under a PID tuning simulation. The mistakes they make during the operation time are integrated firstly to get error sum, and the error sum is transformed secondly to 100 point score according to a formula where the knowledge level of examinee's groups can be compensated and considered reasonably. The implementation result of evaluation system for the given control loop is described and analyzed to show the effectiveness of the suggested configuration as an evaluation tool.

Design and Implementation of an Adaptive Synchronization Algorithm of the MPEG Stream for VOD Services (VOD 서비스를 위한 MPEG 스트림의 적응적 동기화 알고리즘 설계 및 구현)

  • Jo, Dae-Je;Lee, Yeong-Hu;Yoo, Kee-Young
    • Journal of KIISE:Computing Practices and Letters
    • /
    • v.6 no.5
    • /
    • pp.505-512
    • /
    • 2000
  • In this paper, an adaptive multimedia synchronization scheme for VOD (Video On Demand) services in internet environments is proposed. This scheme considers the characteristics of MPEG (Moving Picture Expert Group) system stream. Consequently, the intra-synchronization is handled at the pack layer, and the inter-synchronization is handled at the packet layer. The proposed scheme can cope adaptively with variation of packet loss, jitter and client's playback capacity. If there are variations of the packet loss or client's playback capacity, the server will change the transmission rate by selective picture skip. The client can then adjust and control the playback time according to the variation of the network jitter. Our experimental results show that the proposed scheme can quickly adapt to the network condition, and can guarantee a better quality of service than the other existing schemes.

  • PDF