• Title/Summary/Keyword: implementation algorithm

Search Result 4,233, Processing Time 0.035 seconds

Design and Implementation of Smart Healthcare Monitoring System Using Bio-Signals (생체 신호를 이용한 스마트 헬스케어 모니터링 시스템 설계 및 구현)

  • Yoo, So-Wol;Bae, Sang-Hyun
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.10 no.5
    • /
    • pp.417-423
    • /
    • 2017
  • This paper intend to implement monitoring systems for individual customized diagnostics to maintain ongoing disease management to promote human health. Analyze the threshold of a measured biological signal using a number of measuring sensors. Performance assessment revealed that the SVM algorithm for bio-signal analysis showed an average error rate of 2 %. The accuracy of the classification is 97.2%, and reduced the maximum of 19.2% of the storage space when you split the window into 5,000 pieces. Out of the total 5,000 bio-signals, 84 results showed that results from the system were differently the results of the expert's diagnosis and showed about 98 % accuracy. However, the results of the monitoring system did not occur when the results of the monitoring system were lower than that of experts. And About 98% accuracy was shown.

Airspeed Estimation of Course Correction Munitions by Using Extended Kalman Filter (확장 칼만필터를 이용한 탄도수정탄의 대기속도 추정)

  • Sung, Jaemin;Kim, Byoung Soo
    • Journal of the Korean Society for Aeronautical & Space Sciences
    • /
    • v.43 no.5
    • /
    • pp.405-412
    • /
    • 2015
  • This paper represents a filter design to estimate the airspeed of a spin-stabilized, trajectory-correctible artillery ammunition. Due to the limited power and space in operational point of view, the airspeed sensor is not installed, and thus the airspeed need to be estimated using limited sensor measurements. The only IMU measurements(three-axis specific forces and angular rates) are used in this application. The extended Kalman filter algorithm is applied since a linear filter can not cover the its wide operational range in airspeed and altitude. In the implementation of the EKF, the state and measurement equations are transformed into the no-roll frame for simple form of Jacobian matrix. The simulation study is conducted to evaluate the performance of the filter under various environment conditions of sensor noise and wind turbulence. In addition, the effect of the choice in filter design parameters, i.e. process error covariance matrices is analyzed on the performance of the estimation of airspeed and angular rates.

Design of Vehicle Security Authentication System Using Bluetooth 4.0 Technology (블루투스 4.0 기술을 이용한 차량용 보안인증 시스템 설계)

  • Yu, Hwan-Shin
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.7
    • /
    • pp.325-330
    • /
    • 2017
  • Bluetooth 4.0 is a technology suitable for the Internet of things that is used for communication between various devices. This technology is suitable for developing a service by combining with automobiles. In this study, a security authentication system was designed by linking Bluetooth 4.0 technology and a vehicle system as an implementation example of an object internet service. A procedure was designed for security authentication and an authentication method is proposed using a data server. When the security authentication function is provided, various additional services can be developed using the information collection function of the risk notification and user action history. In addition, BLE (Bluetooth Low Energy) technology, which is a wireless communication technology that enables low-power communication and low-power communication in the process of the standardization and development of Bluetooth technology and technology, improves the battery life through the use of RFID or NFC This study expanded the range possible. The security service can be extended by expanding the scope of authentication by the contactless type. Using the proposed system, a customized service can be provided while overcoming the problems of an existing radio frequency (RF)-based system, portability, and battery usage problem.

Implementation of a Remote Authentication System Using Smartcards to Guarantee User Anonymity to Third Party (제 3자에게 사용자 익명성을 제공하는 스마트 카드 기반 원격 인증 시스템 구현)

  • Baek, Yi-Roo;Oh, Doo-Hwan;Gil, Kwang-Eun;Ha, Jae-Cheol
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.10
    • /
    • pp.2750-2759
    • /
    • 2009
  • In this paper, we analyze vulnerabilities in a remote authentication protocol using smartcards which was proposed by Bindu et al. and propose an improved scheme. The proposed scheme can prevent from restricted replay attack and denial of service attack by replacing time stamp with random number. In addition, this protocol can guarantee user anonymity by transmitting encrypted user's ID using AES cipher algorithm. The computational load in our protocol is decreased by removing heavy exponentiation operations and user efficiency is enhanced due to addition of password change phase in which a user can freely change his password. Furthermore, we really implement the proposed authentication protocol using a STM smartcard and authentication server. Then we prove the correctness and effectiveness of the proposed remote authentication system.

Low Power Cryptographic Design based on Circuit Size Reduction (회로 크기 축소를 기반으로 하는 저 전력 암호 설계)

  • You, Young-Gap;Kim, Seung-Youl;Kim, Yong-Dae;Park, Jin-Sub
    • The Journal of the Korea Contents Association
    • /
    • v.7 no.2
    • /
    • pp.92-99
    • /
    • 2007
  • This paper presented a low power design of a 32bit block cypher processor reduced from the original 128bit architecture. The primary purpose of this research is to evaluate physical implementation results rather than theoretical aspects. The data path and diffusion function of the processor were reduced to accommodate the smaller hardware size. As a running example demonstrating the design approach, we employed a modified ARIA algorithm having four S-boxes. The proposed 32bit ARIA processor comprises 13,893 gates which is 68.25% smaller than the original 128bit structure. The design was synthesized and verified based on the standard cell library of the MagnaChip's 0.35um CMOS Process. A transistor level power simulation shows that the power consumption of the proposed processor reduced to 61.4mW, which is 9.7% of the original 128bit design. The low power design of the block cypher Processor would be essential for improving security of battery-less wireless sensor networks or RFID.

An Implementation of Sound Enhanced MPEG-1 Audio Decoder on Embedded OS Platform (음질향상 알고리즘을 내장한 MPEG-1 오디오 디코더의 Embedded OS 플랫폼에의 구현)

  • Hong, Sung-Min;Park, Kyu-Sik
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.8
    • /
    • pp.958-966
    • /
    • 2007
  • In this paper, we implement a sound-enhanced MPEG-1 audio decoder on embedded OS Platform. Low bit rate lossy audio codecs such as MP3, OGG, and AAC for mitigating the problems in storage space and network bandwidth suffer a major common problem such as a loss of high frequency fidelity of audio signal. This high frequency loss will reproduce only a band-limited low-frequency part of audio in the standard CD-quality audio. In order to overcome this problem, we embedded a sound enhancement algorithm into the MPEG-1 audio decoder and then the algorithms optimized according to the characteristic of the MPEG-1 audio layer I, II, III were implemented on an embedded OS platform. From the experimental results with spectrum analysis and listening test, we confirm the superiority of the proposed system compared to the standard MPEG-1 audio decoder.

  • PDF

Implementation of Music Information Retrieval System using YIN Pitch Information (YIN 피치 정보를 이용한 음악 정보 검색 시스템 구현)

  • Suk, Soo-Young;Chung, Hyun-Yeol
    • Journal of Korea Multimedia Society
    • /
    • v.10 no.11
    • /
    • pp.1398-1406
    • /
    • 2007
  • Providing natural and efficient access to the fast growing multimedia information is a critical aspect for content-based information system. Query by humming system allows the user to find a song by humming part of the tune form music database. Conventional music information retrieval systems use a high precision pitch extraction method. However, it is very difficult to extract true pitch perfectly. So, In this paper, we propose to use YIN parameter with applying the reliability to reduce the pitch extraction errors. And we describes developed music information retrieval method based on a query by humming system which uses reliable feature extraction. Developed system is based on a continuous dynamic programming algorithm with features including pitch, duration and energy along with their confidence measures. The experiment showed that the proposed method could reduce the errors of the top-10 7.2% and the top-1 9.1% compared with the cepsturm based multiple pitch candidate. The overall retrieval system achieved 92.8% correct retrieval in the top-10 rank list on a database of 155 songs.

  • PDF

Improving SVM Classification by Constructing Ensemble (앙상블 구성을 이용한 SVM 분류성능의 향상)

  • 제홍모;방승양
    • Journal of KIISE:Software and Applications
    • /
    • v.30 no.3_4
    • /
    • pp.251-258
    • /
    • 2003
  • A support vector machine (SVM) is supposed to provide a good generalization performance, but the actual performance of a actually implemented SVM is often far from the theoretically expected level. This is largely because the implementation is based on an approximated algorithm, due to the high complexity of time and space. To improve this limitation, we propose ensemble of SVMs by using Bagging (bootstrap aggregating) and Boosting. By a Bagging stage each individual SVM is trained independently using randomly chosen training samples via a bootstrap technique. By a Boosting stage an individual SVM is trained by choosing training samples according to their probability distribution. The probability distribution is updated by the error of independent classifiers, and the process is iterated. After the training stage, they are aggregated to make a collective decision in several ways, such ai majority voting, the LSE(least squares estimation) -based weighting, and double layer hierarchical combining. The simulation results for IRIS data classification, the hand-written digit recognition and Face detection show that the proposed SVM ensembles greatly outperforms a single SVM in terms of classification accuracy.

An Efficient TCP Mechanism for Mobile IP Handoffs (Mobile IP 핸드오프를 위한 효율적인 TCP 방식)

  • Kwon, Jae-Woo;Park, Hee-Dong;Cho, You-Ze
    • Journal of KIISE:Information Networking
    • /
    • v.29 no.5
    • /
    • pp.501-509
    • /
    • 2002
  • When using TCP over a mobile network, TCP responds to a handoff by invoking a congestion control algorithm, thereby resulting in a degraded end-to-end performance in a mobile network. In this paper, two schemes are proposed, TCP-MD and TCP-R. TCP-MD can detect the movement of s mobile host early on, whereas TCP-R can force the source to freeze data transmission during registration. The proposed schemes maintain end-to-end TCP semantics, making it possible to fully interoperate with the existing infrastructure. Only a small change is required in the mobile host, plus the implementation is simple because some Mobile IP messages are used to notify the handoff, eliminating the need for any additional messages. Simulations confirmed that the proposed schemes give an excellent performance under various environments.

Design of Web-based Parallel Processing System using Performance-based Task Allocation (성능 기반 태스크 할당을 이용한 웹 기반 병렬처리 시스템의 설계)

  • Han, Youn-Hee;Park, Chan-Yeol;Jeong, Young-Sik;Hwang, Chong-Sun
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.27 no.3
    • /
    • pp.264-276
    • /
    • 2000
  • Recent advances of technologies make easy sharing various information and utilizing system resources on the Internet. Especially, code migration using applets of Java supports the distribution of programs on the web environment, and also browsers executing the applets guarantee the reliability of a migrated codes. In this paper, we describe the design and implementation of a web-based parallel processing system, which distributes migratable codes of a large job, makes the distributed codes to execute in parallel, and controls and gathers the results of each execution. The hosts participate in the computation reside on the Internet, spreaded out geographically, and the heterogeneity and the variability among them are severe. Thus, task allocation considering the performance differences and the adaptability to the severe variability are necessary. We present an adaptive task allocation algorithm applied to our system and the performance evaluation.

  • PDF