• Title/Summary/Keyword: information weakness

Search Result 788, Processing Time 0.032 seconds

Analog Parallel Processing Algorithm of CNN-UM for Interframe Change Detection (프레임간의 영상 변화 검출을 위한 CNN-UM의 아날로그 병렬연산처리 알고리즘)

  • 김형석;김선철;손홍락;박영수;한승조
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.40 no.1
    • /
    • pp.1-9
    • /
    • 2003
  • The CNN-UM algorithm which performs the analog parallel subtraction of images has been developed and its application study to the moving target detection has been done. The CNN-UM is the state of the art computation architecture with high computational potential of analog parallel processing. It is one of the strong candidates for the next generation of computing system which fulfills requirement of the real-time image processing. One weakness of the CNN-UM is that its analog parallel processing function is not fully utilized for the inter frame processing. If two subsequent image frames are superimposed with opposite signs on identical capacitors for short time period, the analog subtraction between them is achieved. The Principle of such temporal inter-frame processing algorithm has been described and its mathematical analysis has been done. Practical usefulness of the proposed algorithm has also been verified through the application for moving target detection.

The Literary study on Chongmai (충맥(衝脈)에 대(對)한 문헌적(文獻的) 고찰(考察))

  • Kim, Seong-Il;Song, Choon-Ho
    • Journal of Acupuncture Research
    • /
    • v.17 no.2
    • /
    • pp.85-93
    • /
    • 2000
  • We came to the conclusion after considering all the information from many kinds of books on the circulation courses, cross-link points, functions and the symptoms of disease of Chongmai. The results were as follows : 1. The Chongmai that starts from a Uterus flows to Dazhu through the inside of vertebra after joining Renmai and Duimai at Huiyin. The Chongmais up-line that comes out from Qichong into a surface of body arrives and is scattered at a chest through an abdomen. One strand of them goes upward again and is connected to a throat and lips area. After coming out from Qichong, separated down-line is divided into two parts when it arrives a inner part of a heel through the inner part of a leg. One is for an instep, the other is for the sole of a foot. 2. We call it "Sea of Twelve Meridians" or "Meridian's Sea". Because Chongmai controls all of Meridian by acquired "Basic energy" as getting Stomach's energy, Kidney's energy and air-energy, and there are responsible of physiological phenomenon control. And also we name it "Sea of Blood", because it starts from and provides a nutrition to Uterus. 3. All of these four Meridian such as Renmai, Kidney Meridian, Stomach Meridian and Spleen Meridian are ones that flow around the part of a chest and an abdomen. Chongmai makes energy and blood circulation of a chest and an abdomen be stronger and be controlled. Therefore it makes viscera, bowels and body surface be warm and given a nutrition. So Chongmai becomes "Sea of Viscera and Bowels". 4. Chongmai provides a nutrition for ligament and muscle and makes legs get warm as making energy and blood circulate from head to foot. If Chongmai is energetic, hair is completely easy to grow. 5. To see in pathological phase, Chongmais failure or weakness causes like a chest pain, stomachache, heart attack, a menstrual irregularity and sterility and so on. And also if Chongmai is damaged, it happens that giving a nutrition for lips area is stopped, and then mustache doesn't grow any more.

  • PDF

A Robust Acoustic Echo Canceler with Stepsize Predictor for Environment Noise (주변 노이즈에 강건한 Stepsize 예측기를 갖는 음향 반향 제거기)

  • Lee, Se-Won;Kang, Hee-Hoon;Lee, Won-Seok
    • Journal of the Institute of Electronics Engineers of Korea TE
    • /
    • v.39 no.2
    • /
    • pp.44-50
    • /
    • 2002
  • Conventional acoustic echo cancelers using ES(Exponentially weighted Stepsize) algorithm have simple operational configuration and fast convergence speed batter then NLMS algorithm, but they are very weak in external noise because ES algorithm updates filter taps using an average energy reduction rate of room impulse response in specific acoustical condition. So, a new configuration of acoustic echo canceler with stepsize generator and selector is proposed in this thesis. The proposed stepsize generator and selector improve conventional acoustic echo canceler's weakness in external noise and improve the system robustness. The stepsize generator generates additional stepsize value using moving averager, which is the residual noise energy of error signal multiplied by constant ${\gamma}$. The stepsize selector selects the stepsize value that has better performance in an acoustic echo canceler using a coefficient decision factor ${\Delta}_{differ}$ The simulation results show that the proposed algorithm reduces residual error by 5[dB] to 10[dB], improves misadjustment regardless of external noise's SNR. 

Development of Security Audit Agent for the Safety in School Network (학내전산망의 안전성 확보를 위한 보안진단 에이전트 개발)

  • Park, Jong-O;Lee, Chul-Hyun;Kim, Seong-Sik
    • The Journal of Korean Association of Computer Education
    • /
    • v.5 no.1
    • /
    • pp.27-34
    • /
    • 2002
  • Internet has being grown explosively in recent years, hence it becomes easy to search and access information. But it is happening frequently to access illegally into the systems and data, there are many damage caused by them. So, it is very important that we construct security plan for the systems and data. It is not exception on school network being diffused to all schools. But, we have weakness about security to manage server and network safely. So it is causing much anxieties. In this paper, we searched security points make sure of safety of school network, and developed security audit agent helping management of security. Through simple registration process, this agent is able to audit basic and important security problems about not only server systems but also pc systems, and notify to administrator automatically. It is expected to provide efficiency in managing school network.

  • PDF

Development of a Smartphone Interface using Infrared Approach (적외선 방식의 스마트 폰 인터페이스 개발)

  • Jang, Jae-Hyeok;Kim, Byung-Ki;Song, Chang-Geun;Ko, Young-Woong
    • The KIPS Transactions:PartA
    • /
    • v.18A no.2
    • /
    • pp.53-60
    • /
    • 2011
  • Touch screen technologies are widely used as the basic input for mobile devices. However, for smartphones, touch screens have been utilized as a simple device that merely process text data. It has been considered an inappropriate multimedia input device for one to use design applications, such as painting, due to its narrow touch screen space, which makes it inconvenient to draw pictures. In this study, we propose to enhance this weakness by using infrared approach on a smartphone's input interface. The usage of infrared approach will allow for quick and accurate operations without facing any space constraints. In this paper, we provide a detailed description of the design and implementation of a smartphone user interface using infrared pointing device. Additionally, using experimental results, we prove that our proposed approach is more convenient and efficient than traditional touch screen approaches used in smartphones.

An Efficient and Secure Group Key Distribution Protocol for IP-based Pay-TV Systems (IP기반의 Pay-TV 시스템을 위한 안전하고 효율적인 그룹 키 분배 프로토콜)

  • Kim, Jung-Yoon;Choi, Hyoung-Kee
    • The KIPS Transactions:PartC
    • /
    • v.16C no.2
    • /
    • pp.199-208
    • /
    • 2009
  • Recently,IP-based broadcasting systems,such as Mobile-TV and IP-TV, have been widely deployed. These systems require a security system to allow only authorized subscribers access to broadcasting services. We analyzed the Conditional Access System, which is a security system used in the IP-based Pay-TV systems. A weakness of the system is that it does not scale well when the system experiences frequent membership changes. In this paper, we propose a group key distribution protocol which overcomes the scalability problem by reducing communication and computation overheads without loss of security strength. Our experimental results show that computation delay of the proposed protocol is smaller than one of the Conditional Access System. This is attributed to the fact that the proposed protocol replaces expensive encryption and decryption with relatively inexpensive arithmetic operations. In addition, the proposed protocol can help to set up a secure channel between a server and a client with the minimum additional overhead.

Digital Signature Mechanism by Mobile Agent Security Model of Distributed Web Environment (분산 웹 환경에서 이동 에이전트 보안 모델에 의한 전자서명 메카니즘)

  • Choi, Kil-Hwan;Shin, Min-Hwa;Bae, Sang-Hyun
    • The KIPS Transactions:PartC
    • /
    • v.10C no.6
    • /
    • pp.787-792
    • /
    • 2003
  • Telecommunication network are becomming bigger and more complex. Its difficult to manage efficiently the networks, because these networks usually have heterogeneous and inompatoble compinents. Nevertheless, current approaches to network management have focused on centralized managementstrategies based on client-server architecture. These approaches have resulted in much weakness in the real-time management, the service extensibility, and the network scalability. In thispaper, we applied the mobile agent technology to solve the above problems. Jave is a promising technology for developing mobile agent system. But, there are several problems like the service extensibility in using the Java. To solve these problems, a new approach using digital signature is suggested to authenticate mobile agent in network management environments. This approach can solve the conflict between security of the system and extensibility of the mobile code. Moreover, the system suggested in this paper show the decentralized and flexible network management solutions.

PDA-based Text Extraction System using Client/Server Architecture (Client/Server구조를 이용한 PDA기반의 문자 추출 시스템)

  • Park Anjin;Jung Keechul
    • Journal of KIISE:Software and Applications
    • /
    • v.32 no.2
    • /
    • pp.85-98
    • /
    • 2005
  • Recently, a lot of researches about mobile vision using Personal Digital Assistant(PDA) has been attempted. Many CPUs for PDA are integer CPUs, which have no floating-computation component. It results in slow computation of the algorithms peformed by vision system or image processing, which have much floating-computation. In this paper, in order to resolve this weakness, we propose the Client(PDA)/server(PC) architecture which is connected to each other with a wireless LAN, and we construct the system with pipelining processing using two CPUs of the Client(PDA) and the Server(PC) in image sequence. The Client(PDA) extracts tentative text regions using Edge Density(ED). The Server(PC) uses both the Multi-1.aver Perceptron(MLP)-based texture classifier and Connected Component(CC)-based filtering for a definite text extraction based on the Client(PDA)'s tentativel99-y extracted results. The proposed method leads to not only efficient text extraction by using both the MLP and the CC, but also fast running time using Client(PDA)/server(PC) architecture with the pipelining processing.

An RFID Distance Bounding Protocol Based on Cryptographic Puzzles Providing Strong Privacy and Computational Efficiency (강한 프라이버시와 연산 효율성을 제공하는 암호 퍼즐 기반 RFID 경계 결정 프로토콜)

  • Ahn, Hae-Soon;Yoon, Eun-Jun;Nam, In-Gil
    • The KIPS Transactions:PartC
    • /
    • v.19C no.1
    • /
    • pp.9-18
    • /
    • 2012
  • In 2010, Pedro et al. proposed RFID distance bounding protocol based on WSBC cryptographic puzzle. This paper points out that Pedro et al.'s protocol not only is vulnerable to tag privacy invasion attack and location tracking attack because an attacker can easily obtain the secret key(ID) of a legal tag from the intercepted messages between the reader and the tag, but also requires heavy computation by performing symmetric key operations of the resource limited passive tag and many communication rounds between the reader and the tag. Moreover, to resolve the security weakness and the computation/communication efficiency problems, this paper also present a new RFID distance bounding protocol based on WSBC cryptographic puzzle that can provide strong security and high efficiency. As a result, the proposed protocol not only provides computational and communicational efficiency because it requires secure one-way hash function for the passive tag and it reduces communication rounds, but also provides strong security because both tag and reader use secure one-way hash function to protect their exchanging messages.

Video Adaptation Model for User-Centric Contents Delivery in Mobile Computing (모바일 환경에서 맞춤형 콘텐츠 전달을 위한 비디오 적응성 모델)

  • Kim, Svetlana;Yoon, Yong-Ik
    • The KIPS Transactions:PartA
    • /
    • v.16A no.5
    • /
    • pp.389-394
    • /
    • 2009
  • Lately the usage of multimedia equipment with small LCD displays is rapidly increasing. Although many people use devices like this, videos intended for TV or HDTV are sent to these mobile devices. Therefore cases where it is hard for the user to view the desired scenes are growing more frequent. Currently, most services simply reduce the size of the content to fit the screen when they offer it for mobile devices. However, especially with sports broadcasts, there are many areas that cannot be seen very well because it was simply reduced in size. We therefore consider this weakness and are researching how to let the user choose an area of interest and then sending it to the user in a way that fits the device. In this paper, we address the problem of video delivery and personalization. For the delivered video content, we suggest the UP-SAM User Personalized Context-Aware Service Adaptation Middleware) model that uses the video content description and MPEG-21 multimedia framework.