• Title/Summary/Keyword: personal networks

Search Result 426, Processing Time 0.035 seconds

Interoperating Methods of Heterogeneous Networks for Personal Robot System (퍼스널 로봇을 위한 이기종 네트웍 운용 방안)

  • Choo, Seong-Ho;Li, Vitaly;Lee, Jung-Bae;Park, Tai-Kyu;Jang, Ik-Gyu;Jung, Ki-Deok;Choi, Dong-Hee;Park, Hong-Seong
    • Proceedings of the KIEE Conference
    • /
    • 2004.05a
    • /
    • pp.86-88
    • /
    • 2004
  • Personal Robot System in developing, have a module architecture, each module are connected through variety network system like ethernet, WLAN (802.11), IEEE 1394 (firewire), bluetooth, CAN, or RS-232C. In developing personal robot system. We think that the key of robot performance is interoperablity among modules. Each network protocol are well connected in the view of network system for the interoperability. So we make a bridging architecture that can routing converting, and transporting packets with matching each network's properties. Furthermore, we suggest a advanced design scheme for realtime / non-realtime and control signal (short, requiring hard-realtime) / multimedia data (large, requiring soft-realtime).

  • PDF

An applicable Key Distribution and Authentication Protocol in Personal Communication Networks (개인 통신망에서 적용가능한 인증 및 키분배 프로토콜)

  • 송희삼;전문석
    • Proceedings of the Korea Institutes of Information Security and Cryptology Conference
    • /
    • 1995.11a
    • /
    • pp.331-337
    • /
    • 1995
  • In this paper, We present that protocols have already proposed an applicable key distribution and authentication protocol based discrete logarithm and prime-factorization problem in PCN(Personal Communication Network) is anaysised. We newly propose identiity-based protocol using smart card. This proposed potocol is that Fiat-Shamir identification scheme and a new key distribution scheme based on Fiat-Shamir identification scheme are joined. Proposed protocol is compared with suiting protocols with respect to security and efficiency to evalate performance, so its calculation is reduced in key distribution and authentication to evaluate performance.

  • PDF

A Feature Extraction of the EEG Using the Factor Analysis and the Neocognitron

  • Ito, S.;Mitsukura, Y.;Fukumi, M.;Akamatsu, N.
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.2217-2220
    • /
    • 2003
  • It is known that an EEG is characterized by the unique and personal characteristics of an individual. Little research has been done to take into account these personal characteristics when analyzing EEG signals. Often the EEG has frequency components which can describe most of the significant characteristics. These combinations are often unique like individual human beings and yet they have an underlying basic characteristics as well. We think that these combinations are the personal characteristics frequency components of the EEG. In this seminar, the EEG analysis method by using the Genetic Algorithms (GA), Factor Analysis (FA), and the Neural Networks (NN) is proposed. The GA is used for selecting the personal characteristic frequency components. The FA is used for extracting the characteristics data of the EEG. The NN is used for estimating the characteristics data of the EEG. Finally, in order to show the effectiveness of the proposed method, classifying the EEG pattern is carried out via computer simulations. The EEG pattern is evaluated under 4 conditions: listening to Rock music, Schmaltzy Japanese ballad music, Healing music, and Classical music. The results, when personal characteristics frequency components are NOT used, gave over 80 % accuracy versus a 95 % accuracy when personal characteristics frequency components are used. This result of our experiment shows the effectiveness of the proposed method.

  • PDF

An Energy-efficient Pair-wise Time Synchronization Protocol for Wireless Networks (에너지 효율적인 무선 네트워크용 상호 시각 동기화 프로토콜)

  • Bae, Shi-Kyu
    • Journal of Korea Multimedia Society
    • /
    • v.19 no.10
    • /
    • pp.1808-1815
    • /
    • 2016
  • TPSN(Timing-sync Protocol for Sensor Networks), the representative of time synchronization protocol, has been already developed to provide time synchronization among nodes in wireless sensor networks. Even though the TPSN's method has been referenced by so many other time synchronization schemes for resource-constrained networks like wireless sensor networks or low power personal area networks, it has some inefficiency in terms of power consumption and network-wide synchronization time (or called convergence time). The main reason is that each node in TPSN needs waiting delay to solve the collision problem due to simultaneous transmission among competing nodes, which causes more power consumption and longer network convergence time for a network-wide synchronization. In this paper an improved scheme is proposed by changing message exchange method among nodes. The proposed scheme not only shortens network-wide synchronization time, but also reduce collision traffic which lead to needless power consumption. The proposed scheme's performance has been evaluated and compared with an original scheme by simulation. The results are shown to be better than the original algorithm used in TPSN.

Enhancing Internet of Things Security with Random Forest-Based Anomaly Detection

  • Ahmed Al Shihimi;Muhammad R Ahmed;Thirein Myo;Badar Al Baroomi
    • International Journal of Computer Science & Network Security
    • /
    • v.24 no.6
    • /
    • pp.67-76
    • /
    • 2024
  • The Internet of Things (IoT) has revolutionized communication and device operation, but it has also brought significant security challenges. IoT networks are structured into four levels: devices, networks, applications, and services, each with specific security considerations. Personal Area Networks (PANs), Local Area Networks (LANs), and Wide Area Networks (WANs) are the three types of IoT networks, each with unique security requirements. Communication protocols such as Wi-Fi and Bluetooth, commonly used in IoT networks, are susceptible to vulnerabilities and require additional security measures. Apart from physical security, authentication, encryption, software vulnerabilities, DoS attacks, data privacy, and supply chain security pose significant challenges. Ensuring the security of IoT devices and the data they exchange is crucial. This paper utilizes the Random Forest Algorithm from machine learning to detect anomalous data in IoT devices. The dataset consists of environmental data (temperature and humidity) collected from IoT sensors in Oman. The Random Forest Algorithm is implemented and trained using Python, and the accuracy and results of the model are discussed, demonstrating the effectiveness of Random Forest for detecting IoT device data anomalies.

THE EFFICIENCY ROUTING ALGORITHM FOR MULTIMEDIA TRANSMISSION IN DIGITAL HOME NETWORK SCENARIOS

  • Nguyen Thanh Tung;Ahn Sea-Young;An Sun-Shin
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2006.06d
    • /
    • pp.136-138
    • /
    • 2006
  • The high-rate Wireless Personal Area Networks (WPANs) which IEEE 802.15.3 standard support, foster the Digital Home Network (DHN) scenarios with high rate multimedia data transmission. Actually, there are a few routing protocols for ad-hoc networks which considered the terminal location information and routing metric to reduce the energy consumption and optimize the routing path in mobile system. Based on other routing protocols, this paper presents the reliable location-based routing algorithm which is an adaptation to these networks.

  • PDF

Development of Personal-Credit Evaluation System Using Real-Time Neural Learning Mechanism

  • Park, Jong U.;Park, Hong Y.;Yoon Chung
    • The Journal of Information Technology and Database
    • /
    • v.2 no.2
    • /
    • pp.71-85
    • /
    • 1995
  • Many research results conducted by neural network researchers have claimed that the classification accuracy of neural networks is superior to, or at least equal to that of conventional methods. However, in series of neural network classifications, it was found that the classification accuracy strongly depends on the characteristics of training data set. Even though there are many research reports that the classification accuracy of neural networks can be different, depending on the composition and architecture of the networks, training algorithm, and test data set, very few research addressed the problem of classification accuracy when the basic assumption of data monotonicity is violated, In this research, development project of automated credit evaluation system is described. The finding was that arrangement of training data is critical to successful implementation of neural training to maintain monotonicity of the data set, for enhancing classification accuracy of neural networks.

  • PDF

The Development of Distribution Automation System Using TCP/IP (TCP/IP를 이용한 배전자동화시스템 구현)

  • Kim, Myong-Soo;Hyun, Duck-Hwa;Cho, Seon-Ku;Kim, Jae-Sung
    • Proceedings of the KIEE Conference
    • /
    • 2001.07d
    • /
    • pp.2452-2454
    • /
    • 2001
  • KEPRI, the research institute for KEPCO, has started developing a DAS using wireless communication networks since 1999. The wireless networks adopted Radio Link Protocol (RLP) of Personal Communication Service (PCS) as communication protocol. It is the first time that PCS is applied to data networks for DAS. The communication protocol, RLP, makes the DAS networks simple and economically affordable when they are installed at widely dispersed small cities. But, RLP has problem when it send unsolicited message. This paper describes the implementing method of a wireless network using RLP and TCP/IP Network to cope with unsolicited message problem.

  • PDF

Personal Recognition Method using Coupling Image of ECG Signal (심전도 신호의 커플링 이미지를 이용한 개인 인식 방법)

  • Kim, Jin Su;Kim, Sung Huck;Pan, Sung Bum
    • Smart Media Journal
    • /
    • v.8 no.3
    • /
    • pp.62-69
    • /
    • 2019
  • Electrocardiogram (ECG) signals cannot be counterfeited and can easily acquire signals from both wrists. In this paper, we propose a method of generating a coupling image using direction information of ECG signals as well as its usage in a personal recognition method. The proposed coupling image is generated by using forward ECG signal and rotated inverse ECG signal based on R-peak, and the generated coupling image shows a unique pattern and brightness. In addition, R-peak data is increased through the ECG signal calculation of the same beat, and it is thus possible to improve the recognition performance of the individual. The generated coupling image extracts characteristics of pattern and brightness by using the proposed convolutional neural network and reduces data size by using multiple pooling layers to improve network speed. The experiment uses public ECG data of 47 people and conducts comparative experiments using five networks with top 5 performance data among the public and the proposed networks. Experimental results show that the recognition performance of the proposed network is the highest with 99.28%, confirming potential of the personal recognition.

Design and Implementation of Personal Information Identification and Masking System Based on Image Recognition (이미지 인식 기반 향상된 개인정보 식별 및 마스킹 시스템 설계 및 구현)

  • Park, Seok-Cheon
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.5
    • /
    • pp.1-8
    • /
    • 2017
  • Recently, with the development of ICT technology such as cloud and mobile, image utilization through social networks is increasing rapidly. These images contain personal information, and personal information leakage accidents may occur. As a result, studies are underway to recognize and mask personal information in images. However, optical character recognition, which recognizes personal information in images, varies greatly depending on brightness, contrast, and distortion, and Korean recognition is insufficient. Therefore, in this paper, we design and implement a personal information identification and masking system based on image recognition through deep learning application using CNN algorithm based on optical character recognition method. Also, the proposed system and optical character recognition compares and evaluates the recognition rate of personal information on the same image and measures the face recognition rate of the proposed system. Test results show that the recognition rate of personal information in the proposed system is 32.7% higher than that of optical character recognition and the face recognition rate is 86.6%.