• Title/Summary/Keyword: real-time network

Search Result 4,424, Processing Time 0.031 seconds

Encryption Method Based on Chaos Map for Protection of Digital Video (디지털 비디오 보호를 위한 카오스 사상 기반의 암호화 방법)

  • Yun, Byung-Choon;Kim, Deok-Hwan
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.1
    • /
    • pp.29-38
    • /
    • 2012
  • Due to the rapid development of network environment and wireless communication technology, the distribution of digital video has made easily and the importance of the protection for digital video has been increased. This paper proposes the digital video encryption system based on multiple chaos maps for MPEG-2 video encoding process. The proposed method generates secret hash key of having 128-bit characteristics from hash chain using Tent map as a basic block and generates $8{\times}8$ lattice cipher by applying this hash key to Logistic map and Henon map. The method can reduce the encryption overhead by doing selective XOR operations between $8{\times}8$ lattice cipher and some coefficient of low frequency in DCT block and it provides simple and randomness characteristic because it uses the architecture of combining chaos maps. Experimental results show that PSNR of the proposed method is less than or equal to 12 dB with respect to encrypted video, the time change ratio, compression ratio of the proposed method are 2%, 0.4%, respectively so that it provides good performance in visual security and can be applied in real time.

Systemic Approaches Identify a Garlic-Derived Chemical, Z-ajoene, as a Glioblastoma Multiforme Cancer Stem Cell-Specific Targeting Agent

  • Jung, Yuchae;Park, Heejoo;Zhao, Hui-Yuan;Jeon, Raok;Ryu, Jae-Ha;Kim, Woo-Young
    • Molecules and Cells
    • /
    • v.37 no.7
    • /
    • pp.547-553
    • /
    • 2014
  • Glioblastoma multiforme (GBM) is one of the most common brain malignancies and has a very poor prognosis. Recent evidence suggests that the presence of cancer stem cells (CSC) in GBM and the rare CSC subpopulation that is resistant to chemotherapy may be responsible for the treatment failure and unfavorable prognosis of GBM. A garlic-derived compound, Z-ajoene, has shown a range of biological activities, including anti-proliferative effects on several cancers. Here, we demonstrated for the first time that Z-ajoene specifically inhibits the growth of the GBM CSC population. CSC sphere-forming inhibition was achieved at a concentration that did not exhibit a cytotoxic effect in regular cell culture conditions. The specificity of this inhibitory effect on the CSC population was confirmed by detecting CSC cell surface marker CD133 expression and biochemical marker ALDH activity. In addition, stem cell-related mRNA profiling and real-time PCR revealed the differential expression of CSC-specific genes, including Notch, Wnt, and Hedgehog, upon treatment with Z-ajoene. A proteomic approach, i.e., reverse-phase protein array (RPPA) and Western blot analysis, showed decreased SMAD4, p-AKT, 14.3.3 and FOXO3A expression. The protein interaction map (http://string-db.org/) of the identified molecules suggested that the AKT, ERK/p38 and $TGF{\beta}$ signaling pathways are key mediators of Z-ajoene's action, which affects the transcriptional network that includes FOXO3A. These biological and bioinformatic analyses collectively demonstrate that Z-ajoene is a potential candidate for the treatment of GBM by specifically targeting GBM CSCs. We also show how this systemic approach strengthens the identification of new therapeutic agents that target CSCs.

APPLYING ENTERPRISE GIS TO DISASTER MANAGEMENT AT KANGWON PROVINCE

  • Yoon, Hoon-Joo;Ryu, Joong-Hi;Kim, Jung-Dai;Park, Hong-Gi
    • Journal of Korean Society for Geospatial Information Science
    • /
    • v.9 no.2 s.18
    • /
    • pp.29-36
    • /
    • 2001
  • The purpose of this paper is to describe the Disaster Management System Development of Enterprise GIS at the Kangwon Province in Korea. This project is included into 'the Kangwon Enterprise GIS 21 plan'. The Division of Disaster Management is in the middle of the 2-year project of the Disaster Management System development, appropriate for business performed at the Departments of Forestry, Culture, Environment, Tourism, etc. At the 1st phase of CIS implementation, for more than half a year we focused on the necessity of management of disasters. In the planning process, we needed long-term information on the whole area of Kangwon. In the assessment and response processes, we needed real-time data from Korean Meteorological Administration and other agencies. All the above information was carefully studied and referred to. ESRI's new GIS technologies solve the natural hazard/disaster problems. For example, hazardous materials routing often needs to be found the least expensive path through a roadway network. In the circumstances given, we can choose the departure point and destination of the vehicle, which carries the materials. It's also possible to minimize overall risk and costs of disaster problems by making a plan of people and possessions evacuation from the disaster area in short time limits. We can meet all the above goals using the latest ESRI's technologies.

  • PDF

A novel architecture of CCN for better security and applicability (향상된 보안 및 적용 가능성을 위한 컨텐츠 중심 네트워킹(CCN)의 새로운 아키텍처 연구)

  • Sharma, Aashis;Kim, Yun Seon
    • Journal of the Korea Society for Simulation
    • /
    • v.26 no.1
    • /
    • pp.21-38
    • /
    • 2017
  • Information Centric Networking is changing the way how content is being transmitted. The shift from IP and host based networking towards content based networking scenario is growing day by day. Many researches have been done about different frameworks of ICN. Caching is an important part of ICN and many researchers have also proposed different ways for caching the data. With caching of data in intermediate devices like the network devices as well the user devices in some cases, the issue of content security as well as the role of the content producer becomes a major concern. A modified ICN architecture based on the current Content Centric Networking (CCN) model is presented in the paper. The architecture mainly focuses on involving the content producer in content delivery in the real time. The proposed architecture provides better security aspects for the CCN architecture. Apart from security the paper will also consider the issue of applicability of CCN architecture to replace the TCP/IP based architecture. The efficiency of the proposed architecture is compared with the previous CCN architecture based on the response time for a content delivery which shows very comparable level of efficiency. The paper than analyzes different beneficial aspects of the proposed architecture over the current architecture.

Multi-Channel MAC Protocol Based on V2I/V2V Collaboration in VANET (VANET에서 V2I/V2V 협력 기반 멀티채널 MAC 프로토콜)

  • Heo, Sung-Man;Yoo, Sang-Jo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.1
    • /
    • pp.96-107
    • /
    • 2015
  • VANET technologies provide real-time traffic information for mitigating traffic jam and preventing traffic accidents, as well as in-vehicle infotainment service through Telematics/Intelligent Transportation System (ITS). Due to the rapid increasement of various requirements, the vehicle communication with a limited resource and the fixed frame architecture of the conventional techniques is limited to provide an efficient communication service. Therefore, a new flexible operation depending on the surrounding situation information is required that needs an adaptive design of the network architecture and protocol for efficiently predicting, distributing and sharing the context-aware information. In this paper, Vehicle-to-Infrastructure (V2I) based on communication between vehicle and a Road Side Units (RSU) and Vehicle-to-Vehicle (V2V) based on communication between vehicles are effectively combined in a new MAC architecture and V2I and V2V vehicles collaborate in management. As a result, many vehicles and RSU can use more efficiently the resource and send data rapidly. The simulation results show that the proposed method can achieve high resource utilization in accordance. Also we can find out the optimal transmission relay time and 2nd relay vehicle selection probability value to spread out V2V/V2I collaborative schedule message rapidly.

Development of Battery-free SAW Integrated Microsensor for Real Time Simultaneous Measurement of Humidity and $CO_2$ component (습도와 $CO_2$ 농도의 실시간 동시감지를 위한 무전원 SAW 기반 집적 센서 개발)

  • Lim, Chun-Bae;Lee, Kee-Keun;Wang, Wen;Yang, Sang-Sik
    • Journal of the Microelectronics and Packaging Society
    • /
    • v.16 no.1
    • /
    • pp.13-19
    • /
    • 2009
  • A 440MHz wireless and passive surface acoustic wave (SAW) based chemical sensor was developed on a $41^{\circ}YX\;LiNbO_3$ piezoelectric substrate for simultaneous measurement of $CO_2$ gas and relative humidity (RH) using a reflective delay line pattern as the sensor element. The reflective delay line is composed of an interdigital transducer (IDT) and several shorted grating reflectors. A Teflon AF 2400 and a hydrophilic $SiO_2$ layer were used as $CO_2$ and water vapor sensitive films. The coupling of mode (COM) modeling was conducted to determine optimal device parameters prior to fabrication. According to simulation results, the device was fabricated and then wirelessly measured using the network analyzer. The measured reflective coefficient $S_{11}$ in the time domain showed high signal/noise (S/N) ratio, small signal attenuation, and few spurious peaks. In the $CO_2$ and humidity testing, high sensitivity ($2^{\circ}/ppm$ for $CO_2$ detection and $7.45^{\circ}/%$RH for humidity sensing), good linearity and repeatability were observed in the $CO_2$ concentration ranges of $75{\sim}375ppm$ and humidity levels of $20{\sim}80%$RH. Temperature and humidity compensations were also investigated during the sensitivity evaluation process.

  • PDF

Design and Implementation of a SQL based Moving Object Query Process System for Controling Transportation Vehicle (물류 차량 관제를 위한 SQL 기반 이동 객체 질의 처리 시스템의 설계 및 구현)

  • Jung, Young-Jin;Ryu, Keun-Ho
    • The KIPS Transactions:PartD
    • /
    • v.12D no.5 s.101
    • /
    • pp.699-708
    • /
    • 2005
  • It becomes easy and generalized to track the cellular phone users and vehicles according to the Progress of wireless telecommunication, the spread of network, and the miniaturization of terminal devices. It has been constantly studied to provide location based services to furnish suitable services depending on the positions of customers. Various vehicle tracking and management systems are developed to utilize and manage the vehicle locations to relieve the congestion of traffic and to smooth transportation. However the designed previous work can not evaluated in real world, because most of previous work is only designed not implemented and it is developed for simple model to handle a point, a line, a polygon object. Therefore, we design a moving object query language and implement a vehicle management system to search the positions and trajectories of vehicles and to analyze the cost of transportation effectively. The designed query language based on a SQL can be utilized to get the trajectories between two specific places, the departure time, the arrival time of vehicles, and the predicted uncertainty positions, etc. In addition, the proposed moving object query language for managing transportation vehicles is useful to analyze the cost of trajectories in a variety of moving object management system containing transportation.

Study on Location Decisions for Cloud Transportation System Rental Station (이동수요 대응형 클라우드 교통시스템 공유차량 대여소 입지선정)

  • Shin, Min-Seong;Bae, Sang-Hoon
    • Journal of Korean Society of Transportation
    • /
    • v.30 no.2
    • /
    • pp.29-42
    • /
    • 2012
  • Recently, traffic congestion has become serious due to increase of private car usages. Carsharing or other innovative public transportation systems were developed to alleviate traffic congestion and carbon emissions. These measures can make the traffic environment more comfortable, and efficient. Cloud Transportation System (CTS) is a recent carsharing model. User can rent an electronic vehicles with various traffic information through the CTS. In this study, a concept, vision and scenarios of CTS are introduced. And, authors analyzed the location of CTS rental stations and estimated CTS demands. Firstly, we analyze the number of the population, employees, students and traffic volume in study areas. Secondly, the frequency and utilization time are examined. Demand for CTS in each traffic zone was estimated. Lastly, the CTS rental station location is determined based on the analyzed data of the study areas. Evaluation standard of the determined location includes accessibility and density of population. And, the number of vehicles and that of parking zone at the rental station are estimated. The result suggests that Haewoondae Square parking lot would be assigned 11 vehicles and 14.23 parking spaces and that Dongbac parking lot be assigned 7.9 vehicles and 10.29 parking spaces. Further study requires additional real-time data for CTS to increase accuracy of the demand estimation. And network design would be developed for redistribution of vehicles.

Development of Traffic Safety Monitoring Technique by Detection and Analysis of Hazardous Driving Events in V2X Environment (V2X 환경에서 위험운전이벤트 검지 및 분석을 통한 교통안전 모니터링기법 개발)

  • Jeong, Eunbi;Oh, Cheol;Kang, Kyeongpyo;Kang, Younsoo
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.11 no.6
    • /
    • pp.1-14
    • /
    • 2012
  • Traffic management centers (TMC) collect real-time traffic data from the field and have powerful databases for analysing, recording, and archiving the data. Recent advanced sensor and communication technologies have been widely applied to intelligent transportation systems (ITS). Regarding sensors, various in-vehicle sensors, in addition to global positioning system (GPS) receiver, are capable of providing high resolution data representing vehicle maneuverings. Regarding communication technologies, advanced wireless communication technologies including vehicle-to-vehicle (V2V) and vehicle-to-vehicle infrastructure (V2I), which are generally referred to as V2X, have been widely used for traffic information and operations (references). The V2X environment considers the transportation system as a network in which each element, such as the vehicles, infrastructure, and drivers, communicates and reacts systematically to acquire information without any time and/or place restrictions. This study is motivated by needs of exploiting aforementioned cutting-edge technologies for developing smarter transportation services. The proposed system has been implemented in the field and discussed in this study. The proposed system is expected to be used effectively to support the development of various traffic information control strategies for the purpose of enhancing traffic safety on highways.

A Study on Deep Learning-based Pedestrian Detection and Alarm System (딥러닝 기반의 보행자 탐지 및 경보 시스템 연구)

  • Kim, Jeong-Hwan;Shin, Yong-Hyeon
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.18 no.4
    • /
    • pp.58-70
    • /
    • 2019
  • In the case of a pedestrian traffic accident, it has a large-scale danger directly connected by a fatal accident at the time of the accident. The domestic ITS is not used for intelligent risk classification because it is used only for collecting traffic information despite of the construction of good quality traffic infrastructure. The CNN based pedestrian detection classification model, which is a major component of the proposed system, is implemented on an embedded system assuming that it is installed and operated in a restricted environment. A new model was created by improving YOLO's artificial neural network, and the real-time detection speed result of average accuracy 86.29% and 21.1 fps was shown with 20,000 iterative learning. And we constructed a protocol interworking scenario and implementation of a system that can connect with the ITS. If a pedestrian accident prevention system connected with ITS will be implemented through this study, it will help to reduce the cost of constructing a new infrastructure and reduce the incidence of traffic accidents for pedestrians, and we can also reduce the cost for system monitoring.