• Title/Summary/Keyword: 개인프레임

Search Result 353, Processing Time 0.029 seconds

Comparison of Prediction Algorithms in Tracking System of Multiple Vehicles (다중차량 추적시스템의 예측 알고리듬 비교)

  • Kim, In-Haeng;Kim, Whoi-Yul
    • Journal of Advanced Navigation Technology
    • /
    • v.3 no.2
    • /
    • pp.156-166
    • /
    • 1999
  • In multi-vehicle tracking systems Kalman filter is generally used for tracking vehicles. Despite well known advantages of Kalman filter that presents optimality with constraints, it is difficult to track several vehicles in real time simultaneously due to a large number of computations. In this paper, we propose a multi-vehicle tracking system with an adaptive predictor that employs recursive least square algorithm which can be easily implemented for real time application on a transversal filter. The performance of the proposed tracking system is compared to one with Kalman filter using a synthetic sequential image generated by computer graphics and real sequential image taken at intersections. Simulation results show that the proposed tracking system can be applied to track vehicles in real sequential image at the rate of 30 frame/sec on a PC environments without any special hardwares.

  • PDF

Phisical layer of ETRI wideband CDMA with 5 MHz bandwidth (5MHz 대역폭을 갖는 ETRI Wideband CDMA 시스템의 물리계층)

  • Bang, Seung-Chan;Park, Hyeong-Rae;Han, Yeong-Nam;Lim, Myeong-Seop;Lee, Heon;Han, Gi-Cheol;Park, Hang-Gu
    • Information and Communications Magazine
    • /
    • v.13 no.4
    • /
    • pp.56-63
    • /
    • 1996
  • In this paper, the phisical layer of 4.3008 Mcps wideband CDMA which is proposed as the standard of personal communication service system is introduced. It is designed to fit 5 MHz bandwidth by using $28{\times}2^n$ Hadamard code. 13 kbps CELP vocoder is chosen as the main one and 32 kbps ADPCM can be applied. In the reverse link, the burst pilot scheme is proposed and produces the increase of capacity compared with the continuous pilot method. In order to maintain the service quality when the signaling data is increased, the information data and signaling data are time-multiplexed and making use of signaling activity brings the increase of capacity. QPSK data and QPSK spreading, variable frame size, and code pair assignment for high data rate are accomplished and then information data is transmited up to 64 kbps. It is expected that the proposed techiniques here are used in the FPLMTS.

  • PDF

A Design Methodology of TMN Distributed Object based on Platform Independent Class Repository (플랫폼독립형 클래스저장소에 기반한 TMN 분산객체 디자인 방법론)

  • 이광형;박수현
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.24 no.12B
    • /
    • pp.2233-2248
    • /
    • 1999
  • The TMN that appears to operate the various communication networks generally and efficiently is developed under the different platform environment such as the different hardware and the different operating system. One of the main problems is that all the agents of the TMN system must be duplicated and maintain the software and the data blocks that perform the identical function. Therefore, the standard of the Q3 interface development cannot be defined and the multi-platform cannot be supported in the development of the TMN agent. In order to overcome these problems, the Farming methodology that is based on the Farmer model has been suggested. With the Farming methodology, the software and the data components which are duplicated and stored in each distributed object are saved in the platform independent class repository(PICR) by converting into the format of the independent componentware in the platform, so that the componentwares that are essential for the execution can be loaded and used statically or dynamically from PICR as described in the framework of each distributed object. The distributed TMN agent of the personal communication network is designed and developed by using the Farmer model.

  • PDF

Design of Security-Enhanced RFID Authentication Protocol Based on AES Cipher Algorithm (AES 암호 알고리듬 기반 보안성이 강화된 RFID 인증 프로토콜 설계)

  • Kang, Min-Sup
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.12 no.6
    • /
    • pp.83-89
    • /
    • 2012
  • This paper proposes the design of a security-enhanced RFID authentication protocol which meets the privacy protection for tag bearers. The protocol which uses AES(Advanced Encryption Standard) cipher algorithm is based on a three-way challenge response authentication scheme. In addition, three different types of protocol packet formats are also presented by extending the ISO/IEC 18000-3 standard for realizing the security-enhanced authentication mechanism in RFID system environment. Through the comparison of security, it was shown that the proposed scheme has better performance in user data confidentiality, Man-in-the-middle replay attack, and replay attack, and forgery resistance, compared with conventional some protocols. In order to validate the proposed protocol, a digital Codec of RFID tag is also designed based on the protocol. This Codec has been described in Verilog HDL and also synthesized using Xilinx Virtex XCV400E device.

Security Education Training Program Characteristics needed to Development Task of Security Software in Security Majors of 5 Universities of Seoul Region (서울지역 5개 대학 보안 전공들의 보안소프트웨어의 개발 직무에 필요한 보안 교육 훈련 프로그램 특성)

  • Hong, Jin-Keun
    • Journal of Convergence for Information Technology
    • /
    • v.10 no.5
    • /
    • pp.16-22
    • /
    • 2020
  • In this paper, the technology and capabilities required for the job of developing security software recommended by the Cybersecurity Human Resources Development Framework of the National Initiative for Cybersecurity Education (NICE) were studied. In this paper, we describe what security skills are needed for the task of developing security software and what security capabilities should be held. The focus of this paper is to analyze the consistency between security technologies (core and specialized technologies) required for security software development tasks and the curriculum of information protection-related departments located in Seoul, Korea. The reason for this analysis is to see how the curriculum at five universities in Seoul is suitable for performing security software development tasks. In conclusion, if the five relevant departments studied are to intensively train developers of development tasks for security software, they are commonly required to train security testing and software debugging, how secure software is developed, risk management, privacy and information assurance.

Device Adapter Model based on Dynamic Management Module for u-Health gateway (u-헬스 게이트웨이를 위한 동적 관리 모듈 기반의 디바이스 어댑터 모델)

  • Kim, Jong-Tak;Song, Si-Yun;Hwang, Hee-Jeong
    • Journal of Internet Computing and Services
    • /
    • v.11 no.2
    • /
    • pp.41-48
    • /
    • 2010
  • It is essential to guarantee a smooth communication and data exchange in a PHD(Personal Healthcare Device) network for applications providing U-health services. In spite of that, most of PHDs are heterogeneous, so the heterogeneity of their protocols makes it difficult to develop an integrated gateway sending sensed healthcare data to U-health service providers. To solve this problem, we suggest the design and implementation of a device adapter model based on dynamic managed module in this paper. Our model were implemented to work on the OSGi-based gateway middleware and to have interoperability in connection with the HL7 system that is the standard of the Healthcare Information systems. In addition, our model has an architecture supporting a communication based on the object serialization in order to provide extensibility in the functional aspect of applications. Through the experiment on a test-bed which is an implementation of the device adapter module for electrocardiogram and blood-pressure/blood-sugar device having one channel, we have confirmed the accuracy of sensing and sending data.

Typology Study on Journalists' Barriers to Science Reporting: Focusing on Q methodology (언론인들의 과학보도 장벽 유형에 관한 연구 - Q 방법론을 중심으로)

  • Kim, Jin-Young
    • Korean journal of communication and information
    • /
    • v.49
    • /
    • pp.99-121
    • /
    • 2010
  • Utilizing Q methodology, this study explored typology on journalists' barriers to science reporting. Two research issues were raised: First, what are the subjectivity factors and characteristic feature of journalist's barriers to science reporting; Second, what are the commonalities and differences among them. 20 science journalists were interviewed in-depth to find out their subjectivity factors. Korean journalists' type of barriers to science reporting could be classified into 4 groups as follows: Type I(N=8) is "reporting tendency barrier" type. Type II(N=3) is named for "institutional and systematic framework barrier". Type 3(N=5) belongs to "situational barrier" type. Type 4(N=3) is "scientific knowledge barrier" type.

  • PDF

A Study on Security Improvement in Hadoop Distributed File System Based on Kerberos (Kerberos 기반 하둡 분산 파일 시스템의 안전성 향상방안)

  • Park, So Hyeon;Jeong, Ik Rae
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.23 no.5
    • /
    • pp.803-813
    • /
    • 2013
  • As the developments of smart devices and social network services, the amount of data has been exploding. The world is facing Big data era. For these reasons, the Big data processing technology which is a new technology that can handle such data has attracted much attention. One of the most representative technologies is Hadoop. Hadoop Distributed File System(HDFS) designed to run on commercial Linux server is an open source framework and can store many terabytes of data. The initial version of Hadoop did not consider security because it only focused on efficient Big data processing. As the number of users rapidly increases, a lot of sensitive data including personal information were stored on HDFS. So Hadoop announced a new version that introduces Kerberos and token system in 2009. However, this system is vulnerable to the replay attack, impersonation attack and other attacks. In this paper, we analyze these vulnerabilities of HDFS security and propose a new protocol which complements these vulnerabilities and maintains the performance of Hadoop.

Recommendation using Service Ontology based Context Awareness Modeling (서비스 온톨로지 기반의 상황인식 모델링을 이용한 추천)

  • Ryu, Joong-Kyung;Chung, Kyung-Yong;Kim, Jong-Hun;Rim, Kee-Wook;Lee, Jung-Hyun
    • The Journal of the Korea Contents Association
    • /
    • v.11 no.2
    • /
    • pp.22-30
    • /
    • 2011
  • In the IT convergence environment changed with not only the quality but also the material abundance, it is the most crucial factor for the strategy of personalized recommendation services to investigate the context information. In this paper, we proposed the recommendation using the service ontology based context awareness modeling. The proposed method establishes a data acquisition model based on the OSGi framework and develops a context information model based on ontology in order to perform the device environment between different kinds of systems. In addition, the context information will be extracted and classified for implementing the recommendation system used for the context information model. This study develops the ontology based context awareness model using the context information and applies it to the recommendation of the collaborative filtering. The context awareness model reflects the information that selects services according to the context using the Naive Bayes classifier and provides it to users. To evaluate the performance of the proposed method, we conducted sample T-tests so as to verify usefulness. This evaluation found that the difference of satisfaction by service was statistically meaningful, and showed high satisfaction.

A Real-time Electronic Attendance-absence Recording System using Face Detection and Face Recognition (얼굴 검출 및 인식 기술을 이용한 실시간 전자 출결 시스템)

  • Jeong, Pil-seong;Cho, Yang-hyun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.8
    • /
    • pp.1524-1530
    • /
    • 2016
  • Recently, research about an electronic attendance-absence recording system has been actively carried out using smart devices. Using an electronic attendance-absence recording system, professors can check their students' attendance on a real-time basis and manage their attendance records. In this paper, we proposed a real-time electronic attendance-absence recording system using face detection and face recognition based on web application. It can solve the spatial, temporal, cost issues belong to electronic attendance-absence recording system using AIDC(Automatic Identification and Data Capture). A proposed system is running on web server and made by HTML5(Hyper Text Markup Language ver.5). So professor connect to server using mobile web browser on mobile device and real-time manage electronic attendance-absence recording with real-time send or receive image data. In addition, the proposed system has an advantage capable of installation and operation, regardless of the operating system because it operates based on the Python flask framework.