• Title/Summary/Keyword: 기능 블록

Search Result 623, Processing Time 0.026 seconds

Perceptual Generative Adversarial Network for Single Image De-Snowing (단일 영상에서 눈송이 제거를 위한 지각적 GAN)

  • Wan, Weiguo;Lee, Hyo Jong
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.8 no.10
    • /
    • pp.403-410
    • /
    • 2019
  • Image de-snowing aims at eliminating the negative influence by snow particles and improving scene understanding in images. In this paper, a perceptual generative adversarial network based a single image snow removal method is proposed. The residual U-Net is designed as a generator to generate the snow free image. In order to handle various sizes of snow particles, the inception module with different filter kernels is adopted to extract multiple resolution features of the input snow image. Except the adversarial loss, the perceptual loss and total variation loss are employed to improve the quality of the resulted image. Experimental results indicate that our method can obtain excellent performance both on synthetic and realistic snow images in terms of visual observation and commonly used visual quality indices.

Implementation and Analysis Performance of CCM-UW based AES, ARIA Blockcipher for Underwater Environment (수중무선통신 환경에 적합한 AES, ARIA 블록암호 기반 CCM-UW 구현 및 성능 분석)

  • Lee, Jae-Hoon;Park, Minha;Yun, Nam-Yeol;Yi, Okyeon;Park, Soo-Hyun
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.05a
    • /
    • pp.115-118
    • /
    • 2014
  • Underwater Wireless Communication System can be useful for research of quality of water, ocean resources exploration, analysis ocean environment and so on. However, there exist security threats including data loss, data forgery, and another variety of security threats, because of characteristics of water, various geographical factors, intended attack, etc. To solve these problem, in this paper, we propose a CCM-UW mode of operation modified form of CCM mode of operation, providing data confidentiality, integrity, origin authentication and anti-attack prevent, for the Underwater Wireless Communication System. By implementing CCM-UW in MACA protocol(Underwater Wireless Communication MAC Protocol) and measuring speed of communication, we confirm the applicability of the security and analyze the communication environment impact.

  • PDF

An ASIC Design for Photon Pulse Counting Particle Detection (광계수방식 물리입자 검출용 ASIC 설계)

  • Jung, Jun-Mo;Soh, Myung-Jin;Kim, Hyo-Sook;Han, AReum;Soh, Seul-Yi
    • Journal of IKEEE
    • /
    • v.23 no.3
    • /
    • pp.947-953
    • /
    • 2019
  • The purpose of this paper is to explore an ASIC design for estimating sizes and concentrations of airborne micro-particles by the means of integrating, amplifying and digitizing electric charge signals generated by photo-sensors as it receives scattered photons by the presence of micro-particles, consisting of a pre-amplifier that detects and amplifies voltage or current signal from photo-sensor that generates charges (hole-electron pairs) when exposed to visible rays, infrared rays, ultraviolet rays, etc. according to the intensity of rays; a shaper for shaping the amplified signal to a semi-gaussian waveform; two discriminators and binary counters for outputting digital signals by comparing the magnitude of the shaped signal with an arbitrary reference voltages. The ASIC with the proposed architecture and functional blocks in this study was designed with a 0.18um standard CMOS technology from Global Foundries and the operation and performances of the ASIC has been verified by the silicons fabricated by using the process.

Water Jet Experiment of Automatic Fire-tracking Water Cannon Facility combined with Indoor Hydrant Facility in Road Tunnels (도로터널의 옥내소화전설비 겸용 자동화점추적 방수총설비의 방수실험)

  • Kim, Chang-Yong;Kong, Ha-Sung
    • Fire Science and Engineering
    • /
    • v.33 no.1
    • /
    • pp.92-98
    • /
    • 2019
  • To determine if water-jet nozzle moves and water jetting are effective according to the location of the fire, this study examined the automatic fire-tracking water cannon system and aan indoor hydrant system, such as water jet centered directivity, water jet range maintainability and water jet shape uniformity. First, an examination to find the center of fire accurately from this system design showed that the water jet centered test was accurate. Second, the water jet range test results showed that when water is jetted at the maximum water jet radius, the water jet shows an inaccurate result but within the allowable tolerance range. Finally, the water-jet shape test result confirmed that there are no problems in setting the block from the algorithm design.

A Study on the 4th Industrial Revolution and E-Government Security Strategy -In Terms of the Cyber Security Technology of Intelligent Government- (제4차 산업혁명과 전자정부 보안연구 -지능형 정부의 빅데이터 사이버보안기술 측면에서-)

  • Lee, Sang-Yun;Yoon, Hong-Joo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.2
    • /
    • pp.369-376
    • /
    • 2019
  • This paper studies desirable form of future e-government in terms of intelligent government research in response to new intelligent cyber security services in the fourth industrial revolution. Also, the strategic planning of the future e-government has been contemplated in terms of the centralization and intellectualization which are significant characteristics of the fourth industrial revolution. The new system construction which is applied with security analysis technology using big data through advanced relationship analysis is suggested in the paper. The establishment of the system, such as SIEM(Security Information & Event Management), which anticipatively detects security threat by using log information through big data analysis is suggested in the paper. Once the suggested system is materialized, it will be possible to expand big data object, allow centralization in terms of e-government security in the fourth industrial revolution, boost data process, speed and follow-up response, which allows the system to function anticipatively.

A Case Study of Artificial Intelligence Education Course for Graduate School of Education (교육대학원에서의 인공지능 교과목 운영 사례)

  • Han, Kyujung
    • Journal of The Korean Association of Information Education
    • /
    • v.25 no.5
    • /
    • pp.673-681
    • /
    • 2021
  • This study is a case study of artificial intelligence education subjects in the graduate school of education. The main educational contents consisted of understanding and practice of machine learning, data analysis, actual artificial intelligence using Entries, artificial intelligence and physical computing. As a result of the survey on the educational effect after the application of the curriculum, it was found that the students preferred the use of the Entry AI block and the use of the Blacksmith board as a physical computing tool as the priority applied to the elementary education field. In addition, the data analysis area is effective in linking math data and graph education. As a physical computing tool, Husky Lens is useful for scalability by using image processing functions for self-driving car maker education. Suggestions for desirable AI education include training courses by level and reinforcement of data collection and analysis education.

A Design of the High-Speed Cipher VLSI Using IDEA Algorithm (IDEA 알고리즘을 이용한 고속 암호 VLSI 설계)

  • 이행우;최광진
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.11 no.1
    • /
    • pp.64-72
    • /
    • 2001
  • This paper is on a design of the high-speed cipher IC using IDEA algorithm. The chip is consists of six functional blocks. The principal blocks are encryption and decryption key generator, input data circuit, encryption processor, output data circuit, operation mode controller. In subkey generator, the design goal is rather decrease of its area than increase of its computation speed. On the other hand, the design of encryption processor is focused on rather increase of its computation speed than decrease of its area. Therefore, the pipeline architecture for repeated processing and the modular multiplier for improving computation speed are adopted. Specially, there are used the carry select adder and modified Booth algorithm to increase its computation speed at modular multiplier. To input the data by 8-bit, 16-bit, 32-bit according to the operation mode, it is designed so that buffer shifts by 8-bit, 16-bit, 32-bit. As a result of simulation by 0.25 $\mu\textrm{m}$ process, this IC has achieved the throughput of 1Gbps in addition to its small area, and used 12,000gates in implementing the algorithm.

SoC Implementation of Fingerprint Feature Extraction System with Ridge Following (융선추적을 이용한 지문 특징점 추출기의 SoC 구현)

  • 김기철;박덕수;정용화;반성범
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.14 no.5
    • /
    • pp.97-107
    • /
    • 2004
  • This paper presents an System-on-Chip(SoC) implementation of fingerprint feature extraction system. Typical fingerprint feature extraction systems employ binarization and thinning processes which cause many extraction errors for low qualify fingerprint images and degrade the accuracy of the entire fingerprint recognition system. To solve these problems, an algorithm directly following ridgelines without the binarization and thinning process has been proposed. However, the computational requirement of the algorithm makes it hard to implement it on SoCs by using software only. This paper presents an implementation of the ridge-following algorithm onto SoCs. The algorithm has been modified to increase the efficiency of hardwares. Each function block of the algorithm has been implemented in hardware or in software by considering its computational complexity, cost and utilization of the hardware, and efficiency of the entire system. The fingerprint feature extraction system has been developed as an IP for SoCs, hence it can be used on many kinds of SoCs for smart cards.

An Improvement of missing pet rescue system based on Smart Contract (스마트 컨트랙트 기반의 유실 애완동물 구조 시스템 개선)

  • Kwon, Hyeok-dong;Kim, Hyun-jun;Jang, Kyoung-bae;Seo, Hwa-jeong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.24 no.6
    • /
    • pp.786-794
    • /
    • 2020
  • For systematic pet management, the pet registration system has established. It makes the owner of the pet is given greater responsibility through the pet registration system but it also provided with welfare. One of the advantages of the pet registration system is that prepare system what return to owner quickly and safety through information inquiry when the pets are lost. But there are some conflict with the law in the information inquiry, so it occurs interfere the system. In this paper, we propose using the Smart Contract to finding the missing animal effectively. Proposed method discloses only the partially information. Thus it will be eliminated conflict parts, and increases the information accessibility to increase the number of people who can inquiry information. In addition, keeping the RFID inquired feature for compatible with the existing system. The smart contract querying enables quickly and precision access to information. Lastly, compare the proposed method with existing method to see the improvement.

NBAS: NFT-based Bluetooth Device Authentication System (NBAS: NFT를 활용한 블루투스 장치 인증시스템)

  • Hwang, Seong-Uk;Son, Sung-Moo;Chung, Sung-Wook
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.26 no.5
    • /
    • pp.793-801
    • /
    • 2022
  • Most Bluetooth devices are commonly used in various ways these days, but they can be often lost due to small-size devices. However, most Bluetooth protocol do not provide authentication functions to legitimate owners, and thus someone who obtains the lost Bluetooth device can easily connect to their smart devices to use it. In this paper, we propose NBAS can authenticates legitimate owners using NFT on lossy Bluetooth devices.NBAS generates a digital wallet on the blockchain using the decentralized network Ethereum blockchain and facilitating the MAC address of the Bluetooth device in the digital wallet. The owner of the wallet uses a private key to certify the Bluetooth device using NFT. The initial pairing time of NBAS was 10.25 sec, but the reconnection time was 0.007 sec similar to the conventional method, and the pairing rejection time for unapproved users was 1.58 sec on average. Therefore, the proposed NBAS effectively shows the device authentication over the conventional Bluetooth.