• Title/Summary/Keyword: 정보 메시지

Search Result 3,591, Processing Time 0.049 seconds

Recognition of Special Vehicles Using Roof Marks (루프 마크를 이용한 특수차량 인식)

  • Kim, Seok-Young;Lee, Jaesung
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2016.10a
    • /
    • pp.293-296
    • /
    • 2016
  • In case of an emergency on a busy road of a city, drivers should make way for special vehicles such as police cars, fire engines, or ambulance as soon as possible. If road infrastructures recognize the movements of special vehicles, and transfer alert message to traffic signal controllers and normal cars through wireless network such as WAVE or TPEG, normal cars can prepare to make way in advance. As a result, it help special vehicles move faster. In this paper, we install a roof mark on the roof of a special vehicle, detect the mark through a mark recognition algorithm which includes perspective transformation, and get the inner information by decoding the digital pattern on it. The experiment results show that mark can be recognized 100% and 93.3% of inner digital data of the mark can be recognized, when the size of a mark is larger than $88cm{\times}88cm$ and the mark moves at a speed of 50km/s.

  • PDF

Development of an IoT-Based Human Interactive Advertising Service for Sharing Economy (공유경제를 위한 IoT 기반의 휴먼 인터랙티브 광고 서비스 구현)

  • Jung, Wonseok;Lee, Chang-Kyo;Ko, Wan-Jin;Seo, Jeongwook
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2019.05a
    • /
    • pp.413-415
    • /
    • 2019
  • In this paper, we develop IoT-HiAS(IoT-Human Interactive Advertising Service) for sharing economy. The HiAS device shooting the front of the device via a webcam and recognizes the person in real time through the SSD model using MobileNet. If the number of persons above the set threshold is recognized by counting the recognized person, the advertisement is reproduced on the idle resource through the beam projector. At the same time as the advertisement is reproduced, the captured image of the advertisement start time in the front of the device and the number of recognized persons are sends the IoT server of an oneM2M-compliant HiAS server using the IoT client. When the advertisement is finish, the webcam is shooting the front of the device and the image is sends the IoT server. We implemented the IoT-based human interactive advertising service by transmitting the received data to the advertiser and the advertising producers through the SNS(Social Network Service) agent of the HiAS server.

  • PDF

An Efficiency Improved ID-based Tripartite Key Agreement Protocol (효율성을 개선한 신원기반의 3자간 복수 키 합의 프로토콜)

  • Park Young-Ho;Rhee Kyung-Hyune
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.3
    • /
    • pp.77-89
    • /
    • 2005
  • As the ID-based public key cryptosystems become a very active research area, a number of ID-based key agreement protocols have been proposed, but unfortunately many of them were analyzed that there were some security flaws in the protocols. In addition to key agreement protocols, in recent, Liu et al. and Kim et al. proposed the key agreement protocols that multiple session keys are established at once among participated entities. In this paper, we propose an ID-based tripartite key agreement protocol that establishes 8 keys by improving the efficiency of the Liu et al's. Moreover, the proposed protocol can be used in the situation where multiple different private key generators(PKG) are involved. Therefore, because the private key issued by different PKGs belonging to each entity's domain can be used, our proposed scheme is more efficiently applicable to the practical applications.

A Handover Authentication Scheme initiated by Mobile Node for Heterogeneous FMIPv6 Mobile Networks (이기종 FMIPv6 기반의 이동 망에서 이동 노드 주도형 핸드오버 인증 기법)

  • Choi, Jae-Duck;Jung, Sou-Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.17 no.2
    • /
    • pp.103-114
    • /
    • 2007
  • The existing handover authentication schemes have authentication delay and overhead of the authentication server since they have been separately studied handover authentication at the link layer and the network layer. This paper proposes a handover authentication scheme initiated by Mobile Node on FMIPv6 based mobile access networks. The main idea of the paper is to generate a session key at the mobile node side, and transfer it to the next Access Router through the authentication server. Also, the scheme has a hierarchical key management at access router. There are two advantages of the scheme. First, the generated session key can be utilized for protecting the binding update messages and also for access authentication. Second, hierarchical key management at the access router reduced the handover delay time. The security aspects on the against PFS, PBS, and DoS attack of proposed scheme are discussed.

An Enhanced Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Privacy (강한 인증과 프라이버시를 보장하는 개선된 초경량 RFID 인증 프로토콜)

  • Jeon, Dong-Ho;Kim, Young-Jae;Kwon, Hye-Jin;Jeong, Seon-Yeong;Kim, Soon-Ja
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.19 no.5
    • /
    • pp.81-91
    • /
    • 2009
  • Recently, Chein et al proposed the ultralightweight strong authentication and strong integrity (SASI)protocol, where the tag requrires only simple bitwise operations. Since the tag does not support random number generator to generate a challenge nonce, an attacker can replay old messages and impersonate reader. However, all of the previous ultralightweight authentication schemes are vlunerable to various attacks: de-synk, eavesdropping, impersonating, tracking, DoS, disclosure etc. we analyze the problems of previous proposed ultrlightweight protocols, to overcome these security problems by using PRNG on the tag. Therefore, in this paper we propose a new lightweight RFID mutual authentication protocol that provides random number generator and bitwise operations, a security and an efficiency of the proposed schme analyze.

Automation System for Sharing CDM Data (CDM 데이터 공유를 위한 자동화 시스템)

  • Jeong, Chae-Eun;Kang, Yunhee;Park, Young B.
    • Journal of Platform Technology
    • /
    • v.8 no.3
    • /
    • pp.3-9
    • /
    • 2020
  • As the need for sharing for research purposes in the medical field increases, the use of a Common Data Model (CDM) is increasing. However, when sharing CDM data, there are some problems in that access control and personal information in the data are not protected. In this paper, in order to solve this problem, access to CDM data is controlled by using an encryption method in a blockchain network, and information of CDM data is recorded to enable tracking. In addition, IPFS was used to share a large amount of CDM data, and Celery was used to automate the sharing process. In other words, we propose a multi-channel automation system in which the information required for CDM data sharing is shared by a trust-based technology, a distributed file system, and a message queue for automation. This aims to solve the problem of access control and personal information protection in the data that occur in the process of sharing CDM data.

  • PDF

D-ARP Scheme for Full Mesh Routing in Partial BMA Network (제한적 BMA 네트워크에서 Full Mesh 라우팅을 위한 D-ARP 기법)

  • Kim, Moon
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.25 no.8
    • /
    • pp.1088-1094
    • /
    • 2021
  • This paper proposes a partial BMA (Broadcasting Multiple Access) network structure and D-ARP (Distributed Address Resolution Protocol) method in order to support full mesh routing function in the DAMA (Demand Assigned Multiple Access)-based MF-TDMA (Multi Frequency-Time Division Multiple Access) satellite system. The partial BMA network enables legacy router devices and routing protocols to be adopted in the satellite communication system, and decreases the amount of routing protocol overhead. In addition, we introduce the D-ARP method that help a spoke satellite node acquiring the MAC (Media Access Control) address from remote satellite nodes in none BMA satellite network. The D-ARP method provides the MAC address of remote nodes to each other nodes through the broadcasting-enabled satellite channel. And we lastly evaluate and analysis the network performance of the proposed approach.

Real-time LSTM Prediction of RTS Correction for PPP by a Low-cost Positioning Device (저가형 측위장치에 RTS 보정정보의 실시간 LSTM 예측 기능 구현을 통한 PPP)

  • Kim, Beomsoo;Kim, Mingyu;Kim, Jeongrae;Bu, Sungchun;Lee, Chulsoo
    • Journal of Advanced Navigation Technology
    • /
    • v.26 no.2
    • /
    • pp.119-124
    • /
    • 2022
  • The international gnss service (IGS) provides real-time service (RTS) orbit and clock correction applicable to the broadcast ephemeris of GNSS satellites. However, since the RTS correction cannot be received if the Internet connection is lost, the RTS correction should be predicted and used when a signal interruption occurs in order to perform stable precise point positioning (PPP). In this paper, PPP was performed by predicting orbit and clock correction using a long short-term memory (LSTM) algorithm in real-time during the signal loss. The prediction performance was analyzed by implementing the LSTM algorithm in RPI (raspberry pi), the processing speed of which is not high. Compared to the polynomial prediction model, LSTM showed excellent performance in long-term prediction.

A Study on the Efficient Information Delivery of Take-Over Request for Semi-Autonomous Vehicles (반자율주행 차량의 제어권 전환 상황에서 효율적 정보 제공 방식에 관한 연구)

  • Park, Cheonkyu;Kim, Dongwhan
    • The Journal of the Korea Contents Association
    • /
    • v.22 no.4
    • /
    • pp.70-82
    • /
    • 2022
  • At the current stage of a semi-autonomous vehicle, there are situations in which the vehicle has to request take-over control to the driver quickly. However, current self-driving cars use only simple messages and warning sounds to notify drivers when handing over control, so they do not adequately convey considerations of individual characteristics or explanations of various emergent situations. This study investigated how visual and auditory information and the efficacy of drivers in self-driving cars can improve efficient take-over requests between the car and the driver. We found that there were significant differences in driver's cognitive load, reliability, safety, usability, and usefulness according to the combination of three visual and auditory information provided in the experiment of the take-over request situation. The results of this study are expected to help design self-driving vehicles that can communicate more safely and efficiently with drivers in urgent control transition situations.

SPARQL Query Tool for Using OWL Ontology (OWL 온톨로지 사용을 위한 SPARQL 쿼리 툴)

  • Jo, Dae-Woong;Choi, Ji-Woong;Kim, Myung-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.14 no.11
    • /
    • pp.21-30
    • /
    • 2009
  • Semantic web uses ontology languages such as RDF, RDFS, and OWL to define the metadata on the web. There have been many researching efforts in the semantic web technologies based on an agent for extracting triple and relation about concept of ontology. But the extraction of relation and triple about the concept of ontology based on an agent ends up writing a limited query statement as characteristics of an agent. As for this, there is the less of flexibility when extracting triple and relation about the other concept of ontology. We are need a query tool for flexible information retrieval of ontology that is can access the standard ontology and can be used standard query language. In this paper, we propose a SPARQL query tool that is can access the OWL ontology via HTTP protocol and it can be used to make a query. Query result can be output to the soap message. These operations can be support the web service.