• Title/Summary/Keyword: 컴퓨터응용공학

Search Result 717, Processing Time 0.028 seconds

Object Replication Methods for High Availability in DHT based P2P Computing System (분산 해쉬 테이블 기반 피어 투 피어 컴퓨팅 시스템에서 가용성 향상 객체 복제 기법)

  • Son, Young-Sung;Jung, Il-Dong;Kim, Kyong-Sok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.8
    • /
    • pp.1535-1543
    • /
    • 2007
  • Recently, there are many researches for P2P network. P2P network technologies are a good solution about making a wide spread distributed computing in the internet environment. The recent algorithms developed by several research groups for the lookup problem present a simple and general interface, a distributed hash table (DHT). In this paper, we also introduce new schemes that enhance the available rate of an object in the MagicSquare network. Replication scheme is to replicate an object with many replicas and save them to several nodes. Fragmentation scheme is to divide an object into several fragments and save them to several nodes. Replicated Fragmentation scheme is to mix replication scheme and fragmentation scheme. We will show result of simulation for our the proposed scheme.

Efficient Multi-Receiver Certificate-Based Encryption Scheme and Its Application (효율적인 인증서기반 다중수신자 암호 기법 및 응용)

  • Sur, Shul;Jung, Chae-Duk;Rhee, Kyung-Hyune
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.12
    • /
    • pp.2271-2279
    • /
    • 2007
  • In this paper, we introduce the notion of certificate-based encryption in multi-receiver environment, which avoids the inherent key escrow problem while preserving the implicit certification in identity-based encryption. We also construct a highly efficient certificate-based encryption scheme for multi-receiver environment, which eliminates pairing computation to encrypt a message for multiple receivers. Moreover, the proposed scheme only needs one pairing computation for decrypting the ciphertext. We compare our scheme with the most efficient identity-based encryption scheme for multi-receiver environment proposed by Baek et.al.[1] in terms of the computational point of view, and show that our scheme provides better efficiency than Baek's scheme. Finally, we discuss how to properly transform our scheme into a new public key broadcast encryption scheme based on subset-cover framework.

A Proposed Private Blockchain System for Preserving Evidence of False Internet Communications (인터넷 허위통신 신고의 증거물 보존을 위한 프라이빗 블록체인 시스템 제안)

  • Bae, Suk-Min;Yang, Seong-Ryul;Jung, Jai-Jin
    • Journal of Convergence for Information Technology
    • /
    • v.9 no.11
    • /
    • pp.15-21
    • /
    • 2019
  • Allowing only authorized users to record and inquire in the ledger, private blockchain technology is attracting attention from institutions and companies. Based on distributed ledger technology, records are immutable. Because news via the Internet can be easily modified, the possibility of manipulation is high. Some false communication report systems are designed to prevent such harm. However, during the gap between the false communication report and verification time, contents on the website can be modified, or false evidence can be submitted intentionally. We propose a system that collects evidence using a headless browser for more accurate false communication management, and securely preserves evidence through a private blockchain and prevents possibilities of manipulation. The proposed system downloads original HTML, captures the website as an image, stores it in a transaction along with the report, and stores it in a private blockchain to ensure the integrity from acquisition to preservation of evidence.

A Study on Processing of Speech Recognition Korean Words (한글 단어의 음성 인식 처리에 관한 연구)

  • Nam, Kihun
    • The Journal of the Convergence on Culture Technology
    • /
    • v.5 no.4
    • /
    • pp.407-412
    • /
    • 2019
  • In this paper, we propose a technique for processing of speech recognition in korean words. Speech recognition is a technology that converts acoustic signals from sensors such as microphones into words or sentences. Most foreign languages have less difficulty in speech recognition. On the other hand, korean consists of vowels and bottom consonants, so it is inappropriate to use the letters obtained from the voice synthesis system. That improving the conventional structure speech recognition can the correct words recognition. In order to solve this problem, a new algorithm was added to the existing speech recognition structure to increase the speech recognition rate. Perform the preprocessing process of the word and then token the results. After combining the result processed in the Levenshtein distance algorithm and the hashing algorithm, the normalized words is output through the consonant comparison algorithm. The final result word is compared with the standardized table and output if it exists, registered in the table dose not exists. The experimental environment was developed by using a smartphone application. The proposed structure shows that the recognition rate is improved by 2% in standard language and 7% in dialect.

Relay Network using UAV: Survey of Physical Layer and Performance Enhancement Issue (무인항공기를 이용한 중계네트워크: 물리계층 동향분석 및 성능향상 이슈)

  • Cho, Woong
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.14 no.5
    • /
    • pp.901-906
    • /
    • 2019
  • UAV (Unmanned Aerial Vehicle) is widely used in various areas such as civil and military applications including entertainment industries. Among them, UAV based communication system is also one of the important application areas. Relays have been received much attention in communication system due to its benefits of performance enhancement and coverage extension. In this paper, we investigate UAVs as relays especially focusing on physical layer. First, we introduce the research on UAV application for the relays, then the basic performance of relay networks in dual-hop communication system is analyzed by adopting decode-and-forward (DF) relaying protocol. The performance is represented using symbol error rate (SER) and UAV channels are applied by assuming asymmetric environments. Based on the performance analysis, we discuss performance enhancement issues by considering physical layer.

Smart Roll Forming Based on Real-Time Process Data (실시간 공정데이터 기반의 스마트 롤포밍에 관한 연구)

  • Son, Jae-Hwan;Cho, Dong-Hyun;Kim, Chul-Hong
    • Journal of the Korean Society of Manufacturing Process Engineers
    • /
    • v.17 no.5
    • /
    • pp.45-51
    • /
    • 2018
  • Roll forming refers to the production of long plate-molded products, such as panels, pipes, tubes, channels, and frames, by continuously causing the bending deformation to thin plates using rotating rolls. As the roll forming method has advantages in terms of mass production because of its excellent productivity, the size of the roll forming industry has been continuously increasing and the roll forming method is increasingly being used in diverse industrial fields as a very important processing method. Furthermore, as the roll forming method mainly depends on the continuous bending deformation of the plate materials, the time and the cost of the heterogeneous materials developed in the process are relatively large when considered from the viewpoint of plastic working because many processes are continuously implemented. The existing studies on roll forming manufacturing have reported the loss of large amounts of time and materials when the raw materials or product types were changed; further, they have stated that the use of this method can hardly guarantee the uniformity of the formed shapes and the consistency in terms of size and cannot detect all the defects occurring during the mass production and related to the dimensions. Therefore, in this research, a real-time process data-based smart roll forming method that can be applied to multiple products was studied. As a result, a roll forming system was implemented that remembers and automatically sets the changes in the finely adjusted values of the supplied quantities of individual heterogeneous materials so that the equipment setting changing time for heterogeneous material replacements or changes in the products being produced can be shortened. It also secures the uniformity of the products so that more competitive and precise slide-rail products can be mass-produced with improvements in the quality, price, and productivity of the products.

A Performance Evaluation of QE-MMA Adaptive Equalization Algorithm by Quantizer Bit Number (양자화기 비트수에 의한 QE-MMA 적응 등화 알고리즘 성능 평가)

  • Lim, Seung-Gag
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.19 no.1
    • /
    • pp.57-62
    • /
    • 2019
  • This paper evaluates the QE-MMA (Quantized Error-MMA) adaptive equalization algorithm by the number of quantizer in order to compensates the intersymbol interference due to channel in the transmission of high spectral efficient nonconstant modulus signal. In the adaptive equalizer, the error signal is needed for the updating the tap coefficient, the QE-MMA uses the polarity of error signal and correlation multiplier that condered nonlinear finite bit power-of-two quantizing component in order to convinience of H/W implementation. The different adaptive equalization performance were obtained by the number of quantizer, these performance were evaluated by the computer simulation. For this, the equalizer output signal constellation, residual isi, maximum distortion, MSE, SER were applied as a performance index. As a result of computer simulation, it improved equalization performance and reduced equalization noise were obtained in the steady state by using large quantizer bit numbers, but gives slow in convergence speed for reaching steady state.

A Study on Utilizing Smartphone for CMT Object Tracking Method Adapting Face Detection (얼굴 탐지를 적용한 CMT 객체 추적 기법의 스마트폰 활용 연구)

  • Lee, Sang Gu
    • The Journal of the Convergence on Culture Technology
    • /
    • v.7 no.1
    • /
    • pp.588-594
    • /
    • 2021
  • Due to the recent proliferation of video contents, previous contents expressed as the character or the picture are being replaced to video and growth of video contents is being boosted because of emerging new platforms. As this accelerated growth has a great impact on the process of universalization of technology for ordinary people, video production and editing technologies that were classified as expert's areas can be easily accessed and used from ordinary people. Due to the development of these technologies, tasks like that recording and adjusting that depends on human's manual involvement could be automated through object tracking technology. Also, the process for situating the object in the center of the screen after finding the object to record could have been automated. Because the task of setting the object to be tracked is still remaining as human's responsibility, the delay or mistake can be made in the process of setting the object which has to be tracked through a human. Therefore, we propose a novel object tracking technique of CMT combining the face detection technique utilizing Haar cascade classifier. The proposed system can be applied to an effective and robust image tracking system for continuous object tracking on the smartphone in real time.

Design of AES Cryptographic Processor with Modular Round Key Generator (모듈화된 라운드 키 생성회로를 갖는 AES 암호 프로세서의 설계)

  • 최병윤;박영수;전성익
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.12 no.5
    • /
    • pp.15-25
    • /
    • 2002
  • In this paper a design of high performance cryptographic processor which implements AES Rijndael algorithm is described. To eliminate performance degradation due to round-key computation delay of conventional processor, the on-the-fly precomputation of round key based on modified round structure is adopted. And on-the-fly round key generator which supports 128, 192, and 256-bit key has modular structure. The designed processor has iterative structure which uses 1 clock cycle per round and supports three operation modes, such as ECB, CBC, and CTR mode which is a candidate for new AES modes of operation. The cryptographic processor designed in Verilog-HDL and synthesized using 0.251$\mu\textrm{m}$ CMOS cell library consists of about 51,000 gates. Simulation results show that the critical path delay is about 7.5ns and it can operate up to 125Mhz clock frequency at 2.5V supply. Its peak performance is about 1.45Gbps encryption or decryption rate under 128-bit key ECB mode.

Machine Learning Data Extension Way for Confirming Genuine of Trademark Image which is Rotated (회전한 상표 이미지의 진위 결정을 위한 기계 학습 데이터 확장 방법)

  • Gu, Bongen
    • Journal of Platform Technology
    • /
    • v.8 no.1
    • /
    • pp.16-23
    • /
    • 2020
  • For protecting copyright for trademark, convolutional neural network can be used to confirm genuine of trademark image. For this, repeated training one trademark image degrades the performance of machine learning because of overfitting problem. Therefore, this type of machine learning application generates training data in various way. But if genuine trademark image is rotated, this image is classified as not genuine trademark. In this paper, we propose the way for extending training data to confirm genuine of trademark image which is rotated. Our proposed way generates rotated image from genuine trademark image as training data. To show effectiveness of our proposed way, we use CNN machine learning model, and evaluate the accuracy with test image. From evaluation result, our way can be used to generate training data for machine learning application which confirms genuine of rotated trademark image.

  • PDF