• Title/Summary/Keyword: Communication layer

Search Result 1,690, Processing Time 0.028 seconds

3D Stereoscopic Image Production Techniques in accordance with moving Virtual Camera (가상카메라 이동에 따른 3차원 입체영상 제작에 관한 연구)

  • Lee, Jun-Sang;Lee, Im-Geun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.2
    • /
    • pp.337-343
    • /
    • 2012
  • The techniques of implementing 3D movie have been developed by stereoscopic representation methods of the scene based on human visual experience. Recently, though various novel approaches for stereo movies are proposed to produce realistic 3D image, more study have to be done for compensating keystone distortion which is generated by moving virtual camera. In this paper we propose a novel production technique which minimizes keystone distortion based on analyzing pixel distance, and is easily implemented on popular graphics environment. First, in graphics environment we categorize each objects as individual layers, and extract image data to produce 3D image. The comparison between each animation sequences from proposed and conventional production methods shows that our production technique well compensate the distortion.

Network Hacking and Implementation Techniques using Faked ARP Reply Unicast Spoofing according to various Server Types (위조 ARP 응답 유니캐스트 스푸핑을 이용한 서버 유형별 네트워크 해킹 및 구현기술 연구)

  • Choi, Jae-Won
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.21 no.1
    • /
    • pp.61-71
    • /
    • 2017
  • ARP Spoofing is a basic and core hacking technology for almost all sniffing. It makes change the flow of packets by faking the 2nd layer MAC address. In this paper we suggested an efficient hacking technology for sniffing remote servers in the switched network environment. The suggested 'Faked ARP Reply Unicast Spoofing' makes the bidirectional packets sniffing possible between the client and server, and it makes simplify the procedures for ARP sniffing and hacking program. In this paper we researched the network hacking and implementation technologies based on the suggested ARP spoofing. And we researched various types of servers hacking such as Root ID and PW of Telnet/FTP server, Root ID and PW of MySQL DB server, ID and PW of Web Portal Server, and account information and transaction history of Web Banking Server. And also we researched the implementation techniques of core hacking programs for the ARP Spoofing.

A Design of the SMBC for Improving Reliability of Blocking Spam Mail (스팸 메일 차단 신뢰도 향상을 위한 SMBC 플랫폼 설계)

  • Park Nho-Kyung;Han Sung-Ho;Seo Sang-Jin;Jin Hyun-Joon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.11B
    • /
    • pp.730-735
    • /
    • 2005
  • While the E-mail is a important way of fast communication in these days. it is real that the E-mail is often misused as a commercial advertisement method and creates many social problems. Even though various filtering techniques for blocking spam mails have been developed, reliability of mail systems is decreased by misreading normal mails as spam mails, i.e. false-positive errors. In this paper, the SMBC(Spam Mail Blocking Center) platform employing spam mail recovery method based on privacy information is proposed and designed. The SMBC is designed in frame layer based on spam blocking system of proxy sewer and can be physically implemented in various topology so that flexible development with layered module is possible. Using privacy information makes the proposed SMBC platform minimize processing load and false-positive error rates so that it can improve mail system reliabilities.

Efficient and Scalable Overlay Multicast Mechanism for Real-time Tree Construction (효율적이고 확장성 있는 실시간 트리 구성을 위한 오버레이 멀티캐스트 메커니즘)

  • Nam, Yun-Seung;Im, Dong-Gee;Yang, Hyun-Jong;Nam, Ji-Seung
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.34 no.12B
    • /
    • pp.1399-1406
    • /
    • 2009
  • In the internet broadcast, efficient and scalable mechanism of multicast is needed for the communication between groups. Furthermore, Optimization of the multicast tree is required to improve the performance of overlay multicast. This optimization is well-known as NP-complete. If a node in the tree has limited out-degree, a user who wants to join the group has to find parent user who has already joined. In this paper, the users who want to join the group need to setup their level using delay test from source node. And then new users can find candidate parent nodes effectively using ACK-SEND approach and take proper position by comparing level. The closer node of the user to root node should be located in lower level. Also, even if a barrier is caused, fast recovery will be guaranteed using ACK-SEND approach. Through this, the newcomer node can fine their location in the multicast tree and join the group fast and effectively.

A Study on Distributed Cooperation Intrusion Detection Technique based on Region (영역 기반 분산협력 침입탐지 기법에 관한 연구)

  • Yang, Hwan Seok;Yoo, Seung Jae
    • Convergence Security Journal
    • /
    • v.14 no.7
    • /
    • pp.53-58
    • /
    • 2014
  • MANET can quickly build a network because it is configured with only the mobile node and it is very popular today due to its various application range. However, MANET should solve vulnerable security problem that dynamic topology, limited resources of each nodes, and wireless communication by the frequent movement of nodes have. In this paper, we propose a domain-based distributed cooperative intrusion detection techniques that can perform accurate intrusion detection by reducing overhead. In the proposed intrusion detection techniques, the local detection and global detection is performed after network is divided into certain size. The local detection performs on all the nodes to detect abnormal behavior of the nodes and the global detection performs signature-based attack detection on gateway node. Signature DB managed by the gateway node accomplishes periodic update by configuring neighboring gateway node and honeynet and maintains the reliability of nodes in the domain by the trust management module. The excellent performance is confirmed through comparative experiments of a multi-layer cluster technique and proposed technique in order to confirm intrusion detection performance of the proposed technique.

Authentication Interworking Protocol based on Media Independent Handover in Heterogeneous Networks (MIH 기반의 이기종 네트워크 환경에서 대리 서명을 이용한 인증 연동 프로토콜)

  • Roh, Hyo-Sun;Jung, Sou-Hwan
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.47 no.2
    • /
    • pp.86-94
    • /
    • 2010
  • This paper proposed an authentication interworking protocol (AIP) based on IEEE 802.21 MIH in the heterogeneous networks. The proposed AIP using the RSA signature reduces handover delay time and communication message overhead when the mobile node moves between the heterogeneous networks. It defines new AIP TLV in MIH frame format and uses the MIH Information Server (MIHIS) for proxy signature issue instead of the authentication server for the heterogeneous networks. For low handover delay, the proposed AIP performs pre-authentication processes with MIH protocol before layer 2 handover. Also, this paper analyzed the performance of the handover and compared with the non-secure MIH protocol.

A Hardware-Software Co-verification Methodology for cdma2000 1x Compliant Mobile Station Modem (cdma2000 1x 이동국 모뎀을 위한 하드웨어-소프트웨어 동시 검증 방법)

  • Han, Tae-Hee;Han, Sung-Chul;Han, Dong-Ku;Kim, Sung-Ryong;Han, Geum-Goo;Hwang, Suk-Min;Kim, Kyung-Ho
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.39 no.7
    • /
    • pp.46-56
    • /
    • 2002
  • In this paper, we describe a hardware-software co-verification methodology and environment in developing a mobile station modem chip for cdma2000 1x which is one of the 3rd generation mobile communication standards. By constructing an efficient co-verification environment for a register-transfer-level hardware model and a physical-layer software model combining a channel link simulator and a versatile test-bench, we can drastically reduce both time and cost for developing a complex three-million-gate class system integrated circuit.

Design and Implementation of the System for Automatic Classification of Blood Cell By Image Analysis (영상분석을 통한 혈구자동분류 시스템의 설계 및 구현)

  • Kim, Kyung-Su;Kim, Pan-Koo
    • Journal of the Korean Institute of Telematics and Electronics C
    • /
    • v.36C no.12
    • /
    • pp.90-97
    • /
    • 1999
  • Recently, there have been many researches to automate processing and analysing image data in medical field, due to the advance of image processing techniques, the fast communication network and high performance hardware. In this paper, we design and implement the system based on the multi-layer neural network model to be able to analyze, differentiate and count blood cells in the peripheral blood image. To do these, we segment red and white-blood cell in blood image acquired from microscope with CCD(Charge-coupled device) camera and then apply the various feature extraction algorithms to classify. In addition to, we reduce multi-variate feature number using PCA(Principle Component Analysis) to construct more efficient classifier. So, in this paper, we are sure that the proposed system can be applied to a pathological guided system.

  • PDF

Energy-Efficient Resource Allocation for Application Including Dependent Tasks in Mobile Edge Computing

  • Li, Yang;Xu, Gaochao;Ge, Jiaqi;Liu, Peng;Fu, Xiaodong
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.6
    • /
    • pp.2422-2443
    • /
    • 2020
  • This paper studies a single-user Mobile Edge Computing (MEC) system where mobile device (MD) includes an application consisting of multiple computation components or tasks with dependencies. MD can offload part of each computation-intensive latency-sensitive task to the AP integrated with MEC server. In order to accomplish the application faultlessly, we calculate out the optimal task offloading strategy in a time-division manner for a predetermined execution order under the constraints of limited computation and communication resources. The problem is formulated as an optimization problem that can minimize the energy consumption of mobile device while satisfying the constraints of computation tasks and mobile device resources. The optimization problem is equivalently transformed into solving a nonlinear equation with a linear inequality constraint by leveraging the Lagrange Multiplier method. And the proposed dual Bi-Section Search algorithm Bi-JOTD can efficiently solve the nonlinear equation. In the outer Bi-Section Search, the proposed algorithm searches for the optimal Lagrangian multiplier variable between the lower and upper boundaries. The inner Bi-Section Search achieves the Lagrangian multiplier vector corresponding to a given variable receiving from the outer layer. Numerical results demonstrate that the proposed algorithm has significant performance improvement than other baselines. The novel scheme not only reduces the difficulty of problem solving, but also obtains less energy consumption and better performance.

Generation Method of Spatiotemporal Image for Detecting Leukocyte Motions in a Microvessel (미소혈관내 백혈구 운동검출을 위한 시공간 영상 생성법)

  • Kim, Eung Kyeu
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.53 no.9
    • /
    • pp.99-109
    • /
    • 2016
  • This paper presents a method for generating spatiotemporal images to detect the leukocyte motions in a microvessel. By using the constraint that the leukocytes move along the contour line of a blood vessel wall, the method detects leukocyte motions and then generates spatiotemporal images. the translational motion by a movement in vivo is removed first by the template matching method. Next, a blood vessel region is detected by the automatic threshold selection method to binarize the temporal variance image, then a blood vessel wall's contour is expressed by B-spline function. With the detected blood vessel wall's contour as an initial curve, the plasma layer of the best accurate position is determined to be the spatial axis by snake. Finally, the spatiotemporal images are generated. The experimental results show the spatiotemporal images are generated effectively through the comparison of each step of three image sequences.