• Title/Summary/Keyword: Data Communication-Less

Search Result 571, Processing Time 0.024 seconds

Low area field-programmable gate array implementation of PRESENT image encryption with key rotation and substitution

  • Parikibandla, Srikanth;Alluri, Sreenivas
    • ETRI Journal
    • /
    • v.43 no.6
    • /
    • pp.1113-1129
    • /
    • 2021
  • Lightweight ciphers are increasingly employed in cryptography because of the high demand for secure data transmission in wireless sensor network, embedded devices, and Internet of Things. The PRESENT algorithm as an ultralightweight block cipher provides better solution for secure hardware cryptography with low power consumption and minimum resource. This study generates the key using key rotation and substitution method, which contains key rotation, key switching, and binary-coded decimal-based key generation used in image encryption. The key rotation and substitution-based PRESENT architecture is proposed to increase security level for data stream and randomness in cipher through providing high resistance to attacks. Lookup table is used to design the key scheduling module, thus reducing the area of architecture. Field-programmable gate array (FPGA) performances are evaluated for the proposed and conventional methods. In Virtex 6 device, the proposed key rotation and substitution PRESENT architecture occupied 72 lookup tables, 65 flip flops, and 35 slices which are comparably less to the existing architecture.

Breast Cancer Classification in Ultrasound Images using Semi-supervised method based on Pseudo-labeling

  • Seokmin Han
    • International Journal of Internet, Broadcasting and Communication
    • /
    • v.16 no.1
    • /
    • pp.124-131
    • /
    • 2024
  • Breast cancer classification using ultrasound, while widely employed, faces challenges due to its relatively low predictive value arising from significant overlap in characteristics between benign and malignant lesions, as well as operator-dependency. To alleviate these challenges and reduce dependency on radiologist interpretation, the implementation of automatic breast cancer classification in ultrasound image can be helpful. To deal with this problem, we propose a semi-supervised deep learning framework for breast cancer classification. In the proposed method, we could achieve reasonable performance utilizing less than 50% of the training data for supervised learning in comparison to when we utilized a 100% labeled dataset for training. Though it requires more modification, this methodology may be able to alleviate the time-consuming annotation burden on radiologists by reducing the number of annotation, contributing to a more efficient and effective breast cancer detection process in ultrasound images.

Communications Protocol Used in the Wireless Token Rings for Bird-to-Bird

  • Nakajima, Isao;Juzoji, Hiroshi;Ozaki, Kiyoaki;Nakamura, Noboru
    • Journal of Multimedia Information System
    • /
    • v.5 no.3
    • /
    • pp.163-170
    • /
    • 2018
  • We developed a multicast communication packet radio protocol using a time-sharing tablet system ("wireless token ring") to achieve the efficient exchange of files among packet radio terminals attached to swans. This paper provides an overview of the system and the protocol of the packet communications. The packet device forming the main part of the transceiver developed is the Texas Instruments CC2500. This device consists of one call-up channel and one data transmission channel and could improve error frame correction using FEC (forward error correction) with 34.8 kbps MSK and receiving power of at least -64 dBm (output 1 dBm at distance of 200 m using 3 dBi antenna). A time-sharing framework was determined for the wireless token ring using call sign ordinals to prevent transmission right loss. Tests using eight stations showed that resend requests with the ARQ (automatic repeat request) system are more frequent for a receiving power supply of -62 dBm or less. A wireless token ring system with fixed transmission times is more effective. This communication protocol is useful in cases in which frequency resources are limited; the energy consumed is not dependent on the transmission environment (preset transmission times); multiple terminals are concentrated in a small area; and information (position data and vital data) is shared among terminals under circumstances in which direct communication between a terminal and the center is not possible. The method allows epidemiological predictions of avian influenza infection routes based on vital data and relationships among individual birds based on the network topology recorded by individual terminals. This communication protocol is also expected to have applications in the formation of multiple in vivo micromachines or terminals that are inserted into living organisms.

An Efficient Method for Mining Frequent Patterns based on Weighted Support over Data Streams (데이터 스트림에서 가중치 지지도 기반 빈발 패턴 추출 방법)

  • Kim, Young-Hee;Kim, Won-Young;Kim, Ung-Mo
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.10 no.8
    • /
    • pp.1998-2004
    • /
    • 2009
  • Recently, due to technical developments of various storage devices and networks, the amount of data increases rapidly. The large volume of data streams poses unique space and time constraints on the data mining process. The continuous characteristic of streaming data necessitates the use of algorithms that require only one scan over the stream for knowledge discovery. Most of the researches based on the support are concerned with the frequent itemsets, but ignore the infrequent itemsets even if it is crucial. In this paper, we propose an efficient method WSFI-Mine(Weighted Support Frequent Itemsets Mine) to mine all frequent itemsets by one scan from the data stream. This method can discover the closed frequent itemsets using DCT(Data Stream Closed Pattern Tree). We compare the performance of our algorithm with DSM-FI and THUI-Mine, under different minimum supports. As results show that WSFI-Mine not only run significant faster, but also consume less memory.

A Dynamic OD Construction Methodology using Vehicle Trajectory in Ideal C&R Communication Environment (이상적 C&R 환경에서의 궤적자료를 이용한 동적 OD 구축에 관한 연구)

  • Lee, Jungwoo;Choi, Keechoo;Park, Sangwook;Son, Bumsoo
    • KSCE Journal of Civil and Environmental Engineering Research
    • /
    • v.31 no.3D
    • /
    • pp.355-361
    • /
    • 2011
  • In order to properly evaluate ITS services exposed in SMART Highway project, a confident dynamic origin-destination (OD) is inevitably needed. This paper used WAVE communication information as a part of call and response (C&R) communication which constitutes core part of the technology for constructing OD. This information includes node information and vehicle information (e.g., latitude and longitude) as well as trajectory data and sample path volume date calculated using node information and vehicle information. A procedure developed to construct a dynamic OD and to validate OD is consist of 1) making toy network and one-hour 00 (random distribution), 2) collecting link information and vehicle information, 3) constructing five-minute OD, and 4) validating estimated OD result using traffic volume and travel time simultaneously. The constructed OD is about 84.79% correct within less than 20% error range for 15min traffic volume, and about 85.42%, within less than 20% error rate of 15 min travel time. Some limitations and future research agenda have also been discussed.

A Design of DDPT(Dynamic Data Protection Technique) using k-anonymity and ℓ-diversity (k-anonymity와 ℓ-diversity를 이용한 동적 데이터 보호 기법 설계)

  • Jeong, Eun-Hee;Lee, Byung-Kwan
    • The Journal of Korea Institute of Information, Electronics, and Communication Technology
    • /
    • v.4 no.3
    • /
    • pp.217-224
    • /
    • 2011
  • This paper proposes DDPT(Dynamic Data Protection Technique) which solves the problem of private information exposure occurring in a dynamic database environment. The DDPT in this paper generates the MAG(Multi-Attribute Generalization) rules using multi-attributes generalization algorithm, and the EC(equivalence class) satisfying the k-anonymity according to the MAG rules. Whenever data is changed, it reconstructs the EC according to the MAC rules, and protects the identification exposure which is caused by the EC change. Also, it measures the information loss rates of the EC which satisfies the ${\ell}$-diversity. It keeps data accuracy by selecting the EC which is less than critical value and enhances private information protection.

High Efficiency Adaptive Facial Expression Recognition based on Incremental Active Semi-Supervised Learning (점진적 능동준지도 학습 기반 고효율 적응적 얼굴 표정 인식)

  • Kim, Jin-Woo;Rhee, Phill-Kyu
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.17 no.2
    • /
    • pp.165-171
    • /
    • 2017
  • It is difficult to recognize Human's facial expression in the real-world. For these reason, when database and test data have similar condition, we can accomplish high accuracy. Solving these problem, we need to many facial expression data. In this paper, we propose the algorithm for gathering many facial expression data within various environment and gaining high accuracy quickly. This algorithm is training initial model with the ASSL (Active Semi-Supervised Learning) using deep learning network, thereafter gathering unlabeled facial expression data and repeating this process. Through using the ASSL, we gain proper data and high accuracy with less labor force.

Analysis on Achievable Data Rate of Asymmetric 2PAM for NOMA

  • Chung, Kyuhyuk
    • International journal of advanced smart convergence
    • /
    • v.9 no.4
    • /
    • pp.34-41
    • /
    • 2020
  • Nowadays, the advanced smart convergences of the artificial intelligence (AI) and the internet of things (IoT) have been more and more important, in the fifth generation (5G) and beyond 5G (B5G) mobile communication. In 5G and B5G mobile networks, non-orthogonal multiple access (NOMA) has been extensively investigated as one of the most promising multiple access (MA) technologies. In this paper, we investigate the achievable data rate for the asymmetric binary pulse amplitude modulation (2PAM), in non-orthogonal multiple access (NOMA). First, we derive the closed-form expression for the achievable data rate of the asymmetric 2PAM NOMA. Then it is shown that the achievable data rate of the asymmetric 2PAM NOMA reduces for the stronger channel user over the entire range of power allocation, whereas the achievable data rate of the asymmetric 2PAM NOMA increases for the weaker channel user improves over the power allocation range less than 50%. We also show that the sum rate of the asymmetric 2PAM NOMA is larger than that of the conventional standard 2PAM NOMA, over the power allocation range larger than 25%. In result, the asymmetric 2PAM could be a promising modulation scheme for NOMA of 5G systems, with the proper power allocation.

The Relationship between Nurses Perception of the Elderly and Communication (간호사의 노인에 대한 인식과 의사소통과의 관계)

  • Yu, Myeonghwan;Kang, Jisook
    • 한국노년학
    • /
    • v.41 no.4
    • /
    • pp.455-468
    • /
    • 2021
  • This study was performed to utilize for foundation data of research related nursing communication and developing nursing intervention by examining the relationship between nurses' perception of the elderly and communication. This study is a descriptive research using a set of questionnaires that examines the relationship between nurses who provide care to the elderly by confirming their perception of the elderly, communication difficulties with the elderly, communication behavior, and satisfaction with communication. After IRB approval, data were collected either face-to-face survey or by online survey. A total of 292 nurses participated in this study. The collected data were analyzed as descriptive statistics, t-test and ANOVA, Duncan test and Pearson's Correlation Coefficients, Multiple Regression Analysis by using SPSS/WIN 26 program. As a result, a significant correlation was identified between perception of the elderly and communication disorders, communication behavior, and communication satisfaction. We found that nurses who had more positive perceptions about the elderly had less communication disorders, better communication behaviors, and higher communication satisfaction with the elderly. From this result, we suggest that nurses caring for the elderly should receive education on communication methods with elderly to improve their perception. Furthermore, we suggest future studies to improve nurse's perception of the elderly and communication.

Factors Associated with Marital Conflict for Baby Boomers in South Korea

  • Sung, Miai;Byun, Joosoo
    • International Journal of Human Ecology
    • /
    • v.14 no.1
    • /
    • pp.103-113
    • /
    • 2013
  • Using data from the 2010 National Survey of Korean Families (NSKF), we investigated factors associated with marital conflict for baby boomers in South Korea. Korean baby boomers are those born during the post-Korean War period from 1955 to 1963. OLS regression examined the marital conflict of these couples. Baby boomer couples reported that they experienced occasional marital conflict; subsequently individual and family level variables explained 15% of baby boomers' marital conflict. The key findings were that satisfaction in spousal communication was negatively associated with conflict for baby boomer couples. However, the existence of unmarried adult children was positively associated with baby boomers' marital conflict. Work and family balance was also negatively associated with marital conflict. We found that the more satisfied with communication with the spouse, the fewer unmarried adult children, and the more work and family balance the couple maintained, the less marital conflict these baby boomers experienced.