• Title/Summary/Keyword: Data Transmission Processing

Search Result 905, Processing Time 0.028 seconds

Multiple-image Encryption and Multiplexing Using a Modified Gerchberg-Saxton Algorithm in Fresnel-transform Domain and Computational Ghost Imaging

  • Peiming Zhang;Yahui Su;Yiqiang Zhang;Leihong Zhang;Runchu Xu;Kaimin Wang;Dawei Zhang
    • Current Optics and Photonics
    • /
    • v.7 no.4
    • /
    • pp.362-377
    • /
    • 2023
  • Optical information processing technology is characterized by high speed and parallelism, and the light features short wavelength and large information capacity; At the same time, it has various attributes including amplitude, phase, wavelength and polarization, and is a carrier of multi-dimensional information. Therefore, optical encryption is of great significance in the field of information security transmission, and is widely used in the field of image encryption. For multi-image encryption, this paper proposes a multi-image encryption algorithm based on a modified Gerchberg-Saxton algorithm (MGSA) in the Fresnel-transform domain and computational ghost imaging. First, MGSA is used to realize "one code, one key"; Second, phase function superposition and normalization are used to reduce the amount of ciphertext transmission; Finally, computational ghost imaging is used to improve the security of the whole encryption system. This method can encrypt multiple images simultaneously with high efficiency, simple calculation, safety and reliability, and less data transmission. The encryption effect of the method is evaluated by using correlation coefficient and structural similarity, and the effectiveness and security of the method are verified by simulation experiments.

Security-reliability Analysis for a Cognitive Multi-hop Protocol in Cluster Networks with Hardware Imperfections

  • Tin, Phu Tran;Nam, Pham Minh;Duy, Tran Trung;Voznak, Miroslav
    • IEIE Transactions on Smart Processing and Computing
    • /
    • v.6 no.3
    • /
    • pp.200-209
    • /
    • 2017
  • In this paper, we investigate the tradeoff between security and reliability for a multi-hop protocol in cluster-based underlay cognitive radio networks. In the proposed protocol, a secondary source communicates with a secondary destination via the multi-hop relay method in the presence of a secondary eavesdropper. To enhance system performance under the joint impact of interference constraint required by multiple primary users and hardware impairments, the best relay node is selected at each hop to relay the source data to the destination. Moreover, the destination is equipped with multiple antennas and employs a selection combining (SC) technique to combine the received data. We derive closed-form expressions of the intercept probability (IP) for the eavesdropping links and the outage probability (OP) for the data links over a Rayleigh fading channel. Finally, the correction of our derivations is verified by Monte-Carlo simulations.

Integrated GUI Environment of Parallel Fuzzy Inference System for Pattern Classification of Remote Sensing Images

  • Lee, Seong-Hoon;Lee, Sang-Gu;Son, Ki-Sung;Kim, Jong-Hyuk;Lee, Byung-Kwon
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.2 no.2
    • /
    • pp.133-138
    • /
    • 2002
  • In this paper, we propose an integrated GUI environment of parallel fuzzy inference system fur pattern classification of remote sensing data. In this, as 4 fuzzy variables in condition part and 104 fuzzy rules are used, a real time and parallel approach is required. For frost fuzzy computation, we use the scan line conversion algorithm to convert lines of each fuzzy linguistic term to the closest integer pixels. We design 4 fuzzy processor unit to be operated in parallel by using FPGA. As a GUI environment, PCI transmission, image data pre-processing, integer pixel mapping and fuzzy membership tuning are considered. This system can be used in a pattern classification system requiring a rapid inference time in a real-time.

A Study on the Traffic Agent for Overlay Multicast (오버레이 멀티캐스트에서의 트래픽 에이전트에 관한 고찰)

  • Ko Joo-Young;Shim Jae-Chang;Kim Hyun-Ki
    • The KIPS Transactions:PartB
    • /
    • v.12B no.6 s.102
    • /
    • pp.685-690
    • /
    • 2005
  • Recently, studies for effective multimedia data delivery have been widely performed. Among those researches, internet broadcasting is a technology to transmit various multimedia contents to variety of costumers on the internet simultaneously. To deliver large scale multimedia data such as internet broadcasting, efficient data delivery method is required. Therefore, technologies based on the overlay multicast of application larger multicast application are actively studied as an alternative for multicast overcoming shortcoming of uni-cast based technologies, which we one to one transmission methods. In this paper, we classify and study on the overlay multicasting for internet broadcasting, which can be implemented by application programs without modification in physical layer of the internet.

The Evaluation of Communication Distance Using Wireless MEMS Sensor in Building Structure (건축구조물에서 무선 MEMS 센서를 이용한 통신 거리 유효성 평가)

  • Lee, Jong-Ho;Cheon, Dong-Jin;Yoon, Sung-Won
    • Journal of Korean Association for Spatial Structures
    • /
    • v.17 no.4
    • /
    • pp.93-102
    • /
    • 2017
  • Wireless MEMS sensors have common features such as wireless communication, data measurement, embedded processing, battery-based self-power, and low cost, and increased measurement effectiveness. Wireless MEMS sensors enable efficient SHM without interfering with location because there is no requirement for triboelectric noise and cumbersome cables. However, there is little research on the communication distance with sensors and data. For instance, existing researches have limited communication distance experiments in civil engineering bridges. It is also necessary to investigate the characteristics of dynamic behavior and the communication distance of architectural structures with different wireless transmission/reception environments. Therefore, in a building structure with walls and slabs instead of open spaces, MEMS sensors and data loggers were used as distance experiments where communication disturbance between the vertical slab and the horizontal wall could actually be communicated.

Reduction of Quantum Noise using Adaptive Weighted Median filter in Medical Radio-Fluoroscoy Image (적응성 가중 메디안 필터를 이용한 의료용 X선 투시 영상의 양자잡음 제거)

  • Lee, Hoo-Min;Nam, Moon-Hyon
    • The Transactions of the Korean Institute of Electrical Engineers D
    • /
    • v.51 no.10
    • /
    • pp.468-476
    • /
    • 2002
  • Digital images are easily corrupted by noise during the data transmission, data capture and data processing. A technical method of noise analyzing and adaptive filtering for reducing of quantum noise in medical radio-fluoroscopy images is presented. By adjusting the characteristics of the filter according to local statistics around each pixel of the image as moving windowing, it is possible to suppress noise sufficiently while preserve edge and other significant information required in diagnosis. We proposed adaptive weighed median(AWM) filters based on local statistics. We showed two ways of realizing the AWM filters. One is a simple type of AWM filter, which is constructed by Homogeneous factor(HF). Homogeneous factor(HF) from the noise models that enables the filter to recognize the local structures of the image is introduced, and an algorithm for determining the HF fitted to the diagnostic systems with various inner statistical properties is proposed. We show by the experimented that the performances of proposed method is superior to these of other filters and models in preserving small details and suppressing the noise at homogeneous region. The proposed algorithms were implemented by Visual C++ language on a IBM-PC Pentium 550 for testing purposes and the effects and results of the filter in the various levels of noise and images were proposed by comparing the values of NMSE(normalized mean square error) with the value of the other existing filtering methods.

Multipath Routing Algorithm for Wireless Sensor Networks Using Dual Channel Routers (이중 채널 라우터를 사용하는 무선 센서네트워크를 위한 다중경로 라우팅 알고리즘)

  • Hah, Ki-Jong;Yoo, Seung-Sik;Lim, Sang-Min;Kim, Brian
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.11 no.4
    • /
    • pp.833-839
    • /
    • 2007
  • In case of wireless sensor networks being applied to a target environment having continuous data transfer, high-speed data transmission and processing is necessary to meet increased bandwidth needs. This paper proposes a novel multipath routing algorithm to increase the bandwidth of continuous data stream for the wireless sensor network using dual channel routers. We evaluate performance of the proposed algorithm in the wireless sensor network using the dual channel touter based on ZigBee protocol. According to the experimental evaluation, the proposed algorithm showed outstanding performance enhancement with the bandwidth of 150kbps, which is about twice of existing single channel router.

A Study of Data Maintenance management of Wireless Sensor Network (무선센서 네트워크에서 데이터 유지관리에 관한 연구)

  • Xu, Chen-lin;Lee, Hyun Chang;Shin, Seong Yoon
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2014.10a
    • /
    • pp.217-220
    • /
    • 2014
  • Wireless sensor network(WSN) consists by a large number of low-cost micro-sensor nodes, collaborate to achieve the perception of information collection, processing and transmission tasks in deployment area. It can be widely used in national defense, intelligent transportation, medical care, environmental monitoring, precision agriculture, and industrial automation and many other areas. One of the key technologies of sensor networks is the data maintenance management technology. In this paper we analyze the data management technology of wireless sensor network and pointed their problems.

  • PDF

A Study on the Improved Post-Analysis Development System in the Naval Combat System

  • Seo, Chang-Won
    • Journal of the Korea Society of Computer and Information
    • /
    • v.27 no.12
    • /
    • pp.197-207
    • /
    • 2022
  • The Naval Combat System operates in multiple software components for efficient functional processing. Data transmission and reception between components is performed in real time using DDS(Data Distribution Service). Reliable Post-Analysis requires the collection of all DDS messages. However, Software workload and development costs increase because common functions for all messages must be developed directly. In the paper, We propose an improved Post-Analysis based on the Feature Model and a new development system using it. Functions for the modified message were applied as variable domains of the Feature Model. When Build Center updates Post-Analysis, it automatically processes all software tasks associated with Post-Analysis. The proposed development system simplified the overall work procedure, and work time was significantly reduced compared to the existing development system.

A Query Result Integrity Assurance Scheme Using an Order-preserving Encryption Scheme in the Database Outsourcing Environment (데이터베이스 아웃소싱 환경에서 순서 보존 암호화 기법을 이용한 질의 결과 무결성 검증 기법)

  • Jang, Miyoung;Chang, Jae Woo
    • Journal of KIISE
    • /
    • v.42 no.1
    • /
    • pp.97-106
    • /
    • 2015
  • Recently, research on database encryption for data protection and query result authentication methods has been performed more actively in the database outsourcing environment. Existing database encryption schemes are vulnerable to order matching and counting attack of intruders who have background knowledge of the original database domain. Existing query result integrity auditing methods suffer from the transmission overhead of verification object. To resolve these problems, we propose a group-order preserving encryption index and a query result authentication method based on the encryption index. Our group-order preserving encryption index groups the original data for data encryption and support query processing without data decryption. We generate group ids by using the Hilbert-curve so that we can protect the group information while processing a query. Finally, our periodic function based data grouping and query result authentication scheme can reduce the data size of the query result verification. Through performance evaluation, we show that our method achieves better performance than an existing bucket-based verification scheme, it is 1.6 times faster in terms of query processing time and produces verification data that is 20 times smaller.