• Title/Summary/Keyword: Electronic Space

Search Result 1,634, Processing Time 0.024 seconds

Conceptual Analysis of Cyber Electronic Warfare by OSI Reference Model (OSI 참조 모델에 의한 사이버전자전 개념 분석)

  • Lee, Minwoo;Lee, Jongkwan
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2021.10a
    • /
    • pp.600-601
    • /
    • 2021
  • The cyberspace, which is the fifth battle field, should be utilized for multi-domain maneuvering between the cyberspace and the physical space using an electromagnetic spectrum. This becomes a major concept of cyber electronic warfare that combines the characteristics of cyber warfare and electronic warfare. In this study, the concept of cyber electronic warfare is analyzed by using the OSI reference model and examining the threats of the two-layer data link layer.

  • PDF

Performance of Human Skin Detection in Images According to Color Spaces

  • Kim, Jun-Yup;Do, Yong-Tae
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2005.11a
    • /
    • pp.153-156
    • /
    • 2005
  • Skin region detection in images is an important process in many computer vision applications targeting humans such as hand gesture recognition and face identification. It usually starts at a pixel-level, and involves a pre-process of color spae transformation followed by a classification process. A color space transformation is assumed to increase separability between skin classes and other classes, to increase similarity among different skin tones, and to bring a robust performance under varying imaging conditions, without any complicated analysis. In this paper, we examine if the color space transformation actually brings those benefits to the problem of skin region detection on a set of human hand images with different postures, backgrounds, people, and illuminations. Our experimental results indicate that color space transfomation affects the skin detection performance. Although the performance depends on camera and surround conditions, normalized [R, G, B] color space may be a good choice in general.

  • PDF

Polynomial Fuzzy Radial Basis Function Neural Network Classifiers Realized with the Aid of Boundary Area Decision

  • Roh, Seok-Beom;Oh, Sung-Kwun
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.6
    • /
    • pp.2098-2106
    • /
    • 2014
  • In the area of clustering, there are numerous approaches to construct clusters in the input space. For regression problem, when forming clusters being a part of the overall model, the relationships between the input space and the output space are essential and have to be taken into consideration. Conditional Fuzzy C-Means (c-FCM) clustering offers an opportunity to analyze the structure in the input space with the mechanism of supervision implied by the distribution of data present in the output space. However, like other clustering methods, c-FCM focuses on the distribution of the data. In this paper, we introduce a new method, which by making use of the ambiguity index focuses on the boundaries of the clusters whose determination is essential to the quality of the ensuing classification procedures. The introduced design is illustrated with the aid of numeric examples that provide a detailed insight into the performance of the fuzzy classifiers and quantify several essentials design aspects.

On the Relationship Between the Performance Criteria of Unitary Space-Time Codes with Noncoherent and Coherent Decoding

  • Cheun, Kyung-Whoon;Kim, Jeong-Chang;Choi, Soong-Yoon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.12A
    • /
    • pp.1145-1151
    • /
    • 2010
  • Hochwald et al. introduced unitary space-time codes for quasi-static Rayleigh fading channels which allows for noncoherent decoding when the channel response is not known at the receiver. However, when reliable information on the channel response is available, coherent decoding is preferable for improved performance. Here, we study the relationship between the performance criteria on the diversity and coding advantages provided by unitary space-time codes with noncoherent and coherent decoding. We show that when a unitary space-time code achieves full spatial diversity with noncoherent decoding, full spatial diversity is also guaranteed with coherent decoding.

Visual Interface & Surface Expressions in Commercial Space Design (비주얼 인터페이스와 상업공간의 표피 표현)

  • Kim Sunyoung
    • Korean Institute of Interior Design Journal
    • /
    • v.14 no.3 s.50
    • /
    • pp.3-11
    • /
    • 2005
  • This study examines the visual effects of surface design utilized in commercial space. In particular, 1 focus on the following three categories: transparency and lighting, electronic surface and media screen, and ubiquitous environments and interface. Unlike the past era in which surface design in commercial space was viewed merely as a means of decoration, it has become more important in the contemporary era because diverse expression techniques in surface design enormously help architects and interior designers embody their own ideas more effectively Moreover, the diversity of surface design expands the concept of cultural space as it provides various graphic elements that reflect human desire for multicultures.

An Implementation of YK2 Cipher System for Electronic Commerce Security (전자상거래 보안을 위한 YK2 암호시스템의 구현)

  • 서장원
    • The Journal of Society for e-Business Studies
    • /
    • v.6 no.1
    • /
    • pp.17-33
    • /
    • 2001
  • EC(Electronic Commerce) which is done on the virtual space through Internet has strong point like independence from time and space. On the contrary, it also has weak point like security problem because anybody can access easily to the system due to open network attribute of Internet, Therefore, we need the solutions that protect the EC security problem for safe and useful EC activity. One of these solutions is the implementation of strong cipher system. YK2(Young Ku King) cipher system proposed in this paper is good solution for the EC security and it overcome the limit of current block cipher system using 128 bits key length for input, output, encryption key and 32 rounds. Moreover, it is designed for the increase of time complexity by adapting more complex design for key scheduling algorithm regarded as one of important element effected to encryption.

  • PDF

An Improved SVPWM Control of Voltage Imbalance in Capacitors of a Single-Phase Multilevel Inverter

  • Ramirez, Fernando Arturo;Arjona, Marco A.
    • Journal of Power Electronics
    • /
    • v.15 no.5
    • /
    • pp.1235-1243
    • /
    • 2015
  • This paper presents a modified Space Vector Pulse Width Modulation Technique (SVPWM), which solves the well-known problem of voltage imbalance in the capacitors of a single-phase multilevel inverter. The proposed solution is based on the measurement of DC voltage levels at each capacitor of the inverter DC bus. The measurements are then used to adjust the size of the active vectors within the SVPWM algorithm to keep the voltage waveform sinusoidal regardless of any voltage imbalance on the DC link capacitors. When a voltage deviation exceeds a predetermined hysteresis band, the correspondent voltage vector is restricted to restore the voltage level to an acceptable threshold. Hence, the need for external voltage regulators for the voltage capacitors is eliminated. The functionality of the proposed algorithm is successfully demonstrated through simulations and experiments on a grid tied application.

The Distance Communication System by using Intelligent Space

  • Umeda, Hiroo;Yamaguchi, Toru
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.62-65
    • /
    • 2003
  • We propose the Distance Communication System that is not only Making Distance Learning Contents but also controlling intellectual moving object. In order to make Distance Learning Contents (Video Contents), we must follow the motion of lecturer. In the former Systems and a person operates Video-Camera because it's not enough to follow the motion, In this research and we make the systems that can match the motion of lecturer naturally. The systems use Intelligent Space software and so the systems recognize lecturer's motion automatically and order Pan/Tilt-Type Camera to follow the motion. And we made possible to operate an intellectual moving object with application of this system.

  • PDF

A Possibilistic C-Means Approach to the Hough Transform for Line Detection

  • Frank Chung-HoonRhee;Shim, Eun-A
    • Proceedings of the Korean Institute of Intelligent Systems Conference
    • /
    • 2003.09a
    • /
    • pp.476-479
    • /
    • 2003
  • The Rough transform (HT) is often used for extracting global features in binary images, for example curve and line segments, from local features such as single pixels. The HT is useful due to its insensitivity to missing edge points and occlusions, and robustness in noisy images. However, it possesses some disadvantages, such as time and memory consumption due to the number of input data and the selection of an optimal and efficient resolution of the accumulator space can be difficult. Another problem of the HT is in the difficulty of peak detection due to the discrete nature of the image space and the round off in estimation. In order to resolve the problem mentioned above, a possibilistic C-means approach to clustering [1] is used to cluster neighboring peaks. Several experimental results are given.

  • PDF

A Balanced Model Reduction for Fuzzy Systems with Time Varying Delay

  • Yoo, Seog-Hwan;Park, Byung-Jae
    • International Journal of Fuzzy Logic and Intelligent Systems
    • /
    • v.4 no.1
    • /
    • pp.1-6
    • /
    • 2004
  • This paper deals with a balanced model reduction for T-S(Takagi-Sugeno) fuzzy systems with time varying state delay. We define a generalized controllability gramian and a generalized observability gramian for a stable T-S fuzzy delayed systems. We obtain a balanced state space realization using the generalized controllability and observability gramian and obtain a reduced model by truncating states from the balanced state space realization. We also present an upper bound of the approximation error. The generalized controllability gramian and observability gramian can be computed from solutions of linear matrix inequalities. We demonstrate the efficacy of the suggested method by illustrating a numerical example.