• Title/Summary/Keyword: Key Characteristics

Search Result 4,306, Processing Time 0.029 seconds

Video Segmentation and Key frame Extraction using Multi-resolution Analysis and Statistical Characteristic

  • Cho, Wan-Hyun;Park, Soon-Young;Park, Jong-Hyun
    • Communications for Statistical Applications and Methods
    • /
    • v.10 no.2
    • /
    • pp.457-469
    • /
    • 2003
  • In this paper, we have proposed the efficient algorithm that can segment the video scene change using a various statistical characteristics obtained from by applying the wavelet transformation for each frames. Our method firstly extracts the histogram features from low frequency subband of wavelet-transformed image and then uses these features to detect the abrupt scene change. Second, it extracts the edge information from applying the mesh method to the high frequency subband of transformed image. We quantify the extracted edge information as the values of variance characteristic of each pixel and use these values to detect the gradual scene change. And we have also proposed an algorithm how extract the proper key frame from segmented video scene. Experiment results show that the proposed method is both very efficient algorithm in segmenting video frames and also is to become the appropriate key frame extraction method.

Improvement of the mechanical performance and dyeing ability of bamboo fiber by atmospheric pressure air plasma treatment

  • Hoa, Ta Phuong;Chuong, Bui;Hung, Dang Viet;Tien, Nguyen Dung;Khanh, Vu Thi Homg
    • Proceedings of the Korean Society of Dyers and Finishers Conference
    • /
    • 2009.03a
    • /
    • pp.14-20
    • /
    • 2009
  • Atmospheric pressure air plasma was applied for treatment of different kinds of natural bamboo fiber to improve their mechanical properties and surface characteristics, which are suitable for adhesion and dyeing. The tensile strength and Young modulus of bamboo fiber were significantly improved; SEM and AFM study show that the surface of fiber became cleaner and rougher after plasma treatment. Plasma treatment caused the cracking, removing of the protective skin of alkali-untreated fiber and etching to form a cleaner and rougher surface. The dyeability of both groups of bamboo fiber which are used for composite and textile purposes is significantly enhanced after treatment.

  • PDF

Error Correction Codes for Biometric Cryptosystem: An Overview

  • Teoh, Andrew Beng Jin;Kim, Jaihie
    • Information and Communications Magazine
    • /
    • v.32 no.6
    • /
    • pp.39-49
    • /
    • 2015
  • In cryptographic applications, the key protection is either knowledge-based (passwords) or possession-based (tamper-proof device). Unfortunately, both approaches are easily forgotten or stolen, thus introducing various key management issues. By incorporating biometrics technologies which utilize the uniqueness of personal characteristics, the security of cryptosystems could be strengthened as authentication now requires the presence of the user. Biometric Cryptosystem (BC) encompasses the design of cryptographic keys protection methods by incorporating biometrics. BC involves either key-biometrics binding or direct key generation from biometrics. However, the wide acceptance and deployment of BC solutions are constrained by the fuzziness related with biometric data. Hence, error correction codes (ECCs) should be adopted to ensure that fuzziness of biometric data can be alleviated. In this overview paper, we present such ECC solutions used in various BCs. We also delineate on the important facts to be considered when choosing appropriate ECCs for a particular biometric based solution from accuracy performance and security perspectives.

Securing Mobile Ad Hoc Networks Using Enhanced Identity-Based Cryptography

  • Mehr, Kamal Adli;Niya, Javad Musevi
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.512-522
    • /
    • 2015
  • Recent developments in identity-based cryptography (IBC) have provided new solutions to problems related to the security of mobile ad hoc networks (MANETs). Although many proposals to solve problems related to the security of MANETs are suggested by the research community, there is no one solution that fits all. The interdependency cycle between secure routing and security services makes the use of IBC in MANETs very challenging. In this paper, two novel methods are proposed to eliminate the need for this cycle. One of these methods utilizes a key pool to secure routes for the distribution of cryptographic materials, while the other adopts a pairing-based key agreement method. Furthermore, our proposed methods utilize threshold cryptography for shared secret and private key generation to eliminate the "single point of failure" and distribute cryptographic services among network nodes. These characteristics guarantee high levels of availability and scalability for the proposed methods. To illustrate the effectiveness and capabilities of the proposed methods, they are simulated and compared against the performance of existing methods.

Efficient and Secure Group Key Generation Protocol for Small and Medium Business

  • Jung, Hyun Soo
    • Journal of Convergence Society for SMB
    • /
    • v.4 no.4
    • /
    • pp.19-23
    • /
    • 2014
  • Group communication is becoming increasingly popular in Internet applications such as videoconferences, online chatting programs, games, and gambling. For secure communications, the integrity of messages, member authentication, and confidentiality must be provided among group members. To maintain message integrity, all group members use the Group Key (GK) for encrypting and decrypting messages while providing enough security to protect against passive attacks. Tree-based Group Diffie-Hellman (TGDH) is an efficient group key agreement protocol to generate the GK. TGDH assumes all members have an equal computing power. One of the characteristics of distributed computing and grid environments is heterogeneity; the member can be at a workstation, a laptop or even a mobile computer. Member reordering in the TDGH protocol could potentially lead to an improved protocol; such reordering should capture the heterogeneity of the network as well as latency. This research investigates dynamic reordering mechanisms to consider not only the overhead involved but also the scalability of the proposed protocol.

  • PDF

Review of Leptocimbex formosanus group (Hymenoptera: Cimbicidae) with two new Chinese species

  • YAN, Yuchen;NIU, Gengyun;LAN, Bocheng;WEI, Meicai
    • Entomological Research
    • /
    • v.48 no.5
    • /
    • pp.372-383
    • /
    • 2018
  • Leptocimbex formosanus group of Leptocimbex Semenov 1896, Cimbicidae is defined and the relationships and characteristics are provided. Two new species of this group are described from Hunan and Yunnan Provinces in China: Leptocimbex shinoharai Yan & Wei sp. nov. and L. naitoi Yan & Wei sp. nov. Redescriptions of the three known species of L. formosanus group (L. formosanus Enslin 1911, L. dendrobii Rohwer 1915 and L. nigropropodea Wei & Deng 2002) and a key to all known species of this group are provided.

Hybrid Double Direction Blocking Sub-Module for MMC-HVDC Design and Control

  • Zhang, Jianpo;Cui, Diqiong;Tian, Xincheng;Zhao, Chengyong
    • Journal of Power Electronics
    • /
    • v.19 no.6
    • /
    • pp.1486-1495
    • /
    • 2019
  • Dealing with the DC link fault poses a technical problem for an HVDC based on a modular multilevel converter. The fault suppressing mechanisms of several sub-module topologies with DC fault current blocking capacity are examined in this paper. An improved half-bridge sub-module topology with double direction control switch is also designed to address the additional power consumption problem, and a sub-module topology called hybrid double direction blocking sub module (HDDBSM) is proposed. The DC fault suppression characteristics and sub-module capacitor voltage balance problem is also analyzed, and a self-startup method is designed according to the number of capacitors. The simulation model in PSCAD/EMTDC is built to verify the self-startup process and the DC link fault suppression features.

A Development Plan for Core System of Urban Transit based on System Engineering Process (시스템엔지니어링 수명주기를 고려한 도시철도 핵심장치 개발 전략)

  • Han, Seok-Youn;Kim, Jin-Ho;An, Tae-Ki;Lee, Woo-Dong;Shin, Won-Sik
    • Proceedings of the KSR Conference
    • /
    • 2008.11b
    • /
    • pp.2005-2013
    • /
    • 2008
  • Urban transit is a large scaled complex system which combines rolling stocks, power supply, signal communications, tracks & stations etc. KRRI develops nine key devices since July, 2007 as a part of the second phase of project on the standardization of urban rail transit system, which include information-communication system, station facilities, AC-DC current electric power system in urban transit. We promote the project under two directions, i.e. user-customer oriented standardization and strategic standardization for leading technologies in urban transit. In this paper, we present development plan of these key systems in view of system life cycle based on system engineering standards KSX ISO/IEC 15288 which supplies the common fundamental frame to describe the life cycle of artificial systems. System engineering process of KSX ISO/IEC 15288 are helpful to efficiently develop those key devices, although it is difficult to apply the standard identically to the key devices with the varieties and characteristics.

  • PDF

Design of Secure Information Center Using a Conventional Cryptography

  • Choi, Jun-Hyuk;Kim Tae-Gap;Go, Byung-Do;Ryou, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.6 no.4
    • /
    • pp.53-66
    • /
    • 1996
  • World Wide Web is a total solution for multi-media data transmission on Internet. Because of its characteristics like ease of use, support for multi-media data and smart graphic user interface, WWW has extended to cover all kinds of applications. The Secure Information Center(SIC) is a data transmission system using conventional cryptography between client and server on WWW. It's main function is to support the encryption of sending data. For encryption of data IDEA(International Data Encryption Algorithm) is used and for authentication mechanism MD5 hash function is used. Since Secure Information Center is used by many users, conventional cryptosystem is efficient in managing their secure interactions. However, there are some restrictions on sharing of same key and data transmission between client and server, for example the risk of key exposure and the difficulty of key sharing mechanisms. To solve these problems, the Secure Information Center provides encryption mechanisms and key management policies.

Derivation of Key Safety Management Factors by Construction Process through Cross-Tabulation Analysis between Accident Types and Objects (건설공사 공종별 사고유형 및 사고객체 교차분석을 통한 중점안전관리항목 도출)

  • Yoo, Nayeong;Kim, Harim;Lee, Chanwoo;Cho, Hunhee
    • Proceedings of the Korean Institute of Building Construction Conference
    • /
    • 2022.04a
    • /
    • pp.127-128
    • /
    • 2022
  • The construction industry has a higher disaster rate than other industries, so safety education and management are highly important. In order to reduce the construction accident rate, it is necessary to study the key safety management factors reflecting the characteristics of the construction industry, where there are differences in processes and manpower input for each process, and a small number of managers. Therefore, in this study, key safety management factors for each Process of construction were derived through cross-analysis between safety accident types and accident occurrence objects through disaster case data. The extracted key safety management factors are expected to provide useful information for safety education and supervision of construction sites.

  • PDF