• Title/Summary/Keyword: Key Park

Search Result 4,873, Processing Time 0.038 seconds

A Key-Frame Extraction Method based on HSV Color Model for Smart Vehicle Management System (스마트 차량 관리 시스템을 위한 HSV 색상모델 기반의 키 프레임 추출 기법)

  • Kwon, Young-Wook;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.4
    • /
    • pp.595-604
    • /
    • 2013
  • Currently, registered number of imported vehicles is increasing rapidly over the years. Accordingly, environment improvements of vehicle maintenance company for maintenance of luxury vehicle such as imported vehicle are continuously being made. In this paper, we propose a key frame extraction method based on HSV color model for smart vehicle management system implementation to offer for customer reliability of maintenance vehicle. After automatically recognize the license plates of the vehicle using vehicle license plate recognition system when the vehicle come in the car center, we check the repair history and request of the vehicle based on it. We implement mobile services which provide extracted key frame images to the user after extract key frames from vehicle repair video. In addition, we verify the superiority of key frame extraction method by applying a smart vehicle management system. Finally, we convert the RGB color to HSV color to improve the performance of proposed key frame extraction scheme. As a result, we confirmed that our scheme is more excellence about 30% in terms of recall than RGB color model from the performance evaluations.

A Technique to Select Key-Frame for Identifying Harmful Video Images (동영상의 유해성 판별을 위한 대표 프레임 선정 기법)

  • Kim, Seong-Gyun;Park, Myeong-Chul;Ha, Seok-Wun
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.10 no.10
    • /
    • pp.1822-1828
    • /
    • 2006
  • A key-frame should be efficiently selected to distinguish bad information from the videos. A previous technique selecting a key-frame mostly consists of the transformation scene-centered. In the case of harmful videos containing the quaility of continuous changes, the technique makes the total rate be reduced by an unnecessary key-frame. This thesis suggests the technique selecting a key-frame, an entry of the distinguishing system by using the quality of changes between the frames. In the experiment of this technique, it was proved that over 90% of the bad information was distinguished by the selected key frame, and also time efficiency was proved by showing 68% of decrement compared to the numbers I-frame. Therefore, This technique makes the system efficient to distinguish bad information, and efficiently can contribute to the distribution of the healthy movie information.

Diameter Growth and Key-Year in Pinus koraiensis and Pinus densiflora Trees (잣나무와 소나무의 직경생장(直徑生長)과 Key-Year)

  • Han, Sang Sup;Park, Wan Geun
    • Journal of Korean Society of Forest Science
    • /
    • v.77 no.2
    • /
    • pp.216-222
    • /
    • 1988
  • This study was conducted to investigate the effect of meteorological factors on the diameter growth and Key-year in Pinus koraiensis and Pinus densiflora trees grown in Chuncheon and Hongcheon. The results obtained were summarized as follows : 1. The diameter growth of Pinus koraiensis was better than that of Pinus densiflora grown in the same meteorological condition and site environment. 2. The influence of meteorological factors on the diameter growth of Pinus koraiensis was the highest in the descending order fog, hours of sunshine, precipitation, relative humidity, warm index, and evaporation. 3. The influence of meteorological factors on the diameter growth of Pinus densiflora was the highest in the descending order fog, hours of sunshine, relative humidity, precipitation, and warm index. But evaporation was not significant. 4. The Key-years for Pinus koraiensis and Pinus densiflora trees appeared in 1964 and 1913 when the diameter growth was influenced by the specific climate change.

  • PDF

Control Method of BIFS Contents for Mobile Devices with Restricted Input Key (제한적 키 입력을 갖는 휴대 단말에서의 BIFS 콘텐츠 제어방법)

  • Kim, Jong-Youn;Moon, Nam-Mee;Park, Joo-Kyung
    • Journal of Broadcast Engineering
    • /
    • v.15 no.3
    • /
    • pp.346-354
    • /
    • 2010
  • T-DMB is using MPEG-4 BIFS standard format for broadcasting interactive data service. BIFS enables us to represent contents as a scene which consists of various objects such as AV, image, graphic, and text. It also enables us to control objects by using user interaction. BIFS was designed to be adapted to multimedia systems with various input devices. Today, however, we are in lack of considering about mobile device with restricted input unit. The problem is that a consistent user control of interactive data contents is not possible due to the limitations of input units in T-DMB terminals. To solve the problem, we defined KeyNavigator node that provides a means to select or navigate objects (like menu) in BIFS contents by arrow keys and enter key of mobile terminal. By using KeyNavigater node, not only BIFS contents providers can make BIFS contents as they want, but also users can get a way to control BIFS contents consistently and easily.

A design of Giga-bit security module using Fully pipe-lined CTR-AES (Full-pipelined CTR-AES를 이용한 Giga-bit 보안모듈 설계)

  • Vinh, T.Q.;Park, Ju-Hyun;Kim, Young-Chul;Kim, Kwang-Ok
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.12 no.6
    • /
    • pp.1026-1031
    • /
    • 2008
  • Nowdays, homes and small businesses rely more and more PON(Passive Optical Networks) for financial transactions, private communications and even telemedicine. Thus, encryption for these data transactions is very essential due to the multicast nature of the PON In this parer, we presented our implementation of a counter mode AES based on Virtex4 FPGA. Our design exploits three advanced features; 1) Composite field arithmetic SubByte, 2) efficient MixColumn transformation 3) and on-the-fly key-scheduling for fully pipelined architecture. By pipeling the composite field implementation of the S-box, the area cost is reduced to average 17 percent. By designing the on-the-fly key-scheduling, we implemented an efficient key-expander module which is specialized for a pipelined architecture.

Key Establishment Scheme for Multicast CoAP Security (멀티캐스트 CoAP 보안을 위한 키 설정 기법)

  • Cho, Jung mo;Han, Sang woo;Park, Chang seop
    • Convergence Security Journal
    • /
    • v.17 no.5
    • /
    • pp.77-85
    • /
    • 2017
  • In this paper, we propose a key establishment scheme for multicast CoAP security. For multicast CoAP applications, a CoAP Request message from a CoAP client is sent to a group of CoAP servers while each CoAP server responds with a unicast CoAP Response message. In this case, the CoAP Request message should be secured with a group key common to both the CoAP client and servers, while a pairwise key(unicast key) should be employed to secure each CoAP Response message. In the proposed protocol, the CoAP client and the CoAP server establish the group key and the pairwise key using the ECDH in the initial CoAP message exchange process. The proposed protocol, which is highly efficient and scalable, can replace DTLS Handshake and it can support end-to-end security by setting pairwise keys.

A Post-Quantum Multi-Signature Scheme (양자 컴퓨팅 환경에서 안전한 다중 서명 기법)

  • Ko, Chanyoung;Lee, Youngkyung;Lee, Kwangsu;Park, Jong Hwan
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.31 no.3
    • /
    • pp.517-526
    • /
    • 2021
  • Recently, the acceleration of the development of quantum computers has raised the issue of the safety of factorization and discrete logarithm based digital signature schemes used in existing Internet environments. To solve the issue, several digital signature schemes are presented that are safe in post-quantum computing environments, including standardization work by the National Institute of Standards and Technology(NIST). In this paper, we design and present a multi-signature scheme based on the TACHYON announced by Behnia et al. in 2018 CCS conference, and prove the security. Multi-signature schemes are key techniques that can distribute the dependence of cryptocurrency-wallet on private keys in the cryptocurrency field, which has recently received much attention as an digital signature application, and many researchers and developers have recently been interested. The multi-signature scheme presented in this paper enables public key aggregation in a plain public key model, which does not require additional zero-knowledge proof, and can construct an effective scheme with only an aggregated public key.

A study on the reform of the liberal arts curriculum based on key competencies for the innovation of liberal arts education in Universities (대학 교양교육 혁신을 위한 핵심역량 기반 교양 교육과정 개편에 대한 연구 -C 대학 사례를 중심으로)

  • Park, Jongjin
    • The Journal of the Convergence on Culture Technology
    • /
    • v.8 no.1
    • /
    • pp.285-290
    • /
    • 2022
  • The 21st century of the 4th industrial revolution demands 'competency' as a new educational concept that is different from that required in the industrialization era. In accordance with these changes and demands of society, universities are being called for key competency-based education and innovation in education through this by breaking away from the existing methods in liberal arts and major education. At this point, universities are presenting a comprehensive reform of liberal arts education for various financial support projects. This study presents the case of University C regarding the reform of the liberal arts curriculum for the innovation of liberal arts education in universities. According to the research results, each university is reorganizing the liberal arts curriculum in a way that can suggest various key competencies according to the university's founding philosophy and induce key competencies in the aspect of liberal arts education. For the key competency-based liberal arts curriculum of University C, we proposed various subjects for insufficient key competency subjects, various micro-degrees were proposed to specialize liberal arts education, and meta-learning-related liberal arts subjects were presented to improve basic learning ability of the students.

Design of protocol for RFID/USN security (RFID/USN 보안을 위한 프로토콜 설계)

  • Park, Sang-Hyun;Park, Sang-Min;Shin, Seung-Ho
    • Journal of the Korea Safety Management & Science
    • /
    • v.9 no.3
    • /
    • pp.103-109
    • /
    • 2007
  • Payment and security requirement are playing an increasingly critical role in RFID system, allegedly the core of the ubiquitous, especially in logistics. Therefore, security technology has been playing essential role gradually unlike the past when only the perception of equipment was considered important technology. The current encoding system allows the access only to the user who has the secret key. Many encoding algorithm has been studied to ensure the security of secret key. Security protocol is the most typical way to authorize appropriate user perception by using the data and secret key to proceed the encoding and transmit it to the system in order to confirm the user. However, RFID system which transmits more than dozens of data per second cannot be used if the algorithm and protocol of the existing wired system are used because the performance will degrade as a consequence. Security protocol needs to be designed in consideration of property of RFID and hardware. In this paper, a protocol was designed using SNEP(Sensor Network Encryption Protocol), the security protocol used for the sensor similar to RFID- not the current system used in wired environment- and ECC (Elliptic Curve Cryptography: oval curve encoding), the encoding algorithm.

High speed key-hole welding by fiber laser (파이버 레이저에 의한 고속 키 홀 용접)

  • Park Seo-Jeong;Jang Ung-Seong;Cheon Chang-Geun;Ju Seong-Min
    • Proceedings of the KWS Conference
    • /
    • 2006.05a
    • /
    • pp.195-197
    • /
    • 2006
  • The present study examined the characteristics of high speed welding thin metal sheet using single mode fiber laser of averaged maximum output power 300 W. Due to the fiber laser that has a good quality of beam can make a very small focusing beam size, thin metal sheet welding and high speed key hole welding can be peformed by high power density.

  • PDF