• Title/Summary/Keyword: Recovery algorithm

Search Result 555, Processing Time 0.023 seconds

A Study on the FSK Synchronization and MODEM Techniques for Mobile Communication Part II : Performance Analysis and Design of The FSK MODEM (이동통신을 위한 FSK 동기 및 변복조기술에 관한 연구 II부. FSK 모뎀 설계 및 성능평가)

  • Kim, Gi-Yun;Choe, Hyeong-Jin;Jo, Byeong-Hak
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.37 no.3
    • /
    • pp.9-17
    • /
    • 2000
  • In this paper we implement computer simulation system of 4FSK signal MODEM using Quadrature detector and analyze overall tranceiver system. We follow the FLEX wireless paging system standards and construct premodulation filter and data frame. We propose an efficient open loop symbol timing recovery algorithm which takes advantage of 128 bit length preamble pattern and also propose a 32 bit UW pattern which Is based on the optimal UW detection method, and excellent aperiodic autocorrelation characteristic. The BER simulation in the fading channel as well as AWGN is performed with BCH coding and Interleaving to the Quadrature detector system and it is shown that a high coding fain occurs in the fading channel rather than AWGN channel.

  • PDF

Methods on Recognition and Recovery Process of Censored Areas in Digital Image (디지털영상의 특정영역 인식과 처리 방안)

  • 김감래;김욱남;김훈정
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.20 no.1
    • /
    • pp.1-11
    • /
    • 2002
  • This study set up a purpose in the efficient utilization of security target objects. This purpose is the following: Firstly, this study analyzed problem about deleted areas for security described on aerial photography image. Secondly, this study made clustering and labeling to recognize censored areas of image. Finally, this study tried to maximize various utilizability of digital image data through postprocessing algorithm. Based on these courses, the results of this study appeared that brightness value of image increased depending on topography and quantities of topographic features. It was estimated that these was able to utilized by useful estimative data in judging information of topography and topographic features included in the total image. Besides, in the image recognition and postprocessing, the better result value was not elicited than in a mountainous region. Because it was included that a lots of topography and topographic features was similarly recognized with the process for deletion of the existing security target objects in urban and suburb region. This result appeared that the topography and quantities of topographic features absolutely affected the recognition and processing of image.

A Study on Efficient Design of PUF-Based RFID Authentication Protocol (PUF 기반 RFID 인증 프로토콜의 효율적 설계에 관한 연구)

  • Byun, Jin Wook
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.5
    • /
    • pp.987-999
    • /
    • 2014
  • A PUF is embedded and implemented into a tag or a device, and outputs a noise y with an input of x, based on its own unique physical characteristics. Although x is used multiple times as inputs of PUF, the PUF outputs slightly different noises, ($y_1,{\cdots}y_n$), and also the PUF has tamper-resistance property, hence it has been widely used in cryptographic protocol. In this paper, we study how to design a PUF-based RFID authentication protocol in a secure and an efficient way. Compared with recent schemes, the proposed scheme guarantees both authentication and privacy of backword/forward under the compromise of long-term secrets stored in tag. And also, the most cost and time-consumming procedure, key recovery algorithm used with PUF, has been desgined in the side of RFID reader, not in the tag, and, consequently, gives possibility to minimize costs for implementation and running time.

A compensation algorithm of cycle slip for synchronous stream cipher (동기식 스트림 암호 통신에 적합한 사이클 슬립 보상 알고리즘)

  • 윤장홍;강건우;황찬식
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.8
    • /
    • pp.1765-1773
    • /
    • 1997
  • The communication systems which include PLL may have cycle clip problem because of channel noise. The cycle slip problem occurs the synchronization loss of communication system and it may be fatal to the synchronous stream cipher system. While continuous resynchronization is used to lessen the risk of synchronization it has some problems. In this paper, we propose the method which solve the problems by using continuous resynchronization with the clock recovery technique. If the counted value of real clock pulse in reference duration is not same as that of normal state, we decide the cycle slip has occurred. The damaged clock by cycle slip is compensated by adding or subtracting the clock pulse according to the type of cycle slip. It reduced the time for resynchronization by twenty times. It means that 17.8% of data for transmit is compressed.

  • PDF

Facial Features and Motion Recovery using multi-modal information and Paraperspective Camera Model (다양한 형식의 얼굴정보와 준원근 카메라 모델해석을 이용한 얼굴 특징점 및 움직임 복원)

  • Kim, Sang-Hoon
    • The KIPS Transactions:PartB
    • /
    • v.9B no.5
    • /
    • pp.563-570
    • /
    • 2002
  • Robust extraction of 3D facial features and global motion information from 2D image sequence for the MPEG-4 SNHC face model encoding is described. The facial regions are detected from image sequence using multi-modal fusion technique that combines range, color and motion information. 23 facial features among the MPEG-4 FDP (Face Definition Parameters) are extracted automatically inside the facial region using color transform (GSCD, BWCD) and morphological processing. The extracted facial features are used to recover the 3D shape and global motion of the object using paraperspective camera model and SVD (Singular Value Decomposition) factorization method. A 3D synthetic object is designed and tested to show the performance of proposed algorithm. The recovered 3D motion information is transformed into global motion parameters of FAP (Face Animation Parameters) of the MPEG-4 to synchronize a generic face model with a real face.

Self-driving quarantine robot with chlorine dioxide system (이산화염소 시스템을 적용한 자율주행 방역 로봇)

  • Bang, Gul-Won
    • Journal of Digital Convergence
    • /
    • v.19 no.12
    • /
    • pp.145-150
    • /
    • 2021
  • In order to continuously perform quarantine in public places, it is not easy to secure manpower, but using self-driving-based robots can solve problems caused by manpower. Self-driving-based quarantine robots can continuously prevent the spread of harmful viruses and diseases in public institutions and hospitals without additional manpower. The location of the autonomous driving function was estimated by applying the Pinnacle filter algorithm, and the UV sterilization system and chlorine dioxide injection system were applied for quarantine. The driving time is more than 3 hours and the position error is 0.5m.Soon, the stop-avoidance function was operated at 95% and the obstacle detection distance was 1.5 m, and the automatic charge recovery was charged by moving to the charging cradle at the remaining 10% of the battery capacity. As a result of quarantine with an unmanned quarantine system, UV sterilization is 99% and chlorine dioxide is sterilized more than 95%, which can contribute to reducing enormous social costs.

The Development of the Recovery System of the Destroyed Epigraph - Focused on the Chinese standard script - (훼손된 금석문 판독시스템 개발 - 해서체를 중심으로 -)

  • Jang, Seon-Phil
    • Korean Journal of Heritage: History & Science
    • /
    • v.50 no.2
    • /
    • pp.80-93
    • /
    • 2017
  • This study proposes a new scientific measurement method for damaged epigraph. In this new method, the Chinese characters are converted and coordinates are created for this measurement. This method is then used to decipher partially damaged characters from the parts of the coordinated characters that are damaged and intact. The Chinese characters are divided into 9 square parts by the position of their Chinese Radicals. The unknown characters are then compared and deciphered dependent upon the character shape in 9 square parts that have been created. This method is more scientific, accurate, and makes it easier to find related characters than deciphering through contexts, which is current method. When creating a new software based on this algorithm, it will be especially useful in deciphering an old manuscript or a epigraph that made ancient Chinese characters which are not currently in use. This study will also be helpful in deciphering semi-cursive styled or cursive styled epigraph, as well as semi-cursive styled or cursive styled damaged characters during follow-up research.

Exercise Detection Method by Using Heart Rate and Activity Intensity in Wrist-Worn Device (손목형 웨어러블 디바이스에서 사람의 심박변화와 활동강도를 이용한 운동 검출 방법)

  • Sung, Ji Hoon;Choi, Sun Tak;Lee, Joo Young;Cho, We-Duke
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.8 no.4
    • /
    • pp.93-102
    • /
    • 2019
  • As interest in wellness grows, There is a lot of research about monitoring individual health using wearable devices. Accordingly, a variety of methods have been studied to distinguish exercise from daily activities using wearable devices. Most of these existing studies are machine learning methods. However, there are problems with over-fitting on individual person's learning, data discontinuously recognition by independent segmenting and fake activity. This paper suggests a detection method for exercise activity based on the physiological response principle of heart rate up and down during exercise. This proposed method calculates activity intensity and heart rate from triaxial and photoplethysmography sensor to determine a heart rate recovery, then detects exercise by estimating activity intensity or detecting a heart rate rising state. Experimental results show that our proposed algorithm has 98.64% of averaged accuracy, 98.05% of averaged precision and 98.62% of averaged recall.

Security Analysis of Software-Oriented Stream Ciphers against Algebraic Attacks (소프트웨어 구현에 적합한 스트림 암호의 대수적 공격에 대한 안전성)

  • Sung Jaechul;Moon Dukjae;Im Hung-su;Chee Seongtaek;Lee Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.15 no.1
    • /
    • pp.29-40
    • /
    • 2005
  • In this paper we consider the security of recently proposed software-orienred stram cipher HELIX, SCREAM, MUGI, and PANAMA against algebraic attacks. Algebraic attack is a key recovery attack by solving an over-defined system of multi-variate equations with input-output pairs of an algorithm. The attack was firstly applied to block ciphers with some algebraic properties and then it has been mon usefully applied to stream ciphers. However it is difficult to obtain over-defined algebraic equations for a given cryptosystem in general. Here we analyze recently proposed software-oriented stream ciphers by constructing a system of equations for each cipher. furthermore we propose three design considerations of software-oriented stream ciphers.

An Efficient LWE-Based Reusable Fuzzy Extractor (효율적인 LWE 기반 재사용 가능한 퍼지 추출기)

  • Kim, Juon;Lee, Kwangsu;Lee, Dong Hoon
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.32 no.5
    • /
    • pp.779-790
    • /
    • 2022
  • Fuzzy extractor is a biometric encryption that generates keys from biometric data where input values are not always the same due to the noisy data, and performs authentication securely without exposing biometric information. However, if a user registers biometric data on multiple servers, various attacks on helper data which is a public information used to extract keys during the authentication process of the fuzzy extractor can expose the keys. Therefore many studies have been conducted on reusable fuzzy extractors that are secure to register biometric data of the same person on multiple servers. But as the key length increases, the studies presented so far have gradually increased the number of key recovery processes, making it inefficient and difficult to utilize in security systems. In this paper, we design an efficient and reusable fuzzy extractor based on LWE with the same or similar number of times of the authentication process even if the key length is increased, and show that the proposed algorithm is reusably-secure defined by Apon et al.[5].