• Title/Summary/Keyword: Smart Network

Search Result 2,941, Processing Time 0.027 seconds

AI-Based Object Recognition Research for Augmented Reality Character Implementation (증강현실 캐릭터 구현을 위한 AI기반 객체인식 연구)

  • Seok-Hwan Lee;Jung-Keum Lee;Hyun Sim
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.18 no.6
    • /
    • pp.1321-1330
    • /
    • 2023
  • This study attempts to address the problem of 3D pose estimation for multiple human objects through a single image generated during the character development process that can be used in augmented reality. In the existing top-down method, all objects in the image are first detected, and then each is reconstructed independently. The problem is that inconsistent results may occur due to overlap or depth order mismatch between the reconstructed objects. The goal of this study is to solve these problems and develop a single network that provides consistent 3D reconstruction of all humans in a scene. Integrating a human body model based on the SMPL parametric system into a top-down framework became an important choice. Through this, two types of collision loss based on distance field and loss that considers depth order were introduced. The first loss prevents overlap between reconstructed people, and the second loss adjusts the depth ordering of people to render occlusion inference and annotated instance segmentation consistently. This method allows depth information to be provided to the network without explicit 3D annotation of the image. Experimental results show that this study's methodology performs better than existing methods on standard 3D pose benchmarks, and the proposed losses enable more consistent reconstruction from natural images.

An Unproved Optimal Strong-Password Authentication (I-OSPA) Protocol Secure Against Stolen-Verifier Attack and Impersonation Attack (Stolen-Verifier 공격과 Impersonation 공격에 안전한 개선된 OSPA 프로토콜)

  • Kwak, Jin;Oh, Soo-Hyun;Yang, Hyung-Kyu;Won, Dong-Ho
    • The KIPS Transactions:PartC
    • /
    • v.11C no.4
    • /
    • pp.439-446
    • /
    • 2004
  • In the Internet, user authentication is the most important service in secure communications. Although password-based mechanism is the most widely used method of the user authentication in the network, people are used to choose easy-to-remember passwords, and thus suffers from some Innate weaknesses. Therefore, using a memorable password it vulnerable to the dictionary attacks. The techniques used to prevent dictionary attacks bring about a heavy computational workload. In this paper, we describe a recent solution, the Optimal Strong-Password Authentication (OSPA) protocol, and that it is vulnerable to the stolen-verifier attack and an impersonation attack. Then, we propose an Improved Optimal Strong-Password Authentication (I-OSPA) protocol, which is secure against stolen-verifier attack and impersonation attack. Also, since the cryptographic operations are computed by the processor in the smart card, the proposed I-OSPA needs relatively low computational workload and communicational workload for user.

Digital Restoration of Traditional Architectural Buildings Using Multimedia and Augmented Reality Technologies (멀티미디어 및 증강현실 기술을 이용한 전통목조건축물 디지털 복원)

  • Lee, Kang-Hun;Cho, Sae-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.206-212
    • /
    • 2013
  • Information and Communications Technologies(ICT) represented by Multimedia, Virtual Reality and Network could be used as the better ways to preserve and restore the original shape of cultural contents. This paper presents the detailed methods of Multimedia and Virtual Reality technologies to digitally implement the traditional wooden buildings which are called as a typical 'Korean Cultural Content." We implemented a 3D modeling of architectural parts, realized a roof curve, and texture-mapped the material qualities of traditional wooden buildings by using Graphic techniques. In addition, the information, which is implemented by marker-based Augment Reality, for the traditional wooden buildings can be obtained through the mobile appliances such as a smart phone. We, also, presented how to practically use the implemented digital Korea traditional wooden buildings.

A Study on Hotel Customer Reputation Analysis based on Big Data (빅 데이터 기반 호텔고객 평판 분석에 관한 연구)

  • Kong, Hyo-Soon;Song, Eun-Jee
    • Journal of Digital Contents Society
    • /
    • v.15 no.2
    • /
    • pp.219-225
    • /
    • 2014
  • Competition between corporations is getting more intense, so they need customer feedback in order to fulfill an effective management. Recently, SNS (Social Network Service) such as Twitter and Facebook has grown dramatically because of smart phones. Social media like Twitter and Facebook let customers to express their needs, and using big data such as data on SNS is a very effective method for getting customer's feedback. Collecting and analyzing social big data are operated by Buzz monitoring system. This research suggests how to utilize big data for getting customer's feedback on hotel CRM(Customer Relationship Management), which considers customer itself as asset of business. This paper demonstrates the research of buzz monitoring system that analyzes big data, and presents results of hotel customer reputation using buzz monitoring system. It would analyze the result from the hotel customer reputation, and research the implication in this paper.

A Study on Signature-based Wireless Intrusion Detection Systems (시그니처 기반의 무선 침입 탐지 시스템에 관한 연구)

  • Park, Sang-No;Kim, A-Yong;Jung, Hoe-Kyung
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.18 no.5
    • /
    • pp.1122-1127
    • /
    • 2014
  • WLAN is affordability, flexibility, and ease of installation, use the smart device due to the dissemination and the AP (Access Point) to the simplification of the Office building, store, at school. Wi-Fi radio waves because it uses the medium of air transport to reach areas where security threats are always exposed to illegal AP installation, policy violations AP, packet monitoring, AP illegal access, external and service access, wireless network sharing, MAC address, such as a new security threat to steal. In this paper, signature-based of wireless intrusion detection system for Snort to suggest how to develop. The public can use hacking tools and conduct a mock hacking, Snort detects an attack of hacking tools to verify from experimental verification of the suitability of the thesis throughout.

An Experimental Analysis of Linux TCP Variants for Video Streaming in LTE-based Mobile DaaS Environments (LTE 기반 모바일 DaaS 환경에서 비디오 스트리밍을 위한 Linux TCP 구현물의 실험적 성능 분석)

  • Seong, Chaemin;Hong, Seongjun;Lim, Kyungshik;Kim, Dae Won;Kim, Seongwoon
    • IEMEK Journal of Embedded Systems and Applications
    • /
    • v.10 no.4
    • /
    • pp.241-255
    • /
    • 2015
  • Recent network environment has been rapidly evolved to cloud computing environment based on the development of the Internet technologies. Furthermore there is an increasing demand on mobile cloud computing due to explosive growth of smart devices and wide deployment of LTE-based cellular networks. Thus mobile Desktop-as-a-Service(DaaS) could be a pervasive service for nomadic users. In addition, video streaming traffic is currently more than two-thirds of mobile traffic and ever increasing. All such trends enable that video streaming in mobile DaaS could be an important concern for mobile cloud computing. It should be noted that the performance of the Transmission Control Protocol(TCP) on cloud host servers greatly affects Quality of Service(QoS) of video streams for mobile users. With widely deployed Linux server platforms for cloud computing, in this paper, we conduct an experimental analysis of the twelve Linux TCP variants in mobile DaaS environments. The results of our experiments show that the TCP Illinois outperforms the other TCP variants in terms of wide range of packet loss rate and propagation delay over LTE-based wireless links between cloud servers and mobile devices, even though TCP CUBIC is usually used in default in the current Linux systems.

A Study on Wireless Data Quality Measurement Method for u-Healthcare Service in WiBro Environment (WiBro 환경에서의 u-Healthcare 서비스를 위한 무선데이터 품질 측정 방안 연구)

  • Shim, Jae-Sung;Yun, Sung-Yeol;Park, Seok-Cheon
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.13 no.2
    • /
    • pp.834-841
    • /
    • 2012
  • In order to the mobile service uses the wireless terminal including the development of the wire wireless network and Smart phone, and etc. use including mobile office, which and etc. increases. Because in order that the u-Healthcare service using this appeared before the footlights and the existing quality measurement reference considered the speed, error rate, and etc. just, guarantees the stability of the u-Healthcare, the quality control by service are necessary. In this paper, the quality measurement reference by mobile service considering the radio environment as the method for satisfying the quality guarantee of the u-Healthcare mobile service user and user needs was presented. The WiBro u-Healthcare wireless data service quality based system in the end user perspective was established through the main performance index and entrepreneur case presented in the international standardization institute including 3GPP, WiMAX forum, GSMA, and etc. through the related research and the validity of the quality index establishment was presented according to each service.

Transmission Performance of Application Service Traffic on MANET with IDS (IDS가 있는 MANET에서 응용 서비스 트래픽의 전송 성능)

  • Kim, Young-Dong
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.584-587
    • /
    • 2012
  • MANET, which can be constructed with only terminal devices, has structural advantages of ease installation and operation, also has environmental change of rapid supply of smart phone, it's usage can be extended to application area likes as emergency communication, leasure, exploration and investigations. But, as one characteristic of MANET, no use of communicaton infrastructure caused disadvantage of weakness for information intrusion which is frequently occurred, nowadays. In this paper, the effects of IDS(Intrusion Detection System), one of defence tools for information intrusion, is analyzed for transmission performance. Blackhole attack is assumed as a type of intrusion, MANET defence with IDS from intrusions. Computer simulation based on NS-2 used for performance measurement. In this paper, performance measurement is done for application service to analyze application level effects of IDS. VoIP service is used as application service.

  • PDF

Development of Intelligent Switchgear Monitoring System based on Smartphone (스마트폰 기반의 지능형 수배전반 모니터링 시스템 구현)

  • Jung, Hae-Kyung;Jeon, Gam-Pyo;Jeong, Do-Un
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2012.05a
    • /
    • pp.378-379
    • /
    • 2012
  • Nowadays, great energy consumption in advanced electrical industry has called up the great y efficiency. Electric power IT industry such as intelligent electric power system is receiving great attention and being marked up as a new growth engine. Through Intelligent electric power system, the electric power supply can be balance optimized according to demand, giving huge cost savings advantage for energy imports, infrastructure construction and operation. Nevertheless, the intelligent system promotes better reliability in power supply. Manual electric power management using man power appears to be non-practical. Real time electric power management on all facilities and equipment can be done through an intelligent electric power system, any accident break out issue can be easily recorded and recognized. In this paper, a fully integrated intelligent switchgear electric management system is developed to monitor and remote control the electrical switch based on smart phone. The proposed system is superior than the existing switchgear management system's weakness and can sharply improve effectiveness and stability with low cost. In future, the proposed system is expected to be greatly contributed to the advancement of the IT industry in electric power management.

  • PDF

A Research on Personal Environment Services for a Smart Home Network (스마트 홈 네트워크를 위한 개인환경서비스 연구)

  • Ro, Kwang-Hyun;Kim, Seung-Cheon
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.49 no.3
    • /
    • pp.46-55
    • /
    • 2012
  • Recently, the concept of PES(Personal Environment Service) is being widely discussed on various standardization organizations such as ITU-R, ETSI, 3GPP, TTA and etc. The purpose of PES is to introduce the services which can dynamically, automatically and intelligently reconfigures the electronic, electrical, and mechanical equipment surrounding the user according to the user preferences included in a user's profile by using a smartphone embedding WPAN radio technologies such as bluetooth and WiFi. This research introduces an Android Platform-based PES system which consists of a PES app, PES devices and a PES server. A smartphone platform is Android 2.2(Froyo) version and 4 simulated PES devices were implemented by using Galaxy Tab. It has shown that the PES would be a killer application of M2M(Machine-to-Machine) or D2D(Device-to-Device) in the future and it would need to study how to update a user's profile based on analyzing user's behaviour for enhancing the PES user's satisfaction.