• Title/Summary/Keyword: Technique Information

Search Result 16,046, Processing Time 0.056 seconds

Dynamic Addressing Technique in MANET Using an Enhanced DCDP (Enhanced DCDP를 이용한 MANET에서의 Dynamic Addressing Technique)

  • 나상준;이수경;송주석
    • Proceedings of the Korean Information Science Society Conference
    • /
    • 2004.10c
    • /
    • pp.709-711
    • /
    • 2004
  • 네트워크에서의 IP address는 통신을 하기 위한 가장 중요한 요소라고 할 수 있다. 네트워크 상에 존재하는 모든 node들은 자신의 IP address를 가지고 나서야 통신에 참여할 수 있다. 최근 MANET에서의 라우팅 프로토콜에 대한 많은 연구가 진행되고 있으며, 이와 함께 dynamic addressing technique에 대한 연구도 활발히 이루어지고 있다. 본 논문에서는 여러 가지 방식의 dynamic addressing technique들 중에서 빠르고 효율적인 Dynamic Configuration and Distribution Protocol (DCDP)에 대해 살펴보고 보다 안정적인 address 할당 기술을 이용한 Enhanced DCDP를 제안한다.

  • PDF

Enhance Health Risks Prediction Mechanism in the Cloud Using RT-TKRIBC Technique

  • Konduru, Venkateswara Raju;Bharamgoudra, Manjula R
    • Journal of information and communication convergence engineering
    • /
    • v.19 no.3
    • /
    • pp.166-174
    • /
    • 2021
  • A large volume of patient data is generated from various devices used in healthcare applications. With increase in the volume of data generated in the healthcare industry, more wellness monitoring is required. A cloud-enabled analysis of healthcare data that predicts patient risk factors is required. Machine learning techniques have been developed to address these medical care problems. A novel technique called the radix-trie-based Tanimoto kernel regressive infomax boost classification (RT-TKRIBC) technique is introduced to analyze the heterogeneous health data in the cloud to predict the health risks and send alerts. The infomax boost ensemble technique improves the prediction accuracy by finding the maximum mutual information, thereby minimizing the mean square error. The performance evaluation of the proposed RT-TKRIBC technique is realized through extensive simulations in the cloud environment, which provides better prediction accuracy and less prediction time than those provided by the state-of-the-art methods.

A Research on the Magnitude/Phase Asymmetry Measurement Technique of the RF Power Amplifier Based on the Predistortive Tone Cancellation Technique

  • Choi, Heung-Jae;Shim, Sung-Un;Kim, Young-Gyu;Jeong, Yong-Chae;Kim, Chul-Dong
    • Journal of electromagnetic engineering and science
    • /
    • v.10 no.2
    • /
    • pp.73-77
    • /
    • 2010
  • This paper proposes a novel memory effect measurement technique in RF power amplifiers(PAs) using a two-tone intermodulation distortion(IMD) signal with a very simple and intuitive algorithm. Based on the proposed predistortive tone cancellation technique, the proposed measurement method is capable of measuring the relative phase and magnitude of the third-order and fifth-order IMDs, as well as the fundamental signal. The measured relative phase between the higher and lower IMD signal for specific tone spacing can be interpreted as the group delay(GD) information of the IMD signal concerned. From the group delay analysis, we can conclude that an adaptive control of GD as well as the magnitude and phase is a key function in increasing the linearization bandwidth and the dynamic range in a predistortion(PD) technique.

Automatic Document Summary Technique Using Fuzzy Theory (퍼지이론을 이용한 자동문서 요약 기술)

  • Lee, Sanghoon;Moon, Seung-Jin
    • KIPS Transactions on Software and Data Engineering
    • /
    • v.3 no.12
    • /
    • pp.531-536
    • /
    • 2014
  • With the very large quantity of information available on the Internet, techniques for dealing with the abundance of documents have become increasingly necessary but the problem of processing information in the documents is still technically challenging and remains under study. Automatic document summary techniques have been considered as one of critical solutions for processing documents to retain the important points and to remove duplicated contents of the original documents. In this paper, we propose a document summarization technique that uses a fuzzy theory. Proposed summary technique solves the ambiguous problem of various features determining the importance of the sentence and the experiment result shows that the technique generates better results than other previous techniques.

Sharing a Large Secret Image Using Meaningful Shadows Based on VQ and Inpainting

  • Wang, Zhi-Hui;Chen, Kuo-Nan;Chang, Chin-Chen;Qin, Chuan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.12
    • /
    • pp.5170-5188
    • /
    • 2015
  • This paper proposes a novel progressive secret image-hiding scheme based on the inpainting technique, the vector quantization technique (VQ) and the exploiting modification direction (EMD) technique. The proposed scheme first divides the secret image into non-overlapping blocks and categorizes the blocks into two groups: complex and smooth. The blocks in the complex group are compressed by VQ with PCA sorted codebook to obtain the VQ index table. Instead of embedding the original secret image, the proposed method progressively embeds the VQ index table into the cover images by using the EMD technique. After the receiver recovers the complex parts of the secret image by decoding the VQ index table from the shadow images, the smooth parts can be reconstructed by using the inpainting technique based on the content of the complex parts. The experimental results demonstrate that the proposed scheme not only has the advantage of progressive data hiding, which involves more shadow images joining to recover the secret image so as to produce a higher quality steganography image, but also can achieve high hiding capacity with acceptable recovered image quality.

The Design of User-Authentication technique using QR-Code recognition (스마트폰의 QR-Code의 인식 기법을 이용한 사용자 인증 기법 설계)

  • Lee, Yong Jae;Kim, Young Gon;Park, Tae Sung;Jun, Moon Seog
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.7 no.3
    • /
    • pp.85-95
    • /
    • 2011
  • Smart phones, greatly expanding in the recent mobile market, are equipped with various features compared to existing feature phones and provide the conveniences to in several ways. The camera, one of the features of a smartphone, creates the digital contents, such photos and videos, and plays a role for the media which transmits information, such as video calls and bar code reader. QR-Code recognition is also one of the camera features. It contains a variety of information in two-dimensional bar code type in matrix format, and makes it possible to obtain the information by using smart phones. This paper analyzes the method of QR-Code recognition, password method-the existing user-authentication technique, smart card, biometrics and voice recognition and so on and thenn designs a new user-authentication technique. The proposed user-authentication technique is the technique in which QR-Code, which can be simply granted is read by smart phones and transmitted to a server, for authentication. It has the advantages in view that it will simply the process of authentication and conteract the disadvantages, such as brute force attack, man-inthe-middle attack, and keyboard hacking, which may occur in other authentication techniques.

CQ importance sampling technique for the rician fading channel (Rician 페이딩 채널에 대한 CQ Importance Sampling 기법)

  • 이대일;김동인;황인관
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.22 no.5
    • /
    • pp.1097-1106
    • /
    • 1997
  • Most works on importance sampling (IS) as an efficient evaluation technique havd been done in an additibe white gaussian noise channel (Awgn). In this paper we propose a CQ(conventional importance sampling and quasi-translantion) IS technique for the mobile radio channel modeled as Rician fading, and analyze the IS estimator's variance to determine optimum IS parameters and the minimum number of run times. Reference showed that CIS technique has a poor performance for systems with meories, but it is shown that the CIS technique can be improved by combining with quasi-translation technique even for systems with memories. Here the CQ IS technique modifies the variance of additive noise and also performs quasi-translation for the fading distribution. We determine the optimum IS parameters of the proposed CQ IS estimator and whow that the simulation gains are about 10$^{3}$~10$^{6}$ for the mobile communication systems with memories in case of the expected BERs 10$^{-5}$ ~10$^{-8}$ .

  • PDF

Scaling Up Face Masks Classification Using a Deep Neural Network and Classical Method Inspired Hybrid Technique

  • Kumar, Akhil;Kalia, Arvind;Verma, Kinshuk;Sharma, Akashdeep;Kaushal, Manisha;Kalia, Aayushi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.11
    • /
    • pp.3658-3679
    • /
    • 2022
  • Classification of persons wearing and not wearing face masks in images has emerged as a new computer vision problem during the COVID-19 pandemic. In order to address this problem and scale up the research in this domain, in this paper a hybrid technique by employing ResNet-101 and multi-layer perceptron (MLP) classifier has been proposed. The proposed technique is tested and validated on a self-created face masks classification dataset and a standard dataset. On self-created dataset, the proposed technique achieved a classification accuracy of 97.3%. To embrace the proposed technique, six other state-of-the-art CNN feature extractors with six other classical machine learning classifiers have been tested and compared with the proposed technique. The proposed technique achieved better classification accuracy and 1-6% higher precision, recall, and F1 score as compared to other tested deep feature extractors and machine learning classifiers.

Development of Classification Technique of Point Cloud Data Using Color Information of UAV Image

  • Song, Yong-Hyun;Um, Dae-Yong
    • Journal of the Korean Society of Surveying, Geodesy, Photogrammetry and Cartography
    • /
    • v.35 no.4
    • /
    • pp.303-312
    • /
    • 2017
  • This paper indirectly created high density point cloud data using unmanned aerial vehicle image. Then, we tried to suggest new concept of classification technique where particular objects from point cloud data can be selectively classified. For this, we established the classification technique that can be used as search factor in classifying color information in point cloud data. Then, using suggested classification technique, we implemented object classification and analyzed classification accuracy by relative comparison with self-created proof resource. As a result, the possibility of point cloud data classification was observable using the image's information. Furthermore, it was possible to classify particular object's point cloud data in high classification accuracy.

Error Recovery Script of Immunity Debugger for C# .NET Applications

  • Shinde, Rupali;Choi, Min;Lee, Su-Hyun
    • Journal of Information Processing Systems
    • /
    • v.15 no.6
    • /
    • pp.1438-1448
    • /
    • 2019
  • We present a new technique, called VED (very effective debugging), for detecting and correcting division by zero errors for all types of .NET application. We use applications written in C# because C# applications are distributed through the internet and its executable format is used extensively. A tool called Immunity Debugger is used to reverse engineer executable code to get binaries of source code. With this technique, we demonstrate integer division by zero errors, the location of the error causing assembly language code, as well as error recovery done according to user preference. This technique can be extended to work for other programming languages in addition to C#. VED can work on different platforms such as Linux. This technique is simple to implement and economical because all the software used here are open source. Our aims are to simplify the maintenance process and to reduce the cost of the software development life cycle.