• Title/Summary/Keyword: The Blind User

Search Result 117, Processing Time 0.024 seconds

Autonomic Self Healing-Based Load Assessment for Load Division in OKKAM Backbone Cluster

  • Chaudhry, Junaid Ahsenali
    • Journal of Information Processing Systems
    • /
    • v.5 no.2
    • /
    • pp.69-76
    • /
    • 2009
  • Self healing systems are considered as cognation-enabled sub form of fault tolerance system. But our experiments that we report in this paper show that self healing systems can be used for performance optimization, configuration management, access control management and bunch of other functions. The exponential complexity that results from interaction between autonomic systems and users (software and human users) has hindered the deployment and user of intelligent systems for a while now. We show that if that exceptional complexity is converted into self-growing knowledge (policies in our case), can make up for initial development cost of building an intelligent system. In this paper, we report the application of AHSEN (Autonomic Healing-based Self management Engine) to in OKKAM Project infrastructure backbone cluster that mimics the web service based architecture of u-Zone gateway infrastructure. The 'blind' load division on per-request bases is not optimal for distributed and performance hungry infrastructure such as OKKAM. The approach adopted assesses the active threads on the virtual machine and does resource estimates for active processes. The availability of a certain server is represented through worker modules at load server. Our simulation results on the OKKAM infrastructure show that the self healing significantly improves the performance and clearly demarcates the logical ambiguities in contemporary designs of self healing infrastructures proposed for large scale computing infrastructures.

Fast Spectrum Sensing with Coordinate System in Cognitive Radio Networks

  • Lee, Wilaiporn;Srisomboon, Kanabadee;Prayote, Akara
    • ETRI Journal
    • /
    • v.37 no.3
    • /
    • pp.491-501
    • /
    • 2015
  • Spectrum sensing is an elementary function in cognitive radio designed to monitor the existence of a primary user (PU). To achieve a high rate of detection, most techniques rely on knowledge of prior spectrum patterns, with a trade-off between high computational complexity and long sensing time. On the other hand, blind techniques ignore pattern matching processes to reduce processing time, but their accuracy degrades greatly at low signal-to-noise ratios. To achieve both a high rate of detection and short sensing time, we propose fast spectrum sensing with coordinate system (FSC) - a novel technique that decomposes a spectrum with high complexity into a new coordinate system of salient features and that uses these features in its PU detection process. Not only is the space of a buffer that is used to store information about a PU reduced, but also the sensing process is fast. The performance of FSC is evaluated according to its accuracy and sensing time against six other well-known conventional techniques through a wireless microphone signal based on the IEEE 802.22 standard. FSC gives the best performance overall.

User Interface for the 'Smombie Safe Go' App for Walking Safety (보행안전을 위한 앱서비스 'Smombie Safe Go' UI 연구)

  • Qiao, Xian Yue;Kim, Se-Hwa
    • The Journal of the Korea Contents Association
    • /
    • v.20 no.10
    • /
    • pp.190-198
    • /
    • 2020
  • The development in smartphone technology has brought convenience to the life of the mankind, but an excessive use of smartphones sometimes causes various accidents. This research tried to propose an application service 'Smombie Safe Go' UI(User Interface) that allows the prevention of such accident while using smartphones when walking. For this, after research and user observations, produced walker journey maps and derived necessary main functions needed for safety, and the result showed that transparent interface, obstacle location alert, warning of dangers functions were necessary. To make the contents of the service more detailed, hazardous situations faced during smartphone use when walking were classified into 3 situations : 1. Obstacle appearing in front, 2. traffic lights on crosswalks 3. No traffic lights on crosswalks. Scenarios by hazardous situation were written, and the flow and UI of the app service that warns its users in each situation of hazards were designed. it is predicted that 'Smombie Safe Go' may be possible to be utilized as an app service that provides a safe walking experience for not only regular pedestrians but also the blind population.

Blind Video Fingerprinting Using Temporal Wavelet Transform (시간축 웨이블릿 변환을 이용한 블라인드 비디오 핑거프린팅)

  • Kang Hyun-Ho;Park Ji-Hwan;Lee Hye-Joo;Hong Jin-Woo
    • Journal of Korea Multimedia Society
    • /
    • v.7 no.9
    • /
    • pp.1263-1272
    • /
    • 2004
  • In this paper, we present a novel video fingerprinting implementation method to identify the source of illegal copies. The video fingerprinting is achieved by the insertion of uniform distributed random number is made by seller and buyer's identification key-in the video wavelet coefficients by their temporal wavelet transform. The proposed fingerprinting is able to detect unique fingerprint of video contents even if they have been distorted by collusion attacks and MPEG2 compression. Especially, we use characteristics of the temporal wavelet transform to assign user's embedding area. Experimental results show the traceability of unauthorized distribution of video contents and its robustness to various collusion attacks and MPEG2 compression.

  • PDF

Advanced Receiver for Interference Cancellation in 3GPP LTE-A (3GPP LTE-A에서의 진화된 간섭 제거 수신기)

  • Hwang, Jin-Yup;Lee, Sang-Wook
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.39A no.7
    • /
    • pp.389-397
    • /
    • 2014
  • This paper focuses on advanced receiver for interference suppression or cancellation from neighbor cells in the 3GPP Rel-12 standard. From UE (User Equipment) perspective, the advanced receiver which can manage inter-cell interference of adjacent cell is required to support and manage fast-growing wireless data traffic. In 3GPP standard, NAICS which is one of approaches to improve SINR and receiver performance by directly suppression or cancellation of data (PDSCH) and control (PDCCH) signal from interference cells is discussed. In this paper, we briefly introduce the concept and candidate receivers for NAICS (Network Assisted Interference Cancellation and Suppression) based on 3GPP Rel-12 standard, and simulation results for basic NAICS receiver performance are provided.

A User-based MicroPayment System Using Secret Key (비밀키를 이용한 사용자 중심의 소액지불시스템)

  • Baek Seung-Ho;Jeong Yun-Soo;Won Jong-Kwon;Lee Sang-Ho
    • Journal of the Korea Society of Computer and Information
    • /
    • v.10 no.3 s.35
    • /
    • pp.189-199
    • /
    • 2005
  • Now it is increasing the necessity for micropayment system according to activation for trade on internet. Because of the reason, it is requesting safety for personal information as well as for payment cost. But current micropayment systems cannot support anonymity or have heavy overheads in payment process. This paper suggests a micropayment system to keep anonymity of users and also to keep payment cost safe. The proposed system is to use blind signature anonymous ID which is combined nonce with an encryption of personal information. It also keeps payment cost of users by reconfirmation payment cost and product from certification and increases the computational efficiency by using secret key and session key instead of public key.

  • PDF

An Efficient Micropayment System using a Session Key (세션키를 이용한 효율적 소액지불시스템)

  • Jeong Yoon Su;Baek Seung-Ho;Hwang Yoon Cheol;Oh Chung Shick;Lee Sang-ho
    • Journal of KIISE:Information Networking
    • /
    • v.32 no.4
    • /
    • pp.462-470
    • /
    • 2005
  • A hash chain is highly efficient and attractive structure to use in electronic cash. Previous systems using hash chain are used extensively in various cryptography applications such as one-time passwords, server-supported signatures and microments. However, The most hash chain based systems using fro-paid method provide anonymity but have the problem to increase payment cost. Therefore, in this paper, we propose a new hash chain based microment system which improves efficiency using session key and guarantees user anonymity through blind signature in the withdrawal process of the root value without disclosing privacy Information.

Digital Watermarking Method for User's Certification of Camera-Phone (카메라 폰 상에서 사용자 인증을 위한 디지털 워터마킹 기법)

  • Lee, Seung-Ik;Sohn, Jae-Sik;Im, Sung-Woon;Kim, Duk-Gyoo
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.13 no.3
    • /
    • pp.1-8
    • /
    • 2008
  • In the event of a traffic accident, a fire accident, or a criminal act, anyone will be able to capture these important moments and use authentic photographs for evidence purposes. Digital watermarking is able to ensure that the digital photographs taken from a particular camera-phone are authentic and indeed. This paper presents a blind image watermarking technique for digital phone camera. This method is based on singular value decomposition (SVD) and wavelet decomposition. Experimental results show that the proposed technique performs well in security and robustness against JPEG compression.

  • PDF

A Study on the Improvement of Fire Alarm System in Special Buildings Using Beacons in Edge Computing Environment (에지 컴퓨팅 환경에서 비콘을 활용한 특수건물 화재 경보 시스템 개선 방안 연구)

  • Lee, Tae Gyu;Choi, Kyeong Seo;Shin, Youn Soon
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.11 no.7
    • /
    • pp.217-224
    • /
    • 2022
  • Today, with the development of technology and industry, fire accidents in special buildings are increasing as special buildings increase. However, despite the rapid development of information and communication technology, human casualties are steadily occurring due to the underdeveloped and ineffective indoor fire alarm system. In this study, we confirmed that the existing indoor fire alarm system using acoustic alarm could not deliver a sufficiently large alarm to the in-room personnel. To improve this, we designed and implemented a fire alarm system using edge computing and beacons. The proposed improved fire alarm system consists of terminal sensor nodes, edge nodes, a user application, and a server. The terminal sensor nodes collect indoor environment data and send it to the edge node, and the edge node monitors whether a fire occurs through the transmitted sensor value. In addition, the edge node continuously generate beacon signals to collect information of smart devices with user applications installed within the signal range, store them in a server database, and send application push-type fire alarms to all in-room personnel based on the collected user information. As a result of conducting a signal valid range measurement experiment in a university building with dense lecture rooms, it was confirmed that device information was normally collected within the beacon signal range of the edge node and a fire alarm was quickly sent to specific users. Through this, it was confirmed that the "blind spot problem of the alarm" was solved by flexibly collecting information of visitors that changes time to time and sending the alarm to a smart device very adjacent to the people. In addition, through the analysis of the experimental results, a plan to effectively apply the proposed fire alarm system according to the characteristics of the indoor space was proposed.

Institutional and Technical Improvement Measures to Facilitate the Use of Smart Construction Safety Technology (스마트 건설안전 기술 도입 촉진을 위한 제도적⋅기술적 개선 방안에 관한 연구)

  • Jaehyun Jeong;Sang I. Park;Hyungtaek Sim;Yuhee Kim
    • Journal of the Korean Society of Safety
    • /
    • v.39 no.1
    • /
    • pp.41-54
    • /
    • 2024
  • Efforts to reduce on-site safety incidents have expanded, leading to active research in this domain. However, a systematic analysis to improve the utility of technology is lacking. In this study, we conducted a survey on the various institutional and technical improvement measures to promote the application of smart construction safety technology over three years after the implementation of the "Smart Safety Equipment Support Project." The results showed that financial constraint was the primary obstacle in the adoption of this innovation. Fostering a flexible environment in the utilization of management fees and financial support of projects was determined to aid in the extensive application of the technology. Ensuring cost efficiency and user-friendliness were principally necessary for technical enhancements in the smart construction safety technology. Technologies, such as VR/AR safety education, real-time location tracking, wearable devices, and innovation on streamlining safety-related work efficiency, had been anticipated to contribute to on-site safety. Operating a smart safety control center was expected to be beneficial in the systematic securing of data and reduction of safety blind spots. Effective methods had been suggested to overcome the barriers that hindered the development and application of smart construction safety technology. This study facilitates in the technological improvements in this field.