• Title/Summary/Keyword: collision algorithm

Search Result 928, Processing Time 0.025 seconds

Development of a SAD Correlater for Real-time Stereo Vision (실시간 스테레오 비젼 시스템을 위한 SAD 정합연산기 설계)

  • Yi, Jong-Su;Yang, Seung-Gu;Kim, Jun-Seong
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.45 no.1
    • /
    • pp.55-61
    • /
    • 2008
  • A real-time three-dimensional vision is a passive system, which would support various applications including collision avoidance, home networks. It is a good alternative of active systems, which are subject to interference in noisy environments. In this paper, we designed a SAD correlator with respect to resource usage for a real-time three-dimensional vision system. Regular structures, linear data flow and abundant parallelism make the correlation algorithm a good candidate for a reconfigurable hardware. We implemented two versions of SAD correlator in HDL and synthesized them to determine resource requirements and performance. From the experiment we show that the SAD correlator fits into reconfigurable hardware in marginal cost and can handle about 30 frames/sec with $640{\times}480$ images.

Chameleon Hash-Based Mutual Authentication Protocol for Secure Communications in OneM2M Environments (OneM2M 환경에서 안전한 통신을 위한 카멜레온 해쉬 기반의 상호인증 프로토콜)

  • Kim, Sung-soo;Jun, Moon-seog;Choi, Do-hyeon
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.10
    • /
    • pp.1958-1968
    • /
    • 2015
  • Things intelligence communication (M2M or IoT) service activation and global company of OneM2M-related business on aggressive investing and has led to the acceleration of change in the ICT market. But a variety of hacking security technology because of the possibility of secure communication (data exposure, theft, modification, deletion, etc.) has been issued as an important requirement. In this paper, we propose a mutual authentication protocol for secure communications chameleon hash based on the M2M environment. The results of performance analysis efficiency is encryption and decryption an average of 0.7%, calculated rate showed good results as compared to the target algorithm, equivalent to a 3%(Average 0.003 seconds) difference, mutual authentication and encryption region by using the key update advantage of ECC(Elliptic Curve Cryptography)based Chameleon hash function is signed of the operational efficiency, using a collision message verifiable properties demonstrated strong security of the communication section.

A Design and Implementation of Digital Vessel Context Diagnosis System Based on Context Aware (상황 인식 기반 해양 디지털 선박 상황 진단 시스템 구현 및 설계)

  • Song, Byoung-Ho;Choi, Myeong-Soo;Kwon, Jang-Woo;Lee, Sung-Ro
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.35 no.6B
    • /
    • pp.859-866
    • /
    • 2010
  • Digital vessels can occur large a disaster at sea because vessels in fire and collision in case of certain unforeseen circumstances. In this paper, We propose digital vessel context monitoring system through risk analysis. We propose environment information analysis system using wireless sensor that have to acquire marine environment and context of marine digital vessel. For conducting simulation, we chose 300 data sets to train the neural network. As a result, we obtained about 96% accuracy for fire risk context and we obtained 88.7% accuracy for body of vessel risk context. To improve the accuracy of the system, we implement a FEC (Forward Error Correction) block. We implemented digital vessel context monitoring system that transmitted to diagnosis result in CDMA.

An Efficient Data Transmission Strategy using Adaptive-Tier Low Transmission Power Schedule in a Steady-state of BMA (적응형 저전력 전송 기법을 사용한 효율적인 BMA 데이터 전송 기술)

  • Kim, Sang-Chul
    • Journal of the Korea Society of Computer and Information
    • /
    • v.15 no.5
    • /
    • pp.103-111
    • /
    • 2010
  • This paper proposes an efficient data transmission strategy using adaptive-tier low transmission power schedule in a TDMA-based ad hoc MAC protocol. Since the network resource of ad hoc networks has the characteristic of reassignment due to the multiple interferences and the contention-based limited wireless channel, the efficient time slot assignment and low power transmission scheme are the main research topics in developing ad hoc algorithms. Based on the proposed scheme of interference avoidance when neighbor clusters transmit packets, this paper can minimize the total energy dissipation and maximize the utilization of time slot in each ad hoc node. Simulation demonstrates that the proposed algorithm yields 15.8 % lower energy dissipation and 4.66% higher time slot utilization compared to the ones of two-tier conventional energy dissipation model.

QoS-Oriented Handoff Algorithm in IEEE 802.11 Wireless LAN (IEEE 802.11 무선랜에서 서비스 질(QoS) 지향적인 핸드오프 알고리즘에 관한 연구)

  • Choi Haeng-Keol;Kim Il-Hwan;Seo Seung-Woo
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.6B
    • /
    • pp.338-348
    • /
    • 2005
  • Currently, IEEE 802.11 Wireless LAN (WLAN) is rising as the most popular means for the broadband wireless access network. In this thesis, we propose a QoS(Quality of Service)-Oriented mechanism using handshaking method of scanning phase in IEEE 802.11 handoff. In conventional process for handoff, the major criterion to select the best AP(Access Point) among candidates is normally based on the RSS(Received Signal Strength), which does not always make the selected network guarantee the maximum achievable performance. Even though the link quality with a neighboring AP is excellent, the AP may not be a good candidate to handoff to simply because MAC(Medium Access Control) protocol of IEEE 802.11 standard is contention-based such as CSMA/CA. Therefore, if we apply network level information to AP selection criteria, we can achieve better handoff efficiency rather than before. The analysis and simulation results applied to our new mechanism show clearly better performance than AP selection based on traditional handoff method.

Video Based Tail-Lights Status Recognition Algorithm (영상기반 차량 후미등 상태 인식 알고리즘)

  • Kim, Gyu-Yeong;Lee, Geun-Hoo;Do, Jin-Kyu;Park, Keun-Soo;Park, Jang-Sik
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.10
    • /
    • pp.1443-1449
    • /
    • 2013
  • Automatic detection of vehicles in front is an integral component of many advanced driver-assistance system, such as collision mitigation, automatic cruise control, and automatic head-lamp dimming. Regardless day and night, tail-lights play an important role in vehicle detecting and status recognizing of driving in front. However, some drivers do not know the status of the tail-lights of vehicles. Thus, it is required for drivers to inform status of tail-lights automatically. In this paper, a recognition method of status of tail-lights based on video processing and recognition technology is proposed. Background estimation, optical flow and Euclidean distance is used to detect vehicles entering tollgate. Then saliency map is used to detect tail-lights and recognize their status in the Lab color coordinates. As results of experiments of using tollgate videos, it is shown that the proposed method can be used to inform status of tail-lights.

Routing of ALVs under Uncertainty in Automated Container Terminals (컨테이너 터미널의 불확실한 환경 하에서의 ALV 주행 계획 수립방안)

  • Kim, Jeongmin;Lee, Donggyun;Ryu, Kwang Ryel
    • Journal of Navigation and Port Research
    • /
    • v.38 no.5
    • /
    • pp.493-501
    • /
    • 2014
  • An automated lifting vehicle(ALV) used in an automated container terminal is a type of unmanned vehicle that can self-lift a container as well as self-transport it to a destination. To operate a fleet of ALVs efficiently, one needs to be able to determine a minimum-time route to a given destination whenever an ALV is to start its transport job. To find a route free from any collision or deadlock, the occupation time of the ALV on each segment of the route should be carefully scheduled to avoid any such hazard. However, it is not easy because not only the travel times of ALVs are uncertain due to traffic condition but also the operation times of cranes en route are not predicted precisely. In this paper, we propose a routing method based on an ant colony optimization algorithm that takes into account these uncertainties. The result of simulation experiment shows that the proposed method can effectively find good routes under uncertainty.

TDM based MAC protocol for throughput enhancement in dense wireless LANs area (무선 랜 밀집 지역의 전송률 향상을 위한 시분할 매체 접근 제어 프로토콜)

  • Kwon, Hyeok-Jin;Hwang, Gyung-Ho
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.22 no.3
    • /
    • pp.534-541
    • /
    • 2018
  • The number of stations existing in the same wireless channel is increasing due to the spread of the wireless LAN devices. CSMA/CA, a conventional wireless LAN protocol, uses a random backoff method. In the random backoff scheme, collision between stations is frequent in a dense region where the number of stations existing in the same channel is several tens or more, and the performance of the performance degradation of such a protocol, the IEEE 802.11ah standard proposed a Restricted Access Window(RAW) wireless access method. RAW improves performance by limiting the number of concurrent access stations by dividing the stations into several groups. In this paper, we propose a method to improve the performance of channel connection by using new group creation, group removal and group relocation algorithm according to traffic change by improving existing RAW method.

Evaluation of functional wireless sensor node based Ad-hoc network for indoor healthcare monitoring (실내 건강모니터링을 위한 Ad-hoc기반의 기능성 무선센서노드 평가)

  • Lee, Dae-Seok;Do, Kyeong-Hoon;Lee, Hun-Jae
    • Proceedings of the Korean Institute of Information and Commucation Sciences Conference
    • /
    • 2009.05a
    • /
    • pp.313-316
    • /
    • 2009
  • A novel approach for electrocardiogram (ECG) analysis within a functional sensor node has been developed and evaluated. The main aim is to reduce data collision, traffic over loads and power consumption in healthcare applications of wireless sensor networks (WSN). The sensor node attached on the patient's bodysurface around the heart can perform ECG analysis based on a QRS detection algorithm to detect abnormal condition of the patient. Data transfer is activated only after detected abnormality in the ECG. This system can reduce packet loss during transmission by reducing traffic overload. In addition, it saves power supply energy leading to more reliable, cheap and user-friendly operation in the WSN based ubiquitous health monitoring.

  • PDF

EA Study on Practical Engineering Education through the Design and Configure of Safe Running Type Drones (안전 주행형 무인기의 설계 및 제작을 통한 실천 공학 교육에 관한 연구)

  • Jo, Yeong-Myeong;Lee, Sang-Gwon;Chang, Eun-Young
    • Journal of Practical Engineering Education
    • /
    • v.9 no.1
    • /
    • pp.7-13
    • /
    • 2017
  • This study will provide a practical plan of engineering education through the study of major activities connected with the production of works to accomplish the graduation conditions by completing the comprehensive design subject and the result of the performance. The designed subject is to measure the minimum safety distance during driving using the obstacle detection function of the ultrasonic sensor and to perform the avoidance algorithm based on the measurement value of the acceleration gyro sensor. It is proposed an access surveillance system that minimizes the damage of drones, surrounding objects, and people, and improves air mobility. Experimental results show that the obstacles around the drone are detected by five ultrasonic sensors and the difference of output value is applied to each motor of the drone and obstacle avoidance is confirmed. In addition, the content and level of the data for measuring the achievement of learning achievement in the engineering education certification program were used and the results were confirmed to be consistent with the description of the engineering problem level required for the graduates of 4-year engineering college.