• Title/Summary/Keyword: mobile techniques

Search Result 1,060, Processing Time 0.028 seconds

Digital Restoration of Traditional Architectural Buildings Using Multimedia and Augmented Reality Technologies (멀티미디어 및 증강현실 기술을 이용한 전통목조건축물 디지털 복원)

  • Lee, Kang-Hun;Cho, Sae-Hong
    • Journal of Korea Multimedia Society
    • /
    • v.16 no.2
    • /
    • pp.206-212
    • /
    • 2013
  • Information and Communications Technologies(ICT) represented by Multimedia, Virtual Reality and Network could be used as the better ways to preserve and restore the original shape of cultural contents. This paper presents the detailed methods of Multimedia and Virtual Reality technologies to digitally implement the traditional wooden buildings which are called as a typical 'Korean Cultural Content." We implemented a 3D modeling of architectural parts, realized a roof curve, and texture-mapped the material qualities of traditional wooden buildings by using Graphic techniques. In addition, the information, which is implemented by marker-based Augment Reality, for the traditional wooden buildings can be obtained through the mobile appliances such as a smart phone. We, also, presented how to practically use the implemented digital Korea traditional wooden buildings.

Stabilization System for Mobile Antenna Gimbal based on Dynamic Characteristics Analysis (동특성 해석에 기반한 이동용 안테나 김발 안정화 시스템)

  • Lee, Ki-Nam;Lee, Byoung-Ho;Lee, Jeung;Kim, Jie-Eok;Song, Jae-Bok
    • Transactions of the Korean Society of Mechanical Engineers A
    • /
    • v.37 no.7
    • /
    • pp.851-856
    • /
    • 2013
  • Recently, as the tactical environment has changedto one of network-centric warfare, where all components are connected through a network, much emphasis has been placed on the use of an artificial satellite for achieving high communication speeds. To provide a high-quality artificial satellite link, stabilization is very important in a platform. Previous stabilization control techniques used PI control, which is commonly used for vessels. However, for ground terminals that require a higher communication speed, the antenna should move faster to track an artificial satellite within a short period of time. Moreover, the terminals must be equipped with proper sensors and algorithms so that they can detect and compensate for external disturbances while tracking the artificial satellite. In this study, through the analysis of the dynamic model of an antenna system, a stabilization algorithm for ground terminals was proposed;this algorithm shows high isolation performance in the low-frequency range and includes $PI^2$ control.

An Anonymity-Preserving User Authentication and Authorization Model for Ubiquitous Computing Environments (유비쿼터스 컴퓨팅 환경을 위한 익명성을 보장하는 사용자 인증 및 접근제어 모델)

  • Kang Myung-Hee;Ryou Hwang-Bin
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.42 no.4 s.304
    • /
    • pp.25-32
    • /
    • 2005
  • The spread of mobile devices, PDAs and sensors has enabled the construction of ubiquitous computing environments, transforming regular physical spaces into 'Smart space' augmented with intelligence and enhanced with services. However, the deployment of this computing paradigm in real-life is disturbed by poor security, particularly, the lack of proper authentication and authorization techniques. Also, it is very important not only to find security measures but also to preserve user privacy in ubiquitous computing environments. In this Paper, we propose efficient user authentication and authorization model with anonymity for the privacy-preserving for ubiquitous computing environments. Our model is suitable for distributed environments with the computational constrained devices by using MAC-based anonymous certificate and security association token instead of using Public key encryption technique. And our Proposed Protocol is better than Kerberos system in sense of cryptographic computation processing.

Topological SLAM Based on Voronoi Diagram and Extended Kalman Filter

  • Choi, Chang-Hyuk;Song, Jae-Bok;Kim, Mun-Sang;Chung, Woo-Jin
    • 제어로봇시스템학회:학술대회논문집
    • /
    • 2003.10a
    • /
    • pp.174-179
    • /
    • 2003
  • Through the simultaneous localization and map building (SLAM) technique, a robot can create maps about its unknown environment while it continuously localizes its position. Grid maps and feature maps have been widely used for SLAM together with application of probability methods and POMDP (partially observed Markov decision process). But this approach based on grid maps suffers from enormous computational burden. Topological maps, however, have drawn more attention these days because they are compact, provide natural interfaces, and are easily applicable to path planning in comparison with grid maps. Some topological SLAM techniques like GVG (generalized Voronoi diagram) were introduced, but it enables the robot to decide only whether the current position is part of GVG branch or not in the GVG algorithm. In this paper, therefore, to overcome these problems, we present a method for updating a global topological map from the local topological maps. These local topological maps are created through a labeled Voronoi diagram algorithm from the local grid map built based on the sensor information at the current robot position. And the nodes of a local topological map can be utilized as the features of the environment because it is robust in light of visibility problem. The geometric information of the feature is applied to the extended Kalman filter and the SLAM in the indoor environment is accomplished. A series of simulations have been conducted using a two-wheeled mobile robot equipped with a laser scanner. It is shown that the proposed scheme can be applied relatively well.

  • PDF

Implementation of Storage Manager to Maintain Efficiently Stream Data in Ubiquitous Sensor Networks (유비쿼터스 센서 네트워크에서 스트림 데이터를 효율적으로 관리하는 저장 관리자 구현)

  • Lee, Su-An;Kim, Jin-Ho;Shin, Sung-Hyun;Nam, Si-Byung
    • Journal of the Institute of Electronics Engineers of Korea CI
    • /
    • v.46 no.3
    • /
    • pp.24-33
    • /
    • 2009
  • Stream data, gathered from ubiquitous sensor networks, change continuously over time. Because they have quite different characteristics from traditional databases, we need new techniques for storing and querying/analyzing these stream data, which are research issues recently emerging. In this research, we implemented a storage manager gathering stream data and storing them into databases, which are sampled continuously from sensor networks. The storage manager cleans faulty data occurred in mobile sensors and it also reduces the size of stream data by merging repeatedly-sampled values into one and by employing the tilted time frame which stores stream data with several different sampling rates. In this research furthermore, we measured the performance of the storage manager in the context of a sensor network monitoring fires of a building. The experimental results reveal that the storage manager reduces significantly the size of storage spaces and it is effective to manage the data stream for real applications monitoring buildings and their fires.

A Study on step number detection using smartphone sensors for position tracking (위치 추적을 위한 스마트폰 센서를 이용한 걸음 수 검출에 관한 연구)

  • Lee, Kwonhee;Kim, Kwanghyun;Oh, Jongtaek
    • The Journal of the Institute of Internet, Broadcasting and Communication
    • /
    • v.18 no.3
    • /
    • pp.119-125
    • /
    • 2018
  • Various techniques for indoor positioning using a smart phone have been studied. Among them, the positioning technology using the acceleration sensor and the gyro sensor built in the smartphone is widely used in conjunction with the WiFi fingerprint technology. The location tracking technology using sensors has been used for a long time, but the performance environment of the smartphone is poor and the user is moving with the smartphone in a certain posture. Therefore, in order to improve the accuracy of location tracking in a smartphone environment, it is necessary to study and develop appropriate algorithms in a mobile environment. In this paper, we analyze the performances of frequency analysis method, maximum sum of minimum acceleration method and adaptive threshold method, which are the user's moving step count detection algorithms, and determine the most accurate method.

Enhanced Method for Preventing Malware by Detecting of Injection Site (악성코드 인젝션 사이트 탐지를 통한 방어효율 향상방안)

  • Baek, Jaejong
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.20 no.7
    • /
    • pp.1290-1295
    • /
    • 2016
  • Recently, as mobile internet usage has been increasing rapidly, malware attacks through user's web browsers has been spreading in a way of social engineering or drive-by downloading. Existing defense mechanism against drive-by download attack mainly focused on final download sites and distribution paths. However, detection and prevention of injection sites to inject malicious code into the comprised websites have not been fully investigated. In this paper, for the purpose of improving defense mechanisms against these malware downloads attacks, we focus on detecting the injection site which is the key source of malware downloads spreading. As a result, in addition to the current URL blacklist techniques, we proposed the enhanced method which adds features of detecting the injection site to prevent the malware spreading. We empirically show that the proposed method can effectively minimize malware infections by blocking the source of the infection spreading, compared to other approaches of the URL blacklisting that directly uses the drive-by browser exploits.

Automated Smudge Attacks Based on Machine Learning and Security Analysis of Pattern Lock Systems (기계 학습 기반의 자동화된 스머지 공격과 패턴 락 시스템 안전성 분석)

  • Jung, Sungmi;Kwon, Taekyoung
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.26 no.4
    • /
    • pp.903-910
    • /
    • 2016
  • As smart mobile devices having touchscreens are growingly deployed, a pattern lock system, which is one of the graphical password systems, has become a major authentication mechanism. However, a user's unlocking behaviour leaves smudges on a touchscreen and they are vulnerable to the so-called smudge attacks. Smudges can help an adversary guess a secret pattern correctly. Several advanced pattern lock systems, such as TinyLock, have been developed to resist the smudge attacks. In this paper, we study an automated smudge attack that employs machine learning techniques and its effectiveness in comparison to the human-only smudge attacks. We also compare Android pattern lock and TinyLock schemes in terms of security. Our study shows that the automated smudge attacks are significantly advanced to the human-only attacks with regard to a success ratio, and though the TinyLock system is more secure than the Android pattern lock system.

Effective Error Detection Method for Video using Fragile Watermark (연성 워터마크를 이용한 비디오의 효율적인 에러 검출 방법)

  • Hwang, Young-Hooi;Jeon, Byeung-Woo
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.39 no.6
    • /
    • pp.602-611
    • /
    • 2002
  • Recent advances in technology have resulted in rapid growth in mobile communication. With this explosive growth, reliable transmission and error resilient technique become increasingly necessary to offer high quality multimedia service. The success of error resilient techniques at decoder sensitively depends on error detection performance. Therefore, this paper proposes a computationally very simple and efficient error detection technique using fragile watermark for real-time video communication. To balance between image quality degradation and error detection efficiency, fragile watermark is embedded only in least significant bits of selected transform coefficients. The proposed method is workable without additional bit in video bitstream and can be implemented very efficiently. This method will be useful in video communication in error prone environment such as wireless channel.

A Vector Perturbation Based User Selection for Multi-antenna Downlink Channels (다중안테나 하향채널에서의 Vector Perturbation 기반 사용자 선택 기법)

  • Lee, Byung-Ju;Lim, Chae-Hee;Shim, Byong-Hyo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.6
    • /
    • pp.977-985
    • /
    • 2011
  • Recent works on multiuser transmission techniques have shown that the linear growth of capacity in single user MIMO system can be translated to the multiuser MIMO scenario as well. In this paper, we propose a method pursuing performance gain of vector perturbation in multiuser downlink systems. Instead of employing maximum number of mobile users for communication, we use small part of them as virtual users for improving reliability of users participating communication. By controlling parameters of virtual users including information and perturbation vector, we obtain considerable improvement in the effective SNR, resulting in large gain in bit error rate performance. Simulation results on the realistic multiuser downlink systems show that the proposed method brings substantial performance gain over the standard vector perturbation with marginal overhead in computations.