• Title/Summary/Keyword: pre-processing scheme

Search Result 104, Processing Time 0.031 seconds

Performance of Space Time Block Coded-Spatial Multiplexing Systems in Limited Feedback Channel (제한된 귀환채널에서 시공간블록부호화를 적용한 다중화 시스템의 성능)

  • Hwang, Hyeon-Chyeol;Shin, Seung-Hoon;Lim, Jong-Kyoung;Kim, Seok-Ho;Kwak, Kyung-Sup
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.30 no.9A
    • /
    • pp.772-780
    • /
    • 2005
  • In this paper, an efficient pre-processing in space tine block coded-spatial multiplexing systems is presented. The pre-processing scheme is designed empirically with extending the diagonally weighted orthogonal space time-block coded diversity system to spatial multiplexing system. Simulation results show the proposed scheme outperforms both the precoder using the predefued codebooks and typical antenna selection scheme over moderate doppler frequency in limited feedback channel.

Plat-Based Key Pre-Distribution Scheme in Sensor Network (센서네트워크에서 평면 그리드 기반의 키 선 분배 기법)

  • Maeng, Young-Jae;Mohaisen, Abedelaziz;Lee, Kyung-Hee;Nyang, Dae-Hun
    • The KIPS Transactions:PartC
    • /
    • v.15C no.1
    • /
    • pp.1-8
    • /
    • 2008
  • The security of wireless sensor networks is a challenging research area where the resources constraints are a bottleneck for any successful security design. Due to their computational feasibility, symmetric key algorithms that require key pre-distribution are more desirable for use in these networks. In the pre-distribution scheme, keys or keying materials are assigned to each node prior deployment to guarantee a secure communication within the entire network. Though several works are introduced on this issue, yet the connectivity and resiliency are imperfectly handled. In this paper, we revisit the grid based key pre-distribution scheme aiming to improve the connectivity, introduce a higher resiliency level, simplify the logic of key establishment and maintain same level of used of resources usage. The core of our modification relies on introducing the novel plat-based polynomial assignment and key establishment mechanism. To demonstrate the advantageous properties of our scheme over the revisited one, details of consumed resources, resulting connectivity, security and comparisons with relevant works are introduced.

Robust Extraction of Lean Tissue Contour From Beef Cut Surface Image

  • Heon Hwang;Lee, Y.K.;Y.r. Chen
    • Proceedings of the Korean Society for Agricultural Machinery Conference
    • /
    • 1996.06c
    • /
    • pp.780-791
    • /
    • 1996
  • A hybrid image processing system which automatically distinguished lean tissues in the image of a complex beef cut surface and generated the lean tissue contour has been developed. Because of the in homegeneous distribution and fuzzy pattern of fat and lean tissue on the beef cut, conventional image segmentation and contour generation algorithm suffer from a heavy computing requirement, algorithm complexity and poor robustness. The proposed system utilizes an artificial neural network enhance the robustness of processing. The system is composed of pre-network , network and post-network processing stages. At the pre-network stage, gray level images of beef cuts were segmented and resized to be adequate to the network input. Features such as fat and bone were enhanced and the enhanced input image was converted tot he grid pattern image, whose grid was formed as 4 X4 pixel size. at the network stage, the normalized gray value of each grid image was taken as the network input. Th pre-trained network generated the grid image output of the isolated lean tissue. A training scheme of the network and the separating performance were presented and analyzed. The developed hybrid system showed the feasibility of the human like robust object segmentation and contour generation for the complex , fuzzy and irregular image.

  • PDF

An Intelligent Residual Resource Monitoring Scheme in Cloud Computing Environments

  • Lim, JongBeom;Yu, HeonChang;Gil, Joon-Min
    • Journal of Information Processing Systems
    • /
    • v.14 no.6
    • /
    • pp.1480-1493
    • /
    • 2018
  • Recently, computational intelligence has received a lot of attention from researchers due to its potential applications to artificial intelligence. In computer science, computational intelligence refers to a machine's ability to learn how to compete various tasks, such as making observations or carrying out experiments. We adopted a computational intelligence solution to monitoring residual resources in cloud computing environments. The proposed residual resource monitoring scheme periodically monitors the cloud-based host machines, so that the post migration performance of a virtual machine is as consistent with the pre-migration performance as possible. To this end, we use a novel similarity measure to find the best target host to migrate a virtual machine to. The design of the proposed residual resource monitoring scheme helps maintain the quality of service and service level agreement during the migration. We carried out a number of experimental evaluations to demonstrate the effectiveness of the proposed residual resource monitoring scheme. Our results show that the proposed scheme intelligently measures the similarities between virtual machines in cloud computing environments without causing performance degradation, whilst preserving the quality of service and service level agreement.

One Pass Identification processing Password-based

  • Park, Byung-Jun;Park, Jong-Min
    • Journal of information and communication convergence engineering
    • /
    • v.4 no.4
    • /
    • pp.166-169
    • /
    • 2006
  • Almost all network systems provide an authentication mechanism based on user ID and password. In such system, it is easy to obtain the user password using a sniffer program with illegal eavesdropping. The one-time password and challenge-response method are useful authentication schemes that protect the user passwords against eavesdropping. In client/server environments, the one-time password scheme using time is especially useful because it solves the synchronization problem. In this paper, we present a new identification scheme: OPI(One Pass Identification). The security of OPI is based on the square root problem, and OPI is secure: against the well known attacks including pre-play attack, off-line dictionary attack and server comprise. A number of pass of OPI is one, and OPI processes the password and does not need the key. We think that OPI is excellent for the consuming time to verify the prover.

Delivering Augmented Information in a Session Initiation Protocol-Based Video Telephony Using Real-Time AR

  • Jang, Sung-Bong;Ko, Young-Woong
    • Journal of Information Processing Systems
    • /
    • v.18 no.1
    • /
    • pp.1-11
    • /
    • 2022
  • Online video telephony systems have been increasingly used in several industrial areas because of coronavirus disease 2019 (COVID-19) spread. The existing session initiation protocol (SIP)-based video call system is being usefully utilized, however, there is a limitation that it is very inconvenient for users to transmit additional information during conversation to the other party in real time. To overcome this problem, an enhanced scheme is presented based on augmented real-time reality (AR). In this scheme, augmented information is automatically searched from the Internet and displayed on the user's device during video telephony. The proposed approach was qualitatively evaluated by comparing it with other conferencing systems. Furthermore, to evaluate the feasibility of the approach, we implemented a simple network application that can generate SIP call requests and answer with AR object pre-fetching. Using this application, the call setup time was measured and compared between the original SIP and pre-fetching schemes. The advantage of this approach is that it can increase the convenience of a user's mobile phone by providing a way to automatically deliver the required text or images to the receiving side.

Development of Curved-Glass Automatic Shaping System using PID Servo-Drivers (PID 서보제어기를 이용한 곡면유리 자동성형 시스템 개발)

  • 유병국;양근호
    • Proceedings of the Korea Institute of Convergence Signal Processing
    • /
    • 2003.06a
    • /
    • pp.161-164
    • /
    • 2003
  • This research presents the parallel control scheme of PID servo-driver for shaping of the curved glass. The designed system consists of a PC, main controller and 11 servo-drivers. Each elements are connected by using RS-232C and 8-bit bus communication. In order to guarantee the stability and the control performance, we use the LM629, a precision PID motion controller, and LMD18200, a H-bridge on the servo-drivers. PC calculates position values of 11 DC motors by using the pre-determined curvature value and offers the user interface environment operator.

  • PDF

Efficient Block-Based Coding of Noisy Images by Combining Pre-Filtering and DCT (전처리 필터와 DCT의 결합을 이용한 잡음이 있는 영상의 효과적인 블록기반 부호화 기법)

  • 김성득;장성규;김명준;나종범
    • Proceedings of the IEEK Conference
    • /
    • 1999.06a
    • /
    • pp.605-608
    • /
    • 1999
  • A conventional image coder, such as JPEG, requires not only DCT and quantization but also additional pre-filtering under noisy environment. Since the pre-filtering removes camera noise and improves coding efficiency dramatically, its efficient implementation has been an important issue. Based on well-known noise removal techniques in image processing fields, this paper introduces an efficient scheme by adapting a noise removal procedure to block-based image coders. By using two-dimensional DCT factorization, the proposed image coder has only a modified DCT and a VLC, and performs pre-filtering and quantization simultaneously in the modified DCT operation.

  • PDF

Development of Bent Glass Automatic Shaping System using PC-based Parallel Distributed Control Scheme (PC기반 병렬 분산제어방식을 이용한 곡면유리 자동성형기 개발)

  • 양근호
    • Journal of the Institute of Convergence Signal Processing
    • /
    • v.5 no.1
    • /
    • pp.40-45
    • /
    • 2004
  • This paper presents the parallel distributed control scheme for shaping of the bent glass. The designed system consists of a PC, a main controller and 11 servo-controllers, the precision motion controllers. Each elements are connected by using RS-232C and 8-bit data bus. In order to guarantee the stability and the control performance, we use a precision PID motion controller and a H-bridge on the servo-drivers. PC calculates position values of 11 DC motors by using the pre-determined curvature value and offers the user interface environment operator. The main controller provides the control instructions and parameter values to 11 servo-controllers by chip enable signal, simultaneously. Using the received commands and parameter values, the servo-controllers control the positions of the DC motors based on PID control scheme.

  • PDF

Efficient Data Pre-fetching Scheme for InfiniBand based High Performance Clusters (인피니밴드 기반 고성능 클러스터를 위한 효율적인 데이터 선반입 기법)

  • Kim, Bongjae;Jung, Jinman;Min, Hong;Heo, Junyoung;Jung, Hyedong
    • KIISE Transactions on Computing Practices
    • /
    • v.23 no.5
    • /
    • pp.293-298
    • /
    • 2017
  • Recently, much research has been devoted to implementing and provisioning high-performance computing environment using clusters with multiple computers and high-performance networking technologies. In-memory based Key-Value stores, such as Redis or Memcached, are widely used in high performance cluster environments to improve the data processing performance. We can distribute data at different storage nodes, and each computing node can access it at a high speed using these In-memory based Key-Value stores. InfiniBand is a de-facto technology that is widely used to interconnect each node of a cluster. In this paper, we propose a new data pre-fetching scheme for Key-Value store based on high performance clusters to improve the performance. The proposed scheme utilizes the data transfer characteristics of InfiniBand. The results of the simulation show that the proposed scheme can reduce the data transfer time by up to about 28%.