• Title/Summary/Keyword: real-time network system

Search Result 2,564, Processing Time 0.032 seconds

Object Detection and Tracking using Bayesian Classifier in Surveillance (서베일런스에서 베이지안 분류기를 이용한 객체 검출 및 추적)

  • Kang, Sung-Kwan;Choi, Kyong-Ho;Chung, Kyung-Yong;Lee, Jung-Hyun
    • Journal of Digital Convergence
    • /
    • v.10 no.6
    • /
    • pp.297-302
    • /
    • 2012
  • In this paper, we present a object detection and tracking method based on image context analysis. It is robust from the image variations such as complicated background, dynamic movement of the object. Image context analysis is carried out using the hybrid network of k-means and RBF. The proposed object detection employs context-driven adaptive Bayesian framework to relive the effect due to uneven object images. The proposed method used feature vector generator using 2D Haar wavelet transform and the Bayesian discriminant method in order to enhance the speed of learning. The system took less time to learn, and learning in a wide variety of data showed consistent results. After we developed the proposed method was applied to real-world environment. As a result, in the case of the object to detect pass outside expected area or other changes in the uncertain reaction showed that stable. The experimental results show that the proposed approach can achieve superior performance using various data sets to previously methods.

Hot spot DBC: Location based information diffusion for marketing strategy in mobile social networks (Hotspot DBC: 모바일 소셜 네트워크 상에서 마케팅 전략을 위한 위치 기반 정보 유포)

  • Ryu, Jegwang;Yang, Sung-Bong
    • Journal of Intelligence and Information Systems
    • /
    • v.23 no.2
    • /
    • pp.89-105
    • /
    • 2017
  • As the advances of technology in mobile networking and the popularity of online social networks (OSNs), the mobile social networks (MSNs) provide opportunities for marketing strategy. Therefore, understanding the information diffusion in the emerging MSNs is a critical issue. The information diffusion address a problem of how to find the proper initial nodes who can effectively propagate as widely as possible in the minimum amount of time. We propose a new diffusion scheme, called Hotspot DBC, which is to find k influential nodes considering each node's mobility behavior in the hotspot zones. Our experiments were conducted in the Opportunistic Network Environment (ONE) using real GPS trace, to show that the proposed scheme results. In addition, we demonstrate that our proposed scheme outperforms other existing algorithms.

Design and Implementation of Cyber Attack Simulator based on Attack Techniques Modeling

  • Kang, Yong Goo;Yoo, Jeong Do;Park, Eunji;Kim, Dong Hwa;Kim, Huy Kang
    • Journal of the Korea Society of Computer and Information
    • /
    • v.25 no.3
    • /
    • pp.65-72
    • /
    • 2020
  • With the development of information technology and the growth of the scale of system and network, cyber threats and crimes continue to increase. To cope with these threats, cybersecurity training based on actual attacks and defenses is required. However, cybersecurity training requires expert analysis and attack performance, which is inefficient in terms of cost and time. In this paper, we propose a cyber attack simulator that automatically executes attack techniques. This simulator generates attack scenarios by combining attack techniques modeled to be implemented and executes the attack by sequentially executing the derived scenarios. In order to verify the effectiveness of the proposed attack simulator, we experimented by setting an example attack goal and scenarios in a real environment. The attack simulator successfully performed five attack techniques to gain administrator privileges.

Design of Convergence Platform for companion animal Personalized Services (반려동물 개인화서비스를 위한 융합 플랫폼 설계)

  • Kim, Sam-Taek
    • Journal of the Korea Convergence Society
    • /
    • v.7 no.6
    • /
    • pp.29-34
    • /
    • 2016
  • Nowadays, real-time devices that provide health care for a companion animal is being developed by IoT technology and its demand such as smart puppy tag is increasing. However, it is difficult for IoT devices of companion animals to process complex nature due to miniaturized hardware and constructive nature. There is a clear limit to custom advanced features like health care implementation. This paper designs an integrated platform with statistical analysis which makes it possible to customized services such as feed production, pharmaceutical production, and health care for each companion animal. Middleware that collects sensor information, customer's spending pattern and information from Social Network Service is also designed by making use of IoT devices which companion animals wear. Furthermore, the paper designed data analyzer which analyzes and refines data from collected information that can be applied to personalized services.

Reconstruction of Transmitted Frames for Visual Quality Assessment of Streaming Video (스트리밍 비디오 화질 평가를 위한 수신 영상 복원)

  • Park, Su-Kyung;Sim, Dong-Gyu
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.46 no.1
    • /
    • pp.32-40
    • /
    • 2009
  • In this paper, we proposed an reconstruction algorithm of transmitted frames from displayed image on video terminal. For image quality assessment of the video streaming in the wireless network, we need information of the image that is transmitted to the end-user's device. Generally, subjective methods are widely used to evaluate the image quality by human beings because it is difficult to extract the transmitted image from the end-user's device. This paper presents an image reconstruction algerian based on the displayed image in video terminal for the extraction of the transmitted image. In the proposed method, we acquired the displayed image on video terminal using the camera. Camera-acquired images exhibit geometric and color distortions caused by characteristics of cameras and display devices. Therefore we correct the geometric distortion by exploiting the homography and color distortion by pre-computed look-up table. The experimental results show that the proposed measurement system yields promising estimation performance in terms of PSNR of $27{\sim}28dB$. We also carried out performance evaluation of the proposed method in terms of EPSNR and the quality of the estimated images by the proposed algerian was in fairly good range of MOS test scale.

An arbitration approach to resolve conflict to quality requirements in the level of the media service for multi-party collaboration environments (다자간 협업 환경을 위한 미디어 서비스 수준에서의 품질 요구사항 갈등 중재방법)

  • Han, Sang-Woo;Kim, Jong-Won
    • 한국HCI학회:학술대회논문집
    • /
    • 2008.02a
    • /
    • pp.601-606
    • /
    • 2008
  • When sharing real-time media in the ubiquitous computing environments, due to heterogeneous performance of devices, conflict to users' media service requirements might be occurred. To address the problems, there are extensive researches about media streaming QoS control schemes in the aspects of network or application. However, their deployment has met with difficulty because of critical reasons such as high development cost and system complexity. In this paper, in the level of media services, we propose a negotiation approach to offer improved quality of media services. The proposed approach Constructs video distribution group between producer and consumer services, which target to globally minimize the concession of users' quality requirements Consequently, users can be provided video services in the level of conformation to the users' expectation.

  • PDF

Scrambling Technology using Scalable Encryption in SVC (SVC에서 스케일러블 암호화를 이용한 스크램블링 기술)

  • Kwon, Goo-Rak
    • Journal of Korea Multimedia Society
    • /
    • v.13 no.4
    • /
    • pp.575-581
    • /
    • 2010
  • With widespread use of the Internet and improvements in streaming media and compression technology, digital music, video, and image can be distributed instantaneously across the Internet to end-users. However, most conventional Digital Right Management are often not secure and not fast enough to process the vast amount of data generated by the multimedia applications to meet the real-time constraints. The SVC offers temporal, spatial, and SNR scalability to varying network bandwidth and different application needs. Meanwhile, for many multimedia services, security is an important component to restrict unauthorized content access and distribution. This suggests the need for new cryptography system implementations that can operate at SVC. In this paper, we propose a new scrambling encryption for reserving the characteristic of scalability in MPEG4-SVC. In the base layer, the proposed algorithm is applied and performed the selective scambling. And it encrypts various MVS and intra-mode scrambling in the enhancement layer. In the decryption, it decrypts each encrypted layers by using another encrypted keys. Throughout the experimental results, the proposed algorithms have low complexity in encryption and the robustness of communication errors.

A Pipelined Design of the Block Cipher Algorithm SEED (SEED 블록 암호 알고리즘의 파이프라인 하드웨어 설계)

  • 엄성용;이규원;박선화
    • Journal of KIISE:Computer Systems and Theory
    • /
    • v.30 no.3_4
    • /
    • pp.149-159
    • /
    • 2003
  • The need for information security increases interests on cipher algorithms recently. Especially, a large volume of data transmission over high-band communication network requires faster encryption and decryption techniques for real-time processing. It would be a good solution for this problem that we implement the cipher algorithm in forms of hardware circuits. Though some previous researches use this approach, they focus only on repeatedly executing the core part of the algorithm to minimize the hardware chip size, while most cipher algorithms are inherently parallel. In this paper, we propose a new design for the SEED block cipher algorithm developed by KISA (Korea Information Security Agency) in 1998 as Korean standard cipher algorithm. It exploits the parallelism of the algorithm basically and implements it in a pipelined fashion. We described the design in VHDL program and performed functional simulations on the program, and then found that it worked correctly. In addition, we synthesized it and verified that it could be implemented in a single FPGA chip, implying that the new design can be Practically used for the actual hardware implementation of a high-speed and high-performance cipher system.

Fast Game Encoder Based on Scene Descriptor for Gaming-on-Demand Service (주문형 게임 서비스를 위한 장면 기술자 기반 고속 게임 부호화기)

  • Jeon, Chan-Woong;Jo, Hyun-Ho;Sim, Dong-Gyu
    • Journal of Korea Multimedia Society
    • /
    • v.14 no.7
    • /
    • pp.849-857
    • /
    • 2011
  • Gaming on demand(GOD) makes people enjoy games by encoding and transmitting game screen at a server side, and decoding the video at a client side. In this paper, we propose a fast game video encoder for multiple users over network with low-powered devices. In the proposed system, the computational complexity of game encoders is reduced by using scene descriptors, which consists of an object motion vector, global motion, and scene change. With additional information from game engines, the proposed encoder does not need to perform various complexity processes such as motion estimation and ratedistortion optimization. The motion estimation and rate-distortion optimization skipped by scene descriptors. We found that the proposed method improved 192 % in terms of FPS, compared with x264 software. With partial assembly code, we also improved coding speed by 86 % in terms of FPS. We found that the proposed fast encoder could encode over 60 FPS for real-time GOD applications.

Design and Implementation of Object Reusing Methods for Mobile Vector Map Services (모바일 벡터 지도 서비스를 위한 객체 재사용 기법의 설계 및 구현)

  • Kim, Jin-Deog;Choi, Jin-Oh
    • The KIPS Transactions:PartD
    • /
    • v.10D no.3
    • /
    • pp.359-366
    • /
    • 2003
  • Although the reuse of the cached data for scrolling the map reduces the amount of passed data between client and server, it needs the conversions of data coordinates, selective deletion of objects, cache compaction and object structuring step in the clients. The conversion is a time- intensive operation due to limited resources of mobile phones such as low computing power, small memory. Therefore, in order to control the map efficiently in the vector map service based mobile phones, it is necessary to study the methods which reuse cached objects for reducing wireless network bandwidth and overwhelming the limited resources of mobile phones as well. This paper proposes the methods of reusing pre-received spatial objects for map control in the mobile vector map service system based on client-server architecture. The experiments conducted on the Web GIS systems with real data show that the proposed method is appropriate to map services for mobile phone. We also analyze the advantages and drawbacks between the reuse of cached data and transmission of raw data respectively.