• Title/Summary/Keyword: sign algorithm

Search Result 278, Processing Time 0.019 seconds

A MDIT(Mobile Digital Investment Trust) Agent design and security enhancement using 3BC and E2mECC (3BC와 F2mECC를 이용한 MDIT(Mobile Digital Investment Trust) 에이전트 설계 및 보안 강화)

  • Jeong Eun-Hee;Lee Byung-Kwan
    • Journal of Internet Computing and Services
    • /
    • v.6 no.3
    • /
    • pp.1-16
    • /
    • 2005
  • This paper propose not only MDIT(Mobile Digital Investment Trust) agent design for Trust Investment under Mobile E-commerce environment, but also the symmetric key algorithm 3BC(Bit, Byte and Block Cypher) and the public encryption algorithm F2mECC for solving the problems of memory capacity, CPU processing time, and security that mobile environment has. In Particular, the MDIT Security Agent is the banking security project that introduces the concept of investment trust in mobile e-commerce, This mobile security protocol creates a shared secrete key using F2mECC and then it's value is used for 3BC that is block encryption technique. The security and the processing speed of MDIT agent are enhanced using 3BC and F2mECC.

  • PDF

Human Activity Pattern Recognition Using Motion Information and Joints of Human Body (인체의 조인트와 움직임 정보를 이용한 인간의 행동패턴 인식)

  • Kwak, Nae-Joung;Song, Teuk-Seob
    • Journal of the Korea Institute of Information and Communication Engineering
    • /
    • v.16 no.6
    • /
    • pp.1179-1186
    • /
    • 2012
  • In this paper, we propose an algorithm that recognizes human activity patterns using the human body's joints and the information of the joints. The proposed method extracts the object from inputted video, automatically extracts joints using the ratio of the human body, applies block-matching algorithm for each joint and gets the motion information of joints. The proposed method uses the joints to move, the directional vector of motions of joints, and the sign to represent the increase or decrease of x and y coordinates of joints as basic parameters for human recognition of activity. The proposed method was tested for 8 human activities of inputted video from a web camera and had the good result for the ration of recognition of the human activities.

An On-Line Signature Verification Algorithm Based On Neural Network (신경망 기반의 온라인 서명 검증 알고리듬)

  • Lee, Wan-Suck;Kim, Seong-Hoon
    • Journal of Intelligence and Information Systems
    • /
    • v.7 no.2
    • /
    • pp.143-151
    • /
    • 2001
  • This paper investigates the development of a neural network based system for automated signature authentication that relies on an autoregressive characterization for the segments of a signature. The primary contributions of this work are tow-fold: a) the development of the neural network architecture and the modalities of training it, b) adaptation of the dynamic time warping algorithm to fomulate a new method for enabling consistent segmentation of multiple signatures from the same writer. The performance of the signature verification system has been tested using a sizable database that includes a comprehensive set of simulated and realistic forgeries. False Acceptance and False Rejection error rates of 0.78% and 1.6% respectively were obtained in tests conducted using 1920 skilled forgeries.

  • PDF

A Study on the Fingerprint Recognition Algorithm Using Enhancement Method of Fingerprint Ridge Structure (지문 융선 구조의 향상기법을 사용한 지문인식 알고리즘에 관한 연구)

  • 정용훈;노정석;이상범
    • Journal of the Korea Computer Industry Society
    • /
    • v.4 no.4
    • /
    • pp.647-660
    • /
    • 2003
  • The present of state is situation that is realized by necessity of maintenance of public security about great many information is real condition been increasing continually in knowledge info-age been situating in wide field of national defense, public peace, banking, politics, education etc. Also, loss or forgetfulness, and peculation by ID for individual information and number increase of password in Internet called that is sea of information is resulting various social problem. By alternative about these problem, including Biometrics, several authentication systems through sign(Signature), Smart Card, Watermarking technology are developed. Therefore, This paper shows that extract factor that efficiency can get into peculiar feature in physical features for good fingerprint recognition algorithm implementation with old study finding that take advantage of special quality of these fingerprint.

  • PDF

Watermarking-based Error Concealment in Video Communications

  • Oh Tae-Suk;Kim Yong-Cheol;Adsumilli Chowdary;Mitra Sanjit
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.31 no.7C
    • /
    • pp.700-705
    • /
    • 2006
  • In this paper, an informed watermarking algorithm is proposed that aids in concealing packet loss errors in video communications. This watermark-based error concealment (WEC) method embeds a low resolution version of the video frame inside itself as watermark data. At the receiver, the extracted watermark is used as a reference for error concealment. The proposed DCT-based algorithm employs informed watermarking techniques in order to minimize the distortion of host frames. At the encoder, a predictive feedback loop is employed which helps to adjust the strength of the data embedding. Furthermore, the distortion of the DCT coefficients introduced in the embedding can be removed to a considerable extent, by employing bit-sign adaptivity. Simulation results on standard video sequences show that the proposed informed WEC scheme has an advantage of 3$\sim$4 dB in PSNR over non-informed WEC and that even a non-informed WEC is still superior to conventional error concealment techniques.

A Instructional Method Design of Copyright Education using Game-Themed Programming in Elementary School Computer Class (초등컴퓨터 교육에서 게임소재 프로그래밍 학습과정을 통한 저작권 교수방법 설계)

  • Rim, Hwa-Kyung;Cho, Yong-Nam
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.12
    • /
    • pp.121-130
    • /
    • 2011
  • In this paper, we designed instructional method through process that make digital work for active copyright education. This design composed by game-themed programming. We made students realize the effort of creation in algorithm and flow chart, coding progress. And, expressed the effort as copyright sign and cost. Also, we evaluate mutually and did so that confirm value. We applied proposed method to class. And, analyzed effect observing change of inside of students.

An efficient reliability analysis strategy for low failure probability problems

  • Cao, Runan;Sun, Zhili;Wang, Jian;Guo, Fanyi
    • Structural Engineering and Mechanics
    • /
    • v.78 no.2
    • /
    • pp.209-218
    • /
    • 2021
  • For engineering, there are two major challenges in reliability analysis. First, to ensure the accuracy of simulation results, mechanical products are usually defined implicitly by complex numerical models that require time-consuming. Second, the mechanical products are fortunately designed with a large safety margin, which leads to a low failure probability. This paper proposes an efficient and high-precision adaptive active learning algorithm based on the Kriging surrogate model to deal with the problems with low failure probability and time-consuming numerical models. In order to solve the problem with multiple failure regions, the adaptive kernel-density estimation is introduced and improved. Meanwhile, a new criterion for selecting points based on the current Kriging model is proposed to improve the computational efficiency. The criterion for choosing the best sampling points considers not only the probability of misjudging the sign of the response value at a point by the Kriging model but also the distribution information at that point. In order to prevent the distance between the selected training points from too close, the correlation between training points is limited to avoid information redundancy and improve the computation efficiency of the algorithm. Finally, the efficiency and accuracy of the proposed method are verified compared with other algorithms through two academic examples and one engineering application.

A Study on the Measurement of Respiratory Rate Using a Respirator Equipped with an Air Pressure Sensor

  • Shin, Woochang
    • International journal of advanced smart convergence
    • /
    • v.11 no.4
    • /
    • pp.240-246
    • /
    • 2022
  • In order to measure the respiratory rate, one of the major vital signs, many devices have been developed and related studies have been conducted. In particular, as the number of wearers of respirators increases in the COVID-19 pandemic situation, studies have been conducted to measure the respiratory rate of the wearer by attaching an electronic sensor to the respirator, but most of them are cases in which an air flow sensor or a microphone sensor is used. In this study, we design and develop a system that measures the respiratory rate of the wearer using an air pressure sensor in a respirator. Air pressure sensors are inexpensive and consume less power than the other sensors. In addition, since the amount of data required for calculation is small and the algorithm is simple, it is suitable for small-scale and low-power processing devices such as Arduino. We developed an algorithm to measure the respiratory rate of a respirator wearer by analysing air pressure change patterns. In addition, variables that can affect air pressure changes were selected, and experimental scenarios were designed according to the variables. According to the designed scenario, we collected air pressure data while the respirator wearer was breathing. The performance of the developed system was evaluated using the collected data.

A High Speed LDPC Decoder Structure Based on the HSS (HSS 기반 초고속 LDPC 복호를 위한 구조)

  • Lee, In-Ki;Kim, Min-Hyuk;Oh, Deock-Gil;Jung, Ji-Won
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.38B no.2
    • /
    • pp.140-145
    • /
    • 2013
  • This paper proposes the high speed LDPC decoder structure base on the DVB-S2. Firstly, We study the solution to avoid the memory conflict. For the high speed decoding process the decoder adapts the HSS(Horizontal Shuffle Scheduling) scheme. Secondly, for the high speed decoding algorithm normalized Min-Sum algorithm is adapted instead of Sum-Product algorithm. And the self corrected is a variant of the LDPC decoding that sets the reliability of a Mc${\rightarrow}$v message to 0 if there is an inconsistency between the signs of the current incoming messages Mv'${\rightarrow}$c and the sign of the previous incoming messages Moldv'${\rightarrow}$c This self-corrected algorithm avoids the propagation on unreliable information in the Tanner graph and thus, helps the convergence of the decoder.Start after striking space key 2 times. Lastly, and this paper propose the optimal hardware architecture supporting the high speed throughput.

Development of Control Algorithm for Intersection Safety System Using the Fusion of V2X and Environmental Sensors (V2X 및 환경 센서 융합 기반 교차로 안전 시스템 알고리즘 개발)

  • Park, Manbok;Lee, Sanghyun;Jun, Sibum;Kee, Seokcheol;Kim, Jungbeom;Kee, Changdon;Kim, Kyuwon;Yi, Kyongsu
    • Transactions of the Korean Society of Automotive Engineers
    • /
    • v.22 no.5
    • /
    • pp.126-135
    • /
    • 2014
  • This paper describes the development and verification of control algorithms for V2X and environmental sensor integrated intersection support and safety systems. The objective of the research is to develop core technologies for effective fusion of V2X and environmental sensors and to develop new safety function for intersection safety. One of core technologies is to achieve the improvement of GPS accuracy, and the other is to develop the algorithm of a vehicle identification which matches all data from V2X, vehicle sensors and environmental sensors to specific vehicles. A intersection optimal pass (IOP) algorithm is designed based on these core technologies. IOP recommends appropriate speed to pass the intersection in the consideration of traffic light signal and preceeding vehicle existence. Another function is developed to prevent a collision avoidance when car crash caused by traffic violation of surrounding vehicles is expected. Finally all functions are implemented and tested in three test vehicles. It is shown that IOP can support convenient and comfortable driving with recommending optimal pass speed and collision avoidance algorithm can effectively prevent collision caused by traffic sign violation of surrounding vehicles.