• Title/Summary/Keyword: system of computer mathematics

Search Result 331, Processing Time 0.029 seconds

Union and Division using Technique in Fingerprint Recognition Identification System

  • Park, Byung-Jun;Park, Jong-Min;Lee, Jung-Oh
    • Journal of information and communication convergence engineering
    • /
    • v.5 no.2
    • /
    • pp.140-143
    • /
    • 2007
  • Fingerprint Recognition System is made up of Off-line treatment and On-line treatment; the one is registering all the information of there trieving features which are retrieved in the digitalized fingerprint getting out of the analog fingerprint through the fingerprint acquisition device and the other is the treatment making the decision whether the users are approved to be accessed to the system or not with matching them with the fingerprint features which are retrieved and database from the input fingerprint when the users are approaching the system to use. In matching between On-line and Off-line treatment, the most important thing is which features we are going to use as the standard. Therefore, we have been using "Delta" and "Core" as this standard until now, but there might have been some deficits not to exist in every person when we set them up as the standards. In order to handle the users who do not have those features, we are still using the matching method which enables us to make up of the spanning tree or the triangulation with the relations of the spanned feature. However, there are some overheads of the time on these methods and it is not sure whether they make the correct matching or not. In this paper, introduces a new data structure, called Union and Division, representing binary fingerprint image. Minutiae detecting procedure using Union and Division takes, on the average, 32% of the consuming time taken by a minutiae detecting procedure without using Union and Division.

Efficient Compression Algorithm with Limited Resource for Continuous Surveillance

  • Yin, Ling;Liu, Chuanren;Lu, Xinjiang;Chen, Jiafeng;Liu, Caixing
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.10 no.11
    • /
    • pp.5476-5496
    • /
    • 2016
  • Energy efficiency of resource-constrained wireless sensor networks is critical in applications such as real-time monitoring/surveillance. To improve the energy efficiency and reduce the energy consumption, the time series data can be compressed before transmission. However, most of the compression algorithms for time series data were developed only for single variate scenarios, while in practice there are often multiple sensor nodes in one application and the collected data is actually multivariate time series. In this paper, we propose to compress the time series data by the Lasso (least absolute shrinkage and selection operator) approximation. We show that, our approach can be naturally extended for compressing the multivariate time series data. Our extension is novel since it constructs an optimal projection of the original multivariates where the best energy efficiency can be realized. The two algorithms are named by ULasso (Univariate Lasso) and MLasso (Multivariate Lasso), for which we also provide practical guidance for parameter selection. Finally, empirically evaluation is implemented with several publicly available real-world data sets from different application domains. We quantify the algorithm performance by measuring the approximation error, compression ratio, and computation complexity. The results show that ULasso and MLasso are superior to or at least equivalent to compression performance of LTC and PLAMlis. Particularly, MLasso can significantly reduce the smooth multivariate time series data, without breaking the major trends and important changes of the sensor network system.

Two original concepts in linear algebra (선형대수학의 두 가지 기원적 개념)

  • Pak, Hong-Kyung
    • Journal for History of Mathematics
    • /
    • v.21 no.1
    • /
    • pp.109-120
    • /
    • 2008
  • Today linear algebra is one of compulsory courses for university mathematics by virtue of its theoretical fundamentals and fruitful applications. However, a mechanical computation-oriented instruction or a formal concept-oriented instruction is difficult and dull for most students. In this context, how to teach mathematical concepts successfully is a very serious problem. As a solution for this problem, we suggest establishing original concepts in linear algebra from the students' point of view. Any original concept means not only a practical beginning for the historical order and theoretical system but also plays a role of seed which can build most of all the important concepts. Indeed, linear algebra has exactly two original concepts : geometry of planes, spaces and linear equations. The former was investigated in [2], the latter in the present paper.

  • PDF

Development of Hydrophilic Performance Measurement System for Anti-Condensation Using Computer Image (컴퓨터 영상을 이용한 오염방지 친수성능 측정 시스템 개발)

  • Ahn, Byung-Tae;Cho, Sung-Ho;Choi, Sun;Kim, Eun-Kuk;Park, Sang-Soo;Hwang, Heon
    • Journal of Biosystems Engineering
    • /
    • v.35 no.4
    • /
    • pp.257-261
    • /
    • 2010
  • Surface energy is the principal factor of anti-condensation. High surface energy appears hydrophilic itself and low surface energy represents hydrophobic itself. The contact angle is widely being used for measurement of surface energy of materials, evaluation of coating performances, measurement of wettability, and so on. However, the existing contact angle measuring system is so expensive for purchasing and complicated, so it takes a lot of time and money to use. This study was conducted to develop the algorithm for evaluating hydrophilic performance through measuring the contact angle of water droplet automatically, and fabricate relatively simple measuring system using a low-cost monochrome camera and image processing. A constant amount of water was firstly allocated on a slide by a micropipette, and then the image of water droplet was captured by monochrome digital camera and sent to a computer. The image was binarized and then reduced noises by labeling. Finally, the contact angle of water droplet was computed by using three points (left, right, and top coordinates), simple linear mathematics, and trigonometric function. The experimental results demonstrated the accuracy and reproducibility of the developed system showing less deviations and deviation ratio.

SLNR-based User Scheduling in Multi-cell networks: from Multi-antenna to Large-Scale Antenna System

  • Li, Yanchun;Zhu, Guangxi;Chen, Hua;Jo, Minho;Liu, Yingzhuang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.3
    • /
    • pp.945-964
    • /
    • 2014
  • In this paper, we investigate the performance of Signal to Leakage and Noise Radio (SLNR) based user scheduling in uplink of multi-cell with large-scale antenna system. Large antenna array is desired to improve the performance in future system by providing better beamforming capability. However, some studies have found that the signal channel is 'hardened' (becomes invariant) when the antenna number goes extremely large, which implies that the signal channel aware user scheduling may have no gain at all. With the mathematic tool of order statistics, we analyzed the signal and interference terms of SLNR in a homogeneous multicell network. The derived distribution function of signal and interference shows that the leakage channel's variance is much more influential than the signal channel's variance in large-scale antenna regime. So even though the signal channel is hardened, the SLNR-based scheduling can achieve remarkable multiuser diversity (MUD) gain due to the fluctuation of the uplink leakage channel. By providing the final SINR distribution, we verify that the SLNR-based scheduling can leverage MUD in a better way than the signal channel based scheduling. The Monte Carlo simulations show that the throughput gain of SLNR-based scheduling over signal channel based scheduling is significant.

Design and Implementation of a Data Visualization Assessment Module in Jupyter Notebook

  • HakNeung Go;Youngjun Lee
    • Journal of the Korea Society of Computer and Information
    • /
    • v.28 no.9
    • /
    • pp.167-176
    • /
    • 2023
  • In this paper, we designed and implemented a graph assessment module that can evaluate graphs in an programming assessment system based on text and numbers. The assessment method of the graph assessment module is self-evaluation that outputs two graphs generated by codes submitted by learners and by answers, automatic-evaluation that converts each graph image into an array, and gives feedback if it is wrong. The data used to generate the graph can be inputted directly or used from external data, and the method of generatng graph that can be evaluated is MATLAB style in matplotlib, and the graph shape that can be evaluated is presented in mathematics and curriculum. Through expert review, it was confirmed that the content elements of the assessment module, the possibility of learning, and the validity of the learner's needs were met. The graph assessment module developed in this study has expanded the evaluation area of the programming automatic asssessment system and is expected to help students learn data visualization.

Exponential Stabilization of a Class of Underactuated Mechanical Systems using Dynamic Surface Control

  • Qaiser, Nadeem;Iqbal, Naeem;Hussain, Amir;Qaiser, Naeem
    • International Journal of Control, Automation, and Systems
    • /
    • v.5 no.5
    • /
    • pp.547-558
    • /
    • 2007
  • This paper proposes a simpler solution to the stabilization problem of a special class of nonlinear underactuated mechanical systems which includes widely studied benchmark systems like Inertia Wheel Pendulum, TORA and Acrobot. Complex internal dynamics and lack of exact feedback linearizibility of these systems makes design of control law a challenging task. Stabilization of these systems has been achieved using Energy Shaping and damping injection and Backstepping technique. Former results in hybrid or switching architectures that make stability analysis complicated whereas use of backstepping some times requires closed form explicit solutions of highly nonlinear equations resulting from partial feedback linearization. It also exhibits the phenomenon of explosions of terms resulting in a highly complicated control law. Exploiting recently introduced Dynamic Surface Control technique and using control Lyapunov function method, a novel nonlinear controller design is presented as a solution to these problems. The stability of the closed loop system is analyzed by exploiting its two-time scale nature and applying concepts from Singular Perturbation Theory. The design procedure is shown to be simpler and more intuitive than existing designs. Design has been applied to important benchmark systems belonging to the class demonstrating controller design simplicity. Advantages over conventional Energy Shaping and Backstepping controllers are analyzed theoretically and performance is verified using numerical simulations.

A PERFORMANCE IMPROVEMENT OF ANEL SCHEME THROUGH MESSAGE MAPPING AND ELLIPTIC CURVE CRYPTOGRAPHY

  • Benyamina Ahmed;Benyamina Zakarya
    • International Journal of Computer Science & Network Security
    • /
    • v.23 no.3
    • /
    • pp.169-176
    • /
    • 2023
  • The vehicular ad hoc network (VANET) is currently an important approach to improve personal safety and driving comfort. ANEL is a MAC-based authentication scheme that offers all the advantages of MAC-based authentication schemes and overcomes all their limitations at the same time. In addition, the given scheme, ANEL, can achieve the security objectives such as authentication, privacy preservation, non-repudiation, etc. In addition, our scheme provides effective bio-password login, system key update, bio-password update, and other security services. Additionally, in the proposed scheme, the Trusted Authority (TA) can disclose the source driver and vehicle of each malicious message. The heavy traffic congestion increases the number of messages transmitted, some of which need to be secretly transmitted between vehicles. Therefore, ANEL requires lightweight mechanisms to overcome security challenges. To ensure security in our ANEL scheme we can use cryptographic techniques such as elliptic curve technique, session key technique, shared key technique and message authentication code technique. This article proposes a new efficient and light authentication scheme (ANEL) which consists in the protection of texts transmitted between vehicles in order not to allow a third party to know the context of the information. A detail of the mapping from text passing to elliptic curve cryptography (ECC) to the inverse mapping operation is covered in detail. Finally, an example of application of the proposed steps with an illustration

A Practical Implementation of Fuzzy Fingerprint Vault

  • Lee, Sun-Gju;Chung, Yong-Wha;Moon, Dae-Sung;Pan, Sung-Bum;Seo, Chang-Ho
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.5 no.10
    • /
    • pp.1783-1798
    • /
    • 2011
  • Recently, a cryptographic construct, called fuzzy vault, has been proposed for crypto-biometric systems, and some implementations for fingerprint have been reported to protect the stored fingerprint template by hiding the fingerprint features. In this paper, we implement the fuzzy fingerprint vault, combining fingerprint verification and fuzzy vault scheme to protect fingerprint templates. To implement the fuzzy fingerprint vault as a complete system, we have to consider several practical issues such as automatic fingerprint alignment, verification accuracy, execution time, error correcting code, etc. In addition, to protect the fuzzy fingerprint vault from the correlation attack, we propose an approach to insert chaffs in a structured way such that distinguishing the fingerprint minutiae and the chaff points obtained from two applications is computationally hard. Based on the experimental results, we confirm that the proposed approach provides higher security than inserting chaffs randomly without a significant degradation of the verification accuracy, and our implementation can be used for real applications.

Experimental Study of a Power-Over-Fiber Module and Multimode Optical Fiber for a Fishing Camera System

  • Lee, Hyuek Jae;Jung, Gwang S.
    • Current Optics and Photonics
    • /
    • v.1 no.5
    • /
    • pp.468-473
    • /
    • 2017
  • We determined the feasibility of a fishing camera system using an optical fiber as the fishing line by testing a power-over-fiber (POF) module and multimode optical fiber. Operation of the remote camera module (RCM) without the battery was preferred because the removal of the charging or battery replacement section enabled a waterproof single-body type design. The average efficiency of the photovoltaic power converter (PPC) in the tested POF module was 32.6% at 820 nm, and thus, a high-power laser of at least 1.27 W was required for operating the developed RCM with an electrical dissipation of 413 mW. Because the optical fiber was wound on a fishing reel, composite loss composed of bending and tensile loss occurred. To mitigate the composite loss, we employed a simple holder that showed an improvement in the composite loss of 0.38 dB to 0.8 dB, which was considerably better than the losses without the holder.