Earticle

현재 위치 Home

International Journal of Smart Home

간행물 정보
  • 자료유형
    학술지
  • 발행기관
    보안공학연구지원센터(IJSH) [Science & Engineering Research Support Center, Republic of Korea(IJSH)]
  • pISSN
    1975-4094
  • 간기
    격월간
  • 수록기간
    2008 ~ 2016
  • 주제분류
    공학 > 컴퓨터학
  • 십진분류
    KDC 505 DDC 605
Vol.5 No.4 (6건)
No
1

A new Scheduling Mechanism Inspired of Artificial Immune System Algorithm for Wireless Sensor Networks

Arash Nikdel, Amir Massoud Bidgoli, Mohammad Hossein Yektaie

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.1-16

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In hierarchical routing in Wireless Sensor Networks, the nodes are divided into clusters. In each cluster, one node is selected as cluster head and other nodes are cluster members. Till now, different mechanisms have been proposed for communication between cluster members and cluster head in hierarchical protocols. Most of them determine a same time for each cluster member to communicate with cluster head without regarding the nodes conditions. In this paper, we propose a novel scheduling mechanism inspired of Artificial Immune System algorithm called CHSM. In this mechanism, the nodes with more information have a better chance for communicating with cluster head. Then, we propose QoS-CHSM mechanism and improve the proper nodes distribution in each cluster. In this method, we try to apply a more proper distribution of nodes in the cluster, by changing cluster to the virtual sub clusters and applying the CHSM for each virtual cluster separately. In fact, the CHSM is a special manner of QoS-CHSM in which the number of virtual clusters equals one. We have simulated LEACH protocol and used proposed scheduling mechanisms in it and then compared it with original LEACH protocol which uses TDMA scheduling mechanism. The results of simulation show the effectiveness of the proposed mechanisms.

2

Multiple Object Tracking Using SIFT Features and Location Matching

Seok-Wun Ha, Yong-Ho Moon

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.17-26

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In recent, object recognition and tracking systems have been developed that use local invariant features from Shift Invariant Feature Transform algorithm. Most of them are implemented by distance matching of descriptor features between the reference and the next consecutive frame image. Among the matched keypoints generated from SIFT descriptor matching, there are some mismatched keypoints when keypoint location information is considered. These location-mismatched keypoints could be affected to object tracking perfomance. To achieve a stable tracking it is necessary that these are detected and discarded in tracking action. In this paper a robust object tracking system is presented that strengthen stability in tracking by eleminating location-mismatched keypoints. Experimental results show that a stable and robust tracking can be achieved in a test video sequence includes multiple objects.

3

Providing Direct3D Features over the Desktop OpenGL

Nakhoon Baek, Kwan-Hee Yoo

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.27-38

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

In this paper, we aimed to provide Direct3D graphics features on Linux-based systems, which are actively used for various portable game platforms and mobile phone devices. Direct3D is used as one of the most important middle-wares for game and graphics applications developed on Microsoft Windows operating systems. However, this graphics library is not commonly available for other operating systems. We present a prototype library to provide Direct3D functionalities on Linux-based systems, using the OpenGL graphics library. In typical Linux-based systems, only the X window system and OpenGL graphics library are available. There are lots of needs to port Direct3D-based applications on these systems, and our Direct3D-on-OpenGL library would be a good starting point. Selecting a set of widely-used Direct3D data structures and functions, we implemented selected Direct3D functionalities and finally acquired a prototype implementation. Our implementation currently covers 3D transformations, light and material processing, texture mapping, simple animation features and more. We showed its feasibility through successfully executing a set of Direct3D demonstration programs on our implementation.

4

Non-interactive Deniable Authentication Protocol using generalized ECDSA Signature Scheme

Jayaprakash Kar

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.39-50

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Deniable authentication protocol enables a receiver to iden-tify the true source of a given message, but not to prove the identity of the sender to a third party. This property is very useful for provid-ing secure negotiation over the Internet. This paper describes a secure non-interactive deniable authentication protocol using ECDSA signature scheme. The security of the protocol is based on di±culty of breaking Elliptic Curve Discrete Logarithm Problem. It can be implemented in low power and small processor mobile devices such as smart card, PDA etc which work in low power and small processor.

5

Study of Marker Array List Method for Augmented Reality Service Based Smart Home

Donghyun Kim, Yohwan So, Seoksoo Kim

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.51-64

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

More recently, the demand for smart home services is on the rise due to the advanced computing devices and network technology, calling for more stable and efficient visualization and simulation. This has led to a lot of research efforts on AR for virtual smart home services. AR may use a non-marker-based method or a marker-based method. In case of AR services for the indoor environment, however, powerful detection of an object cannot be done solely by a computerized perspective and thus a marker-based technique is applied to smart home services in order to detect an object more accurately. Nevertheless, the marker-based AR may detect markers of similar patterns as the same markers, which causes repeated detection of markers. In this study, therefore, we have explored a method of augmenting a large number of objects without creating a multitude of markers but by creating a list of a marker array, which can increase marker efficiency and avoid repeated detection of markers.

6

Augmented Reality Game Interface Using Effective Face Detection Algorithm

Young Jae Lee, Geun Ho Lee

보안공학연구지원센터(IJSH) International Journal of Smart Home Vol.5 No.4 2011.10 pp.65-76

※ 원문제공기관과의 협약기간이 종료되어 열람이 제한될 수 있습니다.

Viola and Jones Algorithmand Viola and Jones, the conventional face-detecting methods, have the advantages in that they could help fast and clear face recognition. But they also have their own drawbacks. With Viola and Jones, detection of slanted face is hard, and Viola and Jonescannot provide the precise recognition of faces since the detected area in faces is rather wide depending on the environment. To come with some kinds of solutions to these limitations, this paper propose the algorithm, which considers the position and size of the circle(the range of face recognition), detection intervals, and etc. The algorithm has been proven to be effective through a series of experiments. 3D AR game has been produced to utilize the algorithm as game interface in AR environment. Experiments in various game situations proved its effectiveness. Compared with the conventional methods, the algorithm was better in getting the desired information through face recognition, thus realizing interesting game interface. The algorithm could be used as the basis for making natural interaction with virtual object in augmented reality and also for developing interface in the smart environment.

 
페이지 저장