• Title/Summary/Keyword: 이동통신 시스템

Search Result 4,161, Processing Time 0.03 seconds

Transmission Method and Simulator Development with Channel bonding for a Mass Broadcasting Service in HFC Networks (HFC 망에서 대용량 방송서비스를 위한 채널 결합 기반 전송 방식 및 시뮬레이터 개발)

  • Shin, Hyun-Chul;Lee, Dong-Yul;You, Woong-Shik;Choi, Dong-Joon;Lee, Chae-Woo
    • Journal of Broadcast Engineering
    • /
    • v.16 no.5
    • /
    • pp.834-845
    • /
    • 2011
  • Massive broadcasting contents such as UHD(Ultra High Definition) TV which requires multi-channel capacity for transmission has been introduced in recent years. A transmission scheme with channel bonding has been considered for transmission of massive broadcasting contents. In HFC(Hybrid Fiber Coaxial) networks, DOCSIS 3.0(Data Over Cable Service Interface Specification 3.0) has already applied channel bonding schemes for up/downstream of data service. A method unlike DOCSIS 3.0 is required to introduce a channel bonding scheme in the broadcasting service having unidirectional transmission with a downstream. Since a massive broadcasting content requires several channels for transmission, VBR(Variable Bit Rate) transmission has been emerging for the bandwidth efficiency. In addition, research on channel allocation and resource scheduling is required to guarantee QoS(Quality of Service) for the broadcasting service based on VBR. In this paper, we propose a transmission method for mass broadcasting service in HFC network and show the UHD transmission simulator developed to evaluate the performance. In order to evaluate the performance, we define various scenarios. Using the simulator, we assess the possibility of channel bonding and VBR transmission for UHD broadcasting system to provide mass broadcasting service efficiently. The developed simulator is expected to contribute to the efficient transmission system development of mass broadcasting service.

Development of a Traffic Signal Controller for the Tri-light Traffic Signal (3구신호등 제어용 교통신호제어기 개발)

  • Han, Won-Sub;Gho, Gwang-Yong;Heo, Nak-Won;Lee, Chul-Kee;Ha, Dong-Ik;Lee, Byung-Cheol
    • The Journal of The Korea Institute of Intelligent Transport Systems
    • /
    • v.9 no.5
    • /
    • pp.49-58
    • /
    • 2010
  • The traffic signal controllers being used in the domestic currently are being manufactured based on the korean national police standard which was developed for controlling the quad-light traffic signal having the red, yellow, left-turn arrow, and green lights. But according to the national policy for the traffic operation, they have to be changed to be able to switch the tri-light signal having red, yellow and green lights. In this study, a new tri-light traffic signal controller was designed and developed by the way improving the Signal Control Unit of the existing quad-light standard traffic controller. The Load Signal Unit(LSU) was improved to output 6 signals which are the two assemblies of three signal indications having the red, yellow, and green lights. To enough traffic signals output to control each directional movements and the various transport modes which are car, bus, bike, and pedestrian etc., the connector bus system was designed to be able to accommodate maximum 96 signals outputs being constructed by 16 LSUs. Flasher device was developed to be able to support maximum 32 red signals. In the software, the communication protocol between traffic control center and the traffic signal controller was improved and new signal map code values were defined for the developed LSU controlling the quad-light traffic signal. A model of the quad-light traffic signal controller developed and was tested three operations, protocol-operation, remote-command and control-mode. The test result operated all of them successfully.

Radio Frequency Circuit Module BGA(Ball Grid Array) (Radio Frequency 회로 모듈 BGA(Ball Grid Array) 패키지)

  • Kim, Dong-Young;Jung, Tae-Ho;Choi, Soon-Shin;Jee, Yong
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.37 no.1
    • /
    • pp.8-18
    • /
    • 2000
  • We presented a BGA(Ball Grid Array) package for RF circuit modules and extracted its electrical parameters. As the frequency of RF system devices increases, the effect of its electrical parasitics in the wireless communication system requires new structure of RF circuit modules because of its needs to be considered of electrical performance for minimization and module mobility. RF circuit modules with BGA packages can provide some advantages such as minimization, shorter circuit routing, and noise improvement by reducing electrical noise affected to analog and digital mixed circuits, etc. We constructed a BGA package of ITS(Intelligent Transportation System) RF module and measured electrical parameters with a TDR(Time Domain Reflectometry) equipment and compared its electrical parasitic parameters with PCB RF circuits. With a BGA substrate of 3${\times}$3 input and output terminals, we have found that self capacitance of BGA solder ball is 68.6fF, and self inductance 146pH, whose values were reduced to 34% and 47% of the value of QFP package structure. S11 parameter measurement with a HP4396B Network Analyzer showed the resonance frequency of 1.55GHz and the loss of 0.26dB. Routing length of the substrate was reduced to 39.8mm. Thus, we may improve electrical performance when we use BGA package structures in the design of RF circuit modules.

  • PDF

Power Consumption Prediction Scheme Based on Deep Learning for Powerline Communication Systems (전력선통신 시스템을 위한 딥 러닝 기반 전력량 예측 기법)

  • Lee, Dong Gu;Kim, Soo Hyun;Jung, Ho Chul;Sun, Young Ghyu;Sim, Issac;Hwang, Yu Min;Kim, Jin Young
    • Journal of IKEEE
    • /
    • v.22 no.3
    • /
    • pp.822-828
    • /
    • 2018
  • Recently, energy issues such as massive blackout due to increase in power consumption have been emerged, and it is necessary to improve the accuracy of prediction of power consumption as a solution for these problems. In this study, we investigate the difference between the actual power consumption and the predicted power consumption through the deep learning- based power consumption forecasting experiment, and the possibility of adjusting the power reserve ratio. In this paper, the prediction of the power consumption based on the deep learning can be used as a basis to reduce the power reserve ratio so as not to excessively produce extra power. The deep learning method used in this paper uses a learning model of long-short-term-memory (LSTM) structure that processes time series data. In the computer simulation, the generated power consumption data was learned, and the power consumption was predicted based on the learned model. We calculate the error between the actual and predicted power consumption amount, resulting in an error rate of 21.37%. Considering the recent power reserve ratio of 45.9%, it is possible to reduce the reserve ratio by 20% when applying the power consumption prediction algorithm proposed in this study.

Theory and Implementation of Dynamic Taint Analysis for Tracing Tainted Data of Programs (프로그램의 오염 정보 추적을 위한 동적 오염 분석의 이론 및 구현)

  • Lim, Hyun-Il
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.2 no.7
    • /
    • pp.303-310
    • /
    • 2013
  • As the role of software increases in computing environments, issues in software security become more important problems. Dynamic taint analysis is a technique to trace and manage tainted data originated from unreliable sources during the execution of a program. This analysis can be applied to software security verification as well as software behavior understanding, testing unexpected errors, or debugging. In the previous researches, they focussed only to show the analysis results of dynamic taint analysis, and they did not logically describe propagation process of tainted data and analysis procedures. So, there were difficulties in understanding the analysis procedures or applying to other analysis. In this paper, by theoretically describing the analysis procedure, we logically show how the propagation process of tainted data can be traced, and present a theoretical model for dynamic taint analysis. In addition, we verify the correctness of the proposed model by implementing an analyser, and show that propagation of tainted data can be traced by the model. The proposed model can be applied to understand the analysis procedures of data flows in dynamic taint analysis, and can be used as an base knowledge for designing and implementing analysis method, which applies such analysis method.

시 최적화 제어기구의 설계방법에 관한 비교연구

  • 이양범
    • 전기의세계
    • /
    • v.29 no.3
    • /
    • pp.170-176
    • /
    • 1980
  • 이 논문은 제어신호가 이상적인 포화특성을 갖은 제작조건하의 시불변, 선형 제어계의 시최적화 제어기구의 설계이론을 비교 연구하는데 목적을 두었다. 어떤 초기상태에 있는 계를 특정된 최종상태로, 최단시간내에 이행시켜 가는데 요구되는 제어기구의 설계문제는 여러해 동안 흥미있는 연구과제로 학계에 등장되었고 이러한 문제를 처리하는데에는 여러가지의 설계방법이 제안되어 왔다. 이 논문에서는 이러한 최적화 제어기구의 설계 이론중, 상태천이법에 의한 방법, 최대원리의 적용에 의한 방법 및 동적 프로그래밍기법에 의한 방법들을 서로 비교하여 2차계의 시최적화 설계사례에 이들을 적용시킴으로써 그 설계법상의 문제점을 비교 검토하여 보려는데 목적을 두었다. 설계사례 2차계는 시불변, 선형인 것으로 가정하였으며, 초기상태벡터 및 최종상태벡터는 모두 특정된 값으로 지정되고 제어신호는 이상적인 포화특성으로 제약받으며 스윗칭 시간이 유한크기가 아닌 정규형인 경우에 한정시켜 다루었다. 어느 설계이론을 적용시키나 시최적화를 위한 제어측은 단속제어방식으로 결과되었으나, 시최적화 문제의 특수성때문에 최대원리 및 동적 프로그래밍기법의 적용사례에서는 자연경계조건 및 Transversality 조건 등이 스윗칭시간 또는 최종시간을 직접 결정하여 주는 관건은 되지 못하였으며 계통의 상태방정식 또는 보조상태방정식을 구속제약된 양단상태량을 만족하도록 최적에어측을 적용하여 풀므로써 스윗칭시간과 최종시간이 얻어진다. 따라서 어느 한가지 방법의 적용만으로는 수학적인 처리상의 애로는 피할길이 없었으며 Hamiltonian함수의 변화성질을 보조적으로 활용하여 가면 이러한 번거로움이 덜하여 지긴하나, 다루는 계통의 차수가 높을 수록 이러한 수치해를 얻기위한 번거로움은 여간한 험로가 아닌 것으로 생각된다. 결론적으로 이러한 시최적화문제의 설계에는 몇가지의 혼용적용이 바람직하다고 결론된다. 이의 개발에 박차를 가하지 않을 수 없는 것이다.고, 우선 여기서는 당면문제로서 대처하지 않으면 안될 자동주파수제어문제및 계통의 경제운용문제만에 한정하여, 이것을 우리나라의 현상과 관련시켜 개설하고, 이들의 자동화에 관한 기본적인 문제를 간단히 적어 보겠다. 가능하다. 제작완료된 ASIC은 기능시험을 완료했으며 실제 line-of-sight(LOS) 시스템 구현에 적용중이다. 시대를 살아 갈 회원들이다. '컨텐츠의 시대'가 개막되는 것이며, 신세기통신과 SK텔레콤은 선의의 경쟁 과 협력을 통해 이동인터넷 서비스의 컨텐츠를 개발해 나가게 될 것이다. 3배가 높았다. 효소 활성에 필수적인 물의 양에 따른 DIAION WA30의 라세미화 효율에 관하여 실험한 결과, 물의 양이 증가할수록 그 효율은 감소하였다. DIAION WA30을 라세미화 촉매로 사용하여 아이소옥탄 내에서 라세믹 나프록센 2,2,2-트리플로로에틸 씨오에스터의 효소적 DKR 반응을 수행해 보았다. 그 결과 DIAION WA30을 사용하지 않은 경우에 비해 반응 전환율과 생성물의 광학 순도는 급격히 향상되었다. 전통적 광학분할 반응의 최대 50%라는 전환율의 제한이 본 연구에서 찾은 DIAION WA30을 첨가함으로써 성공적으로 극복되었다. 또한 고체 염기촉매인 DIAION WA30의 사용은 라세미화 촉매의 회수 및 재사용이 가능하게 해준다.해준다.다. TN5 세포주를 0.2 L 규모 (1 L spinner flask)oJl에서 세포간의 응집현상 없이 부유배양에 적응,배양시킨 후 세포성장 시기에 따른 발현을 조사한 결과 1 MOI의 감염조건 하에서는 $0.6\times10^6$cell/mL의 early exponential시기의 세포밀도에서 72시간 배양하였을 대 최대 발현양을 나타내었다. 나타내었다. $\beta$4 integrin의

  • PDF

A 14b 100MS/s $3.4mm^2$ 145mW 0.18um CMOS Pipeline A/D Converter (14b 100MS/s $3.4mm^2$ 145mW 0.18un CMOS 파이프라인 A/D 변환기)

  • Kim Young-Ju;Park Yong-Hyun;Yoo Si-Wook;Kim Yong-Woo;Lee Seung-Hoon
    • Journal of the Institute of Electronics Engineers of Korea SD
    • /
    • v.43 no.5 s.347
    • /
    • pp.54-63
    • /
    • 2006
  • This work proposes a 14b 100MS/s 0.18um CMOS ADC with optimized resolution, conversion speed, die area, and power dissipation to obtain the performance required in the fourth-generation mobile communication systems. The 3-stage pipeline ADC, whose optimized architecture is analyzed and verified with behavioral model simulations, employs a wide-band low-noise SHA to achieve a 14b level ENOB at the Nyquist input frequency, 3-D fully symmetric layout techniques to minimize capacitor mismatch in two MDACs, and a back-end 6b flash ADC based on open-loop offset sampling and interpolation to obtain 6b accuracy and small chip area at 100MS/s. The prototype ADC implemented in a 0.18um CMOS process shows the measured DNL and INL of maximum 1.03LSB and 5.47LSB, respectively. The ADC demonstrates a maximum SNDR and SFDR of 59dB and 72dB, respectively, and a power consumption of 145mW at 100MS/s and 1.8V. The occupied active die area is $3.4mm^2$.

Spatial-Sensor Observation Service for Spatial Operation of GeoSensor (GeoSensor의 공간연산을 확장한 Spatial-Sensor Observation Service)

  • Lee, Hyuk;Lee, Yeon;Chung, Weon-Il;Bae, Hae-Young
    • Journal of the Korea Society of Computer and Information
    • /
    • v.16 no.11
    • /
    • pp.35-44
    • /
    • 2011
  • Advances in science and technology have made a lot of changes in our life. Especially, sensors have used in various ways to monitor in real time and analyze the world effectively. Traditional sensor networks, however, have used their own protocols and architecture so it had to be paid a lot of additional cost. In the past 8 years, OGC and ISO have been formulating standards and protocols for the geospatial Sensor Web. Although the OGC SWE initiatives have deployed some components, attempts have been made to access sensor data. All spatial operations had to calculate on the client side because traditional SOS architecture did not consider spatial operation for GeoSensor. As a result, clients have to implement and run spatial operations, and it caused a lot of overload on them and decreased approachableness. In this paper we propose S-SOS for in-situ and moving GeoSensor that extends 52 North SOS and provides spatialFilter and spatialFinder operations. The proposed S-SOS provides an architecture that does not need to edit already deployed SOSs and can add spatial operations as occasion. Additionally we explain how to express the spatial queries and to be used effectively for various location based services.

Enhanced Grid-Based Trajectory Cloaking Method for Efficiency Search and User Information Protection in Location-Based Services (위치기반 서비스에서 효율적 검색과 사용자 정보보호를 위한 향상된 그리드 기반 궤적 클로킹 기법)

  • Youn, Ji-Hye;Song, Doo-Hee;Cai, Tian-Yuan;Park, Kwang-Jin
    • KIPS Transactions on Computer and Communication Systems
    • /
    • v.7 no.8
    • /
    • pp.195-202
    • /
    • 2018
  • With the development of location-based applications such as smart phones and GPS navigation, active research is being conducted to protect location and trajectory privacy. To receive location-related services, users must disclose their exact location to the server. However, disclosure of users' location exposes not only their locations but also their trajectory to the server, which can lead to concerns of privacy violation. Furthermore, users request from the server not only location information but also multimedia information (photographs, reviews, etc. of the location), and this increases the processing cost of the server and the information to be received by the user. To solve these problems, this study proposes the EGTC (Enhanced Grid-based Trajectory Cloaking) technique. As with the existing GTC (Grid-based Trajectory Cloaking) technique, EGTC method divides the user trajectory into grids at the user privacy level (UPL) and creates a cloaking region in which a random query sequence is determined. In the next step, the necessary information is received as index by considering the sub-grid cell corresponding to the path through which the user wishes to move as c(x,y). The proposed method ensures the trajectory privacy as with the existing GTC method while reducing the amount of information the user must listen to. The excellence of the proposed method has been proven through experimental results.

Classification of BcN Vulnerabilities Based on Extended X.805 (X.805를 확장한 BcN 취약성 분류 체계)

  • Yoon Jong-Lim;Song Young-Ho;Min Byoung-Joon;Lee Tai-Jin
    • The KIPS Transactions:PartC
    • /
    • v.13C no.4 s.107
    • /
    • pp.427-434
    • /
    • 2006
  • Broadband Convergence Network(BcN) is a critical infrastructure to provide wired-and-wireless high-quality multimedia services by converging communication and broadcasting systems, However, there exist possible danger to spread the damage of an intrusion incident within an individual network to the whole network due to the convergence and newly generated threats according to the advent of various services roaming vertically and horizontally. In order to cope with these new threats, we need to analyze the vulnerabilities of BcN in a system architecture aspect and classify them in a systematic way and to make the results to be utilized in preparing proper countermeasures, In this paper, we propose a new classification of vulnerabilities which has been extended from the ITU-T recommendation X.805, which defines the security related architectural elements. This new classification includes system elements to be protected for each service, possible attack strategies, resulting damage and its criticalness, and effective countermeasures. The new classification method is compared with the existing methods of CVE(Common Vulnerabilities and Exposures) and CERT/CC(Computer Emergency Response Team/Coordination Center), and the result of an application to one of typical services, VoIP(Voice over IP) and the development of vulnerability database and its management software tool are presented in the paper. The consequence of the research presented in the paper is expected to contribute to the integration of security knowledge and to the identification of newly required security techniques.