• Title/Summary/Keyword: 코드 전송

Search Result 761, Processing Time 0.029 seconds

A study of mitigated interference Chaotic-OOK system in IEEE802.15.4a (IEEE 802.15.4a 채널환경하에서의 저간섭 Chaotic OOK 무선통신기술의 BER 성능분석에 관한 연구)

  • Jeong, Jae-Ho;Park, Goo-Man;Jeon, Tae-Hyun;Seo, Bo-Seok;Kwak, Kyung-Sup;Jang, Yeong-Min;Choi, Sang-Yule;Cha, Jae-Sang
    • Journal of Broadcast Engineering
    • /
    • v.12 no.2
    • /
    • pp.148-158
    • /
    • 2007
  • Recently, IEEE 802.15.4a(low-rate UWB) technique has been paid much attention to the LR-UWB communication system for WPAN. However, there are various interferences such as MPI(Multi Path Interference) or IPI(Inter Piconet Interference) in IEEE 802.15.4a wireless channel. In order to cancel various interferences occurred to WPAN environment, in this paper, we propose a UWB wireless communication system with high QoS(Quality of Service) which is a chaotic-OOK(On-Off Keying) system using unipolar ZCD(Zero Correlation Duration) spreading code in physical layer level. Furthermore, we analyze its performance via simulations and verify the availability of proposed system with prototype implementation.

An Improvement of Still Image Quality Based on Error Resilient Entropy Coding for Random Error over Wireless Communications (무선 통신상 임의 에러에 대한 에러내성 엔트로피 부호화에 기반한 정지영상의 화질 개선)

  • Kim Jeong-Sig;Lee Keun-Young
    • Journal of the Institute of Electronics Engineers of Korea SP
    • /
    • v.43 no.3 s.309
    • /
    • pp.9-16
    • /
    • 2006
  • Many image and video compression algorithms work by splitting the image into blocks and producing variable-length code bits for each block data. If variable-length code data are transmitted consecutively over error-prone channel without any error protection technique, the receiving decoder cannot decode the stream properly. So the standard image and video compression algorithms insert some redundant information into the stream to provide some protection against channel errors. One of redundancies is resynchronization marker, which enables the decoder to restart the decoding process from a known state in the event of transmission errors, but its usage should be restricted not to consume bandwidth too much. The Error Resilient Entropy Code(EREC) is well blown method which can regain synchronization without any redundant information. It can work with the overall prefix codes, which many image compression methods use. This paper proposes EREREC method to improve FEREC(Fast Error-Resilient Entropy Coding). It first calculates initial searching position according to bit lengths of consecutive blocks. Second, initial offset is decided using statistical distribution of long and short blocks, and initial offset can be adjusted to insure all offset sequence values can be used. The proposed EREREC algorithm can speed up the construction of FEREC slots, and can improve the compressed image quality in the event of transmission errors. The simulation result shows that the quality of transmitted image is enhanced about $0.3{\sim}3.5dB$ compared with the existing FEREC when random channel error happens.

A Conceptual Design of Maintenance Information System Interlace for Real-Time Diagnosis of Driverless EMU (무인전동차의 실시간 상태 진단을 위한 유지보수 정보시스템 인터페이스에 대한 개념설계)

  • Han, Jun-hee;Kim, Chul-Su
    • Journal of the Korea Academia-Industrial cooperation Society
    • /
    • v.18 no.10
    • /
    • pp.63-68
    • /
    • 2017
  • Although automated metro subway systems have the advantage of operating a train without a train driver, it is difficult to detect an immediate fault condition and take countermeasures when an unusual situation occurs. Therefore, it is important to construct a maintenance information system (MIS) that detects the vehicle failure/status information in real time and maintains it efficiently in the depot of the railway's vehicles. This paper proposes a conceptual design method that realizes the interface between the train control system (TCS), the operation control center train control monitoring system (OCC-TCMS) console, and the MIS using wireless communication network in real-time. To transmit a large amount of information on 800,000 occurrences per day during operation, data was collected in a 56 byte data table using a data processing algorithm. This state information was classified into 4 hexadecimal codes and transmitted to the MIS by mapping the status and the fault information on the vehicle during the main line operation. Furthermore, the transmission and reception data were examined in real time between the TCS and MIS, and the implementation of the failure information screen was then displayed.

Analysis on Energy Consumption Required for Building DTLS Session Between Lightweight Devices in Internet of Things (사물인터넷에서 경량화 장치 간 DTLS 세션 설정 시 에너지 소비량 분석)

  • Kwon, Hyeokjin;Kang, Namhi
    • The Journal of Korean Institute of Communications and Information Sciences
    • /
    • v.40 no.8
    • /
    • pp.1588-1596
    • /
    • 2015
  • In the Internet of Things (IoT), resource-constrained devices such as sensors are capable of communicating and exchanging data over the Internet. The IETF standard group has specified an application protocol CoAP, which uses UDP as a transport protocol, allows such a lightweight device to transmit data. Also, the IETF recommended the DTLS binding for securing CoAP. However, additional features should be added to the DTLS protocol to resolve several problems such as packet loss, reordering, fragmentation and replay attack. Consequently, performance of DTLS is worse than TLS. It is highly required for lightweight devices powered by small battery to design and implement a security protocol in an energy efficient manner. This paper thus discusses about DTLS performance in the perspective of energy consumption. To analyze the performance, we implemented IEEE 802.15.4 based test network consisting of constrained sensor devices in the Cooja simulator. We measured energy consumptions required for each of DTLS client and server in the test network. This paper compares the energy consumption and amount of transmitted data of each flight of DTLS handshake, and the processing and receiving time. We present the analyzed results with regard to code size, cipher primitive and fragmentation as well.

Implementation of EPCIS Capturing Application for Finished Goods Trace History in EPC Network (완성품 이력추적을 위한 EPC Network기반 EPCIS Capturing Application 개발)

  • Kim, Jinsuk;Shin, Yongtae
    • Journal of Internet Computing and Services
    • /
    • v.16 no.2
    • /
    • pp.19-26
    • /
    • 2015
  • Operating on its own to develop a system or based on the standard to setup and operating of RFID System. If you want to operate RFID system yourself then It is no problem to use its own to develop a system, but have to implementation RFID System based standard for the system integration and data linkage in multiple companies or base. In this paper, I propose an EPCIS Capturing Application of the element for applying an RFID-based EPC Network as an international civil standards organization EPCglobal. EPCIS Capturing Application generation is a message for transmission to EPCIS receives the data transmitted from the reader and middleware to serve to transfer the EPCIS. This paper also proposes Capture Interface capable of receiving the data of the equipment does not use the ALE Interface as a portable RFID reader ALE Interface, as well as used by the RFID reader to implement a fixed system for use in the field. In this paper, we propose a EPCIS Capturing Application for tracking the history RFID is applied to the finished product. It is possible to take advantage to be applied to all systems based on the EPCglobal standard through proposed the EPCIS Capturing Application.

Image Compression Using DCT Map FSVQ and Single - side Distribution Huffman Tree (DCT 맵 FSVQ와 단방향 분포 허프만 트리를 이용한 영상 압축)

  • Cho, Seong-Hwan
    • The Transactions of the Korea Information Processing Society
    • /
    • v.4 no.10
    • /
    • pp.2615-2628
    • /
    • 1997
  • In this paper, a new codebook design algorithm is proposed. It uses a DCT map based on two-dimensional discrete cosine of transform (2D DCT) and finite state vector quantizer (FSVQ) when the vector quantizer is designed for image transmission. We make the map by dividing input image according to edge quantity, then by the map, the significant features of training image are extracted by using the 2D DCT. A master codebook of FSVQ is generated by partitioning the training set using binary tree based on tree-structure. The state codebook is constructed from the master codebook, and then the index of input image is searched at not master codebook but state codebook. And, because the coding of index is important part for high speed digital transmission, it converts fixed length codes to variable length codes in terms of entropy coding rule. The huffman coding assigns transmission codes to codes of codebook. This paper proposes single-side growing huffman tree to speed up huffman code generation process of huffman tree. Compared with the pairwise nearest neighbor (PNN) and classified VQ (CVQ) algorithm, about Einstein and Bridge image, the new algorithm shows better picture quality with 2.04 dB and 2.48 dB differences as to PNN, 1.75 dB and 0.99 dB differences as to CVQ respectively.

  • PDF

Secure File Transfer Method and Forensic Readiness by converting file format in Network Segmentation Environment (망분리 환경에서 파일형식 변환을 통한 안전한 파일 전송 및 포렌식 준비도 구축 연구)

  • Han, Jaehyeok;Yoon, Youngin;Hur, Gimin;Lee, Jaeyeon;Choi, Jeongin;Hong, SeokJun;Lee, Sangjin
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.29 no.4
    • /
    • pp.859-866
    • /
    • 2019
  • Cybersecurity attack targeting a specific user is rising in number, even enterprises are trying to strengthen their cybersecurity. Network segmentation environment where public network and private network are separated could block information coming from the outside, however, it is unable to control outside information for business efficiency and productivity. Even if enterprises try to enhance security policies and introduce the network segmentation system and a solution incorporating CDR technology to remove unnecessary data contained in files, it is still exposed to security threats. Therefore, we suggest a system that uses file format conversion to transmit a secure file in the network separation environment. The secure file is converted into an image file from a document, as it reflects attack patterns of inserting malicious code into the document file. Additionally, this paper proposes a system in the environment which functions that a document file can keep information for incident response, considering forensic readiness.

A Technique Getting Fast Masks Using Rough Division in Dynamic ROI Coding of JPEG2000 (JPEG2000의 동적 ROI 코딩에서 개략적인 분할을 이용한 빠른 마스크 생성 기법)

  • Park, Jae-Heung;Lee, Jum-Sook;Seo, Yeong-Geon;Hong, Do-Soon;Kim, Hyun-Joo
    • The KIPS Transactions:PartB
    • /
    • v.17B no.6
    • /
    • pp.421-428
    • /
    • 2010
  • It takes a long time for the users to view a whole image from the image server under the low-bandwidth internet environments or in case of a big sized image. In this case, as there needs a technique that preferentially transfers a part of image, JPEG2000 offers a ROI(Region-of-Interest) coding. In ROI coding, the users see the thumbnail of image from the server and specifies some regions that they want to see first. And then if an information about the regions are informed to the server, the server preferentially transfers the regions of the image. The existing methods requested a huge time to compute the mask information, but this thesis approximately computes the regions and reduces the creating time of the ROI masks. If each code block is a mixed block which ROI and background are mixed, the proper boundary points should be acquired. Searching the edges of the block, getting the two points on the edge, to get the boundary point inside the code block, the method searches a mid point between the two edge points. The proposed method doesn't have a big difference compared to the existing methods in quality, but the processing time is more speedy than the ones.

A Study on Performance Comparison of Multipurpose Function Electronic Measurement Reference Station Prototype System using LED and Gyro Sensor (LED 및 자이로센서를 이용한 다기능 전자측량기준점 프로토타입 시스템의 성능비교에 관한 연구)

  • Park, Sung-Kyun;Jung, Se-Hoon;Park, Dong-Gook;Sim, Chun-Bo
    • The Journal of the Korea institute of electronic communication sciences
    • /
    • v.8 no.8
    • /
    • pp.1247-1255
    • /
    • 2013
  • In this paper, We proposes multipurpose function electronic measurement reference station prototype system based on LED and Gyro Sensor. This system have developed to possible with real time data collection and landscape illumination and surrounding diastrophism monitoring for that analyze problems of existing planted reference station. Hardware for the proposed system consists of a gyro sensor module to detect diastrophism, GPS module to process location information, environment sensor module to process surrounding environmental data and CDMA wireless data communication to send the collected data to server. In addition, this paper intends to enhance system management and future usability in a way that applies LED, QR-code, RFID and Solar cell module to outer side of electronic measurement reference station to improve usability of H/W for electronic measurement reference station. Lastly, this paper conducted current amount evaluation to supply stabilized electricity with its various functions in the proposed multipurpose function electronic measurement reference station and it's proved that this system can be stably operated with its electricity loss factor of 2.29% loss factor. And this paper conducted a qualitative comparison with existing electronic measurement reference station system in order to evaluate superiority of the proposed electronic measurement reference station.

BER performance analysis of successive interference cancellation(SIC) algorithm for W-CDMA HSDPA receiver (W-CDMA HSDPA수신기의 직렬간섭제거 알고리즘의 오류율 성능해석)

  • Koo Je-Gil
    • Journal of the Institute of Electronics Engineers of Korea TC
    • /
    • v.41 no.1
    • /
    • pp.13-22
    • /
    • 2004
  • This paper drives the exact expression of bit error rate(BER) performance for successive interference cancellation(SIC) algorithm against multipath interference components in a high-speed downlink packet access(HSDPA) system of W-CDMA downlink and the BER performance is evaluated by numerical analysis. Numerical results showed that the average BER performance is rapidly saturated in terms of increasing the number of multipath and is revealed significant improvement for improvement Processing gain(PG). For example, the average BER Performance of the SIC algorithm is superior to the performance of conventional scheme by more than 7dB and 1.4dB for processing gain PG=54 and 128 under the two-path channel and average BER=$1.0{\times}10^{-3}$, respectively. This results also indicated that the average BER saturation is occurred at nearly one weight factor which is assigned to pilot and data channels. Likewise, the average BER performance is greatly degraded due to increasing the interference power in proportional to the number of multipath with increasing multicode K. And the smaller multipath fading channel gain is arrived later, the more the average BER performance is improved. The results of performance analysis in this paper indicated that the multipath interference cancellation is required to improve the BER performance in a HSDPA system under multicode for high-speed packet transmission, low spreading factor, and multipath fading channel.