• Title/Summary/Keyword: Bit errors

Search Result 314, Processing Time 0.029 seconds

Distributed Coding Scheme for Multi-view Video through Efficient Side Information Generation

  • Yoo, Jihwan;Ko, Min Soo;Kwon, Soon Chul;Seo, Young-Ho;Kim, Dong-Wook;Yoo, Jisang
    • Journal of Electrical Engineering and Technology
    • /
    • v.9 no.5
    • /
    • pp.1762-1773
    • /
    • 2014
  • In this paper, a distributed image coding scheme for multi-view video through an efficient generation of side information is proposed. A distributed video coding technique corrects the errors in the side information, which is generated with the original image, by using the channel coding technique at the decoder. Therefore, the more correct the generated side information is, the better the performance of distributed video coding. The proposed technique is to apply the distributed video coding schemes to the image coding for multi-view video. It generates side information by selectively and efficiently using both 3-dimensional warping based on the depth map with spatially adjacent frames and motion-compensated temporal interpolation with temporally adjacent frames. In this scheme the difference between the adjacent frames, the sizes of the motion vectors for the adjacent blocks, and the edge information are used as the selection criteria. From the experiments, it was observed that the quality of the side information generated by the proposed technique was improved by the average peak signal-to-noise ratio of 0.97dB than the one by motion-compensated temporal interpolation or 3-dimensional warping. The result from analyzing the rate-distortion curves revealed that the proposed scheme could reduce the bit-rate by 8.01% on average at the same peak signal-to-noise ratio value, compared to previous work.

A Study on the High Performance TCP over Various Communication Links (다양한 통신 링크에서 고성능 TCP에 관한 연구)

  • Kim, Sang-Mi;Choe, Seon-Wan;Han, Seon-Yeong
    • The KIPS Transactions:PartC
    • /
    • v.9C no.2
    • /
    • pp.197-212
    • /
    • 2002
  • Transmission Control Protocol (TCP) [1] has been tuned as a reliable transfer protocol for traditional networks comprising wired links and stationary hosts with same link characteristics. TCP assumes that congestion in the network be a primary cause for packet losses and unusual delays. TCP performs welt over such networks adapting to end-to-end delays and congestion losses, by standard congestion control mechanisms, such as slow-start, congestion avoidance, fast retransmit and recovery. However, networks with wireless and other lossy links suffer from significant losses due to bit errors and handoffs. An asymmetry network such as ADSL has different bandwidth for both directions. As a result, TCP's standard mechanisms incur end-to-end performance degradation in various links. In this paper, we analyze the TCP problems in wireless, satellite, and asymmetry links, and measure the new TCP mechanisms that are recommended by IETF Performance Implications of Link Characteristics (PILC) WG[2], by using Network Simulator 2 (NS-2).

Analysis Method of Ice Load and Ship Structural Response due to Collision of Ice Bergy Bit and Level Ice (유빙 및 평탄빙의 충돌에 의한 빙하중과 선체구조응답 해석기법)

  • Nho, In Sik;Lee, Jae-Man;Oh, Young-Taek;Kim, Sung-Chan
    • Journal of the Society of Naval Architects of Korea
    • /
    • v.53 no.2
    • /
    • pp.85-91
    • /
    • 2016
  • The most important factor in the structural design of ships and offshore structures operating in arctic region is ice load, which results from ice-structure interaction during the ice collision process. The mechanical properties of ice related to strength and failure, however, show very complicated aspect varying with temperature, volume fraction of brine, grain size, strain rate and etc. So it is nearly impossible to establish a perfect material model of ice satisfying all the mechanical characteristics completely. Therefore, in general, ice collision analysis was carried out by relatively simple material models considering only specific aspects of mechanical characteristics of ice and it would be the most significant cause of inevitable errors in the analysis. Especially, it is well-known that the most distinctive mechanical property of ice is high dependency on strain rate. Ice shows brittle attribute in higher strain rate while it becomes ductile in lower strain rate range. In this study, the simulation method of ice collision to ship hull using the nonlinear dynamic FE analysis was dealt with. To consider the strain rate effects of ice during ice-structural interaction, strain rate dependent constitutive model in which yield stress and hardening behaviors vary with strain rate was adopted. To reduce the huge amount of computing time, the modeling range of ice and ship structure were restricted to the confined region of interest. Under the various scenario of ice-ship hull collision, the structural behavior of hull panels and failure modes of ice were examined by nonlinear FE analysis technique.

Study on DPSAM Turbo TCM in Time-Selective Fading Channels (시간 선택적 페이딩 채널 환경에서 DPSAM Turbo TCM에 관한 연구)

  • Kim, Jeong-Su
    • Journal of the Korea Society of Computer and Information
    • /
    • v.18 no.11
    • /
    • pp.107-113
    • /
    • 2013
  • Mobile mobility and data reliability should be guaranteed as well as amounts of data services are essential in the era of smart media. In order to improve the reliability of high-speed data, strong channel coding and modulation techniques are required. In this paper, the structure of Turbo TCM decoder, applying high-order modulation techniques and the DPSAM method which improves performances in time-selective fading channels in the case of burst errors are suggested through the optimal decoding method and iteration decoding so as to improve bandwidth efficiency in Turbo Codes with excellent encoding gain. The proposed method in comparison with the existing method is that 3dB is superior in case that BER is $10^{-2}$ and the number of iterations is 3. In addition, the function is improved at approximately 6dB in case that BER is $10^{-3}$ and the number of iterations is 7. The proposed method requires additional bandwidth; however, the bandwidth loss can be overcome through Turbo TCM technology on the additional bit rate from the bandwidth loss.

An Improved Round Reduction Attack on Triple DES Using Fault Injection in Loop Statement (반복문 오류 주입을 이용한 개선된 Triple DES 라운드 축소 공격)

  • Choi, Doo-Sik;Oh, Doo-Hwan;Park, Jeong-Soo;Ha, Jae-Cheol
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.22 no.4
    • /
    • pp.709-717
    • /
    • 2012
  • The round reduction on block cipher is a fault injection attack in which an attacker inserts temporary errors in cryptographic devices and extracts a secret key by reducing the number of operational round. In this paper, we proposed an improved round reduction method to retrieve master keys by injecting a fault during operation of loop statement in the Triple DES. Using laser fault injection experiment, we also verified that the proposed attack could be applied to a pure microprocessor ATmega 128 chip in which the Triple DES algorithm was implemented. Compared with previous attack method which is required 9 faulty-correct cipher text pairs and some exhaustive searches, the proposed one could extract three 56-bit secret keys with just 5 faulty cipher texts.

Adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles

  • Surzhik, Dmitry I.;Kuzichkin, Oleg R.;Vasilyev, Gleb S.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.6
    • /
    • pp.23-28
    • /
    • 2021
  • The article discusses the features of adaptation of the parameters of the physical layer of data transmission in self-organizing networks based on unmanned aerial vehicles operating in the conditions of "smart cities". The concept of cities of this type is defined, the historical path of formation, the current state and prospects for further development in the aspect of transition to "smart cities" of the third generation are shown. Cities of this type are aimed at providing more comfortable and safe living conditions for citizens and autonomous automated work of all components of the urban economy. The perspective of the development of urban mobile automated technical means of infocommunications is shown, one of the leading directions of which is the creation and active use of wireless self-organizing networks based on unmanned aerial vehicles. The advantages of using small-sized unmanned aerial vehicles for organizing networks of this type are considered, as well as the range of tasks to be solved in the conditions of modern "smart cities". It is shown that for the transition to self-organizing networks in the conditions of "smart cities" of the third generation, it is necessary to ensure the adaptation of various levels of OSI network models to dynamically changing operating conditions, which is especially important for the physical layer. To maintain an acceptable level of the value of the bit error probability when transmitting command and telemetry data, it is proposed to adaptively change the coding rate depending on the signal-to-noise ratio at the receiver input (or on the number of channel decoder errors), and when transmitting payload data, it is also proposed to adaptively change the coding rate together with the choice of modulation methods that differ in energy and spectral efficiency. As options for the practical implementation of these solutions, it is proposed to use an approach based on the principles of neuro-fuzzy control, for which examples of determining the boundaries of theoretically achievable efficiency are given.

Intra Prediction Method by Quadric Surface Modeling for Depth Video (깊이 영상의 이차 곡면 모델링을 통한 화면 내 예측 방법)

  • Lee, Dong-seok;Kwon, Soon-kak
    • Journal of Korea Society of Industrial Information Systems
    • /
    • v.27 no.2
    • /
    • pp.35-44
    • /
    • 2022
  • In this paper, we propose an intra-picture prediction method by a quadratic surface modeling method for depth video coding. The pixels of depth video are transformed to 3D coordinates using distance information. A quadratic surface with the smallest error is found by least square method for reference pixels. The reference pixel can be either the upper pixels or the left pixels. In the intra prediction using the quadratic surface, two predcition values are computed for one pixel. Two errors are computed as the square sums of differences between each prediction values and the pixel values of the reference pixels. The pixel sof the block are predicted by the reference pixels and prediction method that they have the lowest error. Comparing with the-state-of-art video coding method, simulation results show that the distortion and the bit rate are improved by up to 5.16% and 5.12%, respectively.

Development of 3-State Blind Digital Watermark based on the Correlation Function (신호상관함수를 이용한 3 상태 능동적 디지털 워터마크의 개발)

  • Choi, YongSoo
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.143-151
    • /
    • 2020
  • The digital content's security and authentication are important in the field of digital content application. There are some methods to perform the authentication. The digital watermarking is one of authentication methods. Paper presents a digital watermark authentication method that works in the application of digital image. The proposed watermark has the triple status information and performs the embedding and the detection without original Content. When authenticating the owner information of digital content, an autocorrelation function is used. In addition, a spread spectrum method is used to be adaptive to the signal of the original content in the frequency domain(DWT Domain). Therefore, the possibility of errors occurring in the detection of hidden information was reduced. it also has a advantage what Watermarking in DWT has faster embedding and detection time than other transformation domains(DFT, DCT, etc.). if it has a an image of size N=mXm, the computational amount can be reduced from O(N·logN) to O(N). The particular advantage is that it can hide more information(bits) per bit.

A comparison study of 76Se, 77Se and 78Se isotope spikes in isotope dilution method for Se (셀레늄의 동위원소 희석분석법에서 첨가 스파이크 동위원소 76Se, 77Se 및 78Se들의 비교분석)

  • Kim, Leewon;Lee, Seoyoung;Pak, Yong-Nam
    • Analytical Science and Technology
    • /
    • v.29 no.4
    • /
    • pp.170-178
    • /
    • 2016
  • Accuracy and precision of ID methods for different spike isotopes of 76Se, 77Se, and 78Se were compared for the analysis of Selenium using quadrupole ICP/MS equipped with Octopole reaction cell. From the analysis of Se inorganic standard solution, all of three spikes showed less than 1 % error and 1 % RSD for both short-term (a day) and long-term (several months) periods. They showed similar results with each other and 78Se showed was a bit better than 76Se and 77Se. However, different spikes showed different results when NIST SRM 1568a and SRM 2967 were analyzed because of the several interferences on the m/z measured and calculated. Interferences due to the generation of SeH from ORC was considered as well as As and Br in matrix. The results showed similar accuracy and precisions against SRM 1568a, which has a simple background matrix, for all three spikes and the recovery rate was about 80% with steadiness. The %RSD was a bit higher than inorganic standard (1.8 %, 8.6 %, and 6.3 % for 78Se, 76Se and 77Se, respectively) but low enough to conclude that this experiment is reliable. However, mussel tissue has a complex matrix showed inaccurate results in case of 78Se isotope spike (over 100 % RSD). 76Se and 77Se showd relatively good results of around 98.6 % and 104.2 % recovery rate. The errors were less than 5 % but the precision was a bit higher value of 15 % RSD. This clearly shows that Br interferences are so large that a simple mathematical calibration is not enough for a complex-matrixed sample. In conclusion, all three spikes show similar results when matrix is simple. However, 78Se should be avoided when large amount of Br exists in matrix. Either 76Se or 77Se would provide accurate results.

Limited Indirect Acknowledgement for TCP Performance Enhancement over Wireless Networks (무선 망에서의 TCP 성능 향상을 위한 제한적인 Indirect-ACK)

  • 김윤주;이미정;안재영
    • Journal of KIISE:Information Networking
    • /
    • v.30 no.2
    • /
    • pp.233-243
    • /
    • 2003
  • With the original Transmission Control Protocol(TCP) design, which is particularly targeted at the wired networks, a packet loss is assumed to be caused by the network congestion. In the wireless environment where the chances to lose packets due to transmission bit errors are not negligible, though, this assumption may result in unnecessary TCP performance degradation. In this paper, we propose three schemes that improve the ability to conceal the packet losses in the wireless network while limiting the degree of violating TCP end-to-end semantics to a temporary incidents. If there happens a packet loss at the wireless link and there is a chance that the loss is noticed by the sending TCP, the proposed schemes send an indirect acknowledgement. Each of the proposed schemes uses different criteria to decide whether there is a chance that the packet loss occurred in the wireless part is noticed by the sender. In order to limit the buffer overhead in the base, the indirect acknowledgements are issued only when the length of buffer is less than a certain threshold. We use simulation to compare the overhead and the performance of the proposed schemes, and to show that the proposed schemes improve the TCP performance compared to Snoop with a limited amount of buffer at the base station.